首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7093篇
  免费   324篇
  国内免费   53篇
电工技术   133篇
综合类   26篇
化学工业   1786篇
金属工艺   118篇
机械仪表   211篇
建筑科学   277篇
矿业工程   6篇
能源动力   462篇
轻工业   725篇
水利工程   76篇
石油天然气   115篇
无线电   653篇
一般工业技术   1142篇
冶金工业   337篇
原子能技术   83篇
自动化技术   1320篇
  2024年   24篇
  2023年   151篇
  2022年   317篇
  2021年   405篇
  2020年   295篇
  2019年   335篇
  2018年   416篇
  2017年   358篇
  2016年   355篇
  2015年   236篇
  2014年   319篇
  2013年   641篇
  2012年   356篇
  2011年   505篇
  2010年   350篇
  2009年   326篇
  2008年   288篇
  2007年   217篇
  2006年   201篇
  2005年   140篇
  2004年   111篇
  2003年   117篇
  2002年   90篇
  2001年   64篇
  2000年   73篇
  1999年   50篇
  1998年   77篇
  1997年   41篇
  1996年   49篇
  1995年   40篇
  1994年   36篇
  1993年   44篇
  1992年   36篇
  1991年   32篇
  1990年   30篇
  1989年   20篇
  1988年   35篇
  1987年   30篇
  1986年   20篇
  1985年   15篇
  1984年   27篇
  1983年   22篇
  1982年   22篇
  1981年   16篇
  1980年   20篇
  1979年   16篇
  1978年   17篇
  1976年   18篇
  1975年   19篇
  1974年   12篇
排序方式: 共有7470条查询结果,搜索用时 10 毫秒
91.
We show that for some special functions (called k-multigrid equidistributed functions), we can compute the limit of the frequency of patterns in the discretization of their graph, when the resolution tends to zero. This result is applied to parabolas. We deduce also that local length estimators almost never converge to the length for the parabolas.  相似文献   
92.
This paper describes a new approach of heterogeneous data source fusion. Data sources are either static or active: static data sources can be structured or semi-structured, whereas active sources are services. In order to develop data sources fusion systems in dynamic contexts, we need to study all issues raised by the matching paradigms. This challenging problem becomes crucial with the dominating role of the internet. Classical approaches of data integration, based on schemas mediation, are not suitable to the World Wide Web (WWW) environment where data is frequently modified or deleted. Therefore, we develop a loosely integrated approach that takes into consideration both conflict management and semantic rules which must be enriched in order to integrate new data sources. Moreover, we introduce an XML-based Multi-data source Fusion Language (MFL) that aims to define and retrieve conflicting data from multiple data sources. The system, which is developed according to this approach, is called MDSManager (Multi-Data Source Manager). The benefit of the proposed framework is shown through a real world application based on web data sources fusion which is dedicated to online markets indices tracking. Finally, we give an evaluation of our MFL language. The results show that our language improves significantly the XQuery language especially considering its expressiveness power and its performances.  相似文献   
93.
A malware mutation engine is able to transform a malicious program to create a different version of the program. Such mutation engines are used at distribution sites or in self-propagating malware in order to create variation in the distributed programs. Program normalization is a way to remove variety introduced by mutation engines, and can thus simplify the problem of detecting variant strains. This paper introduces the “normalizer construction problem” (NCP), and formalizes a restricted form of the problem called “NCP=”, which assumes a model of the engine is already known in the form of a term rewriting system. It is shown that even this restricted version of the problem is undecidable. A procedure is provided that can, in certain cases, automatically solve NCP= from the model of the engine. This procedure is analyzed in conjunction with term rewriting theory to create a list of distinct classes of normalizer construction problems. These classes yield a list of possible attack vectors. Three strategies are defined for approximate solutions of NCP=, and an analysis is provided of the risks they entail. A case study using the virus suggests the approximations may be effective in practice for countering mutated malware. R. Mathur is presently at McAfee AVERT Labs.  相似文献   
94.
OBJECTIVE: To investigate the effect of optic flow on gait behavior during treadmill walking using an immersive virtual reality (VR) setup and compare it with conventional treadmill walking (TW) and overground walking (OW). BACKGROUND: Previous research comparing TW with OW speculated that a lack of optic flow (relative visual movement between a walker and the environment) during TW may have led to perceptual cue conflicts, resulting in differences in gait behavior, as compared with OW. METHOD: Participants walked under three locomotion conditions (OW, TW, and TW with VR [TWVR]) under three walking constraint conditions (no constraint, a temporal/pacing constraint, and a spatial/path-following constraint). Presence questionnaires (PQs) were administered at the close of the TWVR trials. Trials were subjected to video analysis to determine spatiotemporal and kinematics variables used for comparison of locomotion conditions. RESULTS: ANOVA revealed gait behavior during TWVR to be between that of OW and TW. Speed and cadence during TWVR were significantly different from those of TW, whereas knee angle was comparable to that of OW. Correlation analysis of PQ scores with gait measures revealed a positive linear association of the distraction subfactor of the PQ with walking speed during TWVR, suggesting an increase in the sense of presence in the virtual environment led to increases in walking speed. CONCLUSION: The results demonstrate that providing optic flow during TW through VR has an impact on gait behavior. APPLICATION: This study provides a basis for developing simple VR locomotion interface setups for gait research.  相似文献   
95.
We use Schnyder woods of 3-connected planar graphs to produce convex straight-line drawings on a grid of size The parameter depends on the Schnyder wood used for the drawing. This parameter is in the range The algorithm is a refinement of the face-counting algorithm; thus, in particular, the size of the grid is at most The above bound on the grid size simultaneously matches or improves all previously known bounds for convex drawings, in particular Schnyder's and the recent Zhang and He bound for triangulations and the Chrobak and Kant bound for 3-connected planar graphs. The algorithm takes linear time. The drawing algorithm has been implemented and tested. The expected grid size for the drawing of a random triangulation is close to For a random 3-connected plane graph, tests show that the expected size of the drawing is   相似文献   
96.
In this paper, we aim to provide adaptive multimedia services especially video ones to end-users in an efficient and secure manner. Users moving outside the office should be able to maintain an office-like environment at their current locations. First, the agents within our proposed architecture negotiate the different communication and interaction factors autonomously and dynamically. Moreover, we needed to develop a user agent in addition to service and system agents that could negotiate the requirements and capabilities at run time to furnish best possible service results. Thus we designed and integrated a video indexing and key framing service within our overall agent-based architecture. We integrated this video indexing and content-based analysis service to adapt the video content according to run time conditions. We designed a video XML schema to validate the media content out of this multimedia service according to specific requirements and features, as we will describe later.
Ahmed KarmouchEmail:
  相似文献   
97.
In this paper, new wavelet-based affine invariant functions for shape representation are presented. Unlike the previous representation functions, only the approximation coefficients are used to obtain the proposed functions. One of the derived functions is computed by applying a single wavelet transform; the other function is calculated by applying two different wavelet transforms with two different wavelet families. One drawback of the previously derived detail-based invariant representation functions is that they are sensitive to noise at the finer scale levels, which limits the number of scale levels that can be used. The experimental results in this paper demonstrate that the proposed functions are more stable and less sensitive to noise than the detail-based functions.  相似文献   
98.
Disruption damage conditions for future large tokamaks like ITER are nearly impossible to simulate on current tokamaks. The electrothermal plasma source SIRENS has been designed, constructed, and operated to produce high density (> 1025/m3), low temperature (1–3 eV) plasma formed by the ablation of the insulator with currents of up to 100 kA (100 s pulse length) and energies up to 15 kJ. The source heat fluence (variable from 0.2 to 7 MJ/m2) is adequate for simulation of the thermal quench phase of plasma disruption in future fusion tokamaks. Different materials have been exposed to the high heat flux in SIRENS, where comparative erosion behavior was obtained. Vapor shield phenomena has been characterized for different materials, and the energy transmission factor through the shielding layer is obtained. The device is also equipped with a magnet capable of producing a parallel magnetic field (up to 16 T) over a 8 msec pulse length. The magnetic field is produced to decrease the turbulent energy transport through the vapor shield, which provides further reduction of surface erosion (magnetic vapor shield effect).  相似文献   
99.
For part I see ibid. vol.8, no. 1 (2000). This paper presents an application of the generalized hidden Markov models to handwritten word recognition. The system represents a word image as an ordered list of observation vectors by encoding features computed from each column in the given word image. Word models are formed by concatenating the state chains of the constituent character hidden Markov models. The novel work presented includes the preprocessing, feature extraction, and the application of the generalized hidden Markov models to handwritten word recognition. Methods for training the classical and generalized (fuzzy) models are described. Experiments were performed on a standard data set of handwritten word images obtained from the US Post Office mail stream, which contains real-word samples of different styles and qualities  相似文献   
100.
We present new and effective lower bounds for the resource constrained project scheduling problem. This problem is widely known to be notoriously difficult to solve due to the lack of lower bounds that are both tight and fast. In this paper, we propose several new lower bounds that are based on the concept of energetic reasoning. A major contribution of this work is to investigate several enhanced new feasibility tests that prove useful for deriving new lower bounds that consistently outperform the classical energetic reasoning-based lower bound. In particular, we present the results of a comprehensive computational study, carried out on 1560 benchmark instances, that provides strong evidence that a deceptively simple dual feasible function-based lower bound is highly competitive with a state-of-the-art lower bound while being extremely fast. Furthermore, we found that an effective shaving procedure enables to derive an excellent lower bound that often outperforms the best bound from the literature while being significantly simpler.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号