首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4861篇
  免费   265篇
  国内免费   11篇
电工技术   32篇
综合类   5篇
化学工业   1018篇
金属工艺   96篇
机械仪表   102篇
建筑科学   240篇
矿业工程   8篇
能源动力   152篇
轻工业   471篇
水利工程   48篇
石油天然气   18篇
武器工业   2篇
无线电   429篇
一般工业技术   904篇
冶金工业   845篇
原子能技术   29篇
自动化技术   738篇
  2024年   6篇
  2023年   43篇
  2022年   82篇
  2021年   136篇
  2020年   96篇
  2019年   110篇
  2018年   143篇
  2017年   126篇
  2016年   159篇
  2015年   118篇
  2014年   158篇
  2013年   277篇
  2012年   274篇
  2011年   338篇
  2010年   241篇
  2009年   265篇
  2008年   301篇
  2007年   284篇
  2006年   232篇
  2005年   243篇
  2004年   173篇
  2003年   149篇
  2002年   158篇
  2001年   76篇
  2000年   68篇
  1999年   60篇
  1998年   70篇
  1997年   66篇
  1996年   71篇
  1995年   53篇
  1994年   52篇
  1993年   54篇
  1992年   39篇
  1991年   28篇
  1990年   38篇
  1989年   38篇
  1988年   31篇
  1987年   42篇
  1986年   39篇
  1985年   33篇
  1984年   26篇
  1983年   29篇
  1982年   27篇
  1981年   15篇
  1980年   12篇
  1979年   10篇
  1978年   13篇
  1976年   10篇
  1975年   7篇
  1974年   5篇
排序方式: 共有5137条查询结果,搜索用时 0 毫秒
81.
Though the network quality-of-service (QoS) metrics are defined in terms of technical parameters (e.g., delay, jitter, bandwidth), they are rather subjective when it comes to the end user. Oftentimes, the end user finds it difficult to express his desired QoS in such technical parameters, though he has a fair idea of what QoS he desires. In this paper, we show how translation functions can be devised and used to translate the user inputs to networking parameters that are used by various layers of the protocol stack. In particular, we consider an ad hoc network and show an interface design that uses translation functions to map user supplied inputs to parameters at the medium access control (MAC) and routing layers. These parameters, in turn, choose the right strategies that particular layer functionality can adopt, such that the QoS desired by the user is achieved. We also compute the associated costs due to the different strategies adopted. We implement the interface on ns-2 and conduct simulation experiments with randomly scattered IEEE 802.11 enabled nodes. Results show the functionality of the interface and demonstrate how delay, throughput, and network lifetime are affected when the end user seeks different levels of QoS.  相似文献   
82.
The DTN architecture is based around sender-initiated unicast communication that is insufficient or inconvenient to meet the needs of many applications. To address these limitations, we define a DTN session layer and associated extensions to the DTN bundle protocol that more naturally support receiver-driven applications and multicast communication. Within a session, we provide mechanisms allowing applications to convey ordering relationships between successive transmissions that can be used by the network to help ensure a distributed application’s delivery ordering expectations are met. We also extend the bundle protocol’s expiration procedures to support more efficient network utilization by allowing in-network deletion of obsolete messages. We present the design rationale and describe our implementation of these mechanisms and discuss their advantages in meeting the needs of several popular types of applications.  相似文献   
83.
We propose a technique for defeating signature-based malware detectors by exploiting information disclosed by antivirus interfaces. This information is leveraged to reverse engineer relevant details of the detector's underlying signature database, revealing binary obfuscations that suffice to conceal malware from the detector. Experiments with real malware and antivirus interfaces on Windows operating systems justify the effectiveness of our approach.  相似文献   
84.
Detecting communities is of great importance in social network analysis. However it is an issue that has not yet been satisfactorily solved, despite the efforts made by interdisciplinary research communities over the past few years, because of the nature of complexity in deciding how community structures should be recognized. In this paper we propose an approach based on cooperative game theory for community detection in social networks. We regard individuals as players, and regard communities as coalitions formed by players, and model community detection problem as the formation and optimization of coalitions. Furthermore, we define coalition profile for players to indicate coalitions that players joined, the order of a coalition profile is defined as the number of coalitions in a coalition profile, and we introduce a utility function to measure preference of coalition profiles. Accordingly, we propose an algorithm to detect a coalition profile with maximal utility function values. We have implemented the algorithms developed in this study and experimental results demonstrate the effectiveness of our approaches.  相似文献   
85.
The objective of this paper is to elucidate an organizational process for the design of generic technologies (GTs). While recognizing the success of GTs, the literature on innovation management generally describes their design according to evolutionary strategies featuring multiple and uncertain trials, resulting in the discovery of common features among multiple applications. This random walk depends on multiple market and technological uncertainties that are considered exogenous: as smart as he can be, the ‘gambler’ must play in a given probability space. However, what happens when the innovator is not a gambler but a designer, i.e., when the actor is able to establish new links between previously independent emerging markets and technologies? Formally speaking, the actor designs a new probability space. Building on a case study of two technological development programmes at the French Center for Atomic Energy, we present cases of GTs that correspond to this logic of designing the probability space, i.e. the logic of intentionally designing common features that bridge the gap between a priori heterogeneous applications and technologies. This study provides another example showing that the usual trial‐and‐learning strategy is not the only strategy to design GTs and that these technologies can be designed by intentionally building new interdependences between markets and technologies. Our main result is that building these interdependences requires organizational patterns that correspond to a ‘design of exploration’ phase in which multiple technology suppliers and application providers are involved in designing both the probability space itself and the instruments to explore and benefit from this new space.  相似文献   
86.
This paper describes Team THOR's approach to human‐in‐the‐loop disaster response robotics for the 2015 DARPA Robotics Challenge (DRC) Finals. Under the duress of unpredictable networking and terrain, fluid operator interactions and dynamic disturbance rejection become major concerns for effective teleoperation. We present a humanoid robot designed to effectively traverse a disaster environment while allowing for a wide range of manipulation abilities. To complement the robot hardware, a hierarchical software foundation implements network strategies that provide real‐time feedback to an operator under restricted bandwidth using layered user interfaces. Our strategy for humanoid locomotion includes a backward‐facing knee configuration paired with specialized toe and heel lifting strategies that allow the robot to traverse difficult surfaces while rejecting external perturbations. With an upper body planner that encodes operator preferences, predictable motion plans are executed in unforeseen circumstances. These plans are critical for manipulation in unknown environments. Our approach was validated during the DRC Finals competition, where Team THOR scored three points in 18 min of operation time, and the results are presented along with an analysis of each task.  相似文献   
87.
Practical and financial constraints associated with traditional field-based lithological mapping are often responsible for the generation of maps with insufficient detail and inaccurately located contacts. In arid areas with well exposed rocks and soils, high-resolution multi- and hyperspectral imagery is a valuable mapping aid as lithological units can be readily discriminated and mapped by automatically matching image pixel spectra to a set of reference spectra. However, the use of spectral imagery in all but the most barren terrain is problematic because just small amounts of vegetation cover can obscure or mask the spectra of underlying geological substrates. The use of ancillary information may help to improve lithological discrimination, especially where geobotanical relationships are absent or where distinct lithologies exhibit inherent spectral similarity. This study assesses the efficacy of airborne multispectral imagery for detailed lithological mapping in a vegetated section of the Troodos ophiolite (Cyprus), and investigates whether the mapping performance can be enhanced through the integration of LiDAR-derived topographic data. In each case, a number of algorithms involving different combinations of input variables and classification routine were employed to maximise the mapping performance. Despite the potential problems posed by vegetation cover, geobotanical associations aided the generation of a lithological map - with a satisfactory overall accuracy of 65.5% and Kappa of 0.54 - using only spectral information. Moreover, owing to the correlation between topography and lithology in the study area, the integration of LiDAR-derived topographic variables led to significant improvements of up to 22.5% in the overall mapping accuracy compared to spectral-only approaches. The improvements were found to be considerably greater for algorithms involving classification with an artificial neural network (the Kohonen Self-Organizing Map) than the parametric Maximum Likelihood Classifier. The results of this study demonstrate the enhanced capability of data integration for detailed lithological mapping in areas where spectral discrimination is complicated by the presence of vegetation or inherent spectral similarities.  相似文献   
88.
Satellite images, along with oceanographic, meteorological, and whale aerial survey data, are used to illustrate aspects of ocean circulation associated with a bowhead whale feeding ‘hotspot’ near Barrow, Alaska. In response to weak winds, a strong front forms near the shelf-break along the southern edge of Barrow Canyon when the Alaska Coastal Current flows adjacent to the southern flank of Barrow Canyon or intrudes onto the western Beaufort shelf. This front is of particular local interest because it is indicative of aggregation and retention of zooplankton on the western Beaufort shelf and, as a result, is a locus for bowhead whales pausing to feed during their westward fall migration. Groups (4 or more individuals) of bowhead whales are primarily seen on the western Beaufort shelf following wind conditions that promote the formation of this front.  相似文献   
89.
We give the first algorithm that is both query-efficient and time-efficient for testing whether an unknown function f:{0,1} n →{−1,1} is an s-sparse GF(2) polynomial versus ε-far from every such polynomial. Our algorithm makes poly(s,1/ε) black-box queries to f and runs in time n⋅poly(s,1/ε). The only previous algorithm for this testing problem (Diakonikolas et al. in Proceedings of the 48th Annual Symposium on Foundations of Computer Science, FOCS, pp. 549–558, 2007) used poly(s,1/ε) queries, but had running time exponential in s and super-polynomial in 1/ε.  相似文献   
90.
Genetic adaptive state estimation   总被引:1,自引:0,他引:1  
A genetic algorithm (GA) uses the principles of evolution, natural selection, and genetics to offer a method for parallel search of complex spaces. This paper describes a GA that can perform on-line adaptive state estimation for linear and nonlinear systems. First, it shows how to construct a genetic adaptive state estimator where a GA evolves the model in a state estimator in real time so that the state estimation error is driven to zero. Next, several examples are used to illustrate the operation and performance of the genetic adaptive state estimator. Its performance is compared to that of the conventional adaptive Luenberger observer for two linear system examples. Next, a genetic adaptive state estimator is used to predict when surge and stall occur in a nonlinear jet engine. Our main conclusion is that the genetic adaptive state estimator has the potential to offer higher performance estimators for nonlinear systems over current methods.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号