首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6919篇
  免费   414篇
  国内免费   16篇
电工技术   127篇
综合类   12篇
化学工业   1792篇
金属工艺   109篇
机械仪表   216篇
建筑科学   247篇
矿业工程   9篇
能源动力   389篇
轻工业   677篇
水利工程   52篇
石油天然气   32篇
无线电   613篇
一般工业技术   1229篇
冶金工业   326篇
原子能技术   36篇
自动化技术   1483篇
  2024年   8篇
  2023年   105篇
  2022年   285篇
  2021年   356篇
  2020年   219篇
  2019年   226篇
  2018年   267篇
  2017年   244篇
  2016年   295篇
  2015年   244篇
  2014年   312篇
  2013年   586篇
  2012年   465篇
  2011年   532篇
  2010年   393篇
  2009年   417篇
  2008年   353篇
  2007年   302篇
  2006年   248篇
  2005年   177篇
  2004年   154篇
  2003年   118篇
  2002年   99篇
  2001年   73篇
  2000年   61篇
  1999年   65篇
  1998年   92篇
  1997年   79篇
  1996年   65篇
  1995年   43篇
  1994年   50篇
  1993年   43篇
  1992年   27篇
  1991年   29篇
  1990年   16篇
  1989年   23篇
  1988年   16篇
  1987年   16篇
  1986年   15篇
  1985年   34篇
  1984年   32篇
  1983年   37篇
  1982年   22篇
  1981年   19篇
  1980年   20篇
  1979年   19篇
  1978年   7篇
  1977年   12篇
  1976年   6篇
  1971年   7篇
排序方式: 共有7349条查询结果,搜索用时 15 毫秒
101.
Measuring the structural similarity between an XML document and a DTD has many relevant applications that range from document classification and approximate structural queries on XML documents to selective dissemination of XML documents and document protection. The problem is harder than measuring structural similarity among documents, because a DTD can be considered as a generator of documents. Thus, the problem is to evaluate the similarity between a document and a set of documents. An effective structural similarity measure should face different requirements that range from considering the presence and absence of required elements, as well as the structure and level of the missing and extra elements to vocabulary discrepancies due to the use of synonymous or syntactically similar tags. In the paper, starting from these requirements, we provide a definition of the measure and present an algorithm for matching a document against a DTD to obtain their structural similarity. Finally, experimental results to assess the effectiveness of the approach are presented.  相似文献   
102.
In this paper, an Adaptive Hierarchical Ant Colony Optimization (AHACO) has been proposed to resolve the traditional machine loading problem in Flexible Manufacturing Systems (FMS). Machine loading is one of the most important issues that is interlinked with the efficiency and utilization of FMS. The machine loading problem is formulated in order to minimize the system unbalance and maximize the throughput, considering the job sequencing, optional machines and technological constraints. The performance of proposed AHACO has been tested over a number of benchmark problems taken from the literature. Computational results indicate that the proposed algorithm is more effective and produces promising results as compared to the existing solution methodologies in the literature. The evaluation and comparison of system efficiency and system utilization justifies the supremacy of the algorithm. Further, results obtained from the proposed algorithm have been compared with well known random search algorithm viz. genetic algorithm, simulated annealing, artificial Immune system, simple ant colony optimization, tabu search etc. In addition, the algorithm has been tested over a randomly generated problem set of varying complexities; the results validate the robustness and scalability of the algorithm utilizing the concepts of ‘heuristic gap’ and ANOVA analysis.  相似文献   
103.
In this article, the design, fabrication, and on‐wafer test of X‐Band and 2–18 GHz wideband high‐power SPDT MMIC switches in AlGaN/GaN technology are presented. The switches have demonstrated state‐of‐the‐art performance and RF fabrication yield better than 65%. Linear and power measurements for different control voltages have been reported and an explanation of the dependence of the power performances on the control voltage is given. In particular, the X‐band switch exhibits a 0.4 dB compression level at 10 GHz when driven by a 38 dBm input signal. The wideband switch shows a compression level of 1 dB at an input drive higher than 38 dBm across the entire bandwidth. © 2009 Wiley Periodicals, Inc. Int J RF and Microwave CAE, 2009.  相似文献   
104.
Although 9-anilinoacridines are among the best studied antitumoral intercalators, there are few studies about the effect of isosteric substitution of a benzene moiety for a heterocycle ring in the acridine framework. According to these studies, this approach may lead to effective cytotoxic agents, but good cytotoxic activity depends on structural requirements in the aniline ring which differ from those in 9-anilinoacridines. The present paper deals with molecular modeling studies of some 9-anilino substituted tricyclic compounds and their intercalation complexes (in various DNA sequences) resulting from docking the compounds into various DNA sequences. As expected, the isosteric substitution in 9-anilinoacridines influences the LUMO energy values and orbital distribution, the dipole moment, electrostatic charges and the conformation of the anilino ring. Other important differences are observed during the docking studies, for example, changes in the spatial arrangement of the tricyclic nucleus and the anilino ring at the intercalation site. Semiempirical calculations of the intercalation complexes show that the isosteric replacement of a benzene ring in the acridine nucleus affects not only DNA affinity but also base pair selectivity. These findings explain, at least partially, the different structural requirements observed in several 9-anilino substituted tricyclic compounds for cytotoxic activity. Thus, the data presented here may guide the rational design of new agents with different DNA binding properties and/or a cytotoxic profile by isosteric substitution of known intercalators.  相似文献   
105.
106.
Motivated by the importance of accurate identification for a range of applications, this paper compares and contrasts the effective and efficient classification of network-based applications using behavioral observations of network-traffic and those using deep-packet inspection.Importantly, throughout our work we are able to make comparison with data possessing an accurate, independently determined ground-truth that describes the actual applications causing the network-traffic observed.In a unique study in both the spatial-domain: comparing across different network-locations and in the temporal-domain: comparing across a number of years of data, we illustrate the decay in classification accuracy across a range of application–classification mechanisms. Further, we document the accuracy of spatial classification without training data possessing spatial diversity.Finally, we illustrate the classification of UDP traffic. We use the same classification approach for both stateful flows (TCP) and stateless flows based upon UDP. Importantly, we demonstrate high levels of accuracy: greater than 92% for the worst circumstance regardless of the application.  相似文献   
107.
Mobile network providers have developed a variety of location-based services (LBSs), such as friend-finder, point of interest services, emergency rescue and many other safety and security services. The protection of location-privacy has consequently become a key aspect to the success of LBSs, since users consider their own physical location and movements highly privacy-sensitive, and demand for solutions able to protect such an information in a variety of environments. The idea behind location-privacy protection is that the individual should be able to set the level at which the location information is released to avoid undesired exploitation by a potential attacker: one of the approaches to this problem is given by the application of spatial obfuscation techniques, actuated by a trusted agent, and consisting in artificial perturbations of the location information collected by sensing technologies, before its disclosure to third parties. In many situations, however, landscape/map information can help a third party to perform Bayesian inference over spatially obfuscated data and to refine the user’s location estimate up to a violation of the original user’s location-privacy requirements. The goal of this paper is to provide a map-dependent obfuscation procedure that enables the release of the maximum possible user’s location information, that does not lead to a violation of the original user’s location-privacy requirements, even when refined through map-based inference.  相似文献   
108.
A recent focus is on creating engaging user experiences with digital products and services such as voicemail. This study aims to design towards increased levels of engagement in voicemail browsing by using the ‘Richness, Control and Engagement’ (RC & E) framework. This framework explains the levels of engagement in terms of the levels of richness and control that are shaped by the features of a product and the user’s expertise. A product was developed that utilized gestures and sound to access digital voicemail contents. An experiment was conducted in which 28 participants interacted with the product while varying (1) the number of features of the user interface, (2) the amount of voicemail content and (3) the type of task. Results showed that the levels of engagement could be predicted according to the levels of richness and control experienced when a task-term was added to the framework. Implications of the refined RC & E framework for interaction design practice are discussed.  相似文献   
109.
We show on a case study from an autonomous aerospace context how to apply a game-based model-checking approach as a powerful technique for the verification, diagnosis, and adaptation of system behaviors based on temporal properties. This work is part of our contribution within the SHADOWS project, where we provide a number of enabling technologies for model-driven self-healing. We propose here to use GEAR, a game-based model checker, as a user-friendly tool that can offer automatic proofs of critical properties of such systems. Although it is a model checker for the full modal μ-calculus, it also supports derived, more user-oriented logics. With GEAR, designers and engineers can interactively investigate automatically generated winning strategies for the games, by this way exploring the connection between the property, the system, and the proof. This work has been partially supported by the European Union Specific Targeted Research Project SHADOWS (IST-2006-35157), exploring a Self-Healing Approach to Designing cOmplex softWare Systems. The project’s web page is at . This article is an extended version of Renner et al. [18] presented at ISoLA 2007, Poitiers, December 2007.  相似文献   
110.
Anti-reflective (AR) boundary conditions (BC) have been introduced recently in connection with fast deblurring algorithms, both in the case of signals and images. Here we extend such BCs to d dimensions (d ≥ 1) and we study in detail the algebra induced by the AR-BCs, with strongly symmetric point spread functions (PSF), both from a structural and computational point of view. The use of the re-blurring idea and the computational features of the AR-algebra allow us to apply Tikhonov-like techniques within O(n d log(n)) arithmetic operations, where n d is the number of pixels of the reconstructed object. Extensive numerical experimentation concerning 2D images and strongly symmetric PSFs confirms the effectiveness of our proposal.   相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号