首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1243篇
  免费   74篇
  国内免费   2篇
电工技术   9篇
综合类   1篇
化学工业   273篇
金属工艺   20篇
机械仪表   45篇
建筑科学   61篇
矿业工程   3篇
能源动力   93篇
轻工业   120篇
水利工程   15篇
石油天然气   5篇
无线电   113篇
一般工业技术   218篇
冶金工业   69篇
原子能技术   15篇
自动化技术   259篇
  2024年   4篇
  2023年   13篇
  2022年   31篇
  2021年   38篇
  2020年   32篇
  2019年   35篇
  2018年   63篇
  2017年   36篇
  2016年   65篇
  2015年   37篇
  2014年   63篇
  2013年   120篇
  2012年   73篇
  2011年   100篇
  2010年   61篇
  2009年   134篇
  2008年   79篇
  2007年   56篇
  2006年   56篇
  2005年   29篇
  2004年   29篇
  2003年   22篇
  2002年   21篇
  2001年   12篇
  2000年   14篇
  1999年   7篇
  1998年   13篇
  1997年   9篇
  1996年   4篇
  1995年   6篇
  1994年   3篇
  1993年   3篇
  1992年   2篇
  1991年   4篇
  1990年   5篇
  1989年   2篇
  1988年   1篇
  1987年   1篇
  1986年   3篇
  1985年   1篇
  1984年   3篇
  1983年   5篇
  1982年   5篇
  1980年   2篇
  1979年   7篇
  1978年   3篇
  1977年   1篇
  1975年   1篇
  1974年   3篇
  1973年   2篇
排序方式: 共有1319条查询结果,搜索用时 15 毫秒
91.
92.
Currently, there is debate regarding both the spatial and temporal relationship between facilitation and inhibition of return (IOR) components of attention, as observed on the covert orienting of visual attention task (COVAT). These issues were addressed in a series of experiments where the spatial and temporal relationships between cue and target were manipulated. Facilitation occurred only when the stimulus onset asynchrony (SOA) was short and there was temporal overlap between cue and target. IOR occurred only when SOA was long and there was no temporal overlap between cue and target. Facilitation encompassed the cued location and all locations between the cue and fixation, whereas IOR arose for the entire cued hemifield. These findings suggest that the facilitation and IOR found on COVATs that use noninformative peripheral cues are separable and stimulus-driven processes. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
93.
Mobile devices with global positioning capabilities allow users to retrieve points of interest (POI) in their proximity. To protect user privacy, it is important not to disclose exact user coordinates to un-trusted entities that provide location-based services. Currently, there are two main approaches to protect the location privacy of users: (i) hiding locations inside cloaking regions (CRs) and (ii) encrypting location data using private information retrieval (PIR) protocols. Previous work focused on finding good trade-offs between privacy and performance of user protection techniques, but disregarded the important issue of protecting the POI dataset D. For instance, location cloaking requires large-sized CRs, leading to excessive disclosure of POIs (O(|D|) in the worst case). PIR, on the other hand, reduces this bound to \(O(\sqrt{|D|})\), but at the expense of high processing and communication overhead. We propose hybrid, two-step approaches for private location-based queries which provide protection for both the users and the database. In the first step, user locations are generalized to coarse-grained CRs which provide strong privacy. Next, a PIR protocol is applied with respect to the obtained query CR. To protect against excessive disclosure of POI locations, we devise two cryptographic protocols that privately evaluate whether a point is enclosed inside a rectangular region or a convex polygon. We also introduce algorithms to efficiently support PIR on dynamic POI sub-sets. We provide solutions for both approximate and exact NN queries. In the approximate case, our method discloses O(1) POI, orders of magnitude fewer than CR- or PIR-based techniques. For the exact case, we obtain optimal disclosure of a single POI, although with slightly higher computational overhead. Experimental results show that the hybrid approaches are scalable in practice, and outperform the pure-PIR approach in terms of computational and communication overhead.  相似文献   
94.
Design by Contract is a software engineering practice that allows semantic information to be added to a class or interface to precisely specify the conditions that are required for its correct operation. The basic constructs of Design by Contract are method preconditions and postconditions, and class invariants. This paper presents a detailed design and implementation overview of jContractor, a freely available tool that allows programmers to write “contracts' as standard Java methods following an intuitive naming convention. Preconditions, postconditions, and invariants can be associated with, or inherited by, any class or interface. jContractor performs on-the-fly bytecode instrumentation to detect violation of the contract specification during a program's execution. jContractor's bytecode engineering technique allows it to specify and check contracts even when source code is not available. jContractor is a pure Java library providing a rich set of syntactic constructs for expressing contracts without extending the Java language or runtime environment. These constructs include support for predicate logic expressions, and referencing entry values of attributes and return values of methods. Fine grain control over the level of monitoring is possible at runtime. Since contract methods are allowed to use unconstrained Java expressions, in addition to runtime verification they can perform additional runtime monitoring, logging, and analysis.  相似文献   
95.
It is commonly accepted that an individual's beliefs and actions are based on his or her assessment and perceptions of the world. In order to determine what practices an individual is likely to follow at any given time, it is necessary to understand the individual's behavioral intention in a given circumstance. From an Information Technology perspective, a software development professional's belief systems are potentially the basis for the adoption and implementation of new and innovative work practices and processes. In this article, we explore the belief systems of software development professionals in order to understand the beliefs underlying intention and practice, and we seek answers about how they adopt or reject new and innovative software development processes and practices. The results point out a strong influence of past experiences, personality types, and repeated behavior on current software development processes and practices in industrial settings.  相似文献   
96.
An appropriate and efficient gate assignment is of great importance in airports since it plays a major role in the revenue obtained from the airport operations. In this study, we have focused mainly on maximum gate employment, or in other words minimize the total duration of un-gated flights. Here, we propose a method that combines the benefits of heuristic approaches with some stochastic approach instead of using a purely probabilistic approach to top-down solution of the problem. The heuristic approaches are usually used in order to provide a fast solution of the problem and later stochastic searches are used in order to ameliorate the previous results of the heuristic approach whenever possible. The proposed method generates an assignment order for the whole planes that corresponds to assignment priority. The ordering process is followed by the allocation step. Since, in practice, each airport has its own physical architecture, there have been arisen many constraints mainly concerning airplane types and parking lots in this step. Sequentially handling the plane ordering and allocation phases provides us great modularity in handling the constraints. The effectiveness of the proposed methodology has been tried to be illustrated firstly on fictively generated flight schedule data and secondly on the real world data obtained from a real world application developed for ?stanbul Atatürk Airport.  相似文献   
97.
In this study, the strengthening with polymer the polypropylene fiber reinforced concrete exposed to high temperature was examined. Taguchi L9 (33) orthogonal array was used for the design of experiments. Three different parameters were used in the study; polypropylene fiber percentage (0 %, 1 % and 2 %), high temperature degree (300 °C, 600 °C and 900 °C) and curing period (3, 7 and 28 days). Cube samples of 100x100x100 mm sizes were produced for the compressive strength and ultrasonic pulse velocity tests. The samples were removed from the water and dried at 105?±?5 °C, and then they were exposed to temperatures of 300 °C, 600 °C and 900 °C. Then, the polymerization of monomer and the vinyl acetate monomer impregnation on the samples were carried out. The compressive strength and ultrasonic pulse velocity tests were made. Taguchi analysis showed that the largest compressive strength and ultrasonic pulse velocity were obtained at a rate of 0 % from the samples with polypropylene fiber exposed to 600 °C and kept for 28 days as cure period. It was determined as the result of Anova analysis that high temperature had made biggest effect on the compressive strength and ultrasonic pulse velocity of the concrete reinforced with polymer.  相似文献   
98.
Neural Computing and Applications - The use of games in daily life, especially in education, has been in an incline during the COVID-2019 pandemic. Thus, game-based learning environments have...  相似文献   
99.
100.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号