首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1686篇
  免费   107篇
  国内免费   1篇
电工技术   37篇
综合类   1篇
化学工业   590篇
金属工艺   24篇
机械仪表   29篇
建筑科学   46篇
矿业工程   8篇
能源动力   69篇
轻工业   188篇
水利工程   6篇
石油天然气   6篇
无线电   111篇
一般工业技术   281篇
冶金工业   88篇
原子能技术   3篇
自动化技术   307篇
  2024年   3篇
  2023年   5篇
  2022年   76篇
  2021年   173篇
  2020年   60篇
  2019年   61篇
  2018年   79篇
  2017年   72篇
  2016年   96篇
  2015年   55篇
  2014年   106篇
  2013年   121篇
  2012年   79篇
  2011年   89篇
  2010年   70篇
  2009年   71篇
  2008年   74篇
  2007年   68篇
  2006年   48篇
  2005年   40篇
  2004年   46篇
  2003年   33篇
  2002年   28篇
  2001年   18篇
  2000年   19篇
  1999年   18篇
  1998年   18篇
  1997年   18篇
  1996年   11篇
  1995年   13篇
  1994年   8篇
  1993年   8篇
  1992年   7篇
  1991年   11篇
  1990年   9篇
  1989年   4篇
  1988年   4篇
  1987年   9篇
  1986年   5篇
  1985年   8篇
  1984年   6篇
  1983年   7篇
  1982年   7篇
  1981年   8篇
  1980年   8篇
  1979年   4篇
  1977年   3篇
  1974年   3篇
  1973年   3篇
  1970年   1篇
排序方式: 共有1794条查询结果,搜索用时 21 毫秒
51.
As a research paradigm, pattern analysis has been shown to be an effective tool for analyzing complex game situations in both chess and go. We extend the prior pattern analysis research in chess to the domain of shogi. Shogi is computationally more complex than chess and should realize greater benefits than the chess domain from pattern recognition and pattern exploitation research. The IAM program, which has accurately predicted up to 28% of the moves for a specific chess player, is redesigned to operate in the domain of shogi. Results similar to those achieved for the domain of chess are achieved in shogi. Received 25 February 1999 / Revised 1 October 1999 / Accepted in revised form 2 February 2000  相似文献   
52.
In this paper we consider the problem of finding perfect matchings in parallel. We present a RNC algorithm with almost optimal work with respect to sequential algorithms, i.e., it uses O(n ω ) processors, where ω is the matrix multiplication exponent. Our algorithm is based on an RNC algorithm for computing determinant of a degree one polynomial matrix which is of independent interest. Research supported by KBN grant 1P03A01830.  相似文献   
53.
On constructing an optimal consensus clustering from multiple clusterings   总被引:1,自引:0,他引:1  
Computing a suitable measure of consensus among several clusterings on the same data is an important problem that arises in several areas such as computational biology and data mining. In this paper, we formalize a set-theoretic model for computing such a similarity measure. Roughly speaking, in this model we have k>1 partitions (clusters) of the same data set each containing the same number of sets and the goal is to align the sets in each partition to minimize a similarity measure. For k=2, a polynomial-time solution was proposed by Gusfield (Information Processing Letters 82 (2002) 159-164). In this paper, we show that the problem is MAX-SNP-hard for k=3 even if each partition in each cluster contains no more than 2 elements and provide a -approximation algorithm for the problem for any k.  相似文献   
54.
A method is presented for tracking 3D objects as they transform rigidly in space within a sparse range image sequence. The method operates in discrete space and exploits the coherence across image frames that results from the relationship between known bounds on the object's velocity and the sensor frame rate. These motion bounds allow the interframe transformation space to be reduced to a reasonable and indeed tiny size, comprising only tens or hundreds of possible states. The tracking problem is in this way cast into a classification framework, effectively trading off localization precision for runtime efficiency and robustness. The method has been implemented and tested extensively on a variety of freeform objects within a sparse range data stream comprising only a few hundred points per image. It has been shown to compare favorably against continuous domain iterative closest point (ICP) tracking methods, performing both more efficiently and more robustly. A hybrid method has also been implemented that executes a small number of ICP iterations following the initial discrete classification phase. This hybrid method is both more efficient than the ICP alone and more robust than either the discrete classification method or the ICP separately  相似文献   
55.
This paper considers methods for knowledge exploitation in security policies for Service-Oriented Architecture (SOA) environments, discovering the modality conflicts in particular. Two algorithms for discovering SOA-specific modality conflicts are proposed. First, a trivial (ad-hoc) approach is presented and further extended by the improved algorithm which offers lower time complexity. The formal verification of the proposal is followed by experimental results confirming the expected supremacy of the improved algorithm.  相似文献   
56.
R-22的替代现状   总被引:9,自引:2,他引:9  
1背景 R~22于1928年最初被人们所认可,并于1936年开始商业化生产使用.迄今为止,R-22已经在很多系统中得到应用,从最小型的窗式空调到最大型的冷水机组和热泵,也包括那些区域性的冷却和加热系统.使用这种通用型制冷剂的单个设备的制冷功率在2 kW与30 MW之间(0.5冷吨到9,500冷吨).R-22的使用装置包括:旋转式活塞、往复式活塞、涡旋式、螺杆和离心式压缩机,在实验中还包括吸收循环装置.没有一种制冷剂能够像R-22这样有如此大的产量和如此广的应用范围.  相似文献   
57.
X-VRML for advanced virtual reality applications   总被引:2,自引:0,他引:2  
Walczak  K. Cellary  W. 《Computer》2003,36(3):89-92
  相似文献   
58.
In general, both consciously and unconsciously perceived stimuli facilitate responses to following similar stimuli. However, masked arrows delay responses to following arrows. This inverse priming has been ascribed to inhibition of premature motor activation, more recently even to special processing of nonconsciously perceived material. Here, inverse priming depended on particular masks, was insensitive to contextual requirements for increased inhibition, and was constant across response speeds. Putative signs of motor inhibition in the electroencephalogram may as well reflect activation of the opposite response. Consequently, rather than profiting from inhibition of primed responses, the alternative response is directly primed by perceptual interactions of primes and masks. Thus there is no need to assume separate pathways for nonconscious and conscious processing. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
59.
For various IT systems security is considered a key quality factor. In particular, it might be crucial for video surveillance systems, as their goal is to provide continuous protection of critical infrastructure and other facilities. Risk assessment is an important activity in security management; it aims at identifying assets, threats and vulnerabilities, analysis of implemented countermeasures and their effectiveness in mitigating risks. This paper discusses an application of a new risk assessment method, in which risk calculation is based on Fuzzy Cognitive Maps (FCMs) to a complex automated video surveillance system. FCMs are used to capture dependencies between assets and FCM based reasoning is applied to aggregate risks assigned to lower-level assets (e.g. cameras, hardware, software modules, communications, people) to such high level assets as services, maintained data and processes. Lessons learned indicate, that the proposed method is an efficient and low-cost approach, giving instantaneous feedback and enabling reasoning on effectiveness of security system.  相似文献   
60.
In laser technological processes, which are connected with phase transitions, special changes in material structure occur. These changes of structure include among others phase composition as well as morphology. The changed structure determines the electrical, mechanical and functional properties of the material. The problems become of greater importance in laser microtechnologies when areas with changed structure have dimensions measurable in micrometers, and volume of an order of 10−3 mm3. The favorable and unfavorable effects of the structural changes of materials and functional properties of elements produced by means of laser microtechnology have been analyzed in the paper.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号