首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   42592篇
  免费   2424篇
  国内免费   43篇
电工技术   329篇
综合类   32篇
化学工业   7685篇
金属工艺   813篇
机械仪表   819篇
建筑科学   1353篇
矿业工程   82篇
能源动力   807篇
轻工业   5585篇
水利工程   377篇
石油天然气   174篇
武器工业   4篇
无线电   2512篇
一般工业技术   7496篇
冶金工业   11152篇
原子能技术   212篇
自动化技术   5627篇
  2023年   359篇
  2022年   336篇
  2021年   891篇
  2020年   752篇
  2019年   678篇
  2018年   1537篇
  2017年   1532篇
  2016年   1585篇
  2015年   1123篇
  2014年   1429篇
  2013年   2807篇
  2012年   2427篇
  2011年   2266篇
  2010年   1799篇
  2009年   1585篇
  2008年   1837篇
  2007年   1618篇
  2006年   1207篇
  2005年   1032篇
  2004年   964篇
  2003年   860篇
  2002年   777篇
  2001年   519篇
  2000年   518篇
  1999年   667篇
  1998年   3597篇
  1997年   2153篇
  1996年   1395篇
  1995年   833篇
  1994年   705篇
  1993年   693篇
  1992年   244篇
  1991年   253篇
  1990年   251篇
  1989年   233篇
  1988年   218篇
  1987年   199篇
  1986年   207篇
  1985年   233篇
  1984年   207篇
  1983年   150篇
  1982年   182篇
  1981年   192篇
  1980年   175篇
  1979年   141篇
  1978年   127篇
  1977年   219篇
  1976年   477篇
  1975年   114篇
  1973年   92篇
排序方式: 共有10000条查询结果,搜索用时 718 毫秒
991.
Even though there is abundant literature on successful cases of organizations applying knowledge management (KM) measures, many KM initiatives have failed to achieve their knowledge and business goals. In order to foster decisions about the design of such initiatives, information is required on success factors and barriers when selecting KM measures. Multi agent-based simulation (MABS) is suggested as instrument to investigate potential effects of KM measures on dependent variables such as sharing of knowledge in organizations or business performance. For such a simulation, the concept of knowledge sharing, influencing factors and their impact on business and knowledge goals are modeled based on an extensive multi-disciplinary literature survey. An extensive domain model is operationalized in a simulation model which is then further simplified and implemented in a MABS tool used for a series of experiments contrasting results with/without KM measures, specifically skill and experience management. Skill management is found highly sensitive with respect to conditions of application and has no significant impact on knowledge or business goals. Experience management positively impacts knowledge and business goals. Personal documentation leads to specialist, project debriefings to generalist knowledge workers. Finally, the paper discusses the simulation’s limitations and further areas of application.  相似文献   
992.
We present in this article a way to produce test suites applied to the POSIX mini-challenge based on a behavioral model of a file system manager written in UML/OCL. We illustrate the limitations of a fully automated test generation approach, which justifies the use of test scenarios as a complement to a functional testing approach. Scenarios are expressed through regular expressions describing sequences of operations, possibly punctuated by intermediate states that have to be reached by the execution of the model. Scenarios are unfolded into extended sequences of operations that are played on the model using symbolic animation techniques. We experimented our approach by testing the conformance of two different file systems w.r.t. the POSIX standard: a recent Linux distribution and a customized Java implementation of POSIX used to evaluate the relevance of our approach and its complementarity with a structural test generation approach.  相似文献   
993.
994.
In this paper we generalize the Continuous Adversarial Queuing Theory (CAQT) model (Blesa et al. in MFCS, Lecture Notes in Computer Science, vol. 3618, pp. 144–155, 2005) by considering the possibility that the router clocks in the network are not synchronized. We name the new model Non Synchronized CAQT (NSCAQT). Clearly, this new extension to the model only affects those scheduling policies that use some form of timing. In a first approach we consider the case in which although not synchronized, all clocks run at the same speed, maintaining constant differences. In this case we show that all universally stable policies in CAQT that use the injection time and the remaining path to schedule packets remain universally stable. These policies include, for instance, Shortest in System (SIS) and Longest in System (LIS). Then, we study the case in which clock differences can vary over time, but the maximum difference is bounded. In this model we show the universal stability of two families of policies related to SIS and LIS respectively (the priority of a packet in these policies depends on the arrival time and a function of the path traversed). The bounds we obtain in this case depend on the maximum difference between clocks. This is a necessary requirement, since we also show that LIS is not universally stable in systems without bounded clock difference. We then present a new policy that we call Longest in Queues (LIQ), which gives priority to the packet that has been waiting the longest in edge queues. This policy is universally stable and, if clocks maintain constant differences, the bounds we prove do not depend on them. To finish, we provide with simulation results that compare the behavior of some of these policies in a network with stochastic injection of packets.  相似文献   
995.
The localization of the components of an object near to a device before obtaining the real interaction is usually determined by means of a proximity measurement to the device of the object’s features. In order to do this efficiently, hierarchical decompositions are used, so that the features of the objects are classified into several types of cells, usually rectangular.In this paper we propose a solution based on the classification of a set of points situated on the device in a little-known spatial decomposition named tetra-tree. Using this type of spatial decomposition gives us several quantitative and qualitative properties that allow us a more realistic and intuitive visual interaction, as well as the possibility of selecting inaccessible components. These features could be used in virtual sculpting or accessibility tasks.In order to show these properties we have compared an interaction system based on tetra-trees to one based on octrees.  相似文献   
996.
997.
In this work we present two new approaches to solve the location management problem, respectively, based on the location areas and the reporting cells strategies. The location management problem corresponds to the management of the network configuration with the objective of minimizing the costs involved. We use the differential evolution algorithm to find the best configuration for the location areas and the reporting cells strategies, which principally considers the location update and paging costs. With this work we want to define the best values to the differential evolution configuration, using test networks and also realistic networks, as well as compare our results with the ones obtained by other authors. These two new approaches applied to this problem have given us very good results, when compared with those obtained by other authors.  相似文献   
998.
999.
We introduce a new geometric method to generate sphere packings with restricted overlap values. Sample generation is an important, but time-consuming, step that precedes a calculation performed with the discrete element method (DEM). At present, there does not exist any software dedicated to DEM which would be similar to the mesh software that exists for finite element methods (FEM). A practical objective of the method is to build very large sphere packings (several hundreds of thousands) in a few minutes instead of several days as the current dynamic methods do. The developed algorithm uses a new geometric procedure to position very efficiently the polydisperse spheres in a tetrahedral mesh. The algorithm, implemented into YADE-OPEN DEM (open-source software), consists in filling tetrahedral meshes with spheres. In addition to the features of the tetrahedral mesh, the input parameters are the minimum and maximum radii (or their size ratio), and the magnitude of authorized overlaps. The filling procedure is stopped when a target solid fraction or number of spheres is reached. Based on this method, an efficient tool can be designed for DEMs used by researchers and engineers. The generated packings can be isotropic and the number of contacts per sphere is very high due to its geometric procedure. In this paper, different properties of the generated packings are characterized and examples from real industrial problems are presented to show how this method can be used. The current C++ version of this packing algorithm is part of YADE-OPEN DEM [20] available on the web (https://yade-dem.org).  相似文献   
1000.
In this paper, we present a novel technique which simulates directional light scattering for more realistic interactive visualization of volume data. Our method extends the recent directional occlusion shading model by enabling light source positioning with practically no performance penalty. Light transport is approximated using a tilted cone‐shaped function which leaves elliptic footprints in the opacity buffer during slice‐based volume rendering. We perform an incremental blurring operation on the opacity buffer for each slice in front‐to‐back order. This buffer is then used to define the degree of occlusion for the subsequent slice. Our method is capable of generating high‐quality soft shadowing effects, allows interactive modification of all illumination and rendering parameters, and requires no pre‐computation.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号