首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2336篇
  免费   131篇
  国内免费   3篇
电工技术   37篇
综合类   3篇
化学工业   626篇
金属工艺   64篇
机械仪表   46篇
建筑科学   76篇
矿业工程   2篇
能源动力   51篇
轻工业   204篇
水利工程   5篇
石油天然气   18篇
无线电   185篇
一般工业技术   463篇
冶金工业   260篇
原子能技术   20篇
自动化技术   410篇
  2024年   5篇
  2023年   26篇
  2022年   75篇
  2021年   96篇
  2020年   48篇
  2019年   43篇
  2018年   82篇
  2017年   70篇
  2016年   90篇
  2015年   60篇
  2014年   89篇
  2013年   173篇
  2012年   150篇
  2011年   188篇
  2010年   103篇
  2009年   142篇
  2008年   125篇
  2007年   116篇
  2006年   92篇
  2005年   58篇
  2004年   62篇
  2003年   59篇
  2002年   49篇
  2001年   32篇
  2000年   33篇
  1999年   24篇
  1998年   44篇
  1997年   30篇
  1996年   39篇
  1995年   24篇
  1994年   26篇
  1993年   11篇
  1992年   16篇
  1991年   10篇
  1990年   14篇
  1989年   14篇
  1988年   11篇
  1987年   15篇
  1986年   8篇
  1985年   17篇
  1984年   11篇
  1983年   19篇
  1982年   10篇
  1981年   8篇
  1979年   7篇
  1978年   4篇
  1977年   10篇
  1976年   11篇
  1975年   5篇
  1973年   5篇
排序方式: 共有2470条查询结果,搜索用时 31 毫秒
61.
Applications implemented on critical systems are subject to both safety critical and real-time constraints. Classically, applications are specified as precedence task graphs that must be scheduled onto a given target multiprocessor heterogeneous architecture. We propose a new method for simultaneously optimizing two objectives: the execution time and the reliability of the schedule. The problem is decomposed into two successive steps: a spatial allocation during which the reliability is maximized (randomized algorithm), and a scheduling during which the makespan is minimized (list scheduling algorithm). It allows us to produce several trade-off solutions, among which the user can choose the solution that best fits the application’s requirements. Reliability is increased by replicating adequate tasks onto well chosen processors. Our fault model assumes that processors are fail-silent, that they are subject to transient failures, and that the occurrences of failures follow a constant parameter Poisson law. We assess and validate our method by running extensive simulations on both random graphs and actual application graphs. They show that it is competitive, in terms of makespan, compared to existing reference scheduling methods for heterogeneous processors (HEFT), while providing a better reliability.  相似文献   
62.
A reduced-scale model and CFD predictions were used to investigate experimentally and numerically the airflow patterns within a ceiling slot-ventilated enclosure partially loaded with vented boxes filled by spherical objects. The experiments were carried out using laser Doppler velocimetry. Airflows around and inside porous boxes were predicted taking into account their aerodynamic interactions. This work is divided into two parts. This paper presents part I and concerns the air velocity characteristics within the jet above the boxes, while Part II deals with the air velocity characteristics inside the boxes. The results highlight the confinement effect due to the enclosure and the influence of load porosity on jet penetration, its development and hence the heterogeneity of ventilation within the enclosure. The numerical predictions obtained with the computational fluid dynamics Fluent package using the RSM turbulence model show reasonable agreement with experimental data. Predicted velocity profiles were generally within an error of 3-30% of the measured velocities.  相似文献   
63.
A DSS integrating empty and full containers transshipment operations is presented, addressing the typically unbalanced export/import containers trading problem. The problem is modeled as a network, where nodes represent customers, leasing companies, harbors and warehouses, while arcs represent transportation routes. The underlying mathematical model operates in stages, first prioritizing and adjusting full containers demands considering available empty containers supplies, and then statically optimizing costs. Transportation routes are registered and dynamically controlled, cyclically, for a given time horizon. The DSS is flexible, allowing several parameters to be configured. Experimental examples using randomly generated parameters were conducted to evaluate the effectiveness of the system.  相似文献   
64.
Enterprise Identity Management Systems (EIdMS) are an IT-based infrastructure that needs to be integrated in various business processes and related infrastructures. Assessment and preparation of decisions for the introduction need to take the costs, benefits, and the organizational settings into consideration. A variety of methods for the evaluation and decision support of new IT (e. g. EIdMS) are discussed in the literature – however, these are typically based on single dimensions (e. g. financial or technology aspects). This paper proposes a multidimensional decision support framework, based on the Balanced Scorecard concept. The presented approach introduces four perspectives and a related set of initial decision parameters to support decision making. The perspectives are (a) financial/monetary, (b) business processes, (c) supporting processes and (ICT) infrastructure and (d) information security, risks and compliance. Perspectives and adaptable sets of decision parameters also may serve as foundation for software-based decision support instruments.  相似文献   
65.
This paper deals with the design and application of a nonlinear multivariable controller in an anaerobic digestion system (AD) carried out in two interconnected fixed bed bioreactors. The proposed control scheme is derived from a mathematical model of the AD system described by a set of partial differential equations and consists of an estimator and two nonlinear control laws. The first law is developed to regulate the volatile fatty acids in the first bioreactor while the second aims at maintaining the chemical oxygen demand at predetermined set-points in the second bioreactor. The performance of the control algorithm is evaluated via numerical simulations in the face of load disturbances, parameter kinetic uncertainties and set-point changes. Stability and convergence properties of the proposed control scheme are also addressed in this paper.  相似文献   
66.
Widespread use of GPS and similar technologies makes it possible to collect extensive amounts of trajectory data. These data sets are essential for reasonable decision making in various application domains. Additional information, such as events taking place along a trajectory, makes data analysis challenging, due to data size and complexity. We present an integrated solution for interactive visual analysis and exploration of events along trajectories data. Our approach supports analysis of event sequences at three different levels of abstraction, namely spatial, temporal, and events themselves. Customized views as well as standard views are combined to form a coordinated multiple views system. In addition to trajectories and events, we include on-the-fly derived data in the analysis. We evaluate our integrated solution using the IEEE VAST 2015 Challenge data set. A successful detection and characterization of malicious activity indicate the usefulness and efficiency of the presented approach.  相似文献   
67.
We propose a variational aggregation method for optical flow estimation. It consists of a two-step framework, first estimating a collection of parametric motion models to generate motion candidates, and then reconstructing a global dense motion field. The aggregation step is designed as a motion reconstruction problem from spatially varying sets of motion candidates given by parametric motion models. Our method is designed to capture large displacements in a variational framework without requiring any coarse-to-fine strategy. We handle occlusion with a motion inpainting approach in the candidates computation step. By performing parametric motion estimation, we combine the robustness to noise of local parametric methods with the accuracy yielded by global regularization. We demonstrate the performance of our aggregation approach by comparing it to standard variational methods and a discrete aggregation approach on the Middlebury and MPI Sintel datasets.  相似文献   
68.
Abnormality detection using low-level co-occurring events   总被引:1,自引:0,他引:1  
We propose in this paper a method for behavior modeling and abnormal events detection which uses low-level features. In conventional object-based approaches, objects are identified, classified, and tracked to locate those with suspicious behavior. We proceed directly with event characterization and behavior modeling using low-level features. We first learn statistics about co-occurring events in a spatio-temporal volume in order to build the normal behavior model, called the co-occurrence matrix. The notion of co-occurring events is defined using mutual information between motion labels sequences. Then, in the second phase, the co-occurrence matrix is used as a potential function in a Markov random field framework to describe, as the video streams in, the probability of observing new volumes of activity. The co-occurrence matrix is thus used for detecting moving objects whose behavior differs from the ones observed during the training phase. Interestingly, the Markov random field distribution implicitly accounts for speed, direction, as well as the average size of the objects without any higher-level intervention. Furthermore, when the spatio-temporal volume is sufficiently large, the co-occurrence distribution contains the average normal path followed by moving objects. Our method has been tested on various indoor and outdoor videos representing various challenges.  相似文献   
69.
Dynamic susceptibility contrast-magnetic resonance imaging (DSC-MRI) data analysis requires the knowledge of the arterial input function (AIF) to quantify the cerebral blood flow (CBF), volume (CBV) and the mean transit time (MTT). AIF can be obtained either manually or using automatic algorithms. We present a method to derive the AIF on the middle cerebral artery (MCA). The algorithm draws a region of interest (ROI) where the MCA is located. Then, it uses a recursive cluster analysis on the ROI to select the arterial voxels. The algorithm had been compared on simulated data to literature state of art automatic algorithms and on clinical data to the manual procedure. On in silico data, our method allows to reconstruct the true AIF and it is less affected by partial volume effect bias than the other methods. In clinical data, automatic AIF provides CBF and MTT maps with a greater contrast level compared to manual AIF ones. Therefore, AIF obtained with the proposed method improves the estimate reliability and provides a quantitatively reliable physiological picture.  相似文献   
70.
We present an adaptive octree based approach for interactive cutting of deformable objects. Our technique relies on efficient refine- and node split-operations. These are sufficient to robustly represent cuts in the mechanical simulation mesh. A high-resolution surface embedded into the octree is employed to represent a cut visually. Model modification is performed in the rest state of the object, which is accomplished by back-transformation of the blade geometry. This results in an improved robustness of our approach. Further, an efficient update of the correspondences between simulation elements and surface vertices is proposed. The robustness and efficiency of our approach is underlined in test examples as well as by integrating it into a prototype surgical simulator.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号