首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3537篇
  免费   211篇
  国内免费   2篇
电工技术   29篇
综合类   2篇
化学工业   860篇
金属工艺   78篇
机械仪表   84篇
建筑科学   137篇
矿业工程   12篇
能源动力   130篇
轻工业   269篇
水利工程   30篇
石油天然气   8篇
无线电   271篇
一般工业技术   744篇
冶金工业   485篇
原子能技术   17篇
自动化技术   594篇
  2024年   8篇
  2023年   49篇
  2022年   66篇
  2021年   172篇
  2020年   89篇
  2019年   84篇
  2018年   125篇
  2017年   114篇
  2016年   122篇
  2015年   103篇
  2014年   164篇
  2013年   254篇
  2012年   225篇
  2011年   285篇
  2010年   206篇
  2009年   167篇
  2008年   172篇
  2007年   182篇
  2006年   120篇
  2005年   103篇
  2004年   100篇
  2003年   87篇
  2002年   78篇
  2001年   43篇
  2000年   39篇
  1999年   37篇
  1998年   73篇
  1997年   70篇
  1996年   36篇
  1995年   36篇
  1994年   27篇
  1993年   25篇
  1992年   24篇
  1991年   16篇
  1990年   28篇
  1989年   18篇
  1988年   11篇
  1987年   9篇
  1986年   11篇
  1985年   17篇
  1984年   9篇
  1983年   13篇
  1982年   9篇
  1981年   13篇
  1980年   11篇
  1979年   10篇
  1977年   9篇
  1976年   20篇
  1975年   8篇
  1974年   8篇
排序方式: 共有3750条查询结果,搜索用时 15 毫秒
61.
In this work, we present a method of decomposition of arbitrary unitary matrix \(U\in \mathbf {U}(2^k)\) into a product of single-qubit negator and controlled-\(\sqrt{\text{ NOT }}\) gates. Since the product results with negator matrix, which can be treated as complex analogue of bistochastic matrix, our method can be seen as complex analogue of Sinkhorn–Knopp algorithm, where diagonal matrices are replaced by adding and removing an one-qubit ancilla. The decomposition can be found constructively, and resulting circuit consists of \(O(4^k)\) entangling gates, which is proved to be optimal. An example of such transformation is presented.  相似文献   
62.
Recently, Brooklyn has seen an explosion of drag culture, with dozens of performers taking the stage in any given week. Social media plays a vital role for members of this community, simultaneously allowing self‐promotion and community solidarity. Drawing on focus group interviews, we analyze the communication practices of Brooklyn's drag performers, examining both the advantages and drawbacks of social media platforms. Using conceptual frameworks of faceted identity and relational labor, our discussion focuses on affordances and constraints of multifaceted identity in online contexts and theories of seamful design. We contend that by analyzing online communication practices of drag performers, it becomes possible to identify gaps between embedded ideologies of mainstream social media technologies and the localized values of outsider communities.  相似文献   
63.
64.
65.
66.
Numerical modelling of natural draft wet-cooling towers is considered in this paper. Development of a complete CFD model capable of predicting cooling tower performance under various operating conditions is presented. A step-by-step approach is employed, thus one-dimensional numerical modelling of counterflow heat and mass exchangers is extensively presented first. This is followed by reduced order modelling of heat and mass transfer in cooling tower fills by means of proper orthogonal decomposition radial basis function networks. Then the approaches in modelling of droplet zones (rain and spray zones) are discussed. Finally the two and three-dimensional CFD models are discussed.  相似文献   
67.
Sealed nanofluidic channels with cross-sections as small as 60 nm × 60 nm were created in polymer bilayers using the focused X-rays of a scanning transmission X-ray microscope. These structures were then characterized by near-edge X-ray absorption fine structure spectromicroscopy, atomic force microscopy and scanning electron microscopy. The cross-sectional area of the nanochannels could be tuned by adjusting the area patterned in x and y and/or manipulating the bottom layer thickness. The maximum length was found to be limited by the efficiency of excavation of patterned material out of the channel, and the stability of the polymer overlayer which seals the channel. Schemes toward interfacing these nanochannels with conventional microfluidics are discussed.  相似文献   
68.
We present a novel algorithm for detection of certain types of unusual events. The algorithm is based on multiple local monitors which collect low-level statistics. Each local monitor produces an alert if its current measurement is unusual, and these alerts are integrated to a final decision regarding the existence of an unusual event. Our algorithm satisfies a set of requirements that are critical for successful deployment of any large-scale surveillance system. In particular it requires a minimal setup (taking only a few minutes) and is fully automatic afterwards. Since it is not based on objects' tracks, it is robust and works well in crowded scenes where tracking-based algorithms are likely to fail. The algorithm is effective as soon as sufficient low-level observations representing the routine activity have been collected, which usually happens after a few minutes. Our algorithm runs in realtime. It was tested on a variety of real-life crowded scenes. A ground-truth was extracted for these scenes, with respect to which detection and false-alarm rates are reported.  相似文献   
69.
Adam Drozdek 《AI & Society》1995,9(4):389-395
The question whether or not computers can think was first asked in print by Alan Turing in his seminal 1950 article. In order to avoid defining what a computer is or what thinking is, Turing resorts to the imitation game which is a test that allows us to determine whether or not a machine can think. That is, if an interrogator is unable to tell whether responses to his questions come from a human being or from a machine, the machine is imitating a human being so well that it has to be acknowledged that these responses result from its thinking. However, then as now, it is not an indisputable claim that machines could think, and an unceasing stream of papers discussing the validity of the test proves this point. There are many arguments in favour of, as well as against, the claims borne by the test, and Turing himself discusses some of them. In his view, there are mice possible objections to the concept of a thinking machine, which he eventually dismisses as weak, irrelevant, or plain false. However, as he admits, he can present no very convincing arguments of a positive nature to support my views. If I had I should not have taken such pains to point out the fallacies in contrary views.  相似文献   
70.
Multidimensional Systems and Signal Processing - Digital images are commonly used in steganography due to the popularity of digital image transfer and exchange through the Internet. However, the...  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号