首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2789篇
  免费   92篇
  国内免费   12篇
电工技术   10篇
综合类   1篇
化学工业   953篇
金属工艺   59篇
机械仪表   65篇
建筑科学   46篇
矿业工程   4篇
能源动力   161篇
轻工业   210篇
水利工程   9篇
石油天然气   6篇
无线电   195篇
一般工业技术   560篇
冶金工业   197篇
原子能技术   21篇
自动化技术   396篇
  2023年   39篇
  2022年   105篇
  2021年   120篇
  2020年   102篇
  2019年   92篇
  2018年   107篇
  2017年   99篇
  2016年   70篇
  2015年   60篇
  2014年   114篇
  2013年   365篇
  2012年   140篇
  2011年   118篇
  2010年   123篇
  2009年   127篇
  2008年   105篇
  2007年   82篇
  2006年   86篇
  2005年   71篇
  2004年   40篇
  2003年   51篇
  2002年   43篇
  2001年   32篇
  2000年   34篇
  1999年   31篇
  1998年   43篇
  1997年   27篇
  1996年   35篇
  1995年   35篇
  1994年   34篇
  1993年   33篇
  1992年   36篇
  1991年   25篇
  1990年   20篇
  1989年   38篇
  1988年   14篇
  1987年   19篇
  1986年   13篇
  1985年   25篇
  1984年   17篇
  1983年   26篇
  1982年   16篇
  1981年   12篇
  1980年   11篇
  1979年   11篇
  1978年   12篇
  1977年   4篇
  1976年   11篇
  1975年   5篇
  1974年   4篇
排序方式: 共有2893条查询结果,搜索用时 109 毫秒
71.
Very recently, in order to unify the notions of fuzzy metric space and metric-like space, Shukla and Abbas introduced the concept of fuzzy metric-like space and proved some fixed-point results in this setting. In this article, we modify the notion of Cauchy sequence and completeness to generalize their results. Thus, we extend their theorems to a more general framework, which is also appropriate to generalize some recent, well-known results in this line of research. Furthermore, several examples are presented to illustrate the significance of our results.  相似文献   
72.
In this digital era, where Internet of Things (IoT) is increasing day by day, use of resource constrained devices is also increasing. Indeed, the features such as low cost, less maintenance, more adaptive to hostile environment, etc. make the wireless multimedia devices to be the best choice as the resource constrained devices. For the security, the end user device requires to establish the session key with the server before transferring the data. Mobile is one of the device having more and more usage as wireless multimedia device in recent years. In 2013, Li et al. proposed an efficient scheme for the wireless mobile communications and claimed it to be secure against various attacks. Recently, Shen et al. claimed that the scheme of Li et al. is still vulnerable to the privileged insider attack, the stolen verifier attack and finally proposed a scheme to withstand the mentioned and other attacks. However, in this paper we claim that the scheme of Shen et al. is still susceptible to the user anonymity, the session specific temporary information attack and the replay attack. In addition, Shen et al.’s scheme requires more time due to many operations. Further, we propose an efficient scheme that is secure against various known attacks and due to reduced time complexity our scheme is a preferred choice for the wireless mobile networks and hence for wireless multimedia systems.  相似文献   
73.
In Kahn process network (KPN), the processes (nodes) communicate by unbounded unidirectional FIFO channels (arcs), with the property of non-blocking writes and blocking reads on the channels. KPN provides a semantic model of computation, where a computation can be expressed as a set of asynchronously communicating processes. However, the unbounded FIFO based asynchrony is not realizable in practice and hence requires refinement in real hardware. In this work, we start with KPN as the model of computation for GALS, and discuss how different GALS architectures can be realized. We borrow some ideas from existing dataflow architectures for our GALS designs.  相似文献   
74.
A malware mutation engine is able to transform a malicious program to create a different version of the program. Such mutation engines are used at distribution sites or in self-propagating malware in order to create variation in the distributed programs. Program normalization is a way to remove variety introduced by mutation engines, and can thus simplify the problem of detecting variant strains. This paper introduces the “normalizer construction problem” (NCP), and formalizes a restricted form of the problem called “NCP=”, which assumes a model of the engine is already known in the form of a term rewriting system. It is shown that even this restricted version of the problem is undecidable. A procedure is provided that can, in certain cases, automatically solve NCP= from the model of the engine. This procedure is analyzed in conjunction with term rewriting theory to create a list of distinct classes of normalizer construction problems. These classes yield a list of possible attack vectors. Three strategies are defined for approximate solutions of NCP=, and an analysis is provided of the risks they entail. A case study using the virus suggests the approximations may be effective in practice for countering mutated malware. R. Mathur is presently at McAfee AVERT Labs.  相似文献   
75.
Most fingerprint-based biometric systems store the minutiae template of a user in the database. It has been traditionally assumed that the minutiae template of a user does not reveal any information about the original fingerprint. In this paper, we challenge this notion and show that three levels of information about the parent fingerprint can be elicited from the minutiae template alone, viz., 1) the orientation field information, 2) the class or type information, and 3) the friction ridge structure. The orientation estimation algorithm determines the direction of local ridges using the evidence of minutiae triplets. The estimated orientation field, along with the given minutiae distribution, is then used to predict the class of the fingerprint. Finally, the ridge structure of the parent fingerprint is generated using streamlines that are based on the estimated orientation field. Line integral convolution is used to impart texture to the ensuing ridges, resulting in a ridge map resembling the parent fingerprint. The salient feature of this noniterative method to generate ridges is its ability to preserve the minutiae at specified locations in the reconstructed ridge map. Experiments using a commercial fingerprint matcher suggest that the reconstructed ridge structure bears close resemblance to the parent fingerprint  相似文献   
76.
The electrical conductivity, σ, and thermoelectric power, S, of copper chromite (CuCr2O4) are reported in the temperature range 295 to 815 K. A break (T B) in the slope of the plot of log σ against T ?1 was observed around 556 K. Apart from this break, the curves are linear, and their slopes correspond to activation energies of 0.60 eV (T B<556 K) and 1.22 eV (T B>556 K). A break (T′ B) in the slope of the -S against T ?1 plot was also observed round 556 K. Apart from the break at this temperature, the S against T ?1 curves are linear. At T′ B>556, S can be expressed by the relation $$S = - \left[ {\left( {\frac{{0.65 eV}}{{{\text{2}}eT}}} \right) + (0.42) mV K^{ - {\text{1}}} } \right]$$ The mechanism involved in the electrical transport is the hopping of holes from Cr4+ centres to neighbouring Cr3+ ions. The typical hopping mobility of the holes is of the order of 106 m2 V?1 sec?1. The mobility activation energy of the holes in CuCr2O4 decreases with temperature due to the smoothing of the potential barriers between Cr4+ and Cr3+ sites.  相似文献   
77.
Thermopower data of S in both of itsα- andβ-phases are reported and the results are compared with the data on Se. Communication No. 129 from the Solid State and Structural Chemistry Unit.  相似文献   
78.
Murty MV  Shukla RP 《Applied optics》1983,22(7):1094-1098
A Brewster polarizer in this study is any dielectric plane reflecting surface reflecting light at or near the Brewster angle of incidence. In this paper, we consider an interesting phenomenon observed when we use an extended source of light or a cone of light with its axis incident on the plane surface at the Brewster angle. The resulting reflected light is viewed (a) through an ordinary sheet polarizer and (b) after reflection from another Brewster polarizer. The extinction pattern of light by such a system is in the form of an elongated black shadow in (a) and a nearly circular shadow in (b), respectively. These shadows are explained on the basis and use of the familiar Fresnel equations at a plane interface between two dielectric media. Photographs of the shadows are also presented.  相似文献   
79.
A rapid screening system for heterogeneous catalyst discovery has been developed by coupling an in-house designed and fabricated high temperature vapor phase pulse reactor on-line to a GC-MS. The incorporation of gas chromatography for separation of the products with the mass spectrometry system allowed simultaneous identification and determination of reaction products and substrate conversion. This system was employed to study the vapor phase catalytic hydride transfer reduction (CHTR) of nitrobenzene with methanol as hydrogen donor on an MgO catalyst as a model reaction. Structural information of all the by-products that were formed was useful to understand the reaction mechanism. The products obtained with the new screening technique were in good agreement with conventional bench scale experiments. The rapid online screening provided an efficient methodology for optimization of reaction conditions such as catalyst loading, reaction temperature, and mole ratios. Response Surface Methodology (RSM) was used to optimize the conversion of reactants and selectivity of products.  相似文献   
80.
Performing manipulation tasks interactively in real environments requires a high degree of accuracy and stability. At the same time, when one cannot assume a fully deterministic and static environment, one must endow the robot with the ability to react rapidly to sudden changes in the environment. These considerations make the task of reach and grasp difficult to deal with. We follow a Programming by Demonstration (PbD) approach to the problem and take inspiration from the way humans adapt their reach and grasp motions when perturbed. This is in sharp contrast to previous work in PbD that uses unperturbed motions for training the system and then applies perturbation solely during the testing phase. In this work, we record the kinematics of arm and fingers of human subjects during unperturbed and perturbed reach and grasp motions. In the perturbed demonstrations, the target’s location is changed suddenly after the onset of the motion. Data show a strong coupling between the hand transport and finger motions. We hypothesize that this coupling enables the subject to seamlessly and rapidly adapt the finger motion in coordination with the hand posture. To endow our robot with this competence, we develop a coupled dynamical system based controller, whereby two dynamical systems driving the hand and finger motions are coupled. This offers a compact encoding for reach-to-grasp motions that ensures fast adaptation with zero latency for re-planning. We show in simulation and on the real iCub robot that this coupling ensures smooth and “human-like” motions. We demonstrate the performance of our model under spatial, temporal and grasp type perturbations which show that reaching the target with coordinated hand–arm motion is necessary for the success of the task.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号