首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   8354篇
  免费   624篇
  国内免费   12篇
电工技术   95篇
综合类   2篇
化学工业   2409篇
金属工艺   148篇
机械仪表   234篇
建筑科学   337篇
矿业工程   28篇
能源动力   321篇
轻工业   1255篇
水利工程   77篇
石油天然气   44篇
无线电   532篇
一般工业技术   1323篇
冶金工业   411篇
原子能技术   70篇
自动化技术   1704篇
  2024年   26篇
  2023年   127篇
  2022年   357篇
  2021年   410篇
  2020年   276篇
  2019年   311篇
  2018年   348篇
  2017年   358篇
  2016年   351篇
  2015年   287篇
  2014年   412篇
  2013年   709篇
  2012年   580篇
  2011年   678篇
  2010年   453篇
  2009年   492篇
  2008年   416篇
  2007年   377篇
  2006年   321篇
  2005年   239篇
  2004年   186篇
  2003年   207篇
  2002年   162篇
  2001年   92篇
  2000年   94篇
  1999年   86篇
  1998年   76篇
  1997年   75篇
  1996年   60篇
  1995年   52篇
  1994年   48篇
  1993年   44篇
  1992年   20篇
  1991年   26篇
  1990年   17篇
  1989年   21篇
  1988年   16篇
  1987年   13篇
  1986年   15篇
  1985年   20篇
  1984年   12篇
  1983年   9篇
  1982年   15篇
  1981年   8篇
  1980年   11篇
  1979年   11篇
  1978年   21篇
  1976年   9篇
  1975年   6篇
  1973年   5篇
排序方式: 共有8990条查询结果,搜索用时 15 毫秒
71.
72.
This paper describes the statistical analysis of data on coke formation (measured by microcarbon residue) in five resids, as a function of compound classes, in order to identify variables wiih a significant effect on the former. In this sense, the SAS VARCLUS and Principal Component Analysis were used. The analysis carried out leads to a lineal combination of the H/C ratio, vanadium and nitrogen content as a model to explain coke yield, under non-catalytic conditions, as determined by MCR. Of all these factors, the H/C ratio has the most important contribution.  相似文献   
73.

This paper proposes an improved version of a recently proposed modified simulated annealing algorithm (MSAA) named as an improved MSAA (I-MSAA) to tackle the size optimization of truss structures with frequency constraint. This kind of problem is problematic because its feasible region is non-convex while the boundaries are highly non-linear. The main motivation is to improve the exploitative behavior of MSAA, taking concept from water wave optimization metaheuristic (WWO). An interesting concept of WWO is its breaking operation. Thirty functions extracted from the CEC2014 test suite and four benchmark truss optimization problems with frequency constraints are explored for the validity of the proposed algorithm. Numerical results indicate that I-MSAA is more reliable, stable and efficient than those found by other existing metaheuristics in the literature.

  相似文献   
74.
Predicting whether the intended audience will be able to recognize the meaning of an icon or pictograph is not an easy task. Many icon recognition studies have been conducted in the past. However, their findings cannot be generalized to other icons that were not included in the study, which, we argue, is their main limitation. In this paper, we propose a comprehensive taxonomy of icons that is intended to enable the generalization of the findings of recognition studies. To accomplish this, we analyzed a sample of more than eight hundred icons according to three axes: lexical category, semantic category, and representation strategy. Three basic representation strategies were identified: visual similarity; semantic association; and arbitrary convention. These representation strategies are in agreement with the strategies identified in previous taxonomies. However, a greater number of subcategories of these strategies were identified. Our results also indicate that the lexical and semantic attributes of a concept influence the choice of representation strategy.  相似文献   
75.
In this paper, we study the sensitivity of centrality metrics as a key metric of social networks to support visual reasoning. As centrality represents the prestige or importance of a node in a network, its sensitivity represents the importance of the relationship between this and all other nodes in the network. We have derived an analytical solution that extracts the sensitivity as the derivative of centrality with respect to degree for two centrality metrics based on feedback and random walks. We show that these sensitivities are good indicators of the distribution of centrality in the network, and how changes are expected to be propagated if we introduce changes to the network. These metrics also help us simplify a complex network in a way that retains the main structural properties and that results in trustworthy, readable diagrams. Sensitivity is also a key concept for uncertainty analysis of social networks, and we show how our approach may help analysts gain insight on the robustness of key network metrics. Through a number of examples, we illustrate the need for measuring sensitivity, and the impact it has on the visualization of and interaction with social and other scale-free networks.  相似文献   
76.
Model-based testing is focused on testing techniques which rely on the use of models. The diversity of systems and software to be tested implies the need for research on a variety of models and methods for test automation. We briefly review this research area and introduce several papers selected from the 22nd International Conference on Testing Software and Systems (ICTSS).  相似文献   
77.
Spam has become a major issue in computer security because it is a channel for threats such as computer viruses, worms, and phishing. More than 86% of received e-mails are spam. Historical approaches to combating these messages, including simple techniques such as sender blacklisting or the use of e-mail signatures, are no longer completely reliable. Many current solutions feature machine-learning algorithms trained using statistical representations of the terms that most commonly appear in such e-mails. However, these methods are merely syntactic and are unable to account for the underlying semantics of terms within messages. In this paper, we explore the use of semantics in spam filtering by introducing a pre-processing step of Word Sense Disambiguation (WSD). Based upon this disambiguated representation, we apply several well-known machine-learning models and show that the proposed method can detect the internal semantics of spam messages.  相似文献   
78.
Crane operation is a challenging task, due to the combined problem of obstacle avoidance and load swing suppression in underactuated conditions. This paper presents a human-machine interface that increases the operator’s perception of a gantry crane’s workspace. With this aim, a virtual environment resembling the workspace is connected with a haptic device. This allows the user to receive not only visual but also tactile feedback, thus increasing maneuvering safety. Additionally, this capability is integrated in a teleoperation setup, adopting a passivity-based control approach that guarantees overall stability. This includes also the design of controllers by means of the IDA-PBC method. Experimental results carried out with a laboratory crane show its feasibility for internet-based teleoperation and demonstrate the improvements on the system performance.  相似文献   
79.
Accumulator schemes were introduced in order to represent a large set of values as one short value called the accumulator. These schemes allow one to generate membership proofs, that is, short witnesses that a certain value belongs to the set. In universal accumulator schemes, efficient proofs of non-membership can also be created. Li et?al. (Proceedings of applied cryptography and network security—ACNS ’07, LNCS, vol 4521, 2007), building on the work of Camenisch and Lysyanskaya (Advances in cryptology—proceedings of Crypto ’02, LNCS, vol 2442. Springer, Berlin, pp 61–76, 2002), proposed an efficient accumulator scheme, which relies on a trusted accumulator manager. Specifically, a manager that correctly performs accumulator updates. In this work, we introduce the notion of strong universal accumulator schemes, which are similar in functionality to universal accumulator schemes, but do not assume the accumulator manager is trusted. We also formalize the security requirements for such schemes. We then give a simple construction of a strong universal accumulator scheme, which is provably secure under the assumption that collision-resistant hash functions exist. The weaker requirement on the accumulator manager comes at a price; our scheme is less efficient than known universal accumulator schemes—the size of (non)membership witnesses is logarithmic in the size of the accumulated set in contrast to constant in the scheme of Camenisch and Lysyanskaya. Finally, we show how to use strong universal accumulators to solve a problem of practical relevance, the so-called e-Invoice Factoring Problem.  相似文献   
80.
In response to K. Danzinger's (see record 1986-00068-001) suggestion that the first use of the term subject in the English-language psychological literature occurred in 1886 in the context of experiments involving the hypnotic state, the present author points out that there are examples of the use of the term in discussions of experiments on thought transference published by the Society for Psychical Research in the 1880's. (8 ref) (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号