首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   909250篇
  免费   11158篇
  国内免费   2108篇
电工技术   16553篇
综合类   807篇
化学工业   139173篇
金属工艺   35289篇
机械仪表   27532篇
建筑科学   21570篇
矿业工程   5557篇
能源动力   23701篇
轻工业   75983篇
水利工程   10117篇
石油天然气   19114篇
武器工业   64篇
无线电   99565篇
一般工业技术   178865篇
冶金工业   171339篇
原子能技术   20007篇
自动化技术   77280篇
  2021年   8345篇
  2020年   6146篇
  2019年   7873篇
  2018年   13441篇
  2017年   13476篇
  2016年   14191篇
  2015年   9374篇
  2014年   15604篇
  2013年   41498篇
  2012年   24388篇
  2011年   33423篇
  2010年   26652篇
  2009年   29744篇
  2008年   30381篇
  2007年   29987篇
  2006年   26047篇
  2005年   23764篇
  2004年   22734篇
  2003年   22391篇
  2002年   21455篇
  2001年   21138篇
  2000年   19970篇
  1999年   20561篇
  1998年   51133篇
  1997年   36432篇
  1996年   28141篇
  1995年   21283篇
  1994年   18854篇
  1993年   18475篇
  1992年   13705篇
  1991年   12985篇
  1990年   12865篇
  1989年   12454篇
  1988年   11824篇
  1987年   10628篇
  1986年   10379篇
  1985年   11682篇
  1984年   10677篇
  1983年   9909篇
  1982年   9136篇
  1981年   9274篇
  1980年   8839篇
  1979年   8781篇
  1978年   8587篇
  1977年   9908篇
  1976年   12841篇
  1975年   7582篇
  1974年   7214篇
  1973年   7369篇
  1972年   6170篇
排序方式: 共有10000条查询结果,搜索用时 9 毫秒
911.
912.
913.
914.
In this work, simple modifications on the cost index of particular local-model fuzzy clustering algorithms are proposed in order to improve the readability of the resulting models. The final goal is simultaneously providing local linear models (reasonably close to the plant’s Jacobian) and clustering in the input space so that desirable characteristics (regarding final model accuracy, and convexity and smoothness of the cluster membership functions) are improved with respect to other proposals in literature. Some examples illustrate the proposed approach.  相似文献   
915.
In this article, we describe a knowledge-based controlled platform using program supervision techniques. This platform eases the creation and the configuration of video surveillance systems. Several issues need to be addressed to provide a correct system configuration: (1) to choose, among a library of programs, those which are best satisfying a given user request, (2) to assign a correct value for each program parameter, (3) to evaluate performances and to guarantee a performance rate which is satisfactory regarding end-user requirements. This platform is composed of three main components: the library of programs, the knowledge base and the control component. The knowledge is either given by experts or learnt by the system. The control is generic in the sense that it is independent of any application. To validate this platform, we have built and evaluated six video surveillance systems which are featured with three properties: adaptability, reliability and real-time processing.  相似文献   
916.
In this paper, AssetCollector is presented, which is a system for managing collections of cultural assets. AssetCollector covers the needs of collection curators towards defining, populating and searching a collection in a flexible way, while supporting them in generating reports based on the collection’s assets and reusing them in order to build web sites and CD-ROMs. In order to support the above functionality, the system provides the content structuring subsystem, the content input subsystem, the search subsystem and the report subsystem. The use of the subsystems is straightforward and requires no technical skills from the curators. AssetCollector has been successfully applied for organizing various collections of cultural assets in Greece, such as archaeological sites, museums and published books. In the future, an evaluation procedure is planned in order to further refine the use of the system according to the targeted users’ needs. Furthermore, more import and export facilities will be provided, which will make the system compliant with widely accepted standards.  相似文献   
917.
918.
Pervasive computing is as much about the user as it is about the technology. So, the Fifth International Conference on Pervasive Computing emphasized desirability rather than just feasibility. Featured themes included user benefits, human-computer interaction, group and social interactions, context awareness, finding and positioning people and objects, and personal privacy.  相似文献   
919.
Unicode is rapidly becoming the preferred means for representing symbols used in creating multimedia content, especially for information that's presented in multiple languages. This article discusses a unicode vulnerability that makes such content susceptible to being used for creation of covert channel communications. We also developed a solution architecture, the unified secure message augmentation (USMA) service. The USMA service incorporates rules (in an XML vocabulary) that we can apply to unicode transmissions that will detect an attempt to transmit a potential exploit, alert network managers to the presence of the unicode anomaly, and take action to mitigate the exploit.  相似文献   
920.
Packing two-dimensional shapes on a surface such that no shapes overlap and the uncovered surface area is minimized is an important problem that arises in a variety of industrial applications. This paper introduces an intelligent system which tackles the most difficult instance of this problem, where two-dimensional irregular shapes have to be packed on a regularly or irregularly shaped surface. The proposed system utilizes techniques not previously applied to packing, drawn from computer vision and artificial intelligence, and achieves high-quality solutions with short computational times. In addition, the system deals with complex shapes and constraints that occur in industrial applications, such as defective regions and irregularly shaped sheets. We evaluate the effectiveness and efficiency of the proposed method using 14 established benchmark problems that are available from the EURO Special Interest Group on Cutting and Packing.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号