首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   690篇
  免费   41篇
  国内免费   4篇
电工技术   14篇
综合类   1篇
化学工业   123篇
金属工艺   8篇
机械仪表   21篇
建筑科学   7篇
能源动力   34篇
轻工业   73篇
水利工程   7篇
石油天然气   1篇
无线电   102篇
一般工业技术   128篇
冶金工业   78篇
原子能技术   6篇
自动化技术   132篇
  2024年   4篇
  2023年   8篇
  2022年   20篇
  2021年   36篇
  2020年   25篇
  2019年   28篇
  2018年   33篇
  2017年   31篇
  2016年   37篇
  2015年   24篇
  2014年   23篇
  2013年   46篇
  2012年   30篇
  2011年   26篇
  2010年   21篇
  2009年   26篇
  2008年   36篇
  2007年   30篇
  2006年   21篇
  2005年   11篇
  2004年   4篇
  2003年   7篇
  2002年   7篇
  2001年   5篇
  2000年   14篇
  1999年   7篇
  1998年   14篇
  1997年   19篇
  1996年   17篇
  1995年   7篇
  1994年   7篇
  1993年   13篇
  1992年   4篇
  1991年   10篇
  1990年   3篇
  1989年   4篇
  1988年   4篇
  1987年   3篇
  1986年   7篇
  1985年   8篇
  1984年   8篇
  1983年   8篇
  1982年   3篇
  1981年   3篇
  1980年   6篇
  1978年   4篇
  1977年   3篇
  1976年   11篇
  1974年   2篇
  1972年   3篇
排序方式: 共有735条查询结果,搜索用时 15 毫秒
21.
In this work we characterize the session-level behavior of users on an Indian mobile phone comparison shopping website. We also correlate the popularity of handset on various news sources to its popularity on the shopping website. There are three aspects to our study: data analysis, correlation between news sources of product information and popularity of a handset, and behavior prediction. We have used KL divergence to show that a time-homogeneous Markov chain is observed when the number of clicks varies from 5 to 30. Our results depict that Markov chain model does not hold in entirety for comparison shopping setting but tells us how far the Markov chain model holds for this setting. Our analysis corroborates intuition that increasing price leads to decrease in popularity. After the strong correlation between various variables and user behavior was found, we predict the users macro (the overall sales of handset) and micro behavior (whether a user will convert or exit the site) using Markov logic networks. Our predictive model validates the intuition that past browsing behavior is an important predictor for future behavior. Methodology of combining data analysis with machine learning is, in our opinion, a new approach to the empirical study of such data sets.  相似文献   
22.
To protect the remote server from various malicious attacks, many authentication schemes have been proposed. Some schemes have to maintain a password verification table in the remote server for checking the legitimacy of the login users. To overcome potential risks of verification tables, researchers proposed remote user authentication schemes using smartcard, in which the remote server only keeps a secret key for computing the user’s passwords and does not need any verification table for verifying legal user. In 2003 Shen, Lin, and Hwang proposed a timestamp-based password authentication scheme using smartcards in which the remote server does not need to store the passwords or verification table for user authentication. Unfortunately, this scheme is vulnerable to some deadly attacks. In this paper, we analyze few attacks and finally propose an improved timestamp-based remote user authentication scheme. The modified scheme is more efficient and secure than original scheme.  相似文献   
23.
Fructose-2,6-bisphosphatase (FBPase-2) is a switch between gluconeogenesis and glycolysis in the hepatic cells. The structural features required for inhibitory activity of FBPase-2 were unidentified; no leads are available for inhibiting this important enzyme. In this paper pharmacophore mapping, molecular docking methods were employed in a virtual screening strategy to identify leads for FBPase-2. A receptor based pharmacophore map was modeled which comprised of important interactions as observed in co-crystal of rat liver isozyme with the product inhibitor fructose-6-phosphate. The pharmacophore model was validated against two databases of best docked structural analogues of fructose-2,6-bisphosphate and fructose-6-phosphate. The query generated was submitted for flexible search of ligands in chemical databases, namely LeadQuest, Maybridge and NCI. The hits obtained were further screened by molecular docking using FlexX.  相似文献   
24.
Determining order relationship between events of a distributed computation is a fundamental problem in distributed systems which has applications in many areas including debugging, visualization, checkpointing and recovery. Fidge/Mattern’s vector-clock mechanism captures the order relationship using a vector of size N in a system consisting of N processes. As a result, it incurs message and space overhead of N integers. Many distributed applications use synchronous messages for communication. It is therefore natural to ask whether it is possible to reduce the timestamping overhead for such applications. In this paper, we present a new approach for timestamping messages and events of a synchronously ordered computation, that is, when processes communicate using synchronous messages. Our approach depends on decomposing edges in the communication topology into mutually disjoint edge groups such that each edge group either forms a star or a triangle. We show that, to accurately capture the order relationship between synchronous messages, it is sufficient to use one component per edge group in the vector instead of one component per process. Timestamps for events are only slightly bigger than timestamps for messages. Many common communication topologies such as ring, grid and hypercube can be decomposed into edge groups, resulting in almost 50% improvement in both space and communication overheads. We prove that the problem of computing an optimal edge decomposition of a communication topology is NP-complete in general. We also present a heuristic algorithm for computing an edge decomposition whose size is within a factor of two of the optimal. We prove that, in the worst case, it is not possible to timestamp messages of a synchronously ordered computation using a vector containing fewer than components when N ≥ 2. Finally, we show that messages in a synchronously ordered computation can always be timestamped in an offline manner using a vector of size at most . An earlier version of this paper appeared in 2002 Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS). The author V. K. Garg was supported in part by the NSF Grants ECS-9907213, CCR-9988225, an Engineering Foundation Fellowship. This work was done while the author C. Skawratananond was a Ph.D. student at the University of Texas at Austin.  相似文献   
25.
Mittal P  Lawrie RA 《Meat science》1984,10(2):101-116
A study was made of thermoplastically extruded products prepared from soy grits incorporating varying percentages of offal. Beyond 35% incorporation no satisfactory extrudate could be prepared. A comparison was therefore made of the expansion ratio, density and hydratability of extrudates prepared from mixes containing 20% and 35% of bovine or porcine offal with those containing soy grit alone. The offal sources consisted of untreated or alkali-extracted bovine and porcine lung and bovine tripe (rumen and reticulum) and bovine tripe extracted by sodium dodecyl sulphate (SDS). Under the determined optimum operating conditions, extrudates from all offal/soy mixtures had lower expansion ratios and rehydratability than those from soy grits alone. Nevertheless, mixtures containing 20% or 35% alkali-extracted offal protein expanded more (greatest expansion at 170°C), had lower density and greater hydratability than those containing these proportions of untreated offal or SDS-extracted offal protein. (The latter expanded most between 175-180°C.) Whereas the incorporation of SDS-extracted bovine or porcine lung protein failed to yield textured extrudates, the incorporation of SDS-extracted bovine tripe protein at the 20% level did so. Effects due to source were otherwise small.  相似文献   
26.
A simplified two-term model was developed to predict the weight loss of frankfurters during thermal processing at various process conditions and with various product compositions. The model was validated with the experimental data. The moisture loss rate was found to be proportional to product temperature and inversely proportional to the fat-protein ratio of the product.  相似文献   
27.
Surface ultrastructures of gill filaments and secondary lamellae of Rita rita and Cirrhinus mrigala, inhabiting different ecological habitat, were investigated to unravel adaptive modifications. R. rita is a sluggish, bottom dwelling carnivorous catfish, which inhabits regions of river with accumulations of dirty water. It retains its viability for long time if taken out of water. C. mrigala is an active bottom dwelling Indian major carp, which lives in relatively clean water and dies shortly after taken out of water. In R. rita, gill septa between gill filaments are reduced. Microridges on epithelial cells covering gill filaments are often continuous and arranged concentrically. Secondary lamellae are extensive. The epithelium appears corrugated, show irregular elevations and shallow depressions, and microridges on epithelial cells appear fragmented. In C. mrigala, in contrast, the gill septa are extensive. Microridges on epithelial cells covering gill filaments are fragmented. Secondary lamellae are less extensive. The epithelium appears smooth and microridges on epithelial cells are relatively inconspicuous. These differences have been considered adaptive modification in relation to habit and ecological niches inhabited by two fish species. Presence of mucous goblet cells on gill filaments is discussed in relation to their functions including precipitation of the sediments and preventing clogging of gill filaments. Infrequent mucous goblet cells in the epithelium of secondary lamellae in two fish species are considered an adaptation, minimizing thickness of the epithelium to reduce barrier between blood and water for favoring gasses exchange with increased efficiency.  相似文献   
28.
Most geometric computer vision problems involve orthogonality constraints. An important subclass of these problems is subspace estimation, which can be equivalently formulated into an optimization problem on Grassmann manifolds. In this paper, we propose to use the conjugate gradient algorithm on Grassmann manifolds for robust subspace estimation in conjunction with the recently introduced generalized projection based M-Estimator (gpbM). The gpbM method is an elemental subset-based robust estimation algorithm that can process heteroscedastic data without any user intervention. We show that by optimizing the orthogonal parameter matrix on Grassmann manifolds, the performance of the gpbM algorithm improves significantly. Results on synthetic and real data are presented.  相似文献   
29.
When occlusion is minimal, a single camera is generally sufficient to detect and track objects. However, when the density of objects is high, the resulting occlusion and lack of visibility suggests the use of multiple cameras and collaboration between them so that an object is detected using information available from all the cameras in the scene.In this paper, we present a system that is capable of segmenting, detecting and tracking multiple people in a cluttered scene using multiple synchronized surveillance cameras located far from each other. The system is fully automatic, and takes decisions about object detection and tracking using evidence collected from many pairs of cameras. Innovations that help us tackle the problem include a region-based stereo algorithm capable of finding 3D points inside an object knowing only the projections of the object (as a whole) in two views, a segmentation algorithm using bayesian classification and the use of occlusion analysis to combine evidence from different camera pairs.The system has been tested using different densities of people in the scene. This helps us determine the number of cameras required for a particular density of people. Experiments have also been conducted to verify and quantify the efficacy of the occlusion analysis scheme.  相似文献   
30.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号