首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3297篇
  免费   75篇
  国内免费   3篇
电工技术   38篇
综合类   6篇
化学工业   544篇
金属工艺   51篇
机械仪表   58篇
建筑科学   234篇
矿业工程   17篇
能源动力   68篇
轻工业   276篇
水利工程   33篇
石油天然气   12篇
武器工业   1篇
无线电   323篇
一般工业技术   410篇
冶金工业   687篇
原子能技术   60篇
自动化技术   557篇
  2023年   11篇
  2022年   21篇
  2021年   40篇
  2020年   34篇
  2019年   41篇
  2018年   38篇
  2017年   62篇
  2016年   55篇
  2015年   37篇
  2014年   92篇
  2013年   218篇
  2012年   117篇
  2011年   157篇
  2010年   147篇
  2009年   134篇
  2008年   161篇
  2007年   157篇
  2006年   169篇
  2005年   128篇
  2004年   126篇
  2003年   114篇
  2002年   92篇
  2001年   60篇
  2000年   60篇
  1999年   70篇
  1998年   152篇
  1997年   110篇
  1996年   96篇
  1995年   62篇
  1994年   52篇
  1993年   52篇
  1992年   35篇
  1991年   23篇
  1990年   29篇
  1989年   29篇
  1988年   17篇
  1987年   25篇
  1986年   20篇
  1985年   20篇
  1984年   27篇
  1983年   25篇
  1982年   27篇
  1981年   26篇
  1980年   21篇
  1979年   21篇
  1978年   22篇
  1977年   24篇
  1976年   42篇
  1975年   9篇
  1974年   11篇
排序方式: 共有3375条查询结果,搜索用时 484 毫秒
71.
Bloom syndrome (BS) is more frequent in the Ashkenazic Jewish population than in any other. There the predominant mutation, referred to as "blmAsh," is a 6-bp deletion and 7-bp insertion at nucleotide position 2281 in the BLM cDNA. Using a convenient PCR assay, we have identified blmAsh on 58 of 60 chromosomes transmitted by Ashkenazic parents to persons with BS. In contrast, in 91 unrelated non-Ashkenazic persons with BS whom we examined, blmAsh was identified only in 5, these coming from Spanish-speaking Christian families from the southwestern United States, Mexico, or El Salvador. These data, along with haplotype analyses, show that blmAsh was independently established through a founder effect in Ashkenazic Jews and in immigrants to formerly Spanish colonies. This striking observation underscores the complexity of Jewish history and demonstrates the importance of migration and genetic drift in the formation of human populations.  相似文献   
72.
An operator's sense of remote presence during teleoperation or use of virtual environment interfaces is analyzed as to what characteristics it should have to qualify it as an explanatory scientific construct. But the implicit goal of designing virtual environment interfaces to maximize presence is itself questioned in a second section in which examples of human-machine interfaces beneficially designed to avoid a strong sense of egocentric presence are cited. In conclusion, it is argued that the design of a teleoperation or virtual environment system should generally focus on the efficient communication of causal interaction. In this view the sense of presence, that is of actually being at the simulated or remote workplace, is an epiphenomena of secondary importance for design.  相似文献   
73.
We discuss the calculus of variations in tensor representations with a special focus on tensor networks and apply it to functionals of practical interest. The survey provides all necessary ingredients for applying minimization methods in a general setting. The important cases of target functionals which are linear and quadratic with respect to the tensor product are discussed, and combinations of these functionals are presented in detail. As an example, we consider the representation rank compression in tensor networks. For the numerical treatment, we use the nonlinear block Gauss?CSeidel method. We demonstrate the rate of convergence in numerical tests.  相似文献   
74.
Automating software testing activities can increase the quality and drastically decrease the cost of software development. Toward this direction, various automated test data generation tools have been developed. The majority of existing tools aim at structural testing, while a quite limited number aim at a higher level of testing thoroughness such as mutation. In this paper, an attempt toward automating the generation of mutation-based test cases by utilizing existing automated tools is proposed. This is achieved by reducing the killing mutants’ problem into a covering branches one. To this extent, this paper is motivated by the use of state of the art techniques and tools suitable for covering program branches when performing mutation. Tools and techniques such as symbolic execution, concolic execution, and evolutionary testing can be easily adopted toward automating the test input generation activity for the weak mutation testing criterion by simply utilizing a special form of the mutant schemata technique. The propositions made in this paper integrate three automated tools in order to illustrate and examine the method’s feasibility and effectiveness. The obtained results, based on a set of Java program units, indicate the applicability and effectiveness of the suggested technique. The results advocate that the proposed approach is able to guide existing automating tools in producing test cases according to the weak mutation testing criterion. Additionally, experimental results with the proposed mutation testing regime show that weak mutation is able to speedup the mutant execution time by at least 4.79 times when compared with strong mutation.  相似文献   
75.
Past research has extensively investigated the effect of media, especially focusing on how anonymity increases risk-related behaviors of groups when using computer-mediated communication (CMC). This study extends prior research by examining the differences in group risk-taking behaviors between face-to-face groups and completely non-anonymous CMC groups (i.e., groups working in a fully identified, synchronous CMC environment similar to popular instant messaging systems utilized widely within organizations). Drawing on the “decision analysis” perspective, a key framework for understanding organizational decision-making, the study also examines the effects of the firm's risk preferences as well as the type of information distribution among group members (i.e., full information known to all group members versus partial information know by only some of the members) on the groups' risk-taking behaviors. Results from a laboratory experiment using student subjects found no differences in risk-taking behaviors between CMC and face-to-face groups; additionally, no differences were found related to how information was distributed among group members. A significant effect was found, however, for the risk preference of the firm, showing that risk-neutral firms influenced groups to make riskier decisions than groups from risk-averse firms. Finally, groups within risk-neutral firms receiving partial information made riskier decisions than groups receiving full information. The implications of these results for future research and practice are examined.  相似文献   
76.
Lidars have the unique ability to make direct, physical measurements of forest height and vertical structure in much denser canopies than is possible with passive optical or short wavelength radars. However the literature reports a consistent underestimate of tree height when using physically based methods, necessitating empirical corrections. This bias is a result of overestimating the range to the canopy top due to background noise and failing to correctly identify the ground.This paper introduces a method, referred to as “noise tracking”, to avoid biases when determining the range to the canopy top. Simulated waveforms, created with Monte-Carlo ray tracing over geometrically explicit forest models, are used to test noise tracking against simple thresholding over a range of forest and system characteristics. It was found that noise tracking almost completely removed the bias in all situations except for very high noise levels and very low (< 10%) canopy covers. In all cases noise tracking gave lower errors than simple thresholding and had a lower sensitivity to the initial noise threshold.Finite laser pulses spread out the measured signal, potentially overriding the benefit of noise tracking. In the past laser pulse length has been corrected by adding half that length to the signal start range. This investigation suggests that this is not always appropriate for simple thresholding and that the results for noise tracking were more directly related to pulse length than for simple thresholding. That this effect has not been commented on before may be due to the possible confounding impacts of instrument and survey characteristics inherent in field data. This method should help improve the accuracy of waveform lidar measurements of forests, whether using airborne or spaceborne instruments.  相似文献   
77.
X-machines were proposed by Holcombe as a possible specification language and since then a number of further investigations have demonstrated that the model is intuitive and easy to use as well as general enough to cater for a wide range of applications. In particular (generalised) stream X-machines have been found to be extremely useful as a specification method and most of the theory developed so far has concentrated on this particular class of X-machines. Furthermore, a method for testing systems specified by stream X-machines exists and is proved to detect all faults of the implementation provided that the system meets certain initial requirements. However, this method can only be used to generate test sequences from deterministic X-machine specifications. In this paper we present the theoretical basis for a method for generating test sets from non-deterministic generalised stream X-machines. Received November 1999 / Accepted in revised form September 2000  相似文献   
78.
Due to the rapid development in computer networks, congestion becomes a critical issue. Congestion usually occurs when the connection demands on network resources, i.e. buffer spaces, exceed the available ones. We propose in this paper a new discrete-time queueing network analytical model based on dynamic random early drop (DRED) algorithm to control the congestion in early stages. We apply our analytical model on two-queue nodes queueing network. Furthermore, we compare between the proposed analytical model and three known active queue management (AQM) algorithms, including DRED, random early detection (RED) and adaptive RED, in order to figure out which of them offers better quality of service (QoS). We also experimentally compare the queue nodes of the proposed analytical model and the three AQM methods in terms of different performance measures, including, average queue length, average queueing delay, throughput, packet loss probability, etc., aiming to determine the queue node that offers better performance.  相似文献   
79.
Information visualisation is about gaining insight into data through a visual representation. This data is often multivariate and increasingly, the datasets are very large. To help us explore all this data, numerous visualisation applications, both commercial and research prototypes, have been designed using a variety of techniques and algorithms. Whether they are dedicated to geo-spatial data or skewed hierarchical data, most of the visualisations need to adopt strategies for dealing with overcrowded displays, brought about by too much data to fit in too small a display space. This paper analyses a large number of these clutter reduction methods, classifying them both in terms of how they deal with clutter reduction and more importantly, in terms of the benefits and losses. The aim of the resulting taxonomy is to act as a guide to match techniques to problems where different criteria may have different importance, and more importantly as a means to critique and hence develop existing and new techniques.  相似文献   
80.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号