首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2988篇
  免费   73篇
  国内免费   3篇
电工技术   36篇
综合类   3篇
化学工业   636篇
金属工艺   34篇
机械仪表   34篇
建筑科学   197篇
矿业工程   21篇
能源动力   62篇
轻工业   160篇
水利工程   27篇
石油天然气   48篇
无线电   170篇
一般工业技术   384篇
冶金工业   815篇
原子能技术   19篇
自动化技术   418篇
  2022年   27篇
  2021年   35篇
  2019年   34篇
  2018年   36篇
  2017年   54篇
  2016年   48篇
  2015年   42篇
  2014年   42篇
  2013年   179篇
  2012年   71篇
  2011年   104篇
  2010年   83篇
  2009年   93篇
  2008年   105篇
  2007年   109篇
  2006年   95篇
  2005年   110篇
  2004年   74篇
  2003年   96篇
  2002年   68篇
  2001年   74篇
  2000年   51篇
  1999年   64篇
  1998年   97篇
  1997年   65篇
  1996年   69篇
  1995年   45篇
  1994年   40篇
  1993年   40篇
  1992年   38篇
  1991年   32篇
  1990年   53篇
  1989年   46篇
  1988年   47篇
  1987年   52篇
  1986年   35篇
  1985年   49篇
  1984年   39篇
  1983年   35篇
  1982年   37篇
  1981年   32篇
  1980年   26篇
  1979年   34篇
  1978年   34篇
  1977年   31篇
  1976年   50篇
  1975年   30篇
  1974年   33篇
  1973年   42篇
  1972年   23篇
排序方式: 共有3064条查询结果,搜索用时 15 毫秒
71.
In this digital era, where Internet of Things (IoT) is increasing day by day, use of resource constrained devices is also increasing. Indeed, the features such as low cost, less maintenance, more adaptive to hostile environment, etc. make the wireless multimedia devices to be the best choice as the resource constrained devices. For the security, the end user device requires to establish the session key with the server before transferring the data. Mobile is one of the device having more and more usage as wireless multimedia device in recent years. In 2013, Li et al. proposed an efficient scheme for the wireless mobile communications and claimed it to be secure against various attacks. Recently, Shen et al. claimed that the scheme of Li et al. is still vulnerable to the privileged insider attack, the stolen verifier attack and finally proposed a scheme to withstand the mentioned and other attacks. However, in this paper we claim that the scheme of Shen et al. is still susceptible to the user anonymity, the session specific temporary information attack and the replay attack. In addition, Shen et al.’s scheme requires more time due to many operations. Further, we propose an efficient scheme that is secure against various known attacks and due to reduced time complexity our scheme is a preferred choice for the wireless mobile networks and hence for wireless multimedia systems.  相似文献   
72.
Spacecraft formation reconfiguration with collision avoidance   总被引:1,自引:0,他引:1  
In this paper we present a behavioral control solution for reconfiguration of a spacecraft formation using the Null-Space Based (NSB) concept. The solution is task based, and aims to reconfigure and maintain a rigid formation while avoiding collisions between spacecraft. A model of relative translation is derived, together with a passivity-based sliding surface controller which globally stabilizes the equilibrium point of the closed-loop system. The NSB control method is implemented by giving each task different priorities and then calculating desired velocity and a Jacobian matrix for each spacecraft and each task. The velocity vector for each task is then projected into the null-space for higher prioritized tasks to remove conflicting velocity components. Simulation results are presented, showing that each spacecraft moves into the predefined formation without breaking any rules for the higher priority tasks, and all collisions are avoided.  相似文献   
73.
The use of formal methods for analyzing and synthesizing a controller for a multi-train multi-track railway system is discussed. The research was motivated by a case study involving the Bay Area Rapid Transit (BART) system. The overall goal is to design a train acceleration control function that enables trains to be safely placed but also increases system throughput. The use of a modeling language for specifying safety properties and a control function is illustrated. The program transformation methodology supported in the HATS system is employed to generate an efficient implementation from a high-level specification of a controller. This implementation can then be used to simulate the controller behavior, thus further enhancing confidence in the design. Properties of optimization transformations can be verified using an rewrite-rule based induction theorem prover Rewrite Rule Laboratory (RRL).  相似文献   
74.
75.
Individual privacy will be at risk if a published data set is not properly de-identified. k-anonymity is a major technique to de-identify a data set. Among a number of k-anonymisation schemes, local recoding methods are promising for minimising the distortion of a k-anonymity view. This paper addresses two major issues in local recoding k-anonymisation in attribute hierarchical taxonomies. Firstly, we define a proper distance metric to achieve local recoding generalisation with small distortion. Secondly, we propose a means to control the inconsistency of attribute domains in a generalised view by local recoding. We show experimentally that our proposed local recoding method based on the proposed distance metric produces higher quality k-anonymity tables in three quality measures than a global recoding anonymisation method, Incognito, and a multidimensional recoding anonymisation method, Multi. The proposed inconsistency handling method is able to balance distortion and consistency of a generalised view.  相似文献   
76.
Recently, a powerful two-phase method for restoring images corrupted with high level impulse noise has been developed. The main drawback of the method is the computational efficiency of the second phase which requires the minimization of a non-smooth objective functional. However, it was pointed out in (Chan et al. in Proc. ICIP 2005, pp. 125–128) that the non-smooth data-fitting term in the functional can be deleted since the restoration in the second phase is applied to noisy pixels only. In this paper, we study the analytic properties of the resulting new functional ℱ. We show that ℱ, which is defined in terms of edge-preserving potential functions φ α , inherits many nice properties from φ α , including the first and second order Lipschitz continuity, strong convexity, and positive definiteness of its Hessian. Moreover, we use these results to establish the convergence of optimization methods applied to ℱ. In particular, we prove the global convergence of some conjugate gradient-type methods and of a recently proposed low complexity quasi-Newton algorithm. Numerical experiments are given to illustrate the convergence and efficiency of the two methods.
Carmine Di FioreEmail:
  相似文献   
77.
78.
With the increasing importance of XML, LDAP directories, and text-based information sources on the Internet, there is an ever-greater need to evaluate queries involving (sub)string matching. In many cases, matches need to be on multiple attributes/dimensions, with correlations between the multiple dimensions. Effective query optimization in this context requires good selectivity estimates. In this paper, we use pruned count-suffix trees (PSTs) as the basic data structure for substring selectivity estimation. For the 1-D problem, we present a novel technique called MO (Maximal Overlap). We then develop and analyze two 1-D estimation algorithms, MOC and MOLC, based on MO and a constraint-based characterization of all possible completions of a given PST. For the k-D problem, we first generalize PSTs to multiple dimensions and develop a space- and time-efficient probabilistic algorithm to construct k-D PSTs directly. We then show how to extend MO to multiple dimensions. Finally, we demonstrate, both analytically and experimentally, that MO is both practical and substantially superior to competing algorithms. Received April 28, 2000 / Accepted July 11, 2000  相似文献   
79.
We present a systematic microscopic approach to diffusion and diffusion-limited processes in Ni3Al. These processes have been identified as controlling the deformation of the material under specific circumstances. The embedded atom method calculations are done using kinetic Monte Carlo combined with the Dimer method of finding saddlepoints. We compute the tracer diffusivities as functions of composition and temperature. The comparison with available experiments is good. We find that at temperatures below about 1000 K, the diffusivity is a sharp function of composition, showing a pronounced dip on the Ni-rich side at 76 at.% Ni. This agrees well with experiment, except that the experiments show this structure setting in a temperatures below about 1300 K. We show that the structure arises from the composition dependence of both the vacancy formation energy and pre-exponential of the diffusivity. We also compute the mobility of an anti-phase boundary perpendicular to its plane, and conclude that vacancy-assistance is very plausible. We conclude that the kMC + Dimer method works well for these problems above 700 K but less effectively below, owing to the presence of short-range, low-energy hops that tend to localize the vacancy and lower the efficiency of the calculation.  相似文献   
80.
Four studies examined associations between E. L. Deci and R. M. Ryan's (1985, 2000) construct of autonomy, responses to relationship disagreements, and dissatisfaction after conflict. In Study 1, diary data showed that trait autonomy predicted relationship autonomy, which in turn predicted relative satisfaction after disagreements. In Study 2, trait autonomy predicted relationship autonomy, which was associated with less defensive and more understanding responses to conflict. Studies 3 and 4 examined whether one's partner's relationship autonomy uniquely predicted reported and observed behavior during conflict. Autonomous reasons for being in the relationship (of both self and partner) predicted both reported and observed responses to conflict and feelings of satisfaction. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号