首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   322篇
  免费   20篇
电工技术   2篇
化学工业   32篇
金属工艺   1篇
机械仪表   6篇
建筑科学   10篇
矿业工程   1篇
能源动力   4篇
轻工业   13篇
水利工程   2篇
石油天然气   1篇
无线电   49篇
一般工业技术   73篇
冶金工业   34篇
自动化技术   114篇
  2023年   2篇
  2022年   4篇
  2021年   7篇
  2020年   10篇
  2019年   16篇
  2018年   11篇
  2017年   8篇
  2016年   13篇
  2015年   5篇
  2014年   12篇
  2013年   31篇
  2012年   21篇
  2011年   30篇
  2010年   25篇
  2009年   17篇
  2008年   15篇
  2007年   14篇
  2006年   19篇
  2005年   11篇
  2004年   7篇
  2003年   4篇
  2002年   2篇
  2001年   2篇
  2000年   4篇
  1999年   4篇
  1998年   7篇
  1997年   7篇
  1996年   6篇
  1995年   4篇
  1994年   1篇
  1993年   1篇
  1992年   2篇
  1991年   1篇
  1990年   1篇
  1988年   1篇
  1987年   2篇
  1985年   1篇
  1984年   1篇
  1983年   1篇
  1982年   2篇
  1981年   2篇
  1979年   1篇
  1978年   1篇
  1977年   1篇
  1975年   3篇
  1973年   1篇
  1972年   1篇
排序方式: 共有342条查询结果,搜索用时 140 毫秒
91.
Mesh segmentation using feature point and core extraction   总被引:1,自引:0,他引:1  
Mesh segmentation has become a necessary ingredient in many applications in computer graphics. This paper proposes a novel hierarchical mesh segmentation algorithm, which is based on new methods for prominent feature point and core extraction. The algorithm has several benefits. First, it is invariant both to the pose of the model and to different proportions between the model’s components. Second, it produces correct hierarchical segmentations of meshes, both in the coarse levels of the hierarchy and in the fine levels, where tiny segments are extracted. Finally, the boundaries between the segments go along the natural seams of the models.  相似文献   
92.
针对目前有些企业在深化体制改革, 转换经营机制后仍存在以改代管, 以转代管, 忽视企业管理的片面做法, 指出转换经营机制, 建立现代企业制度是增强企业活力的必要条件, 实施科学管理则是企业生存和发展的基础。企业管理必须随着体制改革的深入发展而不断创新, 加强管理必须从更新观念, 完善法人治理结构, 大力培养管理人才, 建立以人为本的激励制度, 建立目标成本管理制度, 吸收和引进现代科学管理方法, 以及改革投资管理制度等方面着手。  相似文献   
93.
This article focuses on the concept of empowerment and the ways in which the Internet is being utilized as an empowering tool. This analysis ranges from the personal to the global levels and the consequences of that empowerment are also discussed. We propose a four-level model that serves to explain what we term E-empowerment and the effects that can be observed at each of the four levels, ranging from (1) the personal; (2) the interpersonal; (3) group; and (4) citizenship. The potential for future development of E-empowerment is also discussed.  相似文献   
94.
1. The purpose of this study was to investigate testosterone's role on the calcium channel antagonist oxodipine-inducing gingival hyperplasia in a dog model. 2. Two experiments were conducted using castrated and intact male dogs. Oxodipine was administered orally for 90 days, at a dose of 24 mg/kg/day. In the first experiment, the occurrence of gingival hyperplasia was evaluated. In the second, the gingival index (GI) and gingival hyperplasia index (GHI) were recorded and correlated with serum levels of testosterone. 3. A significant positive correlation between GI, GHI and plasma testosterone was noted. Castrated dogs were injected with testosterone, 4 months after the start of oxodipine treatment, while in the non-castrated dogs, administration of oxodipine was stopped. Castration correlated with lack of GH, while testosterone injection to the same dogs was associated with an increase of GI and GHI. 4. Since it is known that testosterone receptors are present in the gingiva, it is proposed that oxodipine-induced gingival hyperplasia could be mediated by the calcium channel blocker on plasma testosterone levels.  相似文献   
95.
This paper describes the use of Obstacle Analysis to identify anomaly handling requirements for a safety-critical, autonomous system. The software requirements for the system evolved during operations due to an on-going effort to increase the autonomous system’s robustness. The resulting increase in autonomy also increased system complexity. This investigation used Obstacle Analysis to identify and to reason incrementally about new requirements for handling failures and other anomalous events. Results reported in the paper show that Obstacle Analysis complemented standard safety-analysis techniques in identifying undesirable behaviors and ways to resolve them. The step-by-step use of Obstacle Analysis identified potential side effects and missing monitoring and control requirements. Adding an Availability Indicator and feature-interaction patterns proved useful for the analysis of obstacle resolutions. The paper discusses the consequences of these results in terms of the adoption of Obstacle Analysis to analyze anomaly handling requirements in evolving systems.  相似文献   
96.
Modern cryptography is based on various building blocks such as one way functions with or without trapdoors, pseudo-random functions, one way permutations with or without trapdoors, etc. In a quantum world some of the main candidates for these building blocks are broken. For instance, the security of the most popular public-key cryptosystem—RSA—is related to the difficulty of factoring large numbers, and is broken (in principle) by a quantum computer. We investigate some of the remaining candidates, and discuss the resulting “Post-Quantum Cryptography” (namely, the resulting “modern cryptography in a quantum environment”).  相似文献   
97.
This paper advances a procedure to compute the a-posteriori error bounds for the solution of a wide class of ordinary differential equations with given initial conditions. The method is based on an iterative scheme which yields upper and lower bounds which approach each other. The convergence of these iterations is proved analytically. Application of the proposed method is demonstrated by several examples. The method is independent of the integration scheme used. Also, separate bounds for each component of the solution are specifically available as a function of time compared to the bound on the norm yielded by conventional methods.  相似文献   
98.
An ecology of ideology: theory and evidence from four populations   总被引:1,自引:0,他引:1  
This paper analyzes the founding rates of two types of Jewishagricultural cooperatives, the moshav and the kibbutz, to showhow political ideology intersects with resource requirementsto produce competition and mutualism between organizations.These two populations, which share ideology and a resource base,competed with each other. They both enjoyed mutualism with thepopulation of credit cooperatives, which represented a kindredideology, but relied on different resources. They both sufferedcompetition from the population of corporations, which representeda rival ideology, capitalism.  相似文献   
99.
This study investigated the role that attachment style plays in preadolescent behavior in group counseling. The study population consisted of 77 preadolescents referred to counseling services in their schools in Israel. They were treated in 11 small counseling groups led by novice counselors. Variables included self-disclosure, client behavior in therapy, and responsiveness to other group members--all assessed based on transcribed sessions. Participants also completed attachment questionnaires. The analyses were performed with hierarchical modeling (mixed) nesting individuals within groups. Results indicated differences on all dependent variables among the three attachment styles: secure, preoccupied, and avoidant. Secure adolescents showed the highest rates of self-disclosure, productive client behavior, and responsiveness to others, whereas avoidant participants showed the lowest scores on all measures. Gender, age, and group size showed little effect. The discussion focuses on implications for group therapists. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
100.
We present the first undeniable signatures scheme based on RSA. Since their introduction in 1989 a significant amount of work has been devoted to the investigation of undeniable signatures. So far, this work has been based on discrete log systems. In contrast, our scheme uses regular RSA signatures to generate undeniable signatures. In this new setting, both the signature and verification exponents of RSA are kept secret by the signer, while the public key consists of a composite modulus and a sample RSA signature on a single public message. Our scheme possesses several attractive properties. First, provable security, as forging the undeniable signatures is as hard as forging regular RSA signatures. Second, both the confirmation and denial protocols are zero-knowledge. In addition, these protocols are efficient (particularly, the confirmation protocol involves only two rounds of communication and a small number of exponentiations). Furthermore, the RSA-based structure of our scheme provides with simple and elegant solutions to add several of the more advanced properties of undeniable signatures found in the literature, including convertibility of the undeniable signatures (into publicly verifiable ones), the possibility to delegate the ability to confirm and deny signatures to a third party without giving up the power to sign, and the existence of distributed (threshold) versions of the signing and confirmation operations. Due to the above properties and the fact that our undeniable nsignatures are identical in form to standard RSA signatures, the scheme we present becomes a very attractive candidate for practical implementations. Received 25 July 1997 and revised 5 November 1998  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号