首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9685篇
  免费   452篇
  国内免费   20篇
电工技术   97篇
综合类   4篇
化学工业   1989篇
金属工艺   142篇
机械仪表   194篇
建筑科学   619篇
矿业工程   21篇
能源动力   320篇
轻工业   847篇
水利工程   108篇
石油天然气   28篇
无线电   704篇
一般工业技术   1967篇
冶金工业   1293篇
原子能技术   37篇
自动化技术   1787篇
  2023年   71篇
  2022年   144篇
  2021年   225篇
  2020年   177篇
  2019年   212篇
  2018年   235篇
  2017年   232篇
  2016年   255篇
  2015年   228篇
  2014年   338篇
  2013年   664篇
  2012年   556篇
  2011年   792篇
  2010年   507篇
  2009年   475篇
  2008年   589篇
  2007年   516篇
  2006年   440篇
  2005年   391篇
  2004年   335篇
  2003年   310篇
  2002年   278篇
  2001年   149篇
  2000年   156篇
  1999年   140篇
  1998年   148篇
  1997年   150篇
  1996年   135篇
  1995年   115篇
  1994年   89篇
  1993年   87篇
  1992年   80篇
  1991年   64篇
  1990年   76篇
  1989年   63篇
  1988年   44篇
  1987年   64篇
  1986年   55篇
  1985年   57篇
  1984年   54篇
  1983年   67篇
  1982年   50篇
  1981年   42篇
  1980年   37篇
  1979年   38篇
  1978年   29篇
  1977年   26篇
  1976年   23篇
  1975年   22篇
  1974年   14篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
21.
The introduction of a loop header block facilitates the hoisting of loop-invariant code from a loop. In a -calculus intermediate representation, which has a notion of scope, this transformation is particularly useful. Loop headers with scope also solve a problem with in-line expansion of recursive functions or loops: if done naively, only the first iteration is inlined. A loop header can encapsulate the loop or recursion for better in-line expansion. This optimization improves performance by about 5% in Standard ML of New Jersey.  相似文献   
22.
Congenital abnormalities of the aortic arch may lead to signs and symptoms of tracheal and esophageal obstruction secondary to a restrictive vascular ring. There are many case reports and monographs concerning the surgical management of dysphagia lusoria. This case provides the first example of long-term follow-up of surgical intervention for relief of dysphagia lusoria. A 45-year-old laborer presented with a several year history of episodic bilateral blindness and a more recent onset of "drop attacks." Notably this patient had presented at the age of 18 months with difficulty breathing and eating since birth. The patient also had frequent upper respiratory infections and episodes of pneumonia. Workup revealed a right-sided aortic arch with a left ligamentum arteriosum. When he was first seen in our clinic, history and physical examination revealed claudication and diminished pulses in the left upper extremity. Arteriography and duplex studies confirmed reversal of flow in the patient's left vertebral artery. The arteriogram demonstrated the presence of a right-sided aortic arch and descending aorta along with the proximal stump of the previously ligated left subclavian artery. He underwent left carotid to left axillary artery bypass for the treatment of symptomatic subclavian steal syndrome. His symptoms have resolved with return of antegrade vertebral flow and the presence of normal pulses in the left arm. Congenital aortic abnormalities that lead to tracheal and esophageal compromise are numerous and varied. Surgical management requires a thorough understanding of the person's anatomy and preoperative planning. The life expectancy of patients with dysphagia lusoria necessitates consideration of the long-term consequences of surgical intervention.  相似文献   
23.
3D Motion recovery via affine Epipolar geometry   总被引:10,自引:6,他引:4  
Algorithms to perform point-based motion estimation under orthographic and scaled orthographic projection abound in the literature. A key limitation of many existing algorithms is that they operate on the minimum amount of data required, often requiring the selection of a suitable minimal set from the available data to serve as a local coordinate frame. Such approaches are extremely sensitive to errors and noise in the minimal set, and forfeit the advantages of using the full data set. Furthermore, attention is seldom paid to the statistical performance of the algorithms.We present a new framework that allowsall available features to be used in the motion computations, without the need to select a frame explicitly. This theory is derived in the context of theaffine camera, which preserves parallelism and generalises the orthographic, scaled orthographic and para-perspective models. We define the affine epipolar geometry for two such cameras, giving the fundamental matrix in this case. The noise resistant computation of the epipolar geometry is discussed, and a statistical noise model constructed so that confidence in the results can be assessed.The rigid motion parameters are then determineddirectly from the epipolar geometry, using the novel rotation representation of Koenderink and van Doorn (1991). The two-view partial motion solution comprises the scale factor between views, the projection of the 3D axis of rotation and the cyclotorsion angle, while the addition of a third view allows the true 3D rotation axis to be computed (up to a Necker reversal). The computed uncertainties in these parameters permit optimal estimates to be obtained over time by means of a linear Kalman filter. Our theory extends work by Huang and Lee (1989), Harris (1990), and Koenderink and van Doorn (1991), and results are given on both simulated and real data.  相似文献   
24.
25.
26.
27.
This paper presents an implementation of the watermarking method proposed by Venkatesan et al. in their paper [R. Venkatesan, V. Vazirani, S. Sinha, A graph theoretic approach to software watermarking, in: Fourth International Information Hiding Workshop, Pittsburgh, PA, 2001]. An executable program is marked by the addition of code for which the topology of the control-flow graph encodes a watermark. We discuss issues that were identified during construction of an actual implementation that operates on Java bytecode. We present two algorithms for splitting a watermark number into a redundant set of pieces and an algorithm for turning a watermark number into a control-flow graph. We measure the size and time overhead of watermarking, and evaluate the algorithm against a variety of attacks.  相似文献   
28.
An examination into the effects of carried military equipment on the performance of two tactical combat movement simulations was conducted. Nineteen Airfield Defence Guards performed a break contact (five 30-m sprints) and a fire and movement simulation (16 6-m bounds) in five load conditions (10–30 kg). Heavier loads significantly increased movement duration on the break contact (0.8%/kg load) and fire and movement (1.1%/kg). Performance deterioration was observed from the beginning to the end of the series of movements (bounds or sprints) with deterioration becoming significantly greater in heavier load conditions. Inter-individual variation between slower and faster participants showed a range in load effects; 0.6, 0.8%/kg for fast and 1.0, 1.4%/kg for slow (break contact, fire and movement, respectively). Velocity profiles revealed that the initial acceleration and peak velocity were the primary determinants of performance. As the duration of these tactical combat movements reflects periods of heightened vulnerability, these findings highlight important implications for commanders.

Practitioner Summary: Increasing amounts of carried military equipment impairs the performance of tactical combat movements. Examination of inter-individual variation in velocity profiles identified that the initial acceleration and the peak velocity achieved during sprints and bounds are key determinants of overall performance.  相似文献   

29.
Yin  Zhaoxia  Abel  Andrew  Tang  Jin  Zhang  Xinpeng  Luo  Bin 《Multimedia Tools and Applications》2017,76(3):3899-3920
Multimedia Tools and Applications - In recent years there has been significant interest in reversible data hiding, and also in particular, reversible data hiding in encrypted images (RDH-EI). This...  相似文献   
30.
We extend the traditional notion of passivity to a forced system whose equilibrium is dependent on the control input by defining equilibrium-independent passivity, a system property characterized by a dissipation inequality centered at an arbitrary equilibrium point. We provide a necessary input/output condition which can be tested for systems of arbitrary dimension and sufficient conditions to certify this property for scalar systems. An example from network stability analysis is presented which demonstrates the utility of this new definition. We then proceed to numerical certification of equilibrium-independent passivity using sum-of-squares programming. Finally, through numerical examples we show that equilibrium-independent passivity is less restrictive than incremental passivity.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号