首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2041篇
  免费   39篇
  国内免费   7篇
电工技术   14篇
综合类   26篇
化学工业   153篇
金属工艺   10篇
机械仪表   21篇
建筑科学   39篇
矿业工程   4篇
能源动力   28篇
轻工业   71篇
水利工程   5篇
石油天然气   5篇
无线电   118篇
一般工业技术   124篇
冶金工业   1331篇
原子能技术   7篇
自动化技术   131篇
  2023年   3篇
  2022年   10篇
  2021年   17篇
  2020年   12篇
  2019年   14篇
  2018年   17篇
  2017年   15篇
  2016年   25篇
  2015年   13篇
  2014年   27篇
  2013年   45篇
  2012年   37篇
  2011年   46篇
  2010年   36篇
  2009年   38篇
  2008年   32篇
  2007年   29篇
  2006年   42篇
  2005年   18篇
  2004年   29篇
  2003年   23篇
  2002年   24篇
  2001年   11篇
  2000年   26篇
  1999年   70篇
  1998年   360篇
  1997年   220篇
  1996年   165篇
  1995年   105篇
  1994年   84篇
  1993年   93篇
  1992年   15篇
  1991年   27篇
  1990年   28篇
  1989年   21篇
  1988年   34篇
  1987年   33篇
  1986年   16篇
  1985年   23篇
  1984年   5篇
  1983年   5篇
  1982年   9篇
  1981年   16篇
  1980年   11篇
  1978年   6篇
  1977年   46篇
  1976年   83篇
  1975年   4篇
  1974年   3篇
  1972年   3篇
排序方式: 共有2087条查询结果,搜索用时 21 毫秒
21.
Project-based learning is a student-centered comprehensive instructional approach where students collectively engage themselves in complex learning tasks. Recent advances in educational technologies have made student-centered learning in a technology rich environment both possible and feasible. This paper will report part of a larger study carried out at a school in the United States of America on the use ofconstructivism and technology in project-based learning. Data collection techniques included those typically associated with qualitative field research. In this paper, the technological infrastructure of the school and how technology is used in one of the project-based learning classes will be provided. Based on this study, some suggestions are also provided on how technology can be used in the context of other countries including in Malaysia.  相似文献   
22.
Single channel currents were activated by GABA (0.5 to 5 microM) in cell-attached and inside-out patches from cells in the dentate gyrus of rat hippocampal slices. The currents reversed at the chloride equilibrium potential and were blocked by bicuculline (100 microM). Several different kinds of channel were seen: high conductance and low conductance, rectifying and "nonrectifying." Channels had multiple conductance states. The open probability (Po) of channels was greater at depolarized than at hyperpolarized potentials and the relationship between Po and potential could be fitted with a Boltzmann equation with equivalent valency (z) of 1. The combination of outward rectification and potential-dependent open probability gave very little chloride current at hyperpolarized potentials but steeply increasing current with depolarization, useful properties for a tonic inhibitory mechanism.  相似文献   
23.
This paper aims to derive stability conditions and an output‐feedback stabilization method for discrete‐time systems with a time‐varying state delay and nonlinear perturbation. With a new way of handling the Lyapunov stability criterion, linear matrix inequality conditions are obtained for estimating bounds on delay to ensure the asymptotic stability. Based on the conditions, a synthesis procedure is developed for finding stabilizing output‐feedback gains, which are formulated as direct design variables. Three numerical examples are employed to demonstrate the effectiveness and advantages of the proposed method. Copyright © 2010 John Wiley and Sons Asia Pte Ltd and Chinese Automatic Control Society  相似文献   
24.
Given a hypergraph and a set of embedded functional dependencies, we investigate the problem of determining the conditions under which we can efficiently generate redundancy-free XML storage structures with as few scheme trees as possible. Redundancy-free XML structures guarantee both economy in storage space and the absence of update anomalies, and having the least number of scheme trees requires the fewest number of joins to navigate among the data elements. We know that the general problem is intractable. The problem may still be intractable even when the hypergraph is acyclic and each hyperedge is in Boyce–Codd normal form (BCNF). As we show here, however, given an acyclic hypergraph with each hyperedge in BCNF, a polynomial-time algorithm exists that generates a largest possible redundancy-free XML storage structure. Successively generating largest possible scheme trees from among hyperedges not already included in generated scheme trees constitutes a reasonable heuristic for finding the fewest possible scheme trees. For many practical cases, this heuristic finds the set of redundancy-free XML storage structures with the fewest number of scheme trees. In addition to a correctness proof and a complexity analysis showing that the algorithm is polynomial, we also give experimental results over randomly generated but appropriately constrained hypergraphs showing empirically that the algorithm is indeed polynomial.  相似文献   
25.
We present GSUVis, a visualization tool designed to provide better understanding of location‐based social network (LBSN) data. LBSN data is one of the most important sources of information for transportation, marketing, health, and public safety. LBSN data consumers are interested in accessing and analysing data that is as complete and as accurate as possible. However, LBSN data contains sensitive information about individuals. Consequently, data anonymization is of critical importance if this data is to be made available to consumers. However, anonymization commonly reduces the utility of information available. Working with privacy experts, we designed GSUVis a visual analytic tool to help experts better understand the effects of anonymization techniques on LBSN data utility. One of GSUVis's primary goals is to make it possible for people to use LBSN data, without requiring them to gain deep knowledge about data anonymization. To inform the design of GSUVis, we interviewed privacy experts, and collected their tasks and system requirements. Based on this understanding, we designed and implemented GSUVis. It applies two anonymization algorithms for social and location trajectory data to a real‐world LBSN dataset and visualizes the data both before and after anonymization. Through feedback from domain experts, we reflect on the effectiveness of GSUVis and the impact of anonymization using visualization.  相似文献   
26.
The objective of this study is to solve the problem of user data not being precisely received from sensors because of sensing region limitations in invoked reality (IR) space, distortion of colors or patterns by lighting, and blocking or overlapping of a user by other users. The sensing scope range is thus expanded using multiple sensors in the IR space. Moreover, user feature data are accurately identified by user sensing. Specifically, multiple sensors are employed when not all of user data are sensed because they overlap with data of other users. In the proposed approach, all clients share the user feature data from multiple sensors. Accordingly, each client recognizes that the user is the same individual on the basis of the shared data. Furthermore, the identification accuracy is improved by identifying the user features based on colors and patterns that are less affected by lighting. Therefore, accurate identification of the user feature data is enabled, even under lighting changes. The proposed system was implemented based on system performance analysis standards. The practicality and system performance in identifying the same person using the proposed method were verified through an experiment.  相似文献   
27.
Vehicle Teleoperation Interfaces   总被引:1,自引:1,他引:0  
Despite advances in autonomy, there will always be a need for human involvement in vehicle teleoperation. In particular, tasks such as exploration, reconnaissance and surveillance will continue to require human supervision, if not guidance and direct control. Thus, it is critical that the operator interface be as efficient and as capable as possible. In this paper, we provide an overview of vehicle teleoperation and present a summary of interfaces currently in use.  相似文献   
28.
Wireless video sensor networks (WVSNs) have drawn significant attention in recent years due to the advent of low-cost miniaturized cameras, which makes it feasible to realize large-scale WVSNs for a variety of applications including security surveillance, environmental tracking, and health monitoring. However, the conventional video coding paradigms are not suitable for WVSNs due to resource constraints such as limited computation power, battery energy, and network bandwidth. In this paper, we evaluated and analyzed the performance of video codecs based on emerging video coding paradigms such as distributed video coding and distributed compressive video sensing for multihop WVSNs. The main objective of this work was to provide an insight into the computational (encoding/decoding) complexity, energy consumption, node and network lifetime, processing and memory requirements, and the quality of reconstruction of these video codecs. Based on the findings, this paper also provides some guidelines for the selection of appropriate video codecs for a given WVSN application.  相似文献   
29.
The dynamic capabilities view (DCV) focuses on renewal of firms’ strategic knowledge resources so as to sustain competitive advantage within turbulent markets. Within the context of the DCV, the focus of knowledge management (KM) is to develop the KMC through deploying knowledge governance mechanisms that are conducive to facilitating knowledge processes so as to produce superior business performance over time. The essence of KM performance evaluation is to assess how well the KMC is configured with knowledge governance mechanisms and processes that enable a firm to achieve superior performance through matching its knowledge base with market needs. However, little research has been undertaken to evaluate KM performance from the DCV perspective. This study employed a survey study design and adopted hypothesis-testing approaches to develop a capability-based KM evaluation framework (CKMEF) that upholds the basic assertions of the DCV. Under the governance of the framework, a KM index (KMI) and a KM maturity model (KMMM) were derived not only to indicate the extent to which a firm’s KM implementations fulfill its strategic objectives, and to identify the evolutionary phase of its KMC, but also to bench-mark the KMC in the research population. The research design ensured that the evaluation framework and instruments have statistical significance and good generalizabilty to be applied in the research population, namely construction firms operating in the dynamic Hong Kong construction market. The study demonstrated the feasibility of quantitatively evaluating the development of the KMC and revealing the performance heterogeneity associated with the development.  相似文献   
30.
War is a complex social situation due to the interplay of multiple factors. Economical and political ones are of utmost importance, but human attitudes and motivations must be also taken into account. Being desirable to modify human transactions in such a way that they do not interfere with the basic right of everyone to a condition of physical and mental well-being, war must be abolished. The author contends that an understanding of behaviour through Psychology can be helpful in that aim. Aggression is considered the principal psychological cause of war. It is worth while to differentiate between aggression as an instrument for attaining a special end, and as pure hostility. Only in the first form, it is held here, does it play an important role in war. Psychogists must deal also with a wide range of states of mind that can be "served" by aggression: feelings of inferiority or insecurity, fear, greed, projections, compensations, rationalizations, etc. Scientific approach is not the only one Physiology brings to war prevention. It is equally important the wide dissemination of its conclusions among the general public. Information on the dynamics that prompt people to decide war would make it easier to control. This applies not only to political or military leaders, but also to civil populations. Concerning those two possible contributions of psychologists, scientific and educative, it is suggested the extensive use of psychodramatic techniques. Their richness lie in the lifelike experiences they convey to the participants, and particular aptitude to promote changes of attitudes. Investigation and information on the psychological processes related to war should be undertaken by international organizations of social scientists, acting simultaneously in several countries. Some of the initial steps they could further: 1) that prevention of war be a current subject matter in psychological courses; 2) that the World Health Organization take interest in this subject; 3) that psychologists participate in international political and economical bodies in order to clarify the psychological factors leading to war.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号