首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1006篇
  免费   66篇
  国内免费   1篇
电工技术   8篇
化学工业   309篇
金属工艺   5篇
机械仪表   19篇
建筑科学   36篇
矿业工程   7篇
能源动力   43篇
轻工业   146篇
水利工程   12篇
石油天然气   4篇
无线电   49篇
一般工业技术   172篇
冶金工业   45篇
原子能技术   5篇
自动化技术   213篇
  2023年   8篇
  2022年   27篇
  2021年   50篇
  2020年   25篇
  2019年   46篇
  2018年   33篇
  2017年   41篇
  2016年   44篇
  2015年   36篇
  2014年   38篇
  2013年   78篇
  2012年   51篇
  2011年   72篇
  2010年   65篇
  2009年   63篇
  2008年   46篇
  2007年   54篇
  2006年   32篇
  2005年   37篇
  2004年   32篇
  2003年   20篇
  2002年   24篇
  2001年   13篇
  2000年   12篇
  1999年   13篇
  1998年   14篇
  1997年   16篇
  1996年   7篇
  1995年   10篇
  1994年   8篇
  1993年   9篇
  1992年   3篇
  1991年   2篇
  1990年   1篇
  1989年   5篇
  1988年   3篇
  1987年   2篇
  1986年   3篇
  1985年   5篇
  1984年   3篇
  1983年   4篇
  1982年   4篇
  1981年   3篇
  1980年   1篇
  1979年   1篇
  1977年   1篇
  1976年   1篇
  1975年   2篇
  1974年   3篇
  1973年   2篇
排序方式: 共有1073条查询结果,搜索用时 15 毫秒
981.
982.
We apply current theorem proving technology to certified code in the domain of abstract algebra. More concretely, based on a formal proof of the Basic Perturbation Lemma (a central result in homological algebra) in the prover Isabelle/HOL, we apply various code generation techniques, which lead to certified implementations of the associated algorithm in ML. In the formal proof, algebraic structures occurring in the Basic Perturbation Lemma are represented in a way, which is not directly amenable to code generation with the available tools. Interestingly, this representation is required in the proof, while for the algorithm simpler data structures are sufficient. Our approach is to establish a link between the non-executable setting of the proof and the executable representation in the algorithm, which is to be generated. This correspondence is established within the logical framework of Isabelle/HOL—that is, it is formally proved correct. The generated code is applied to and illustrated with a number of examples.  相似文献   
983.
Stack filters are a special case of non-linear filters. They have a good performance for filtering images with different types of noise while preserving edges and details. A stack filter decomposes an input image into several binary images according to a set of thresholds. Each binary image is filtered by a Boolean function. The Boolean function that characterizes an adaptive stack filter is optimal and is computed from a pair of images consisting of an ideal noiseless image and its noisy version. In this work the behavior of adaptive stack filters on synthetic aperture radar (SAR) data is evaluated. With this aim, the equivalent number of looks for stack filtered data are calculated to assess the speckle noise reduction capability of this filter. Then a classification of simulated and real SAR images is carried out on data filtered with a stack filter trained with selected samples. The results of a maximum likelihood classification of these data are evaluated and compared with the results of classifying images previously filtered using the Lee and the Frost filters.  相似文献   
984.
Conformance metrics for the mobile web can play a crucial role as far as engineering mobile websites are concerned, especially if they are automatically obtained. In this way, developers can have an idea in numeric terms of how suitable their developments are for mobile devices. However, there are a plethora of devices with their own particular features (screen size, formats support, etc.) that restrict a unified automatic assessment process. This paper proposes a tool-supported method for device-tailored assessment in terms of conformance with Mobile Web Best Practices 1.0, including the definition of five quantitative metrics for automatically measuring mobile web conformance: Navigability, Page layout, Page definition, User input and Overall score. The behaviour of these metrics was analysed for different devices and different web paradigms, both mobile web pages and their equivalent desktop pages. As expected, the results show that mobile web pages on more capable devices score higher. In addition, 20 users took part in an experiment aimed at discovering how conformance-based scores relate to usability dimensions. The results demonstrate that automatic scoring approaches strongly correlate with usability scores obtained by direct observation, such as task completion time and user satisfaction. This correlation is even stronger for the device-tailored assessment than the one that assumes a general profile for all devices. For instance, results show a strong negative correlation between Overall score and task completion time: ρ (9) = −0.81, (p < 0.05) for the generalist approach and ρ (9) = −0.88 for the device-tailored one, entailing that mobile web guidelines and the metrics based on their conformance capture usability aspects. This result challenges the widely accepted belief that conformance to guidelines does not imply more usable web pages, at least for web accessibility conformance.  相似文献   
985.
This paper presents an interactive tool for dead-time compensator design. The tool is based on an unified dead-time compensator and considers models commonly used in industrial process control. The main contribution of this work is that the proposed tool and controller are simple to analyze and tune as they are based on an unique modified structure of the Smith predictor valid for every type of dead-time process (including integrating and unstable systems). Simple frequency analysis and block diagram transformations are used together with simulations to illustrate the main problems associated to the control of dead-time processes. Several examples of typical processes are presented to illustrate the fundamental concepts associated to the control of these systems. The interactive tool is not only useful for designing and analyzing but also for training and educational purposes.  相似文献   
986.
The growth of real‐world objects with embedded and globally networked sensors allows to consolidate the Internet of things paradigm and increase the number of applications in the domains of ubiquitous and context‐aware computing. The merging between cloud computing and Internet of things named cloud of things will be the key to handle thousands of sensors and their data. One of the main challenges in the cloud of things is context‐aware sensor search and selection. Typically, sensors require to be searched using two or more conflicting context properties. Most of the existing work uses some kind of multi‐criteria decision analysis to perform the sensor search and selection, but does not show any concern for the quality of the selection presented by these methods. In this paper, we analyse the behaviour of the SAW, TOPSIS and VIKOR multi‐objective decision methods and their quality of selection comparing them with the Pareto‐optimality solutions. The gathered results allow to analyse and compare these algorithms regarding their behaviour, the number of optimal solutions and redundancy. Copyright © 2016 John Wiley & Sons, Ltd.  相似文献   
987.
Internet of Things is a paradigm that enables communication between different devices connected to a local network or to Internet. Identification and communication between sensors used in Internet of Things and devices like smart-phones or tablets are established using radio frequency identification technology. However, this technology still has several security and privacy issues because of its severe computational constraints. In 2011, Jeong and Anh proposed the combined use of an authentication radio frequency identification protocol together with a ticket issuing system for bank services (in J. Supercomput. 55:307, 2011). In this paper we show that their message generation is weak, because it abuses the XOR operation and the use of a counter, which leaks too much secret protocol information. Our analysis shows important security faults that ruin most of the security properties claimed in the original paper. More precisely, information privacy (via a disclosure and leakage attack) and location privacy (traceability attack) are both compromised. Moreover, an attacker can disrupt the proper working of the system by exploiting the fact that message integrity is not properly checked.  相似文献   
988.
A major problem in monitoring the online reputation of companies, brands, and other entities is that entity names are often ambiguous (apple may refer to the company, the fruit, the singer, etc.). The problem is particularly hard in microblogging services such as Twitter, where texts are very short and there is little context to disambiguate. In this paper we address the filtering task of determining, out of a set of tweets that contain a company name, which ones do refer to the company. Our approach relies on the identification of filter keywords: those whose presence in a tweet reliably confirm (positive keywords) or discard (negative keywords) that the tweet refers to the company.We describe an algorithm to extract filter keywords that does not use any previously annotated data about the target company. The algorithm allows to classify 58% of the tweets with 75% accuracy; and those can be used to feed a machine learning algorithm to obtain a complete classification of all tweets with an overall accuracy of 73%. In comparison, a 10-fold validation of the same machine learning algorithm provides an accuracy of 85%, i.e., our unsupervised algorithm has a 14% loss with respect to its supervised counterpart.Our study also shows that (i) filter keywords for Twitter does not directly derive from the public information about the company in the Web: a manual selection of keywords from relevant web sources only covers 15% of the tweets with 86% accuracy; (ii) filter keywords can indeed be a productive way of classifying tweets: the five best possible keywords cover, in average, 28% of the tweets for a company in our test collection.  相似文献   
989.
This paper presents a procedure based on the Arrhenius relation to predict the long-term behavior of glass fiber-reinforced polymer (GFRP) bars in concrete structures, based on short-term data from accelerated aging tests. GFRP reinforcing bars were exposed to simulated concrete pore solutions at 20, 40, and 60°C. The tensile strengths of the bars determined before and after exposure were considered a measure of the durability performance of the specimens. Based on the short-term data, a detailed procedure is developed and verified to predict the long-term durability performance of GFRP bars. A modified Arrhenius analysis is included in the procedure to evaluate the validity of accelerated aging tests before the prediction is made. The accelerated test and prediction procedure used in this study can be a reliable method to evaluate the durability performance of FRP composites exposed to solutions or in contact with concrete.  相似文献   
990.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号