首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   12804篇
  免费   922篇
  国内免费   12篇
电工技术   81篇
综合类   9篇
化学工业   5102篇
金属工艺   138篇
机械仪表   300篇
建筑科学   456篇
矿业工程   17篇
能源动力   330篇
轻工业   3152篇
水利工程   113篇
石油天然气   73篇
无线电   489篇
一般工业技术   1686篇
冶金工业   543篇
原子能技术   36篇
自动化技术   1213篇
  2024年   42篇
  2023年   182篇
  2022年   903篇
  2021年   1019篇
  2020年   418篇
  2019年   426篇
  2018年   479篇
  2017年   506篇
  2016年   546篇
  2015年   441篇
  2014年   581篇
  2013年   875篇
  2012年   831篇
  2011年   945篇
  2010年   717篇
  2009年   669篇
  2008年   609篇
  2007年   575篇
  2006年   444篇
  2005年   332篇
  2004年   281篇
  2003年   255篇
  2002年   234篇
  2001年   142篇
  2000年   95篇
  1999年   128篇
  1998年   109篇
  1997年   109篇
  1996年   100篇
  1995年   74篇
  1994年   61篇
  1993年   60篇
  1992年   67篇
  1991年   46篇
  1990年   39篇
  1989年   36篇
  1988年   33篇
  1987年   32篇
  1986年   41篇
  1985年   36篇
  1984年   29篇
  1983年   22篇
  1982年   18篇
  1981年   18篇
  1980年   19篇
  1979年   20篇
  1978年   20篇
  1977年   14篇
  1976年   9篇
  1975年   11篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
71.
Node‐link infographics are visually very rich and can communicate messages effectively, but can be very difficult to create, often involving a painstaking and artisanal process. In this paper we present an investigation of node‐link visualizations for communication and how to better support their creation. We begin by breaking down these images into their basic elements and analyzing how they are created. We then present a set of techniques aimed at improving the creation workflow by bringing more flexibility and power to users, letting them manipulate all aspects of a node‐link diagram (layout, visual attributes, etc.) while taking into account the context in which it will appear. These techniques were implemented in a proof‐of‐concept prototype called GraphCoiffure, which was designed as an intermediary step between graph drawing/editing software and image authoring applications. We describe how GraphCoiffure improves the workflow and illustrate its benefits through practical examples.  相似文献   
72.
Ants present a pair of metapleural glands located at the posterolateral end of the thorax. Because of its importance in the social organization of ants, the present study was aimed at describing the morphophysiology of this gland in three worker castes of Acromyrmex coronatus, focused on secretory activity using histological and histochemical techniques. Our findings revealed that the secretory and the storage portions of this gland are connected by extracytoplasmic portion of canaliculi that drain the secretion from each secretory cell to the collecting chamber. This secretion contains glycoproteins. In minor workers, the secretion contains higher levels of polysaccharides when compared to that of major workers, supporting the role of the metapleural gland in the maintenance of the fungus garden. The nucleus as well as cytoplasm of secretory cells were strongly positive for RNA indicating that these cells are active in the synthesis of proteins and lipids, compounds found in the final secretion. The variant of the CEC revealed that the secretory activity of the entire gland is synchronous, as all cells exhibit the result.  相似文献   
73.
Different doses of ketamine (10 mg/kg, 20 mg/kg, 30 mg/kg, 40 mg/kg, 50 mg/kg, and 60 mg/kg) were injected i.p. (I.P.), respectively, to male ICR mice to determine the optimal dosage for chronic administration. At and above 40 mg/kg I.P. injection, mice had almost no hindlimb movement during swimming test. Subsequently, 30 mg/kg was used as the dose for the study in the toxicity of long-term ketamine administration on urinary bladder and sperm motility. The treatment group were subdivided into two (n = 10 each group); one received daily ketamine treatment i.p. for 3 months and another group for 6 months. Corresponding number of mice in control groups (n = 5 each group) received saline injection instead of ketamine. Terminal dUTP nick and labeling (TUNEL) study and Sirius red staining were carried out on the sectioned slides of the urinary bladders to study the degree of apoptosis in both epithelium and muscular layers of the urinary bladder and the relative thickness of the muscular layers in this organ was also computed. Apoptosis in the bladder epithelium was observed initially in the 3-month ketamine treated mice and the number of apoptotic cells was significantly different (P < 0.05) between the 3-month and 6-month ketamine treated mice and the control. The relative thickness of muscular layers in the bladder wall also decreased significantly (P < 0.05) when the 6-month treated mice and the control were compared. Sirius red staining revealed increase of collagen in the urinary bladder of the treated mice, most evidently 6 months after ketamine treatment. In addition, the sperm motility was studied and there was a statistically significant difference between the control and ketamine treated groups in the percentages of sperms which were motile (P < 0.05). This suggested that the chronic administration of ketamine affected the genital system as well.  相似文献   
74.
ABSTRACT

In this article, we explore how visitors engage with a science museum exhibit that displays controversial topics. Through a case study methodology, we focus on the Brazilian exhibit Preventing Youth Pregnancy that delves into teen pregnancy, sexual practices, and sexually transmitted diseases. Using the lens of science communication (an emergent field of research) we explore (a) communication patterns established between the exhibit and the public and (b) the dimensions of engagement that visitors experienced. Data were collected through observations and interviews with visitors, field notes, exit comment cards, and interviews with staffers. Our findings revealed the potential of articulating different models of science communication and exposed a visitor experience in which informed decision making, sharing of personal stories, co-production of knowledge, and learning how to care (and act) were at play while negotiating the complexities of the issues raised by the displays.  相似文献   
75.
Vulnerability to sudden service disruptions due to deliberate sabotage and terrorist attacks is one of the major threats of today. In this paper, we present a bilevel formulation of the r-interdiction median problem with fortification (RIMF). RIMF identifies the most cost-effective way of allocating protective resources among the facilities of an existing but vulnerable system so that the impact of the most disruptive attack to r unprotected facilities is minimized. The model is based upon the classical p-median location model and assumes that the efficiency of the system is measured in terms of accessibility or service provision costs. In the bilevel formulation, the top level problem involves the decisions about which facilities to fortify in order to minimize the worst-case efficiency reduction due to the loss of unprotected facilities. Worst-case scenario losses are modeled in the lower-level interdiction problem. We solve the bilevel problem through an implicit enumeration (IE) algorithm, which relies on the efficient solution of the lower-level interdiction problem. Extensive computational results are reported, including comparisons with earlier results obtained by a single-level approach to the problem.  相似文献   
76.
Educational software games aim at increasing the students’ motivation and engagement while they learn. However, if software games are targeted to school classrooms they have to be usable and likeable by all students. Usability of virtual reality games may be a problem because these games tend to have complex user interfaces so that they are more attractive. Moreover, if the games acquire an educational content they may lose the attractiveness and appeal that they have on users who are familiar with commercial games. Consequently, likeability may also be questioned. In this paper, we address the issue of usability and likeability of a virtual reality game that is meant to teach students geography. We describe the evaluation experiments conducted, which involved three categories of students in terms of their level of game-playing expertise: novice, intermediate and expert game players. The evaluation results showed that the game was indeed usable and likeable but there was scope for usability and likeability improvement so that the educational benefits may be maximised for all categories of students. The evaluation studies reported in this paper, revealed important issues about further research on virtual reality educational games.  相似文献   
77.
The reconstruction of DNA sequences from DNA fragments is one of the most challenging problems in computational biology. In recent years the specific problem of DNA sequencing by hybridization has attracted quite a lot of interest in the optimization community. Several metaheuristics such as tabu search and evolutionary algorithms have been applied to this problem. However, the performance of existing metaheuristics is often inferior to the performance of recently proposed constructive heuristics. On the basis of these new heuristics we develop an ant colony optimization algorithm for DNA sequencing by hybridization. An important feature of this algorithm is the implementation in a so-called multi-level framework. The computational results show that our algorithm is currently a state-of-the-art method for the tackled problem.  相似文献   
78.
This paper presents a sensory-motor coordination scheme for a robot hand-arm-head system that provides the robot with the capability to reach an object while pre-shaping the fingers to the required grasp configuration and while predicting the tactile image that will be perceived after grasping. A model for sensory-motor coordination derived from studies in humans inspired the development of this scheme. A peculiar feature of this model is the prediction of the tactile image. The implementation of the proposed scheme is based on a neuro-fuzzy module that, after a learning phase, starting from visual data, calculates the position and orientation of the hand for reaching, selects the best-suited hand configuration, and predicts the tactile feedback. The implementation of the scheme on a humanoid robot allowed experimental validation of its effectiveness in robotics and provided perspectives on applications of sensory predictions in robot motor control.  相似文献   
79.
Traditionally, direct marketing companies have relied on pre-testing to select the best offers to send to their audience. Companies systematically dispatch the offers under consideration to a limited sample of potential buyers, rank them with respect to their performance and, based on this ranking, decide which offers to send to the wider population. Though this pre-testing process is simple and widely used, recently the industry has been under increased pressure to further optimize learning, in particular when facing severe time and learning space constraints. The main contribution of the present work is to demonstrate that direct marketing firms can exploit the information on visual content to optimize the learning phase. This paper proposes a two-phase learning strategy based on a cascade of regression methods that takes advantage of the visual and text features to improve and accelerate the learning process. Experiments in the domain of a commercial Multimedia Messaging Service (MMS) show the effectiveness of the proposed methods and a significant improvement over traditional learning techniques. The proposed approach can be used in any multimedia direct marketing domain in which offers comprise both a visual and text component.
Giuseppe TribulatoEmail:

Sebastiano Battiato   was born in Catania, Italy, in 1972. He received the degree in Computer Science (summa cum laude) in 1995 and his Ph.D in Computer Science and Applied Mathematics in 1999. From 1999 to 2003 he has lead the “Imaging” team c/o STMicroelectronics in Catania. Since 2004 he works as a Researcher at Department of Mathematics and Computer Science of the University of Catania. His research interests include image enhancement and processing, image coding and camera imaging technology. He published more than 90 papers in international journals, conference proceedings and book chapters. He is co-inventor of about 15 international patents. He is reviewer for several international journals and he has been regularly a member of numerous international conference committees. He has participated in many international and national research projects. He is an Associate Editor of the SPIE Journal of Electronic Imaging (Specialty: digital photography and image compression). He is director of ICVSS (International Computer Vision Summer School). He is a Senior Member of the IEEE. Giovanni Maria Farinella   is currently contract researcher at Dipartimento di Matematica e Informatica, University of Catania, Italy (IPLAB research group). He is also associate member of the Computer Vision and Robotics Research Group at University of Cambridge since 2006. His research interests lie in the fields of computer vision, pattern recognition and machine learning. In 2004 he received his degree in Computer Science (egregia cum laude) from University of Catania. He was awarded a Ph.D. (Computer Vision) from the University of Catania in 2008. He has co-authored several papers in international journals and conferences proceedings. He also serves as reviewer numerous international journals and conferences. He is currently the co-director of the International Summer School on Computer Vision (ICVSS). Giovanni Giuffrida   is an assistant professor at University of Catania, Italy. He received a degree in Computer Science from the University of Pisa, Italy in 1988 (summa cum laude), a Master of Science in Computer Science from the University of Houston, Texas, in 1992, and a Ph.D. in Computer Science, from the University of California in Los Angeles (UCLA) in 2001. He has an extensive experience in both the industrial and academic world. He served as CTO and CEO in the industry and served as consultant for various organizations. His research interest is on optimizing content delivery on new media such as Internet, mobile phones, and digital tv. He published several papers on data mining and its applications. He is a member of ACM and IEEE. Catarina Sismeiro   is a senior lecturer at Imperial College Business School, Imperial College London. She received her Ph.D. in Marketing from the University of California, Los Angeles, and her Licenciatura in Management from the University of Porto, Portugal. Before joining Imperial College Catarina had been and assistant professor at Marshall School of Business, University of Southern California. Her primary research interests include studying pharmaceutical markets, modeling consumer behavior in interactive environments, and modeling spatial dependencies. Other areas of interest are decision theory, econometric methods, and the use of image and text features to predict the effectiveness of marketing communications tools. Catarina’s work has appeared in innumerous marketing and management science conferences. Her research has also been published in the Journal of Marketing Research, Management Science, Marketing Letters, Journal of Interactive Marketing, and International Journal of Research in Marketing. She received the 2003 Paul Green Award and was the finalist of the 2007 and 2008 O’Dell Awards. Catarina was also a 2007 Marketing Science Institute Young Scholar, and she received the D. Antonia Adelaide Ferreira award and the ADMES/MARKTEST award for scientific excellence. Catarina is currently on the editorial boards of the Marketing Science journal and the International Journal of Research in Marketing. Giuseppe Tribulato   was born in Messina, Italy, in 1979. He received the degree in Computer Science (summa cum laude) in 2004 and his Ph.D in Computer Science in 2008. From 2005 he has lead the research team at Neodata Group. His research interests include data mining techniques, recommendation systems and customer targeting.   相似文献   
80.

The permanent availability and relative obscurity of blockchains is the perfect ground for using them for malicious purposes. However, the use of blockchains by malwares has not been characterized yet. This paper analyses the current state of the art in this area. One of the lessons learned is that covert communications for malware have received little attention. To foster further defence-oriented research, a novel mechanism (dubbed Smart-Zephyrus) is built leveraging smart contracts written in Solidity. Our results show that it is possible to hide 4 Kb of secret in 41 s. While being expensive (around USD 1.82 per bit), the provided stealthiness might be worth the price for attackers.

  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号