首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1850篇
  免费   51篇
  国内免费   2篇
电工技术   22篇
综合类   6篇
化学工业   312篇
金属工艺   37篇
机械仪表   30篇
建筑科学   183篇
矿业工程   12篇
能源动力   41篇
轻工业   152篇
水利工程   16篇
石油天然气   7篇
武器工业   1篇
无线电   226篇
一般工业技术   279篇
冶金工业   151篇
原子能技术   16篇
自动化技术   412篇
  2023年   7篇
  2022年   18篇
  2021年   34篇
  2020年   25篇
  2019年   33篇
  2018年   30篇
  2017年   47篇
  2016年   45篇
  2015年   25篇
  2014年   71篇
  2013年   158篇
  2012年   91篇
  2011年   104篇
  2010年   97篇
  2009年   107篇
  2008年   117篇
  2007年   114篇
  2006年   122篇
  2005年   100篇
  2004年   95篇
  2003年   77篇
  2002年   56篇
  2001年   39篇
  2000年   34篇
  1999年   36篇
  1998年   26篇
  1997年   32篇
  1996年   31篇
  1995年   13篇
  1994年   19篇
  1993年   10篇
  1992年   10篇
  1991年   9篇
  1990年   9篇
  1989年   5篇
  1988年   2篇
  1987年   9篇
  1985年   2篇
  1984年   6篇
  1983年   6篇
  1982年   3篇
  1981年   6篇
  1980年   8篇
  1979年   1篇
  1978年   4篇
  1977年   4篇
  1974年   1篇
  1971年   2篇
  1970年   1篇
  1969年   2篇
排序方式: 共有1903条查询结果,搜索用时 15 毫秒
31.
In mobile ad hoc networks (MANETs), flooding is a required message dissemination technique for network-wide broadcast. The conventional blind flooding algorithm causes broadcast storm problem, a high number of unnecessary packet rebroadcasts thus resulting in high contention and packet collisions. This paper proposes a new probabilistic approach that dynamically fine-tunes the rebroadcasting probability of a node for routing request packets (RREQs) according to the number of neighbour nodes. We evaluate the performance of the proposed approach for the ad hoc on demand distance vector (AODV) routing protocol and compared against the blind flooding, fixed probabilistic and adjusted probabilistic flooding [L.M.M.M. Bani-Yassein, M. Ould-Khaoua et al., Performance analysis of adjusted probabilistic broadcasting in mobile ad hoc networks, International Journal of Wireless Information Networks 13(2) (2006) 127–140; M.B. Yassein, M.O. Khaoua et al., Improving route discovery in on-demand routing protocols using local topology information in MANETs, Proceedings of the ACM international workshop on Performance Monitoring, Measurement, and Evaluation of Heterogeneous Wireless and Wired Networks, Terromolinos, Spain, ACM Press, 2006, pp. 95–99.] approaches. The simulation results show that our proposed approach demonstrates better performance than blind flooding, fixed probabilistic and adjusted flooding approaches.  相似文献   
32.
下一代台式PC和笔记本电脑也许会跟iPhone特别相像。一年前,我写过一篇专栏文章"为什么iPhone会改变PC世界",在那篇文章中我描绘了未来PC操作系统的用户界面,将出现类似于iPhone中的多重触控、智能识别、3D和微小图标等元素。在微软的Surface Computing中这些元素已经成为现实。  相似文献   
33.
Letf: {0,1} n {0,1} m be anm-output Boolean function inn variables.f is called ak-slice iff(x) equals the all-zero vector for allx with Hamming weight less thank andf(x) equals the all-one vector for allx with Hamming weight more thank. Wegener showed that PI k -set circuits (set circuits over prime implicants of lengthk) are at the heart of any optimum Boolean circuit for ak-slicef. We prove that, in PI k -set circuits, savings are possible for the mass production of anyFX, i.e., any collectionF ofm output-sets given any collectionX ofn input-sets, if their PI k -set complexity satisfiesSC m (FX)3n+2m. This PI k mass production, which can be used in monotone circuits for slice functions, is then exploited in different ways to obtain a monotone circuit of complexity 3n+o(n) for the Neiporuk slice, thus disproving a conjecture by Wegener that this slice has monotone complexity (n 3/2). Finally, the new circuit for the Neiporuk slice is proven to be asymptotically optimal, not only with respect to monotone complexity, but also with respect to combinational complexity.  相似文献   
34.
Capacitive deionization (CDI) is an emerging water desalination technology for removing different ionic species from water, which is based on electric charge compensation by these charged species. CDI is becoming popular because it is more energy-efficient and cost-effective than other technologies, such as reverse osmosis and distillation, specifically in dealing with brackish water having low or moderate salt concentrations. Over the past decade, the CDI research field has witnessed significant advances in the used electrode materials, cell architectures, and associated mechanisms for desalination applications. This review article first discusses ion storage/removal mechanisms in carbon and Faradaic materials aided by advanced in situ analysis techniques and computations. It then summarizes research progress toward electrode materials in terms of structure, surface chemistry, and composition. More still, it discusses CDI cell architectures by highlighting their different cell design concepts. Finally, current challenges and future research directions are summarized to provide guidelines for future CDI research.  相似文献   
35.
Strengthening intellectual property rights for publicly financed research and development (R&D) ensures that research organizations maximize the full national value of the intellectual property that they generate, but potential negative spillover effects on the perceived value of a research alliance might deter an existing alliance partner from continued collaboration or a potential alliance partner from future collaboration. This study, performed in 2010 within the context of the Council for Scientific and Industrial Research in South Africa, aimed to develop a structural equation modeling-based value-mediation governance decision-making model that will enable engineering managers at publicly financed R&D organizations to select optimal governance modes for the research alliances they are establishing to grow their organizations’ R&D capabilities.  相似文献   
36.
37.
We discuss the calculus of variations in tensor representations with a special focus on tensor networks and apply it to functionals of practical interest. The survey provides all necessary ingredients for applying minimization methods in a general setting. The important cases of target functionals which are linear and quadratic with respect to the tensor product are discussed, and combinations of these functionals are presented in detail. As an example, we consider the representation rank compression in tensor networks. For the numerical treatment, we use the nonlinear block Gauss?CSeidel method. We demonstrate the rate of convergence in numerical tests.  相似文献   
38.
Automating software testing activities can increase the quality and drastically decrease the cost of software development. Toward this direction, various automated test data generation tools have been developed. The majority of existing tools aim at structural testing, while a quite limited number aim at a higher level of testing thoroughness such as mutation. In this paper, an attempt toward automating the generation of mutation-based test cases by utilizing existing automated tools is proposed. This is achieved by reducing the killing mutants’ problem into a covering branches one. To this extent, this paper is motivated by the use of state of the art techniques and tools suitable for covering program branches when performing mutation. Tools and techniques such as symbolic execution, concolic execution, and evolutionary testing can be easily adopted toward automating the test input generation activity for the weak mutation testing criterion by simply utilizing a special form of the mutant schemata technique. The propositions made in this paper integrate three automated tools in order to illustrate and examine the method’s feasibility and effectiveness. The obtained results, based on a set of Java program units, indicate the applicability and effectiveness of the suggested technique. The results advocate that the proposed approach is able to guide existing automating tools in producing test cases according to the weak mutation testing criterion. Additionally, experimental results with the proposed mutation testing regime show that weak mutation is able to speedup the mutant execution time by at least 4.79 times when compared with strong mutation.  相似文献   
39.
Past research has extensively investigated the effect of media, especially focusing on how anonymity increases risk-related behaviors of groups when using computer-mediated communication (CMC). This study extends prior research by examining the differences in group risk-taking behaviors between face-to-face groups and completely non-anonymous CMC groups (i.e., groups working in a fully identified, synchronous CMC environment similar to popular instant messaging systems utilized widely within organizations). Drawing on the “decision analysis” perspective, a key framework for understanding organizational decision-making, the study also examines the effects of the firm's risk preferences as well as the type of information distribution among group members (i.e., full information known to all group members versus partial information know by only some of the members) on the groups' risk-taking behaviors. Results from a laboratory experiment using student subjects found no differences in risk-taking behaviors between CMC and face-to-face groups; additionally, no differences were found related to how information was distributed among group members. A significant effect was found, however, for the risk preference of the firm, showing that risk-neutral firms influenced groups to make riskier decisions than groups from risk-averse firms. Finally, groups within risk-neutral firms receiving partial information made riskier decisions than groups receiving full information. The implications of these results for future research and practice are examined.  相似文献   
40.
Lidars have the unique ability to make direct, physical measurements of forest height and vertical structure in much denser canopies than is possible with passive optical or short wavelength radars. However the literature reports a consistent underestimate of tree height when using physically based methods, necessitating empirical corrections. This bias is a result of overestimating the range to the canopy top due to background noise and failing to correctly identify the ground.This paper introduces a method, referred to as “noise tracking”, to avoid biases when determining the range to the canopy top. Simulated waveforms, created with Monte-Carlo ray tracing over geometrically explicit forest models, are used to test noise tracking against simple thresholding over a range of forest and system characteristics. It was found that noise tracking almost completely removed the bias in all situations except for very high noise levels and very low (< 10%) canopy covers. In all cases noise tracking gave lower errors than simple thresholding and had a lower sensitivity to the initial noise threshold.Finite laser pulses spread out the measured signal, potentially overriding the benefit of noise tracking. In the past laser pulse length has been corrected by adding half that length to the signal start range. This investigation suggests that this is not always appropriate for simple thresholding and that the results for noise tracking were more directly related to pulse length than for simple thresholding. That this effect has not been commented on before may be due to the possible confounding impacts of instrument and survey characteristics inherent in field data. This method should help improve the accuracy of waveform lidar measurements of forests, whether using airborne or spaceborne instruments.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号