首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6797篇
  免费   191篇
  国内免费   14篇
电工技术   75篇
综合类   7篇
化学工业   1562篇
金属工艺   107篇
机械仪表   149篇
建筑科学   359篇
矿业工程   9篇
能源动力   237篇
轻工业   546篇
水利工程   66篇
石油天然气   27篇
武器工业   2篇
无线电   602篇
一般工业技术   1152篇
冶金工业   913篇
原子能技术   36篇
自动化技术   1153篇
  2024年   46篇
  2023年   85篇
  2022年   107篇
  2021年   196篇
  2020年   158篇
  2019年   164篇
  2018年   176篇
  2017年   157篇
  2016年   203篇
  2015年   160篇
  2014年   223篇
  2013年   407篇
  2012年   366篇
  2011年   429篇
  2010年   325篇
  2009年   369篇
  2008年   353篇
  2007年   367篇
  2006年   262篇
  2005年   253篇
  2004年   204篇
  2003年   183篇
  2002年   157篇
  2001年   105篇
  2000年   113篇
  1999年   107篇
  1998年   103篇
  1997年   111篇
  1996年   80篇
  1995年   100篇
  1994年   87篇
  1993年   63篇
  1992年   64篇
  1991年   31篇
  1990年   46篇
  1989年   65篇
  1988年   49篇
  1987年   37篇
  1986年   51篇
  1985年   57篇
  1984年   44篇
  1983年   54篇
  1982年   35篇
  1981年   35篇
  1980年   32篇
  1979年   26篇
  1978年   19篇
  1976年   24篇
  1975年   29篇
  1974年   22篇
排序方式: 共有7002条查询结果,搜索用时 15 毫秒
991.
Classic shortest path algorithms operate on graphs, which are suitable for problems that can be represented by weighted nodes or edges. Finding a shortest path through a set of weighted regions is more difficult and only approximate solutions tend to scale well. The Field D* algorithm efficiently calculates an approximate, interpolated shortest path through a set of weighted regions and was designed for navigating robots through terrains with varying characteristics. Field D* operates on unit grid or quad-tree data structures, which require high resolutions to accurately model the boundaries of irregular world structures. In this paper, we extend the Field D* cost functions to 2D triangulations and 3D tetrahedral meshes: structures which model polygonal world structures more accurately. Since robots typically have limited resources available for computation and storage, we pay particular attention to computation and storage overheads when detailing our extensions. We begin by providing analytic solutions to the minimum of each cost function for 2D triangles and 3D tetrahedra. Our triangle implementation provides a 50 % improvement in performance over an existing triangle implementation. While our 3D extension to tetrahedra is the first full analytic extension of Field D* to 3D, previous work only provided an approximate minimization for a single cost function on a 3D cube with unit lengths. Each cost function is expressed in terms of a general function whose characteristics can be exploited to reduce the calculations required to find a minimum. These characteristics can also be exploited to cache the majority of cost functions, producing a speedup of up to 28 % in the 3D tetrahedral case. We demonstrate that, in environments composed of non-grid aligned data, Multi-resolution quad-tree Field D* requires an order of magnitude more faces and between 15 and 20 times more node expansions, to produce a path of similar cost to one produced by a triangle implementation of Field D* on a lower resolution triangulation. We provide examples of 3D pathing through models of complex topology, including pathing through anatomical structures extracted from a medical data set. To summarise, this paper details a robust and efficient extension of Field D* pathing to data sets represented by weighted triangles and tetrahedra, and also provides empirical data which demonstrates the reduction in storage and computation costs that accrue when one chooses such a representation over the more commonly used quad-tree and grid-based alternatives.  相似文献   
992.
A probabilistic approximation is a generalization of the standard idea of lower and upper approximations, defined for equivalence relations. Recently probabilistic approximations were additionally generalized to an arbitrary binary relation so that probabilistic approximations may be applied for incomplete data. We discuss two ways to induce rules from incomplete data using probabilistic approximations, by applying true MLEM2 algorithm and an emulated MLEM2 algorithm. In this paper we report novel research on a comparison of both approaches: new results of experiments on incomplete data with three interpretations of missing attribute values. Our results show that both approaches do not differ much.  相似文献   
993.
Asynchronous monitoring relieves the system from additional overheads induced through online runtime monitoring. The price paid with such monitoring approaches is that the system may proceed further despite having reached an anomalous state. Any actions performed by the system after the error occurring are undesirable, since for instance, an unchecked malicious user access may perform unauthorized actions. In this paper we investigate the use of compensations to enable the undoing of such undesired actions, thus enriching asynchronous monitoring with the ability to restore the system to the original state just after the anomaly had occurred. Furthermore, we show how adaptive synchronisation and desynchronisation of the monitor with the system can also be achieved and report on the use of the proposed approach on an industrial case study of a financial transaction handling system.  相似文献   
994.
The dynamic capabilities view (DCV) focuses on renewal of firms’ strategic knowledge resources so as to sustain competitive advantage within turbulent markets. Within the context of the DCV, the focus of knowledge management (KM) is to develop the KMC through deploying knowledge governance mechanisms that are conducive to facilitating knowledge processes so as to produce superior business performance over time. The essence of KM performance evaluation is to assess how well the KMC is configured with knowledge governance mechanisms and processes that enable a firm to achieve superior performance through matching its knowledge base with market needs. However, little research has been undertaken to evaluate KM performance from the DCV perspective. This study employed a survey study design and adopted hypothesis-testing approaches to develop a capability-based KM evaluation framework (CKMEF) that upholds the basic assertions of the DCV. Under the governance of the framework, a KM index (KMI) and a KM maturity model (KMMM) were derived not only to indicate the extent to which a firm’s KM implementations fulfill its strategic objectives, and to identify the evolutionary phase of its KMC, but also to bench-mark the KMC in the research population. The research design ensured that the evaluation framework and instruments have statistical significance and good generalizabilty to be applied in the research population, namely construction firms operating in the dynamic Hong Kong construction market. The study demonstrated the feasibility of quantitatively evaluating the development of the KMC and revealing the performance heterogeneity associated with the development.  相似文献   
995.
The exurbanization process, particularly rural residential development, is reducing the amount of roadless areas and remote habitat across the nation, with implications for biodiversity and ecosystem integrity of parks and protected areas. The need for connecting protected areas via existing habitat centers, or relatively undisturbed core areas, is greater than ever as exurbanization expands. Our objective was to make use of nationally available data sets on roads as well as information derived from satellite imagery, including impervious cover of the built environment and forest canopy density, to identify core habitat of the northeastern and mid-Atlantic USA. The identified core habitat areas, which covered 73,730 km2 across 1177 discrete units, were stratified in terms of land ownership and management, and then analyzed in a landscape context using connectivity metrics derived from graph theory. The connectivity analysis made use of a suitability surface, derived from the land cover information, which approximated the costs incurred by hypothetical animals traversing the landscape. We show that protected areas are frequently identified as core habitat but are typically isolated, albeit sometimes buffered by adjacent multi-use lands (such as state or national forests). Over one third of the core habitat we identified has no protection, and another 42% is subject to motorized recreation or timber extraction. We provide maps showing the relative importance of core habitat areas for potentially connecting existing protected areas, and also provide an example of the vulnerability of connectivity to projected future residential development around one greater park ecosystem.  相似文献   
996.
997.
This article describes a program of research investigating the relations between abilities required to perform job tasks and human error probabilities while performing these tasks. Study 1, using objectively derived human errors made in performing Air Force job tasks, evaluated an ability-requirements classification methodology and found that error rates were related to the numbers, types, and levels of different abilities required. In Study 2, subject matter expert panels used the methodology to identify the ability requirements of tasks in 2 different jobs found in each of 2 types of nuclear power plants. This study, using a task-anchored scale of human error probability, replicated the findings of Study 1, identified 2 ability requirements that cross-validated in predicting task-error probabilities across both jobs and plants, and identified other abilities specific to error probabilities in each job. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
998.
The present study assessed drug use and the validity of self–reports of substance use among help–seeking veterans referred to a specialty clinic for the assessment of posttraumatic stress disorder (PTSD). Patients (n?=?341) were asked to provide a urine sample for use in drug screening as part of an evaluation of PTSD. Self–reports of substance use were compared with same–day supervised urine samples for 317 patients who volunteered to participate in a drug screening. Results suggested that self–reports were generally quite valid. Only 8% of the cases involved patients not reporting substance use detected by urine screens. A total of 42% of the participants were identified as using drugs of abuse (excluding alcohol) through self–report and urine drug screens. Among participants using drugs, PTSD diagnosis was significantly associated with greater marijuana and depressant use as compared with stimulant (cocaine and amphetamines) use. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
999.
Examined strategic aspects of children's performance in computational estimation. 23 5th-grade children (aged 10 yrs old) were asked to provide estimates of 48 3- by 3-digit addition problems. After each problem, Ss were asked to say how they found the solution. Verbal protocols, speed, and accuracy were collected for each problem so as to identify which computational estimation strategy is used on each trial, and how each strategy is used, selected, and executed. The results show that children used 4 strategies: rounding with decomposition, rounding without decomposition, truncation, and compensation. Strategies appeared to differ in frequency and effectiveness. Finally, children chose strategies in an adaptive way so as to obtain fast and accurate performance. Implications of these findings for understanding children's computational estimation performance and strategies in numerical cognition in general are discussed. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
1000.
This investigation examined how hemispheric asymmetry and interhemispheric processing contribute to attentional biases toward emotional information. Participants (n?=?88) named the color of lateralized squares presented concurrently with neutral, positive, or threatening words. A left-hemisphere advantage in color naming was reduced when distractors were emotional, suggesting right-hemisphere priming by emotional stimuli. Furthermore, the advantage of dividing the word and color across visual fields was increased for emotion words when they were frequently presented, indicating a strategic use of interhemispheric division of labor to reduce the distracting effect of emotional words. Finally, participants with high levels of anxious apprehension were most likely to make use of this interhemispheric processing strategy, supporting a processing efficiency theory of cognitive function in anxiety. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号