首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   479篇
  免费   673篇
  国内免费   36篇
电工技术   113篇
综合类   37篇
化学工业   34篇
金属工艺   36篇
机械仪表   49篇
建筑科学   173篇
矿业工程   18篇
能源动力   52篇
轻工业   15篇
水利工程   6篇
石油天然气   10篇
武器工业   2篇
无线电   31篇
一般工业技术   128篇
冶金工业   4篇
原子能技术   17篇
自动化技术   463篇
  2023年   77篇
  2022年   166篇
  2021年   116篇
  2020年   148篇
  2019年   100篇
  2018年   55篇
  2017年   47篇
  2016年   11篇
  2015年   15篇
  2014年   9篇
  2013年   51篇
  2012年   5篇
  2011年   8篇
  2010年   5篇
  2009年   6篇
  2008年   1篇
  2007年   3篇
  2006年   1篇
  2005年   124篇
  2004年   101篇
  2003年   2篇
  2002年   3篇
  2001年   2篇
  2000年   55篇
  1999年   10篇
  1998年   12篇
  1997年   2篇
  1996年   1篇
  1995年   3篇
  1994年   3篇
  1993年   10篇
  1992年   5篇
  1991年   8篇
  1990年   6篇
  1989年   6篇
  1988年   1篇
  1987年   4篇
  1984年   3篇
  1980年   1篇
  1972年   1篇
  1971年   1篇
排序方式: 共有1188条查询结果,搜索用时 0 毫秒
61.
Query by image and video content: a colored-based stochastic model approach   总被引:2,自引:0,他引:2  
For efficient image retrieval, the image database should be processed to extract a representing feature vector for each member image in the database. A reliable and robust statistical image indexing technique based on a stochastic model of an image color content has been developed. Based on the developed stochastic model, a compact 12-dimensional feature vector was defined to tag images in the database system. The entries of the defined feature vector are the mean, variance, and skewness of the image color histogram distributions as well as correlation factors between color components of the RGB color space. It was shown using statistical analysis that the feature vector provides sufficient knowledge about the histogram distribution. The reliability and robustness of the proposed technique against common intensity artifacts and noise was validated through several experiments conducted for that purpose. The proposed technique outperforms traditional and other histogram based techniques in terms of feature vector size and properties, as well as performance.  相似文献   
62.
A super-peer model for resource discovery services in large-scale Grids   总被引:12,自引:0,他引:12  
As deployed Grids increase from tens to thousands of nodes, peer-to-peer (P2P) techniques and protocols can be used to implement scalable services and applications. The super-peer model is a novel approach that helps the convergence of P2P models and Grid environments and can be used to deploy a P2P information service in Grids. A super-peer serves a single physical organization in a Grid, and manages metadata associated to the resources provided by the nodes of that organization. Super-peers connect to each other to form a peer network at a higher level. This paper examines how the super-peer model can handle membership management and resource discovery services in a multi-organizational Grid. A simulation analysis evaluates the performance of a resource discovery protocol; simulation results can be used to tune protocol parameters in order to increase search efficiency.  相似文献   
63.
Organizational memory information systems: a transactive memory approach   总被引:2,自引:0,他引:2  
Effective management of organizational memory (OM) is critical to collaboration and knowledge sharing in organizations. We present a framework for managing organizational memory based on transactive memory, a mechanism of collective memory in small groups. While being effective in small groups, there are difficulties hindering the extension of transactive memory to larger groups. We claim that information technology can be used to help overcome these difficulties. We present a formal architecture for directories of meta-memories required in extended transactive memory systems and propose the use of meta-knowledge to substitute for the lack of tacit group knowledge that exists in small groups.  相似文献   
64.
基于神经网络的软件可靠性模型的实现与分析   总被引:4,自引:0,他引:4  
本文针对软件可靠性工程中模型选择比较麻烦的问题,提出了用神经网络构建通用的可靠性增长模型,在实现该模型的基础上,利用三组数据进行试验,并与三个分析模型的结果作了比较,得出了比较好的结论。  相似文献   
65.
Towards trust management standardization   总被引:4,自引:0,他引:4  
Recent research in the field of security has evolved into trust issues, which are now one of the interesting research topics. A majority of current approaches proposes techniques that support users' trust processes, while a minority of them addresses the essence of trust. The latter approaches form the basis for the work presented in this paper. Outer manifestations of trust phenomenon are formalized in order to facilitate the development in this field. The main goal is to provide means for computable trust that can be used in a standardized way for contemporary internet-based applications, independently of its cognitive principles.  相似文献   
66.
67.
Abstract

We decrypt a hitherto undeciphered Union message from the United States Civil War. Our means of cryptanalysis of the (Stager) cipher combines an appreciation of the limitations of human-generated randomness and several applications of the principle known as Ockham's Razor. We work without any codebooks and, in the process of our analysis, identify and explain the error that was made in the encryption of this letter from Porter to McClellan (about 148 years ago) that likely led to it being undecipherable—until now.  相似文献   
68.
69.
An optical fibre sensor based on the macro-bending loss effect has been redeveloped for thoracic and abdominal circumference measurements in non-invasive plethysmographic respiratory monitoring. A new geometrical analysis of the figure-of-eight transducer is presented, along with an optical analysis, and experimental results are presented which are in good agreement with these analyses. A comparison is made with earlier implementations of macrobending loss effect based transducers for respiratory measurement, and the newer sensor compares favourably, indicating a higher resolution and a simpler mechanical construction.  相似文献   
70.
A procedure to evaluate system design parameters for “pull” production strategies is presented in this paper. The evaluation procedure is based on a cost function which includes the inventory carrying, storage, setup, stockout, and idle costs. A combined SLAM II/FORTRAN simulation model and electronic spreadsheets support the evaluation procedure. A “pull” production strategy using the dual-kanban production control method is modeled. The best design in terms of unit load size/number of kanbans is found to (a) satisfy daily production requirements and (b) minimize the cost function.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号