首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3724篇
  免费   175篇
  国内免费   15篇
电工技术   80篇
综合类   14篇
化学工业   989篇
金属工艺   62篇
机械仪表   131篇
建筑科学   95篇
矿业工程   9篇
能源动力   213篇
轻工业   405篇
水利工程   32篇
石油天然气   35篇
无线电   299篇
一般工业技术   653篇
冶金工业   241篇
原子能技术   40篇
自动化技术   616篇
  2023年   80篇
  2022年   147篇
  2021年   183篇
  2020年   124篇
  2019年   131篇
  2018年   144篇
  2017年   132篇
  2016年   186篇
  2015年   109篇
  2014年   178篇
  2013年   267篇
  2012年   188篇
  2011年   192篇
  2010年   155篇
  2009年   164篇
  2008年   130篇
  2007年   116篇
  2006年   94篇
  2005年   72篇
  2004年   72篇
  2003年   60篇
  2002年   71篇
  2001年   53篇
  2000年   40篇
  1999年   41篇
  1998年   52篇
  1997年   41篇
  1996年   40篇
  1995年   29篇
  1994年   33篇
  1993年   36篇
  1992年   31篇
  1991年   22篇
  1990年   21篇
  1989年   19篇
  1988年   15篇
  1987年   20篇
  1986年   17篇
  1985年   24篇
  1984年   23篇
  1983年   28篇
  1981年   19篇
  1980年   19篇
  1979年   29篇
  1978年   22篇
  1977年   18篇
  1976年   12篇
  1975年   16篇
  1974年   24篇
  1973年   12篇
排序方式: 共有3914条查询结果,搜索用时 0 毫秒
51.
The passage from secondary school to university puts students in an environment with different expectations. Not only the expectations towards learning might change, but also towards ICT competences and computer use. The purpose of this article is to find out whether freshmen, after 6 months at the university, changed their self-perception of ICT competences and computer use in comparison with their behaviour at secondary school, and what factors can explain the self-perception of ICT competences and computer use in secondary school, in the university and their possible change. Based on a panel research among 714 freshmen of a large university, this article answers the following questions: (1) What is the self-perception of ICT competences among freshmen and is there a change in this self-perception 6 months after entering the university? (2) How often and for what purpose do freshmen use a computer and is there a change in the frequency of the use of a computer? (3) What factors might influence this attitude, behaviour, and possible change? In function of the basic components of Unified Theory of Acceptance and Use of Technology (Venkatesh, Morris, Davis, & Davis, 2003) hypotheses was developed and tested to answer these questions. Students who consider the computer to be a useful instrument, have control over the computer, possess a certain level of Internet competence, and are at ease with computers are more likely to have the skills needed to maintain a computer, to develop a web site, and to use basic ICT skills. The predictors have little influence on Internet usage. The same predictors contribute modestly to the explanation of the different frequencies of computer use, and a few of the predictors explain parts of change in ICT skills and frequency of computer use.  相似文献   
52.
53.
This paper presents interactive smart battery-based storage (BBS) for wind generator (WG) and photovoltaic (PV) systems. The BBS is composed of an asymmetric cascaded H-bridge multilevel inverter (ACMI) with staircase modulation. The structure is parallel to the WG and PV systems, allowing the ACMI to have a reduction in power losses compared to the usual solution for storage connected at the DC-link of the converter for WG or PV systems. Moreover, the BBS is embedded with a decision algorithm running real-time energy costs, plus a battery state-of-charge manager and power quality capabilities, making the described system in this paper very interactive, smart and multifunctional. The paper describes how BBS interacts with the WG and PV and how its performance is improved. Experimental results are presented showing the efficacy of this BBS for renewable energy applications.  相似文献   
54.
Conventional adaptive driving beam headlamps are limited in achieving still higher quantities of switchable pixels by the number of LEDs and movable elements needed. In this paper, it is shown that by integrating an active matrix liquid crystal display module, it is possible to realize fully adaptive high‐resolution headlights without mechanical elements and a finite number of LED with 30 k switchable pixels.  相似文献   
55.
Android productivity apps have provided the facility of having a constantly accessible and productive workforce to the information and work capabilities needed by the users. With hundreds of productivity apps available in the Android app market, it is necessary to develop a taxonomy for the forensic investigators and the end users to allow them to know what personal data remnants are available from the productivity apps. In this paper, 30 popular Android productivity apps were examined. A logical extraction of the Android phone was collected by using a well-known mobile forensic tool- XRY to extract various information of forensic interest such as user email ID and list of tasks. Based on the findings, a two-dimensional taxonomy of the forensic artefacts of the productivity apps is proposed with the app categories in one dimension and the classes of artefacts in the other dimension. The artefacts identified in the study of the apps are summarised using the taxonomy. In addition, a comparison with the existing forensic taxonomies of different categories of Android apps is provided to facilitate timely collection and analysis of evidentiary materials from mobile devices.  相似文献   
56.
Interactive data exploration platforms in Web, business and scientific domains are becoming increasingly popular. Typically, users without prior knowledge of data interact with these platforms in an exploratory manner hoping they might retrieve the results they are looking for. One way to explore large-volume data is by posing aggregate queries which group values of multiple rows by an aggregate operator to form a single value: an aggregated value. Though, when a query fails, i.e., returns undesired aggregated value, users will have to undertake a frustrating trial-and-error process to refine their queries, until a desired result is attained. This data exploration process, however, is growing rather difficult as the underlying data is typically of large-volume and high-dimensionality. While heuristic-based techniques are fairly successful in generating refined queries that meet specified requirements on the aggregated values, they are rather oblivious to the (dis)similarity between the input query and its corresponding refined version. Meanwhile, enforcing a similarity-aware query refinement is rather a non-trivial challenge, as it requires a careful examination of the query space while maintaining a low processing cost. To address this challenge, we propose an innovative scheme for efficient Similarity-Aware Refinement of Aggregation Queries called (EAGER) which aims to balance the tradeoff between satisfying the aggregate and similarity constraints imposed on the refined query to maximize its overall benefit to the user. To achieve that goal, EAGER implements efficient strategies to minimize the costs incurred in exploring the available search space by utilizing similarity-based and monotonic-based pruning techniques to bound the search space and quickly find a refined query that meets users’ expectations. Our extensive experiments show the scalability exhibited by EAGER under various workload settings, and the significant benefits it provides.  相似文献   
57.
The Swiss avalanche bulletin is produced twice a day in four languages. Due to the lack of time available for manual translation, a fully automated translation system is employed, based on a catalogue of predefined phrases and predetermined rules of how these phrases can be combined to produce sentences. Because this catalogue of phrases is limited to a small sublanguage, the system is able to automatically translate such sentences from German into the target languages French, Italian and English without subsequent proofreading or correction. Having been operational for two winter seasons, we assess here the quality of the produced texts based on two different surveys where participants rated texts from real avalanche bulletins from both origins, the catalogue of phrases versus manually written and translated texts. With a mean recognition rate of 55 %, users can hardly distinguish between the two types of texts, and give very similar ratings with respect to their language quality. Overall, the output from the catalogue system can be considered virtually equivalent to a text written by avalanche forecasters and then manually translated by professional translators. Furthermore, forecasters declared that all relevant situations were captured by the system with sufficient accuracy. Forecaster’s working load did not change with the introduction of the catalogue: the extra time to find matching sentences is compensated by the fact that they no longer need to double-check manually translated texts. The reduction of daily translation costs is expected to offset the initial development costs within a few years.  相似文献   
58.
The issue of bifurcation control for a delayed fractional network involving two neurons is concerned. Delay-dependent stability conditions and the bifurcation point are established by discussing the associated characteristic equation of the proposed network. Then, a delayed feedback controller is firstly designed to stabilize the Hopf bifurcation, and desirable dynamics is achieved. It is indicated that the designed controller is extremely effective which can postpone the onset of bifurcation by carefully selecting the feedback gain. Finally, simulation results are given to verify the efficiency of the theoretical results.  相似文献   
59.
Binary image representation is essential format for document analysis. In general, different available binarization techniques are implemented for different types of binarization problems. The majority of binarization techniques are complex and are compounded from filters and existing operations. However, the few simple thresholding methods available cannot be applied to many binarization problems. In this paper, we propose a local binarization method based on a simple, novel thresholding method with dynamic and flexible windows. The proposed method is tested on selected samples called the DIBCO 2009 benchmark dataset using specialized evaluation techniques for binarization processes. To evaluate the performance of our proposed method, we compared it with the Niblack, Sauvola and NICK methods. The results of the experiments show that the proposed method adapts well to all types of binarization challenges, can deal with higher numbers of binarization problems and boosts the overall performance of the binarization.  相似文献   
60.
We consider the problem of computing a minimum cycle basis in a directed graph G with m arcs and n vertices. The arcs of G have non-negative weights assigned to them. In this problem a {-1,0,1} incidence vector is associated with each cycle and the vector space over generated by these vectors is the cycle space of G. A set of cycles is called a cycle basis of G if it forms a basis for its cycle space. A cycle basis where the sum of weights of the cycles is minimum is called a minimum cycle basis of G. This paper presents an algorithm, which is the first polynomial-time algorithm for computing a minimum cycle basis in G. We then improve it to an algorithm. The problem of computing a minimum cycle basis in an undirected graph has been well studied. In this problem a {0,1} incidence vector is associated with each cycle and the vector space over generated by these vectors is the cycle space of the graph. There are directed graphs in which the minimum cycle basis has lower weight than any cycle basis of the underlying undirected graph. Hence algorithms for computing a minimum cycle basis in an undirected graph cannot be used as black boxes to solve the problem in directed graphs.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号