首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2413篇
  免费   68篇
  国内免费   9篇
电工技术   54篇
综合类   2篇
化学工业   475篇
金属工艺   79篇
机械仪表   49篇
建筑科学   30篇
矿业工程   1篇
能源动力   128篇
轻工业   111篇
水利工程   23篇
石油天然气   17篇
无线电   287篇
一般工业技术   585篇
冶金工业   298篇
原子能技术   24篇
自动化技术   327篇
  2023年   26篇
  2022年   66篇
  2021年   75篇
  2020年   61篇
  2019年   52篇
  2018年   69篇
  2017年   67篇
  2016年   70篇
  2015年   50篇
  2014年   84篇
  2013年   150篇
  2012年   90篇
  2011年   135篇
  2010年   94篇
  2009年   123篇
  2008年   89篇
  2007年   82篇
  2006年   58篇
  2005年   55篇
  2004年   46篇
  2003年   55篇
  2002年   45篇
  2001年   43篇
  2000年   40篇
  1999年   36篇
  1998年   65篇
  1997年   58篇
  1996年   39篇
  1995年   40篇
  1994年   42篇
  1993年   37篇
  1992年   21篇
  1991年   26篇
  1990年   21篇
  1989年   17篇
  1988年   23篇
  1987年   24篇
  1986年   18篇
  1985年   35篇
  1984年   31篇
  1983年   20篇
  1982年   22篇
  1981年   20篇
  1980年   23篇
  1979年   15篇
  1978年   11篇
  1977年   20篇
  1976年   26篇
  1975年   11篇
  1973年   16篇
排序方式: 共有2490条查询结果,搜索用时 15 毫秒
71.
Anonymizing bipartite graph data using safe groupings   总被引:1,自引:0,他引:1  
Private data often come in the form of associations between entities, such as customers and products bought from a pharmacy, which are naturally represented in the form of a large, sparse bipartite graph. As with tabular data, it is desirable to be able to publish anonymized versions of such data, to allow others to perform ad hoc analysis of aggregate graph properties. However, existing tabular anonymization techniques do not give useful or meaningful results when applied to graphs: small changes or masking of the edge structure can radically change aggregate graph properties. We introduce a new family of anonymizations for bipartite graph data, called (k, ℓ)-groupings. These groupings preserve the underlying graph structure perfectly, and instead anonymize the mapping from entities to nodes of the graph. We identify a class of “safe” (k, ℓ)-groupings that have provable guarantees to resist a variety of attacks, and show how to find such safe groupings. We perform experiments on real bipartite graph data to study the utility of the anonymized version, and the impact of publishing alternate groupings of the same graph data. Our experiments demonstrate that (k, ℓ)-groupings offer strong tradeoffs between privacy and utility.  相似文献   
72.
A dynamical model is proposed to study self-diffusion coefficient by confining the fluid in rectangular nanotube. The theoretical model is based on the consideration that the confinement affects the movement at atomic level. The model predicts that the diffusion parallel to walls of channel is different from that of diffusion perpendicular to the walls. Near the walls the dynamics of fluid has been found to slow down to an extent that below a certain value of ratio of width to the diameter of particle, the molecules behave as if these belong to solid. The results are contrasted with the result obtained from the model based on similar considerations for a fluid confined only in one direction. It is found that tendency of freezing near the wall increases due to confinement from second direction. Empirical relation which governs the behavior of diffusion coefficient as function of distance from the confining walls has also been proposed. The effect of confinement is more pronounced for denser fluids than for dilute fluid.  相似文献   
73.
Growing interests in multi-criteria decision support applications have resulted in a flurry of efficient skyline algorithms. In practice, real-world decision support applications require to access data from disparate sources. Existing techniques define the skyline operation to work on a single set, and therefore, treat skylines as an “add-on” on top of a traditional Select-Project-Join query plan. In many real-world applications, the skyline dimensions can be anti-correlated such as the attribute pair {price, mileage} for cars and {price, distance} for hotels. Anti-correlated data are particularly challenging for skyline evaluation and therefore have commonly been ignored by existing techniques. In this work, we propose a robust execution framework called SKIN to evaluate skyline over joins. The salient features of SKIN are: (a) effective in reducing the two primary costs, namely the cost of generating the join results and the cost of dominance comparisons to compute the final skyline of join results, (b) shown to be robust for both skyline-friendly (independent and correlated) as well as skyline-unfriendly (anti-correlated) data distributions. SKIN is effective in exploiting the skyline knowledge in both local within individual data sources and across disparate sources—to significantly reduce the above-mentioned costs incurred during the evaluation of skyline over join. Our experimental study demonstrates the superiority of our proposed approach over state-of-the-art techniques to handle a wide variety of data distributions.  相似文献   
74.
Nonpolynomial quintic spline functions are used to develop a numerical algorithm for computing an approximation to the solution of a system of second order boundary value problems associated with heat transfer. We show that the approximate solutions obtained by our algorithm are better than those produced by other spline and domain decomposition methods. A comparison of our algorithm with nonpolynomial quadratic spline method is discussed with the help of two numerical examples.  相似文献   
75.
Determination of the thermo-mechanical structure of the crust for seismically active regions using available geophysical and geological data is of great importance. The most important feature of the intraplate earthquakes in the Indian region are that the seismicity occurs within the entire crust. In Latur region of India an earthquake occurred in the upper crust. In such situations, quantifying the uncertainties in seismogenic depths becomes very important. The stochastic heat conduction equation has been solved for different sets of boundary conditions, an exponentially decreasing radiogenic heat generation and randomness in thermal conductivity. Closed form analytical expressions for mean and variance in the temperature depth distribution have been used and an automatic formulation has been developed in Matlab for computing and plotting the thermal structure. The Matlab toolbox presented allows us to display the controlling thermal parameters on the screen directly, and plot the subsurface thermal structure along with its error bounds. The software can be used to quantify the thermal structure for any given region and is applied here to the Latur earthquake region of India.  相似文献   
76.
Interpretation of images and videos containing humans interacting with different objects is a daunting task. It involves understanding scene/event, analyzing human movements, recognizing manipulable objects, and observing the effect of the human movement on those objects. While each of these perceptual tasks can be conducted independently, recognition rate improves when interactions between them are considered. Motivated by psychological studies of human perception, we present a Bayesian approach which integrates various perceptual tasks involved in understanding human-object interactions. Previous approaches to object and action recognition rely on static shape/appearance feature matching and motion analysis, respectively. Our approach goes beyond these traditional approaches and applies spatial and functional constraints on each of the perceptual elements for coherent semantic interpretation. Such constraints allow us to recognize objects and actions when the appearances are not discriminative enough. We also demonstrate the use of such constraints in recognition of actions from static images without using any motion information.  相似文献   
77.
In a cloud computing paradigm, energy efficient allocation of different virtualized ICT resources (servers, storage disks, and networks, and the like) is a complex problem due to the presence of heterogeneous application (e.g., content delivery networks, MapReduce, web applications, and the like) workloads having contentious allocation requirements in terms of ICT resource capacities (e.g., network bandwidth, processing speed, response time, etc.). Several recent papers have tried to address the issue of improving energy efficiency in allocating cloud resources to applications with varying degree of success. However, to the best of our knowledge there is no published literature on this subject that clearly articulates the research problem and provides research taxonomy for succinct classification of existing techniques. Hence, the main aim of this paper is to identify open challenges associated with energy efficient resource allocation. In this regard, the study, first, outlines the problem and existing hardware and software-based techniques available for this purpose. Furthermore, available techniques already presented in the literature are summarized based on the energy-efficient research dimension taxonomy. The advantages and disadvantages of the existing techniques are comprehensively analyzed against the proposed research dimension taxonomy namely: resource adaption policy, objective function, allocation method, allocation operation, and interoperability.  相似文献   
78.
The scientific approach to understand the nature of consciousness revolves around the study of the human brain. Neurobiological studies that compare the nervous system of different species have accorded the highest place to humans on account of various factors that include a highly developed cortical area comprising of approximately 100 billion neurons, that are intrinsically connected to form a highly complex network. Quantum theories of consciousness are based on mathematical abstraction and the Penrose–Hameroff Orch-OR theory is one of the most promising ones. Inspired by the Penrose–Hameroff Orch-OR theory, Behrman et al. have simulated a quantum Hopfield neural network with the structure of a microtubule. They have used an extremely simplified model of the tubulin dimers with each dimer represented simply as a qubit, a single quantum two-state system. The extension of this model to n-dimensional quantum states or n-qudits presented in this work holds considerable promise for even higher mathematical abstraction in modelling consciousness systems.  相似文献   
79.
In this study, novel designs of single‐band and tri‐band pattern reconfigurable antennas are proposed. The design of single‐band pattern reconfigurable antenna is accomplished by the use of varactor diodes with the parasitic elements placed on both sides of the driven conventional printed dipole antenna. By tuning the capacitance of varactor, the antenna operates in four different configurations of radiation pattern which include bi‐directional end‐fire, broadside, and uni‐directional end‐fire radiation patterns. The tri‐band pattern reconfigurable antenna design is achieved by the use of parasitic elements on both sides of a tri‐band driven dipole antenna. Dual‐band LC resonators are used as loading elements along the arms of printed dipole to get two lower order modes in addition to the reference dipole mode, resulting in a triband operation of the driven element. The electrical lengths of the parasitic elements with respect to the tri‐band driven element are controlled by suitably embedding varactor and PIN diodes with them. The proposed tri‐band antenna operates in ten different configurations of radiation patterns in the three operating bands. Fully functional prototypes of single‐band and tri‐band pattern reconfigurable antennas along with the DC bias networks have been fabricated to validate the results obtained in simulation.  相似文献   
80.
Multimedia Tools and Applications - In this paper, a blind image watermarking scheme based on discrete wavelet transform (DWT) and singular value decomposition (SVD) is proposed. In this scheme,...  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号