首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3751篇
  免费   186篇
  国内免费   5篇
电工技术   30篇
综合类   2篇
化学工业   972篇
金属工艺   81篇
机械仪表   85篇
建筑科学   139篇
矿业工程   13篇
能源动力   138篇
轻工业   271篇
水利工程   30篇
石油天然气   9篇
无线电   278篇
一般工业技术   782篇
冶金工业   500篇
原子能技术   17篇
自动化技术   595篇
  2024年   10篇
  2023年   53篇
  2022年   127篇
  2021年   175篇
  2020年   92篇
  2019年   85篇
  2018年   125篇
  2017年   118篇
  2016年   124篇
  2015年   103篇
  2014年   165篇
  2013年   256篇
  2012年   228篇
  2011年   287篇
  2010年   208篇
  2009年   168篇
  2008年   173篇
  2007年   186篇
  2006年   120篇
  2005年   104篇
  2004年   101篇
  2003年   88篇
  2002年   78篇
  2001年   46篇
  2000年   40篇
  1999年   39篇
  1998年   77篇
  1997年   77篇
  1996年   43篇
  1995年   38篇
  1994年   27篇
  1993年   25篇
  1992年   26篇
  1991年   22篇
  1990年   30篇
  1989年   18篇
  1988年   12篇
  1987年   11篇
  1986年   11篇
  1985年   18篇
  1983年   15篇
  1982年   11篇
  1981年   15篇
  1980年   12篇
  1979年   13篇
  1977年   12篇
  1976年   28篇
  1975年   10篇
  1974年   10篇
  1972年   12篇
排序方式: 共有3942条查询结果,搜索用时 9 毫秒
11.
Virtualization is the cornerstone of the developing third-party compute industry, allowing cloud providers to instantiate multiple virtual machines (VMs) on a single set of physical resources. Customers utilize cloud resources alongside unknown and untrusted parties, creating the co-resident threat—unless perfect isolation is provided by the virtual hypervisor, there exists the possibility for unauthorized access to sensitive customer information through the exploitation of covert side channels. This paper presents co-resident watermarking, a traffic analysis attack that allows a malicious co-resident VM to inject a watermark signature into the network flow of a target instance. This watermark can be used to exfiltrate and broadcast co-residency data from the physical machine, compromising isolation without reliance on internal side channels. As a result, our approach is difficult to defend against without costly underutilization of the physical machine. We evaluate co-resident watermarkingunder a large variety of conditions, system loads and hardware configurations, from a local laboratory environment to production cloud environments (Futuregrid and the University of Oregon’s ACISS). We demonstrate the ability to initiate a covert channel of 4 bits per second, and we can confirm co-residency with a target VM instance in $<$ 10 s. We also show that passive load measurement of the target and subsequent behavior profiling is possible with this attack. We go on to consider the detectability of co-resident watermarking, extending our scheme to create a subtler watermarking attack by imitating legitimate cloud customer behavior. Our investigation demonstrates the need for the careful design of hardware to be used in the cloud.  相似文献   
12.
Robustly and accurately localizing vehicles in underground mines is particularly challenging due to the unavailability of GPS, variable and often poor lighting conditions, visual aliasing in long tunnels, and airborne dust and water. In this paper, we present a novel, infrastructure‐less, multisensor localization method for robust autonomous operation within underground mines. The proposed method integrates with existing mine site commissioning and operation procedures and includes both an offline map‐building process and an online localization algorithm. The approach combines the strengths of visual‐based place recognition, LIDAR‐based localization, and odometry in a particle filter fusion process. We provide an extensive experimental validation using new large data sets acquired in two operational Australian underground hard‐rock mines (including a 600m‐deep multilevel mine with approximately 33 km of mapping data and 7 km of vehicle localization) by actual mining vehicles during production operations. We demonstrate a significant increase in localization accuracy over prior state‐of‐the‐art SLAM research systems and real‐time operation, with processing times in the order of 10 Hz. We present results showing a mean error of 0.68 m from the Queensland Mine data set and 1.32 m from the New South Wales Mine data set and at least 86% reduction in error compared with prior state of the art. We also analyze the impact of the particle filter parameters with respect to localization accuracy. Together this study represents a new approach to positioning systems for currently deployed autonomous vehicles within underground mine environments.  相似文献   
13.
In this paper, basic relationships and algorithms for numerical simulation of non-linear, self-excited vibrations in single degree-of-freedom cutting systems are presented. Non-linearities due to the tool leaving the cut, as well as interference between the cutting tool clearance face and cutting surface waviness, were taken into consideration. Examples of vibration simulation results are shown.  相似文献   
14.
In this article I argue for rule-based, non-monotonic theories of common law judicial reasoning and improve upon one such theory offered by Horty and Bench-Capon. The improvements reveal some of the interconnections between formal theories of judicial reasoning and traditional issues within jurisprudence regarding the notions of the ratio decidendi and obiter dicta. Though I do not purport to resolve the long-standing jurisprudential issues here, it is beneficial for theorists both of legal philosophy and formalizing legal reasoning to see where the two projects interact.  相似文献   
15.
Environmental conditions and the interplay of cognitive and affective processes both exert influences on bidding behavior. This paper brings the above together, considering how the (external) auction environment determines the impact of (internal) cognitive and affective processes on bidding behavior, assessed in comparison to the optimal bid. Two aspects of the auction environment were considered, namely auction dynamics (low: first-price sealed-bid auction, high: Dutch auction) and value uncertainty (low, high). In a laboratory experiment, we assess bidders’ cognitive workload and emotional arousal through physiological measurements. We find that higher auction dynamics increase the impact of emotional arousal on bid deviations, but not that of cognitive workload. Higher value uncertainty, conversely, increases the impact of cognitive workload on bid deviations, but not that of emotional arousal. Taken together, the auction environment is a critical factor in understanding the nature of the underlying decision process and its impact on bids.  相似文献   
16.
We extend an abstract agent-based swarming model based on the evolution of neural network controllers, to explore further the emergence of swarming. Our model is grounded in the ecological situation, in which agents can access some information from the environment about the resource location, but through a noisy channel. Swarming critically improves the efficiency of group foraging, by allowing agents to reach resource areas much more easily by correcting individual mistakes in group dynamics. As high levels of noise may make the emergence of collective behavior depend on a critical mass of agents, it is crucial to reach sufficient computing power to allow for the evolution of the whole set of dynamics in simulation. Since simulating neural controllers and information exchanges between agents are computationally intensive, to scale up simulations to model critical masses of individuals, the implementation requires careful optimization. We apply techniques from astrophysics known as treecodes to compute the signal propagation, and efficiently parallelize for multi-core architectures. Our results open up future research on signal-based emergent collective behavior as a valid collective strategy for uninformed search over a domain space.  相似文献   
17.
In this work, we present a method of decomposition of arbitrary unitary matrix \(U\in \mathbf {U}(2^k)\) into a product of single-qubit negator and controlled-\(\sqrt{\text{ NOT }}\) gates. Since the product results with negator matrix, which can be treated as complex analogue of bistochastic matrix, our method can be seen as complex analogue of Sinkhorn–Knopp algorithm, where diagonal matrices are replaced by adding and removing an one-qubit ancilla. The decomposition can be found constructively, and resulting circuit consists of \(O(4^k)\) entangling gates, which is proved to be optimal. An example of such transformation is presented.  相似文献   
18.
Recently, Brooklyn has seen an explosion of drag culture, with dozens of performers taking the stage in any given week. Social media plays a vital role for members of this community, simultaneously allowing self‐promotion and community solidarity. Drawing on focus group interviews, we analyze the communication practices of Brooklyn's drag performers, examining both the advantages and drawbacks of social media platforms. Using conceptual frameworks of faceted identity and relational labor, our discussion focuses on affordances and constraints of multifaceted identity in online contexts and theories of seamful design. We contend that by analyzing online communication practices of drag performers, it becomes possible to identify gaps between embedded ideologies of mainstream social media technologies and the localized values of outsider communities.  相似文献   
19.
20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号