首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   84686篇
  免费   946篇
  国内免费   408篇
电工技术   787篇
综合类   2318篇
化学工业   11676篇
金属工艺   4856篇
机械仪表   3035篇
建筑科学   2170篇
矿业工程   568篇
能源动力   1159篇
轻工业   3634篇
水利工程   1268篇
石油天然气   342篇
无线电   9295篇
一般工业技术   16537篇
冶金工业   2688篇
原子能技术   264篇
自动化技术   25443篇
  2022年   39篇
  2021年   53篇
  2020年   31篇
  2019年   33篇
  2018年   14486篇
  2017年   13399篇
  2016年   10001篇
  2015年   637篇
  2014年   271篇
  2013年   280篇
  2012年   3168篇
  2011年   9432篇
  2010年   8300篇
  2009年   5578篇
  2008年   6805篇
  2007年   7800篇
  2006年   152篇
  2005年   1227篇
  2004年   1146篇
  2003年   1190篇
  2002年   563篇
  2001年   110篇
  2000年   190篇
  1999年   74篇
  1998年   69篇
  1997年   48篇
  1996年   55篇
  1995年   26篇
  1994年   20篇
  1993年   31篇
  1992年   26篇
  1991年   34篇
  1988年   17篇
  1969年   24篇
  1968年   43篇
  1967年   33篇
  1966年   42篇
  1965年   44篇
  1963年   28篇
  1962年   22篇
  1961年   18篇
  1960年   30篇
  1959年   35篇
  1958年   37篇
  1957年   36篇
  1956年   34篇
  1955年   63篇
  1954年   68篇
  1951年   18篇
  1950年   19篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
91.
92.
93.
For motion compensated de-interlace, the accuracy and reliability of the motion vectors have a significant impact on the performance of the motion compensated interpolation. In order to improve the robustness of motion vector, a novel motion estimation algorithm with center-biased diamond search and its parallel VLSI architecture are proposed in this paper. Experiments show that it works better than conventional motion estimation algorithms in terms of motion compensation error and robustness, and its architecture overcomes the irregular data flow and achieves high efficiency. It also efficiently reuses data and reduces the control overhead. So, it is highly suitable for HDTV applications.  相似文献   
94.
This paper presents a method of autonomous topological modeling and localization in a home environment using only low-cost sonar sensors. The topological model is extracted from a grid map using cell decomposition and normalized graph cut. The autonomous topological modeling involves the incremental extraction of a subregion without predefining the number of subregions. A method of topological localization based on this topological model is proposed wherein a current local grid map is compared with the original grid map. The localization is accomplished by obtaining a node probability from a relative motion model and rotational invariant grid-map matching. The proposed method extracts a well-structured topological model of the environment, and the localization provides reliable node probability even when presented with sparse and uncertain sonar data. Experimental results demonstrate the performance of the proposed topological modeling and localization in a real home environment.  相似文献   
95.
In the literature, more and more clues show that the bidders indeed tend to risk averse. But as a good structure estimation procedure in first-price sealed-bid auctions, the traditional PPMLE (Piecewise Pseudo-Maximum Likelihood Estimation) approach is only applicable to the risk neutrality case. This study generalizes this approach to the risk aversion case, and obtains a simple estimation procedure for the Pareto family of private costs. In the procedure, the estimation order of distribution parameters of private costs is not important, which is different from the traditional PPMLE method. Though there is no unique estimator for θ 1 and γ, some guidance is given for real-world applications on the basis of our Monte Carlo simulation experiments. What’s more, this procedure can be reduced further, if one is only interested in estimating the private costs. Extensive simulation experimental results indicate that our approach outperforms or matches at least the traditional one in the case of risk neutrality, and is applicable to the risk aversion case.  相似文献   
96.
This study examines gender differences among Greek Internet users in using digital music distribution methods. First, a Web-based questionnaire was developed and placed on most popular Greek forums. Then, 300 Greek Internet users stated their opinions regarding digital music and the following downloading methods: 1) Http downloading, 2) P2P downloading, 3) Torrent downloading, and 4) Combined iTunes method. The results revealed that P2P programs are the first choice for downloading mp3. The responders were satisfied with the P2P’s easiness of use, the variety of songs and the no need to pay. However, they worried about P2P’s safety. Gender differences were identified in several areas. Music industry managers could consider these findings in their strategies to reach the consumers. Advertising companies could use the results to target differently male or female consumers.  相似文献   
97.
98.
In this paper, we address the problem of determining whether a mobile robot, called the pursuer, is able to maintain strong mutual visibility (a visibility notion between regions over a convex partition of the environment) of an antagonist agent, called the evader. We frame the problem as a non cooperative game. We consider the case in which the pursuer and the evader move at bounded speed, traveling in a known polygonal environment with or without holes, and in which there are no restrictions as to the distance that might separate the agents. Unlike our previous efforts (Murrieta-Cid et al. in Int J Robot Res 26:233–253, 2007), we give special attention to the combinatorial problem that arises when searching for a solution through visiting several locations in an environment with obstacles. In this paper we take a step further, namely, we assume an antagonistic evader who moves continuously and unpredictably, but with a constraint over its set of admissible motion policies, as the evader moves in the shortest-path roadmap, also called the reduced visibility graph (RVG). The pursuer does not know which among the possible paths over the RVG the evader will choose, but the pursuer is free to move within all the environment. We provide a constructive method to solve the decision problem of determining whether or not the pursuer is able to maintain strong mutual visibility of the evader. This method is based on an algorithm that computes the safe areas (areas that keep evader surveillance) at all times. We prove decidability of this problem, and provide a complexity measure to this evader surveillance game; both contributions hold for any general polygonal environment that might or not contain holes. All our algorithms have been implemented and we show simulation results.  相似文献   
99.
This paper introduces a novel hybrid adaptive cuckoo search (HACS) algorithm to establish the parameters of chaotic systems. In order to balance and enhance the accuracy and convergence rate of the basic cuckoo search (CS) algorithm, the adaptive parameters adjusting operation is presented to tune the parameters properly. Besides, the exploitation capability of the CS algorithm is enhanced a lot by integrating the orthogonal design strategy. The functionality of the HACS algorithm is tested through the Lorenz system under the noise-free and noise-corrupted conditions, respectively. The numerical results demonstrate that the algorithm can estimate parameters efficiently and accurately, and the capability of noise immunity is also powerful. Compared with the basic CS algorithm, genetic algorithm, and particle swarm optimization algorithm, the HACS algorithm is energy efficient and superior.  相似文献   
100.
This paper responds to the recent call for understanding the nature and consequences of the digital mediation of everyday experiences. We do so in the context of online opinion sharing. We propose that the unique design features of mobile computing devices and the intention and purpose of their users, meld into a technology affordance we label: Triggered essential reviewing. We empirically investigate the effect of this technology affordance on opinion characteristics (i.e., timing and length), and outcomes (i.e., opinion valence and content). We find that triggered essential reviewing engenders opinions that cover a narrower range of aspects of the experience and that it produces a negative evaluative bias—a bias that mitigates over time. Our work makes two contributions to the application of affordance theory in Information Systems. First, it shows the importance of IT design in studying experiential computing. While not taking a deterministic view of technology, we validate the notion that different technology designs produce a variation of effects around a predictable central tendency. Second, it empirically demonstrates that the affordances of embodied digital experiences have an effect on actual behavior as well as on the outcome of the experience itself.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号