首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6656篇
  免费   452篇
  国内免费   9篇
电工技术   78篇
综合类   2篇
化学工业   1928篇
金属工艺   112篇
机械仪表   203篇
建筑科学   286篇
矿业工程   24篇
能源动力   261篇
轻工业   973篇
水利工程   60篇
石油天然气   35篇
无线电   415篇
一般工业技术   1037篇
冶金工业   306篇
原子能技术   47篇
自动化技术   1350篇
  2024年   22篇
  2023年   96篇
  2022年   272篇
  2021年   310篇
  2020年   208篇
  2019年   231篇
  2018年   277篇
  2017年   291篇
  2016年   279篇
  2015年   233篇
  2014年   312篇
  2013年   568篇
  2012年   445篇
  2011年   546篇
  2010年   372篇
  2009年   402篇
  2008年   339篇
  2007年   312篇
  2006年   263篇
  2005年   196篇
  2004年   145篇
  2003年   164篇
  2002年   133篇
  2001年   76篇
  2000年   83篇
  1999年   64篇
  1998年   49篇
  1997年   55篇
  1996年   50篇
  1995年   39篇
  1994年   30篇
  1993年   27篇
  1992年   15篇
  1991年   21篇
  1990年   12篇
  1989年   19篇
  1988年   11篇
  1987年   11篇
  1986年   11篇
  1985年   14篇
  1984年   9篇
  1983年   8篇
  1982年   14篇
  1981年   6篇
  1980年   9篇
  1979年   10篇
  1978年   19篇
  1976年   8篇
  1975年   5篇
  1973年   5篇
排序方式: 共有7117条查询结果,搜索用时 15 毫秒
21.
In this paper, we study the sensitivity of centrality metrics as a key metric of social networks to support visual reasoning. As centrality represents the prestige or importance of a node in a network, its sensitivity represents the importance of the relationship between this and all other nodes in the network. We have derived an analytical solution that extracts the sensitivity as the derivative of centrality with respect to degree for two centrality metrics based on feedback and random walks. We show that these sensitivities are good indicators of the distribution of centrality in the network, and how changes are expected to be propagated if we introduce changes to the network. These metrics also help us simplify a complex network in a way that retains the main structural properties and that results in trustworthy, readable diagrams. Sensitivity is also a key concept for uncertainty analysis of social networks, and we show how our approach may help analysts gain insight on the robustness of key network metrics. Through a number of examples, we illustrate the need for measuring sensitivity, and the impact it has on the visualization of and interaction with social and other scale-free networks.  相似文献   
22.
Model-based testing is focused on testing techniques which rely on the use of models. The diversity of systems and software to be tested implies the need for research on a variety of models and methods for test automation. We briefly review this research area and introduce several papers selected from the 22nd International Conference on Testing Software and Systems (ICTSS).  相似文献   
23.
Spam has become a major issue in computer security because it is a channel for threats such as computer viruses, worms, and phishing. More than 86% of received e-mails are spam. Historical approaches to combating these messages, including simple techniques such as sender blacklisting or the use of e-mail signatures, are no longer completely reliable. Many current solutions feature machine-learning algorithms trained using statistical representations of the terms that most commonly appear in such e-mails. However, these methods are merely syntactic and are unable to account for the underlying semantics of terms within messages. In this paper, we explore the use of semantics in spam filtering by introducing a pre-processing step of Word Sense Disambiguation (WSD). Based upon this disambiguated representation, we apply several well-known machine-learning models and show that the proposed method can detect the internal semantics of spam messages.  相似文献   
24.
In response to K. Danzinger's (see record 1986-00068-001) suggestion that the first use of the term subject in the English-language psychological literature occurred in 1886 in the context of experiments involving the hypnotic state, the present author points out that there are examples of the use of the term in discussions of experiments on thought transference published by the Society for Psychical Research in the 1880's. (8 ref) (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
25.
Sensor Web Enablement (SWE) technologies have been successfully applied to a great variety of outdoor scenarios but, in practical terms, little effort has been applied for indoor environments, and even less in the field of industrial applications. This article presents an intelligent SWE application for an indoor and industrial scenario, with the aim of improving and increasing the levels of human safety. The base low-level architecture is built on top of wireless sensor networks (WSN) connected to a Sensor Observation Service (SOS). Higher layers in the architecture include services that make real time decisions based on the collected data. Both simulation and experimental results are presented. The paper shows the viability of our approach in terms of performance, scalability, modularity and safety.  相似文献   
26.
The exponential growth of Internet during the last decade leads us to make more efforts in the researching and developing of sustainable Web servers in order to decrease the global energy demand. In this paper, we cover, as a first step, a proper review of the literature related to the energy efficiency research in Web server systems to depict the state of the art to plan further contributions as more research in sustainable Web systems. We also propose and implement an energy metric that permits to establish a relation between the Quality of Service (QoS) obtained by the system and the power it consumes.  相似文献   
27.
With the advent of wearable sensing and mobile technologies, biosignals have seen an increasingly growing number of application areas, leading to the collection of large volumes of data. One of the difficulties in dealing with these data sets, and in the development of automated machine learning systems which use them as input, is the lack of reliable ground truth information. In this paper we present a new web-based platform for visualization, retrieval and annotation of biosignals by non-technical users, aimed at improving the process of ground truth collection for biomedical applications. Moreover, a novel extendable and scalable data representation model and persistency framework is presented. The results of the experimental evaluation with possible users has further confirmed the potential of the presented framework.  相似文献   
28.
This paper presents a testing methodology to apply Behaviour Driven Development (BDD) techniques while developing Multi-Agent Systems (MASs), termed BEhavioural Agent Simple Testing (BEAST) Methodology. This methodology is supported by the open source framework (BEAST Tool) which automatically generates test cases skeletons from BDD scenarios specifications. The developed framework allows the testing of MASs based on JADE or JADEX platforms. In addition, this framework offers a set of configurable Mock Agents with the aim of being able to execute tests while the MAS is under development. The BEAST Methodology presents transparent traceability from user requirements to test cases. Thus, the stakeholders can be aware of the project status. The methodology and the associated tool have been validated in the development of a MAS for fault diagnosis in FTTH (Fiber To The Home) networks. The results have been measured in quantifiable way obtaining a reduction of the tests implementation time.  相似文献   
29.
The job-shop scheduling problem with operators is a very interesting problem that generalizes the classic job-shop problem in such a way that an operation must be algorithm to solve this problem considering makespan minimization. The genetic algorithm uses permutations with repetition to encode chromosomes and a schedule generation scheme, termed OG&T, as decoding algorithm. This combination guaranties that at least one of the chromosomes represents and optimal schedule and, at the samhat machines and operators are idle while an operation is available to be processed. To improve the quality of the schedules for large instances, we use Lamarckian evolution and modify the OG&T algorithm to further reduce the idle time of the machines and operators, in this case at the risk of leaving all optimal schedules out of the search space. We conducted a large experimental study showing that these improvements allow the genetic algorithm to reach high quality solutions in very short time, and so it is quite competitive with the current state-of-the-art methods.  相似文献   
30.
In this paper, a microfluidic experimental set-up is introduced to study the ionic transport in an artificial capacitive deionization (CDI) cell. CDI is a promising desalination technique, which relies on the application of an external electric field and high surface area porous electrodes for ion separation and storage. Photolithography and deep reactive ion etching were used to fabricate a micro-CDI channel with pseudo-porous electrodes on a silicon-on-insulator substrate. Laser-induced fluorescence was performed using cationic Sulforhodamine B (SRB) fluorescent dye to measure ion concentration within the bulk solution and more importantly, within the porous electrodes during the desalination process, with an average normalized root mean square deviation of 8.2 %. Using this set-up, electromigration of ions within the electrode was visualized and the effect of applied electric potential on bulk solution concentration distribution is quantified. In addition, SRB and Fluorescein were used together to visualize anion and cation concentrations simultaneously. The method presented in this study can be used for solution concentrations up to approximately 0.7 mM. The ionic concentration profiles obtained by this approach can be used to test and validate the existing electrosorption models, and pseudo-porous electrodes can be modified to observe the effects of pore size, shape and distribution on electrosorption performance. Furthermore, with proper modifications, the microfabricated structure and experimental set-up can be used for CDI-on-a-chip applications and bio-separation devices.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号