首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2103篇
  免费   154篇
  国内免费   3篇
电工技术   24篇
化学工业   667篇
金属工艺   31篇
机械仪表   61篇
建筑科学   94篇
矿业工程   2篇
能源动力   93篇
轻工业   232篇
水利工程   12篇
石油天然气   13篇
无线电   148篇
一般工业技术   348篇
冶金工业   117篇
原子能技术   11篇
自动化技术   407篇
  2024年   2篇
  2023年   14篇
  2022年   61篇
  2021年   106篇
  2020年   55篇
  2019年   68篇
  2018年   74篇
  2017年   87篇
  2016年   91篇
  2015年   71篇
  2014年   99篇
  2013年   145篇
  2012年   111篇
  2011年   178篇
  2010年   103篇
  2009年   113篇
  2008年   115篇
  2007年   98篇
  2006年   80篇
  2005年   63篇
  2004年   73篇
  2003年   64篇
  2002年   52篇
  2001年   26篇
  2000年   35篇
  1999年   34篇
  1998年   34篇
  1997年   25篇
  1996年   27篇
  1995年   20篇
  1994年   7篇
  1993年   16篇
  1992年   11篇
  1991年   10篇
  1990年   8篇
  1989年   6篇
  1988年   3篇
  1987年   4篇
  1986年   5篇
  1985年   11篇
  1984年   10篇
  1983年   5篇
  1982年   8篇
  1981年   7篇
  1980年   3篇
  1979年   4篇
  1978年   2篇
  1976年   4篇
  1975年   2篇
  1965年   4篇
排序方式: 共有2260条查询结果,搜索用时 328 毫秒
61.
This paper presents and discusses a blocked parallel implementation of bi- and three-dimensional versions of the Lattice Boltzmann Method. This method is used to represent and simulate fluid flows following a mesoscopic approach. Most traditional parallel implementations use simple data distribution strategies to parallelize the operations on the regular fluid data set. However, it is well known that block partitioning is usually better. Such a parallel implementation is discussed and its communication cost is established. Fluid flows simulations crossing a cavity have also been used as a real-world case study to evaluate our implementation. The presented results with our blocked implementation achieve a performance up to 31% better than non-blocked versions, for some data distributions. Thus, this work shows that blocked, parallel implementations can be efficiently used to reduce the parallel execution time of the method.  相似文献   
62.
Selecting software technologies for software projects represents a challenge to software engineers. It is known that software projects differ from each other by presenting different characteristics that can complicate the selection of such technologies. This is not different when considering model-based testing. There are many approaches with different characteristics described in the technical literature that can be used in software projects. However, there is no indication as to how they can fit a software project. Therefore, a strategy to select model-based testing approaches for software projects called Porantim is fully described in this paper. Porantim is based on a body of knowledge describing model-based testing approaches and their characterization attributes (identified by secondary and primary experimental studies), and a process to guide by adequacy and impact criteria regarding the use of this sort of software technology that can be used by software engineers to select model-based testing approaches for software projects.  相似文献   
63.
Air pollution has a negative impact on human health. For this reason, it is important to correctly forecast over-threshold events to give timely warnings to the population. Nonlinear models of the nonlinear autoregressive with exogenous variable (NARX) class have been extensively used to forecast air pollution time series, mainly using artificial neural networks (NNs) to model the nonlinearities. This work discusses the possible advantages of using polynomial NARX instead, in combination with suitable model structure selection methods. Furthermore, a suitably weighted mean square error (MSE) (one-step-ahead prediction) cost function is used in the identification/learning process to enhance the model performance in peak estimation, which is the final purpose of this application. The proposed approach is applied to ground-level ozone concentration time series. An extended simulation analysis is provided to compare the two classes of models on a selected case study (Milan metropolitan area) and to investigate the effect of different weighting functions in the identification performance index. Results show that polynomial NARX are able to correctly reconstruct ozone concentrations, with performances similar to NN-based NARX models, but providing additional information, as, e.g., the best set of regressors to describe the studied phenomena. The simulation analysis also demonstrates the potential benefits of using the weighted cost function, especially in increasing the reliability in peak estimation.  相似文献   
64.
Widespread use of GPS and similar technologies makes it possible to collect extensive amounts of trajectory data. These data sets are essential for reasonable decision making in various application domains. Additional information, such as events taking place along a trajectory, makes data analysis challenging, due to data size and complexity. We present an integrated solution for interactive visual analysis and exploration of events along trajectories data. Our approach supports analysis of event sequences at three different levels of abstraction, namely spatial, temporal, and events themselves. Customized views as well as standard views are combined to form a coordinated multiple views system. In addition to trajectories and events, we include on-the-fly derived data in the analysis. We evaluate our integrated solution using the IEEE VAST 2015 Challenge data set. A successful detection and characterization of malicious activity indicate the usefulness and efficiency of the presented approach.  相似文献   
65.
66.
Dynamic susceptibility contrast-magnetic resonance imaging (DSC-MRI) data analysis requires the knowledge of the arterial input function (AIF) to quantify the cerebral blood flow (CBF), volume (CBV) and the mean transit time (MTT). AIF can be obtained either manually or using automatic algorithms. We present a method to derive the AIF on the middle cerebral artery (MCA). The algorithm draws a region of interest (ROI) where the MCA is located. Then, it uses a recursive cluster analysis on the ROI to select the arterial voxels. The algorithm had been compared on simulated data to literature state of art automatic algorithms and on clinical data to the manual procedure. On in silico data, our method allows to reconstruct the true AIF and it is less affected by partial volume effect bias than the other methods. In clinical data, automatic AIF provides CBF and MTT maps with a greater contrast level compared to manual AIF ones. Therefore, AIF obtained with the proposed method improves the estimate reliability and provides a quantitatively reliable physiological picture.  相似文献   
67.
This paper describes a novel template-based meshing approach for generating good quality quadrilateral meshes from 2D digital images. This approach builds upon an existing image-based mesh generation technique called Imeshp, which enables us to create a segmented triangle mesh from an image without the need for an image segmentation step. Our approach generates a quadrilateral mesh using an indirect scheme, which converts the segmented triangle mesh created by the initial steps of the Imesh technique into a quadrilateral one. The triangle-to-quadrilateral conversion makes use of template meshes of triangles. To ensure good element quality, the conversion step is followed by a smoothing step, which is based on a new optimization-based procedure. We show several examples of meshes generated by our approach, and present a thorough experimental evaluation of the quality of the meshes given as examples.  相似文献   
68.
Treatment of prostate cancer patients with antiandrogens is initially successful, though the therapy often becomes refractory over the time. This mechanism is not fully understood, but the presence of androgen receptor (AR) mutant forms which are activated by antiandrogens and other endogenous ligands, and overexpression of the receptor have been suggested. In an attempt to explain the molecular basis for agonicity and antagonicity in the androgen receptor, and the changes on biological activity of subtle modifications at the ligand and receptor (mutations) level, molecular dynamics simulations were performed on the androgen receptor wild type (WT), and T877A and W741 mutant forms, complexed with several non-steroidal androgens. The stabilizing role of residues from helices 3, 5, 11 and 12 was observed in non-steroidal androgens R-3, S-1, and R-bicalutamide and hydroxyflutamide in resistant mutations. In the AR WT antiandrogen R-bicalutamide complex, destabilization of M895 by both W741 and the sulfonyl linkage of the ligand may be responsible for reported antagonism. Changes in the ligand or mutations alleviating this effect were observed to stabilize the receptor in the active conformation, thus developing resistance to R-bicalutamide. The results presented provide a plausible explanation for the molecular basis of agonicity and antagonicity in the androgen receptor, and complement previous studies using static crystal structures, incorporating for the first time protein dynamics into the analysis. Thus, our results provide a valuable framework for the structure-based design of improved antiandrogens.  相似文献   
69.
Privacy preserving technologies are likely to become an essential component of adaptive services in pervasive and mobile computing. Although privacy issues have been studied for a long time in computer science as well as in other fields, most studies are focused on the release of data from large repositories. Mobile and pervasive computing pose new challenges, requiring specific formal models for attacks and new privacy preserving techniques. This paper considers a specific pervasive computing scenario, and shows that the application of state-of-the-art techniques for the anonymization of service requests is insufficient to protect the privacy of users. A specific class of attacks, called shadow attacks, is formally defined and a defense technique is proposed. This defense is formally proved to be correct, and its effectiveness is validated by extensive experiments in a simulated environment.  相似文献   
70.
This paper presents the design and the implementation of a coarse-grain reconfigurable machine used as an accelerator for a programmable RISC core, to speed up the execution of computationally demanding tasks like multimedia applications. We created a VHDL model of the proposed architecture and implemented it on a FPGA board for prototyping purposes; then we mapped on our architecture some DSP and image processing algorithms as a benchmark. In particular, we provided the proposed architecture with subword computation capabilities, which turns out to be extremely effective especially when dealing with image processing algorithms, achieving significant benefits in terms of speed and efficiency in resource usage. To create the configuration bitstream (configware) we created a tool based on a graphical user interface (GUI) which provides a first step towards the automation of the programming flow of our design: the tool is meant to ease the life of the programmer, relieving him from the burden of calculating the configuration bits by hand. Synthesis results indicate that the area occupation and the operating frequency of our design are reasonable also when compared to other similar design. In addition to this, the amount of clock cycles taken by our machine to perform a given algorithm is orders of magnitude smaller than the one required by a corresponding software implementation on a RISC microprocessor.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号