首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   36894篇
  免费   1470篇
  国内免费   63篇
电工技术   381篇
综合类   30篇
化学工业   7278篇
金属工艺   737篇
机械仪表   788篇
建筑科学   1996篇
矿业工程   114篇
能源动力   1072篇
轻工业   2976篇
水利工程   435篇
石油天然气   118篇
武器工业   5篇
无线电   2532篇
一般工业技术   6206篇
冶金工业   6859篇
原子能技术   270篇
自动化技术   6630篇
  2023年   215篇
  2022年   443篇
  2021年   689篇
  2020年   465篇
  2019年   620篇
  2018年   787篇
  2017年   699篇
  2016年   848篇
  2015年   767篇
  2014年   1056篇
  2013年   2416篇
  2012年   1697篇
  2011年   2119篇
  2010年   1671篇
  2009年   1561篇
  2008年   1820篇
  2007年   1789篇
  2006年   1608篇
  2005年   1458篇
  2004年   1186篇
  2003年   1136篇
  2002年   1061篇
  2001年   726篇
  2000年   554篇
  1999年   612篇
  1998年   648篇
  1997年   615篇
  1996年   578篇
  1995年   596篇
  1994年   544篇
  1993年   529篇
  1992年   511篇
  1991年   301篇
  1990年   433篇
  1989年   400篇
  1988年   329篇
  1987年   361篇
  1986年   320篇
  1985年   429篇
  1984年   421篇
  1983年   325篇
  1982年   304篇
  1981年   283篇
  1980年   273篇
  1979年   273篇
  1978年   252篇
  1977年   233篇
  1976年   226篇
  1975年   199篇
  1974年   180篇
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
941.
We prove several decidability and undecidability results for ν-PN, an extension of P/T nets with pure name creation and name management. We give a simple proof of undecidability of reachability, by reducing reachability in nets with inhibitor arcs to it. Thus, the expressive power of ν-PN strictly surpasses that of P/T nets. We encode ν-PN into Petri Data Nets, so that coverability, termination and boundedness are decidable. Moreover, we obtain Ackermann-hardness results for all our decidable decision problems. Then we consider two properties, width-boundedness and depth-boundedness, that factorize boundedness. Width-boundedness has already been proven to be decidable. Here we prove that its complexity is also non-primitive recursive. Then we prove undecidability of depth-boundedness. Finally, we prove that the corresponding “place version” of all the boundedness problems is undecidable for ν-PN. These results carry over to Petri Data Nets.  相似文献   
942.
This paper describes an active model with a robust texture model built on-line. The model uses one camera and it is able to operate without active illumination. The texture model is defined by a series of clusters, which are built in a video sequence using previously encountered samples. This model is used to search for the corresponding element in the following frames. An on-line clustering method, named leaderP is described and evaluated on an application of face tracking. A 20-point shape model is used. This model is built offline, and a robust fitting function is used to restrict the position of the points. Our proposal is to serve as one of the stages in a driver monitoring system. To test it, a new set of sequences of drivers recorded outdoors and in a realistic simulator has been compiled. Experimental results for typical outdoor driving scenarios, with frequent head movement, turns and occlusions are presented. Our approach is tested and compared with the Simultaneous Modeling and Tracking (SMAT) [1], and the recently presented Stacked Trimmed Active Shape Model (STASM) [2], and shows better results than SMAT and similar fitting error levels to STASM, with much faster execution times and improved robustness.  相似文献   
943.
Bio-chemical networks are often modeled as systems of ordinary differential equations (ODEs). Such systems will not admit closed form solutions and hence numerical simulations will have to be used to perform analyses. However, the number of simulations required to carry out tasks such as parameter estimation can become very large. To get around this, we propose a discrete probabilistic approximation of the ODEs dynamics. We do so by discretizing the value and the time domain and assuming a distribution of initial states w.r.t. the discretization. Then we sample a representative set of initial states according to the assumed initial distribution and generate a corresponding set of trajectories through numerical simulations. Finally, using the structure of the signaling pathway we encode these trajectories compactly as a dynamic Bayesian network.This approximation of the signaling pathway dynamics has several advantages. First, the discretized nature of the approximation helps to bridge the gap between the accuracy of the results obtained by ODE simulation and the limited precision of experimental data used for model construction and verification. Second and more importantly, many interesting pathway properties can be analyzed efficiently through standard Bayesian inference techniques instead of resorting to a large number of ODE simulations. We have tested our method on ODE models of the EGF-NGF signaling pathway [1] and the segmentation clock pathway [2]. The results are very promising in terms of accuracy and efficiency.  相似文献   
944.
生物特征计算旨在实现人体生物特征的自动感知与分析,建立生物特征与人的身份、情感、行为、健康情况和美学评价的对应关系的可计算模型.结合作者近十余年来在生物特征计算方面的研究,从生物特征识别、医学和美学生物特征计算三个方面对生物特征计算的进展和趋势进行了介绍和展望.  相似文献   
945.
This paper recasts the Friesz et al. (1993) measure theoretic model of dynamic network user equibrium as a controlled variational inequality problem involving Riemann integrals. This restatement is done to make the model and its foundations accessible to a wider audience by removing the need to have a background in functional analysis. Our exposition is dependent on previously unavailable necessary conditions for optimal control problems with state-dependent time lags. These necessary conditions, derived in an Appendix, are employed to show that a particular variational inequality control problem has solutions that are dynamic network user equilibria. Our analysis also shows that use of proper flow propagation constraints obviates the need to explicitly employ the arc exit time functions that have complicated numerical implementations of the Friesz et al. (1993) model heretofore. We close by describing the computational implications of numerically determining dynamic user equilibria from formulations based on state-dependent time lags.  相似文献   
946.
Binding Virtual Environments to Toolkit Capabilities   总被引:1,自引:0,他引:1  
There are many toolkits and development environments that aid the process of constructing virtual environment applications. Many of these development environments encourage customising a virtual environment's design while rapid prototyping within the confines of a toolkit's capabilities. Thus the choice of the technology and its associated support has been made independent of the end-use requirements of the final system. This can bias a virtual environment's design by implementation based constraints. We propose that an alternative approach is the consideration of virtual environment requirements in the context of an inspectable design model, to identify the requirements that a toolkit will need to support. In the context of an example, we present a selection of design requirements that we consider important for virtual environment design in general. We explore how these requirements might be mapped to different capabilities using Virtual Reality Modelling Language (VRML) as a concrete example of a platform technology.  相似文献   
947.
In my September and November contributions, I deviated slightly from my usual theme and examined several of the technical and procedural matters associated with Digital Signature technology. Of course, Digital Signature represents one of the less politically sensitive applications of cryptographic technology, although it is undoubtedly destined to become one of the most pervasive.  相似文献   
948.
Jon David 《Network Security》2001,2001(10):13-15
The information available both as input to, and as output from, any given intrusion detection apparatus is a function of where it is placed in a network architecture. In particular, placing an intrusion detection apparatus on the inside (i.e. between one’s perimeter defenses and one’s inner operations) will yield significantly different results than placing that same apparatus on the outside (i.e. between one’s perimeter defenses and the rest of the world). This writing examines these differences.  相似文献   
949.
Multimedia group applications often operate in an environment where the various participants are located on systems and communication links with different capabilities. Mechanisms are required that ensure full-quality media for high-performance workstations but lower-quality media for playout at low-end systems. QoS filters have been proposed as a way to adapt QoS to the user specified level by changing the structure of a media stream in a well defined way. Resource reservation and QoS filter instantiation should be closely integrated since both represent one particular aspect of the provision of individualistic QoS for heterogeneous users in multipeer communications. The Internet reservation protocol RSVP is receiver oriented and allows each receiver to specify its resource requirements. However, no actual mechanisms are defined that adapt the data stream to the receiver specified QoS requirements.In this paper we present an enhanced version of RSVP (called RSVP++) that integrates resource reservation and QoS filter control. In order to achieve this integration we extend the RSVP functional model and define a new QoS service class. RSVP++ can coexist with common RSVP systems, thus, openness and interoperability of the system are ensured.  相似文献   
950.
The refinement calculus is a well-established theory for formal development of imperative program code and is supported by a number of automated tools. Via a detailed case study, this article shows how refinement theory and tool support can be extended for a program with real-time constraints. The approach adapts a timed variant of the refinement calculus and makes corresponding enhancements to a theorem-prover based refinement tool.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号