首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   405篇
  免费   19篇
电工技术   5篇
综合类   1篇
化学工业   96篇
金属工艺   12篇
机械仪表   13篇
建筑科学   24篇
矿业工程   5篇
能源动力   15篇
轻工业   22篇
水利工程   2篇
无线电   45篇
一般工业技术   81篇
冶金工业   26篇
自动化技术   77篇
  2023年   10篇
  2022年   6篇
  2021年   21篇
  2020年   13篇
  2019年   19篇
  2018年   15篇
  2017年   12篇
  2016年   18篇
  2015年   19篇
  2014年   20篇
  2013年   22篇
  2012年   15篇
  2011年   33篇
  2010年   20篇
  2009年   23篇
  2008年   22篇
  2007年   11篇
  2006年   13篇
  2005年   12篇
  2004年   10篇
  2003年   11篇
  2002年   8篇
  2001年   3篇
  2000年   5篇
  1999年   2篇
  1998年   6篇
  1997年   4篇
  1996年   4篇
  1995年   5篇
  1994年   3篇
  1993年   3篇
  1990年   2篇
  1989年   2篇
  1988年   2篇
  1987年   1篇
  1986年   2篇
  1985年   5篇
  1983年   1篇
  1982年   3篇
  1980年   1篇
  1979年   1篇
  1977年   1篇
  1976年   2篇
  1975年   1篇
  1973年   1篇
  1971年   1篇
  1968年   1篇
  1967年   2篇
  1966年   2篇
  1963年   2篇
排序方式: 共有424条查询结果,搜索用时 15 毫秒
41.
Inter-domain collaborations suffer not only from technological obstacles that hinder interoperability, but also from diverting business objectives of the involved domains. Today, hand-crafted contracts define the terms and conditions for service interactions. Electronic negotiation can serve as the enabler of dynamic interdomain collaborations by providing a large degree of freedom for the automation of agreement formation and electronic contracting. Negotiation by electronic means has been an area of intensive research for many years now. However, most effort was put on the determination of prices and neglected that real-world agreements also consist of complex dependencies of interdependent obligations. In this paper we present agreement negotiation as a tool to establish ad hoc services collaborations. Our novel protocol allows for the discovery of complex agreement options and for the formation of multi-party agreements. The protocol works through an iterative exchange of requirements and offers. A major benefit over existing bilateral negotiation protocols is that our protocol is capable of discovering potential collaborations between different parties. It will leave each negotiating party with a complete agreement document after a successful negotiation. This comprehensive agreement document defines the interdependent obligations between all parties and is well suited for E-Contracting.  相似文献   
42.
Ubiquitous computing is about to become part of our everyday lives by integrating hundreds of “invisible” to us computing devices in our environment, so that they can unobtrusively and constantly assist us. This will imply more and smaller “invisible” sensors, homogeneously distributed and at the same time densely packed in host materials, responding to various stimuli and immediately delivering information. In order to reach this aim, the embedded sensors should be integrated within the host material, heading towards sensorial materials. The first step is to omit all parts that are not needed for the sensorial task and to find new solutions for a gentle integration. This is what we call function scale integration. The paper discusses sensor embedding in the human hand as an example of integration in nature, new technological applications and main challenges associated with this approach.  相似文献   
43.
Consumer credit scoring is often considered a classification task where clients receive either a good or a bad credit status. Default probabilities provide more detailed information about the creditworthiness of consumers, and they are usually estimated by logistic regression. Here, we present a general framework for estimating individual consumer credit risks by use of machine learning methods. Since a probability is an expected value, all nonparametric regression approaches which are consistent for the mean are consistent for the probability estimation problem. Among others, random forests (RF), k-nearest neighbors (kNN), and bagged k-nearest neighbors (bNN) belong to this class of consistent nonparametric regression approaches. We apply the machine learning methods and an optimized logistic regression to a large dataset of complete payment histories of short-termed installment credits. We demonstrate probability estimation in Random Jungle, an RF package written in C++ with a generalized framework for fast tree growing, probability estimation, and classification. We also describe an algorithm for tuning the terminal node size for probability estimation. We demonstrate that regression RF outperforms the optimized logistic regression model, kNN, and bNN on the test data of the short-term installment credits.  相似文献   
44.
A major tsunami in December 2004 devastated the coastal ecosystems along the Andaman Sea coast of Thailand. Since intact coastal ecosystems provide many important services for local communities at the Andaman Sea, it is crucial to investigate to what extent (in terms of percentage area and speed) the affected ecosystems were capable of recovering after the tsunami. Field measurements and multi-date IKONOS imagery were used to estimate the recovery and succession patterns of coastal vegetation types in the Phang-Nga province of Thailand, three years after the tsunami. Thus, this study contributes to a holistic understanding of the ecological vulnerability of the coastal area to tsunamis. A zone-based change detection approach is applied by comparing two change detection techniques: the first method involves the calculation of a recovery rate based on multi-temporal TNDVI (transformed normalized difference vegetation index) images (TNDVI approach), whereas the second approach is a combined approach of the change vector analysis (CVA). Although these two methods provide different types of information (quantitative for the TNDVI approach, qualitative for the CVA), they are comparable in terms of results and accuracies. The results reveal that recovery processes vary based on the type of the ecosystem and, furthermore, are strongly influenced by human activities. Grasslands, coconut plantations and the mixed vegetation cover could recover faster than the mangroves and casuarina forests. Among the forest ecosystems, recovery rates of casuarina forests were higher than for mangroves, but the recovery area was smaller. This study also discusses the potential and some limitations and inaccuracies of applying high-resolution optical imagery for assessing vegetation recovery at a local scale.  相似文献   
45.
Over the last few years Internet of Things products have become known for their weak security. News articles regularly describe security vulnerabilities of cars, surveillance cameras, kettles, and other IoT devices. There are, however, recent standardization activities addressing some of these security challenges. This article describes how the work of the IETF and the FIDO Alliance can lead to improved security.  相似文献   
46.
The concern of this work is the influence of the thermal motion of the atoms on electron scattering simulations, used for quantitative interpretation of results in high-resolution electron microscopy. We distinguish between the influence of inelastic phonon excitation and the effect of a moving lattice on images generated by elastically scattered electrons. It is shown that, analog to aberrations, the impact of a moving lattice differs substantially with respect to different imaging conditions and cannot be described by the Debye–Waller damping applicable in XRD. We derive a new formalism, based on the frozen lattice and multislice approach, to incorporate the statistics of the thermal motion into elastic TEM imaging simulations, taking into account different imaging conditions. The averaging over different atom positions is generally performed within a density matrix framework, which can be linearized in the special case of off-axis electron holography. All findings are supported by explicit numerical simulations: molecular dynamics simulations are performed to get a realistic thermal motion and the electron scattering simulations are performed within the new multislice algorithm.  相似文献   
47.
In two studies, the authors investigated 2- and 3-year-old children's awareness of the normative structure of conventional games. In the target conditions, an experimenter showed a child how to play a simple rule game. After the child and the experimenter had played for a while, a puppet came (controlled by a 2nd experimenter), asked to join in, and then performed an action that constituted a mistake in the game. In control conditions, the puppet performed the exact same action as in the experimental conditions, but the context was different such that this act did not constitute a mistake. Children's normative responses to the puppet's acts (e.g., protest, critique, or teaching) were scored. Both age groups performed more normative responses in the target than in the control conditions, but the 3-year-olds did so on a more explicit level. These studies demonstrate in a particularly strong way that even very young children have some grasp of the normative structure of conventional activities. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
48.
49.
This article deals with the extension of the quarry “Fischbach” in Upper Bavaria. In the quarry primarily limestone is mined, which is further transported to Rohrdorf for cement production. For the planned expansion firstly a geotechnical mapping of all benches is made. All benches are divided into segments, then gap data are taken. In addition, rock samples are taken from the mining area and uniaxial compressive tests are carried out. This data is basis of a differentiated geomechanical classification of the benches and slopes. The subsequent rock classification defines the rock strength of individual bench-areas. Furthermore, the slopes are tested on stability in actual condition and after enlargement. This happens on the one hand through a regional breakdown, on the other hand through a local viewing on benches. These stability considerations yield factors of safety and let assume a safe slope height.  相似文献   
50.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号