首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1985篇
  免费   49篇
  国内免费   3篇
电工技术   24篇
化学工业   401篇
金属工艺   27篇
机械仪表   28篇
建筑科学   63篇
矿业工程   2篇
能源动力   70篇
轻工业   361篇
水利工程   18篇
石油天然气   9篇
无线电   136篇
一般工业技术   272篇
冶金工业   345篇
原子能技术   16篇
自动化技术   265篇
  2024年   8篇
  2023年   10篇
  2022年   38篇
  2021年   49篇
  2020年   41篇
  2019年   57篇
  2018年   45篇
  2017年   61篇
  2016年   62篇
  2015年   51篇
  2014年   75篇
  2013年   127篇
  2012年   105篇
  2011年   100篇
  2010年   102篇
  2009年   102篇
  2008年   77篇
  2007年   90篇
  2006年   55篇
  2005年   63篇
  2004年   59篇
  2003年   49篇
  2002年   38篇
  2001年   37篇
  2000年   35篇
  1999年   31篇
  1998年   129篇
  1997年   83篇
  1996年   52篇
  1995年   36篇
  1994年   28篇
  1993年   40篇
  1992年   6篇
  1991年   9篇
  1990年   8篇
  1989年   8篇
  1988年   10篇
  1987年   4篇
  1986年   5篇
  1985年   5篇
  1984年   4篇
  1982年   4篇
  1981年   3篇
  1980年   4篇
  1979年   7篇
  1978年   2篇
  1977年   5篇
  1976年   14篇
  1959年   1篇
  1958年   1篇
排序方式: 共有2037条查询结果,搜索用时 15 毫秒
91.
92.
Radio frequency identification (RFID) is a powerful technology that enables wireless information storage and control in an economical way. These properties have generated a wide range of applications in different areas. Due to economic and technological constrains, RFID devices are seriously limited, having small or even tiny computational capabilities. This issue is particularly challenging from the security point of view. Security protocols in RFID environments have to deal with strong computational limitations, and classical protocols cannot be used in this context. There have been several attempts to overcome these limitations in the form of new lightweight security protocols designed to be used in very constrained (sometimes called ultra‐lightweight) RFID environments. One of these proposals is the David–Prasad ultra‐lightweight authentication protocol. This protocol was successfully attacked using a cryptanalysis technique named Tango attack. The capacity of the attack depends on a set of boolean approximations. In this paper, we present an enhanced version of the Tango attack, named Genetic Tango attack, that uses Genetic Programming to design those approximations, easing the generation of automatic cryptanalysis and improving its power compared to a manually designed attack. Experimental results are given to illustrate the effectiveness of this new attack.  相似文献   
93.
Decomposing an input image into its intrinsic shading and reflectance components is a long‐standing ill‐posed problem. We present a novel algorithm that requires no user strokes and works on a single image. Based on simple assumptions about its reflectance and luminance, we first find clusters of similar reflectance in the image, and build a linear system describing the connections and relations between them. Our assumptions are less restrictive than widely‐adopted Retinex‐based approaches, and can be further relaxed in conflicting situations. The resulting system is robust even in the presence of areas where our assumptions do not hold. We show a wide variety of results, including natural images, objects from the MIT dataset and texture images, along with several applications, proving the versatility of our method.  相似文献   
94.
This work proposes a mathematical model for the acclimatization process of a bioreactor treating toxic wastewater. Experimental data was used to identify the changing kinetic parameters of the model as acclimatization progresses. It was found that only one key parameter, the specific biomass growth rate function, changed during the acclimatization process. Therefore, an acclimatization model was proposed to explain the changes of this parameter.  相似文献   
95.
In this article, we present a simple methodology for obtaining algorithms to estimate surface water vapour pressure (e 0) over cloud-free land areas using Moderate Resolution Imaging Spectroradiometer (MODIS) data. The algorithm obtained in this case is adapted to the particular climatic characteristics of the Asturias region, but the methodology can easily be extrapolated and used to obtain algorithms for other regions around the world. The proposed method estimates e 0 from a simple linear combination of the radiances of the MODIS near-infrared (NIR) channels more commonly applied to total precipitable water (W) estimations. Comparison between the e 0 data measured at the ground-based meteorological stations in Asturias (daily data from 2004) versus the values predicted using the proposed algorithm gives R 2 = 0.76 and residual standard error (RSE) = 2.07 hPa (16%). The algorithm was tested using the data from 2008 obtained in Asturias and in two sites outside of Asturias with similar latitudes and radiosonde observations (La Coruña and Santander). The resulting validation demonstrates that the algorithm gives good results in Asturias (root-mean-square deviation (RMSD) = 2.50 hPa (19%) and bias = 1.26 hPa, with R 2 = 0.65) and when La Coruña is included (R 2 = 0.61), but that its validity is decreased when Santander is also included (R 2 = 0.56).

The possibility of obtaining e 0 from three global MODIS algorithms for W retrieval was also tested and compared to our algorithm. The results show that our algorithm gives better results than the International MODIS/Atmospheric InfraRed Sounder Processing Package (IMAPP) Water Vapour Near-Infrared (WVNIR) product and the Sobrino algorithm. The MODIS Total Precipitable Water (MOD05) product is worse than that obtained with our algorithm in Asturias (R 2 = 0.61 vs. R 2 = 0.65), but the two values are similar if the stations in La Coruña (R 2 = 0.60) and Santander (R 2 = 0.56) are included in the comparison. The dominant advantage of the novel algorithm proposed in this study is that it is simpler and can be produced quickly in real time.  相似文献   
96.
Collision avoidance is essential for safe robot manipulation. Especially with humans around, robots should work only when safety can be robustly guaranteed. In this paper, we propose using virtual impedance control for reactive, smooth, and consistent collision avoidance that interferes minimally with the original task. The virtual impedance control operates in the risk space, a vector space describing the possibilities of all forthcoming collisions, and is designed to elude all risks in a consistent response in order to create assuring human-robot interaction experiences. The proposed scheme intrinsically handles kinematic singularity and the activation of avoidance using a boundary layer defined on the spectrum of Jacobian. In cooperation with the original controller, the proposed avoidance scheme provides a proof of convergence if the original controller is stable with and without projection. In simulations and experiments, we verified the characteristics of the proposed control scheme and integrated the system with Microsoft Kinect to monitor the workspace for real-time collision detection and avoidance. The results show that the proposed approach is suitable for robot operation with humans nearby.  相似文献   
97.
98.
We present new methods for uniformly sampling the solid angle subtended by a disk. To achieve this, we devise two novel area‐preserving mappings from the unit square [0,1]2 to a spherical ellipse (i.e. the projection of the disk onto the unit sphere). These mappings allow for low‐variance stratified sampling of direct illumination from disk‐shaped light sources. We discuss how to efficiently incorporate our methods into a production renderer and demonstrate the quality of our maps, showing significantly lower variance than previous work.  相似文献   
99.
Considering that group formation is one of the key processes in collaborative learning, the aim of this paper is to propose a method based on a genetic algorithm approach for achieving inter-homogeneous and intra-heterogeneous groups. The main feature of such a method is that it allows for the consideration of as many student characteristics as may be desired, translating the grouping problem into one of multi-objective optimization. In order to validate our approach, an experiment was designed with 135 college freshmen considering three characteristics: an estimate of student knowledge levels, an estimate of student communicative skills, and an estimate of student leadership skills. Results of such an experiment allowed for the validation, not only from the computational point of view by measuring the algorithmic performance, but also from the pedagogical point of view by measuring student outcomes, and comparing them with two traditional group formation strategies: random and self-organized.  相似文献   
100.
We present an interactive approach for decompositing bitmap drawings and studio photographs into opaque and semi‐transparent vector layers. Semi‐transparent layers are especially challenging to extract, since they require the inversion of the non‐linear compositing equation. We make this problem tractable by exploiting the parametric nature of vector gradients, jointly separating and vectorising semi‐transparent regions. Specifically, we constrain the foreground colours to vary according to linear or radial parametric gradients, restricting the number of unknowns and allowing our system to efficiently solve for an editable semi‐transparent foreground. We propose a progressive workflow, where the user successively selects a semi‐transparent or opaque region in the bitmap, which our algorithm separates as a foreground vector gradient and a background bitmap layer. The user can choose to decompose the background further or vectorise it as an opaque layer. The resulting layered vector representation allows a variety of edits, such as modifying the shape of highlights, adding texture to an object or changing its diffuse colour.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号