首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4069篇
  免费   216篇
  国内免费   6篇
电工技术   35篇
综合类   4篇
化学工业   1017篇
金属工艺   42篇
机械仪表   69篇
建筑科学   133篇
矿业工程   10篇
能源动力   149篇
轻工业   712篇
水利工程   39篇
石油天然气   17篇
无线电   342篇
一般工业技术   547篇
冶金工业   270篇
原子能技术   37篇
自动化技术   868篇
  2024年   4篇
  2023年   47篇
  2022年   140篇
  2021年   169篇
  2020年   103篇
  2019年   129篇
  2018年   136篇
  2017年   142篇
  2016年   181篇
  2015年   123篇
  2014年   231篇
  2013年   326篇
  2012年   307篇
  2011年   301篇
  2010年   234篇
  2009年   234篇
  2008年   214篇
  2007年   202篇
  2006年   129篇
  2005年   111篇
  2004年   94篇
  2003年   95篇
  2002年   76篇
  2001年   50篇
  2000年   40篇
  1999年   48篇
  1998年   106篇
  1997年   63篇
  1996年   45篇
  1995年   31篇
  1994年   27篇
  1993年   27篇
  1992年   22篇
  1991年   9篇
  1990年   14篇
  1989年   18篇
  1988年   9篇
  1987年   7篇
  1986年   4篇
  1985年   6篇
  1984年   1篇
  1983年   3篇
  1982年   3篇
  1981年   3篇
  1980年   1篇
  1979年   2篇
  1978年   7篇
  1977年   3篇
  1976年   13篇
  1974年   1篇
排序方式: 共有4291条查询结果,搜索用时 0 毫秒
31.
Experiences applying standards in personal health devices (PHDs) show an inherent trade-off between interoperability and costs (in terms of processing load and development time). Therefore, reducing hardware and software costs as well as time-to-market is crucial for standards adoption. The ISO/IEEE11073 PHD family of standards (also referred to as X73PHD) provides interoperable communication between PHDs and aggregators. Nevertheless, the responsibility of achieving inexpensive implementations of X73PHD in limited resource microcontrollers falls directly on the developer. Hence, the authors previously presented a methodology based on patterns to implement X73-compliant PHDs into devices with low-voltage low-power constraints. That version was based on multitasking, which required additional features and resources. This paper therefore presents an event-driven evolution of the patterns-based methodology for cost-effective development of standardized PHDs. The results of comparing between the two versions showed that the mean values of decrease in memory consumption and cycles of latency are 11.59% and 45.95%, respectively. In addition, several enhancements in terms of cost-effectiveness and development time can be derived from the new version of the methodology. Therefore, the new approach could help in producing cost-effective X73-compliant PHDs, which in turn could foster the adoption of standards.  相似文献   
32.
The aim of this research is to analyse the effectiveness of the Chicago Board Options Exchange Market Volatility Index (VIX) when used with Support Vector Machines (SVMs) in order to forecast the weekly change in the S&P 500 index. The data provided cover the period between 3 January 2000 and 30 December 2011. A trading simulation is implemented so that statistical efficiency is complemented by measures of economic performance. The inputs retained are traditional technical trading rules commonly used in the analysis of equity markets such as Relative Strength Index, Moving Average Convergence Divergence, VIX and the daily return of the S&P 500. The SVM identifies the best situations in which to buy or sell in the market. The two outputs of the SVM are the movement of the market and the degree of set membership. The obtained results show that SVM using VIX produce better results than the Buy and Hold strategy or SVM without VIX. The influence of VIX in the trading system is particularly significant when bearish periods appear. Moreover, the SVM allows the reduction in the Maximum Drawdown and the annualised standard deviation.  相似文献   
33.
The complexity of new information technologies (IT) may limit the access of elderly people to the information society, exacerbating what is known as “the digital divide,” as they appear to be too challenging for elderly citizens regardless of the integrity of their cognitive status. This study is an attempt to clarify how some cognitive functions (such as attention or verbal memory) may determine the interaction of cognitively impaired elderly people with technology. Twenty participants ranging from mild cognitive impairment to moderate Alzheimer’s disease were assessed by means of a neuropsychological and functional battery and were asked to follow simple commands from an avatar appearing on a TV by means of a remote control, such as asking the participant to confirm their presence or to respond Yes/No to a proposal to see a TV program. The number of correct answers and command repetitions required for the user to respond were registered. The results show that participants with a better cognitive and functional state in specific tests show a significantly better performance in the TV task. The derived conclusion is that neuropsychological assessment may be used as a useful complementary tool for assistive technology developers in the adaptation of IT to the elderly with different cognitive and functional profiles. Further studies with larger samples are required to determine to what extent cognitive functions can actually predict older users’ interaction with technology.  相似文献   
34.
This work focuses on camera-based systems that are designed for mouse replacement. Usually, these interfaces are based on computer vision techniques that capture the user’s face or head movements and are specifically designed for users with disabilities. The work identifies and reviews the key factors of these interfaces based on the lessons learnt by the authors’ experience and by a comprehensive analysis of the literature to describe the specific points to consider in their design. These factors are as follows: user features to track, initial user detection (calibration), position mapping, feedback, error recovery, event execution, profiles and ergonomics of the system. The work compiles the solutions offered by different systems to help new designers avoid problems already discussed by the others.  相似文献   
35.
36.
The influence of aging on computer interaction has been widely analyzed in human–computer interaction research literature. Despite this, there are no age-based user maps that could support the user-interface customization. Studying the specific needs and constraints of these groups is crucial in order to adapt a user interface to the user’s interaction requirements. This work studies the performance of a sample of participants on three different basic tasks (pointing, dragging and dropping, and text selection) and the influence of age for each of them. It is concluded that this influence differs between specific activities. A group profile map that can support automatic classification in the future has been obtained.  相似文献   
37.
End-effectors are usually related to the location of limbs, and their reliable detection enables robust body tracking as well as accurate pose estimation. Recent innovation in depth cameras has re-stated the pose estimation problem. We focus on the information provided by these sensors, for which we borrow the name 2.5D data from the Graphics community. In this paper we propose a human pose estimation algorithm based on topological propagation. Geometric Deformable Models are used to carry out such propagation, implemented according to the Narrow Band Level Set approach. A variant of the latter method is proposed, including a density restriction which helps preserving the topological properties of the object under analysis. Principal end-effectors are extracted from a directed graph weighted with geodesic distances, also providing a skeletal-like structure describing human pose. An evaluation against reference methods is performed with promising results. The proposed solution allows a frame-wise end-effector detection, with no temporal tracking involved, which may be generalized to the tracking of other objects beyond human body.  相似文献   
38.
Recent vehicular routing proposals use real-time road traffic density estimates to dynamically select forwarding paths. Estimating the traffic density in vehicular ad hoc networks requires the transmission of additional dedicated messages increasing the communications load. These proposals are generally based on unicast sender-based forwarding schemes. The greedy nature of sender-based forwarding can result in the selection of forwarders with weak radio links that might compromise the end-to-end performance. To overcome these limitations, this paper presents TOPOCBF, a novel contention-based broadcast forwarding protocol that dynamically selects forwarding paths based on their capability to route packets between anchor points. Such capability is estimated by means of a multi-hop connectivity metric. The obtained results demonstrate that TOPOCBF can provide good packet delivery ratios while reducing the communications load compared to unicast sender-based forwarding schemes using road traffic density estimates.  相似文献   
39.
In this paper, a fuzzy based Variable Structure Control (VSC) with guaranteed stability is presented. The main objective is to obtain an improved performance of highly non-linear unstable systems. The main contribution of this work is that, firstly, new functions for chattering reduction and error convergence without sacrificing invariant properties are proposed, which is considered the main drawback of the VSC control. Secondly, the global stability of the controlled system is guaranteed.The well known weighting parameters approach, is used in this paper to optimize local and global approximation and modeling capability of T-S fuzzy model.A one link robot is chosen as a nonlinear unstable system to evaluate the robustness, effectiveness and remarkable performance of optimization approach and the high accuracy obtained in approximating nonlinear systems in comparison with the original T-S model. Simulation results indicate the potential and generality of the algorithm. The application of the proposed FLC-VSC shows that both alleviation of chattering and robust performance are achieved with the proposed FLC-VSC controller. The effectiveness of the proposed controller is proven infront of disturbances and noise effects.  相似文献   
40.
In public key encryption schemes with a double decryption mechanism (DD-PKE), decryption can be done in either of two ways: by the user owning the secret/public key pair corresponding to the ciphertext, or by a trusted party holding a sort of master secret-key. In this note we argue that the classical security notion for standard public key encryption schemes does not suffice for DD-PKE schemes, and propose a new natural definition. Additionally, we illustrate the usefulness of the new security definition by showing that a DD-PKE scheme presented in the workshop Selected Areas in Cryptography 2005 is insecure under this augmented security notion.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号