首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5731篇
  免费   378篇
  国内免费   13篇
电工技术   109篇
综合类   9篇
化学工业   1621篇
金属工艺   79篇
机械仪表   169篇
建筑科学   218篇
矿业工程   5篇
能源动力   190篇
轻工业   556篇
水利工程   42篇
石油天然气   23篇
无线电   463篇
一般工业技术   948篇
冶金工业   320篇
原子能技术   30篇
自动化技术   1340篇
  2024年   6篇
  2023年   86篇
  2022年   250篇
  2021年   324篇
  2020年   178篇
  2019年   205篇
  2018年   211篇
  2017年   208篇
  2016年   252篇
  2015年   214篇
  2014年   274篇
  2013年   449篇
  2012年   396篇
  2011年   457篇
  2010年   336篇
  2009年   335篇
  2008年   294篇
  2007年   258篇
  2006年   217篇
  2005年   154篇
  2004年   123篇
  2003年   97篇
  2002年   86篇
  2001年   65篇
  2000年   57篇
  1999年   60篇
  1998年   97篇
  1997年   78篇
  1996年   59篇
  1995年   32篇
  1994年   38篇
  1993年   37篇
  1992年   14篇
  1991年   11篇
  1990年   14篇
  1989年   12篇
  1988年   6篇
  1987年   11篇
  1986年   4篇
  1985年   14篇
  1984年   10篇
  1983年   17篇
  1982年   11篇
  1981年   9篇
  1980年   9篇
  1979年   10篇
  1978年   6篇
  1977年   11篇
  1976年   5篇
  1975年   4篇
排序方式: 共有6122条查询结果,搜索用时 0 毫秒
91.
Mobile network providers have developed a variety of location-based services (LBSs), such as friend-finder, point of interest services, emergency rescue and many other safety and security services. The protection of location-privacy has consequently become a key aspect to the success of LBSs, since users consider their own physical location and movements highly privacy-sensitive, and demand for solutions able to protect such an information in a variety of environments. The idea behind location-privacy protection is that the individual should be able to set the level at which the location information is released to avoid undesired exploitation by a potential attacker: one of the approaches to this problem is given by the application of spatial obfuscation techniques, actuated by a trusted agent, and consisting in artificial perturbations of the location information collected by sensing technologies, before its disclosure to third parties. In many situations, however, landscape/map information can help a third party to perform Bayesian inference over spatially obfuscated data and to refine the user’s location estimate up to a violation of the original user’s location-privacy requirements. The goal of this paper is to provide a map-dependent obfuscation procedure that enables the release of the maximum possible user’s location information, that does not lead to a violation of the original user’s location-privacy requirements, even when refined through map-based inference.  相似文献   
92.
A recent focus is on creating engaging user experiences with digital products and services such as voicemail. This study aims to design towards increased levels of engagement in voicemail browsing by using the ‘Richness, Control and Engagement’ (RC & E) framework. This framework explains the levels of engagement in terms of the levels of richness and control that are shaped by the features of a product and the user’s expertise. A product was developed that utilized gestures and sound to access digital voicemail contents. An experiment was conducted in which 28 participants interacted with the product while varying (1) the number of features of the user interface, (2) the amount of voicemail content and (3) the type of task. Results showed that the levels of engagement could be predicted according to the levels of richness and control experienced when a task-term was added to the framework. Implications of the refined RC & E framework for interaction design practice are discussed.  相似文献   
93.
We show on a case study from an autonomous aerospace context how to apply a game-based model-checking approach as a powerful technique for the verification, diagnosis, and adaptation of system behaviors based on temporal properties. This work is part of our contribution within the SHADOWS project, where we provide a number of enabling technologies for model-driven self-healing. We propose here to use GEAR, a game-based model checker, as a user-friendly tool that can offer automatic proofs of critical properties of such systems. Although it is a model checker for the full modal μ-calculus, it also supports derived, more user-oriented logics. With GEAR, designers and engineers can interactively investigate automatically generated winning strategies for the games, by this way exploring the connection between the property, the system, and the proof. This work has been partially supported by the European Union Specific Targeted Research Project SHADOWS (IST-2006-35157), exploring a Self-Healing Approach to Designing cOmplex softWare Systems. The project’s web page is at . This article is an extended version of Renner et al. [18] presented at ISoLA 2007, Poitiers, December 2007.  相似文献   
94.
Anti-reflective (AR) boundary conditions (BC) have been introduced recently in connection with fast deblurring algorithms, both in the case of signals and images. Here we extend such BCs to d dimensions (d ≥ 1) and we study in detail the algebra induced by the AR-BCs, with strongly symmetric point spread functions (PSF), both from a structural and computational point of view. The use of the re-blurring idea and the computational features of the AR-algebra allow us to apply Tikhonov-like techniques within O(n d log(n)) arithmetic operations, where n d is the number of pixels of the reconstructed object. Extensive numerical experimentation concerning 2D images and strongly symmetric PSFs confirms the effectiveness of our proposal.   相似文献   
95.
We consider patches that contain any given 3D polynomial curve as a pregeodesic (i.e. geodesic up to reparametrization). A curve is a pregeodesic if and only if its rectifying plane coincides with the tangent plane to the surface, we use this fact to construct ruled cubic patches through pregeodesics and bicubic patches through pairs of pregeodesics. We also discuss the G1 connection of (1,k) patches with abutting pregeodesics.  相似文献   
96.
PURPOSE: To assess the "in vivo" effect of 13-cis-retinoic acid and low dose Ara-C in MDS as well as to establish "in vitro" advantage of retinoid dose-related growth pattern on bone marrow cultures as defined by culture timing and CFU-GM proliferative response. PATIENTS AND METHODS: We evaluated 28 patients diagnosed of MDS according to FAB classification, of whom 4 cases had RA, 8 cases SRA, 14 cases RAEB and 2 cases RAEB-T. Patients who had RA and SRA were treated with oral 13-cis-retinoic acid at doses of 20-40 mg daily for 4 months and those cases with RAEB and RAEB-T had subcutaneous Ara-C at doses of 3 mg/m2 twice a day for 21 days. The "in vivo" and "in vitro" effect of retinoic acid on the haemopoietic differentiation was evaluated by the growth CFU-GM in semisolid cell culture methods. RESULTS: Increasing in vitro concentrations of 13-cis retinoic acid did not enhance the growth of myelodysplastic progenitors. Nevertheless, our study did not find any beneficial therapeutic effect of retinoic compounds in MDS patients. In this study, low-dose Ara-C (3 mg/m2) showed similar effects when compared with higher doses reported by others. Furthermore, in terms of CFU-GM proliferation the concentration of colonies before and after treatment were fairly similar in all but two patients. CONCLUSIONS: The results drawn from our study demonstrated that there is no beneficial advantage of 13-cis-retinoic acid as a differentiation inducing agent on myelodysplastic patients. In contrast, lower doses of Ara-C showed similar effects on haemopoiesis of MDS patients than standard doses of 10-20 mg/m2 but with less side effects.  相似文献   
97.
With reference to the kinematic wave theory coupled with the hypothesis of constant linear velocity for the rating curve, rising limb analytical solutions have been calculated for overland flow, over an Hortonian-infiltrating surface, and sediment discharge. These analytical solutions are certainly easier to use than the numerical integration of the basic equations and they may be used to obtain an initial evaluation of the parameters of more complex models generally devised for complicated cases.Notation a exponent of the Horton law [T–1] - b exponent of the rill erosion equation - B inter-rill erosion coefficient [MLm–2T m–1] - c sediment concentration [ML–3] - c o reference sediment concentration [ML–3] - E I inter-rill erosion [ML–2T–1] - E R rill erosion [ML–2T–1] - f c final infiltration rate of the soil [LT–1] - f o initial infiltration rate of the soil [LT–1] - h flow depth [L] - h o reference flow depth [L] - i infiltration rate [LT–1] - k rill erosion coefficient [ML–1–b T–1] - K integration constant - L() Laplace transformation - m exponent of the inter-rill erosion equation - n Manning's coefficient [L–1/3T] - p rainfall intensity [LT–1] - q water discharge per unit width [L2T–1] - q s sediment discharge per unit width [ML–1T–1] - t time [T] - t p ponding time [T] - x distance along the flow direction [L] Greek Letters coefficient of the stage-discharge equation [L2–T–1] - exponent of the stage-discharge equation - rill erosion coefficient [L–1]  相似文献   
98.
Two-Photon Lithography, thanks to its very high sub-diffraction resolution, has become the lithographic technique par excellence in applications requiring small feature sizes and complex 3D pattering. Despite this, the fabrication times required for extended structures remain much longer than those of other competing techniques (UV mask lithography, nanoimprinting, etc.). Its low throughput prevents its wide adoption in industrial applications. To increase it, over the years different solutions have been proposed, although their usage is difficult to generalize and may be limited depending on the specific application. A promising strategy to further increase the throughput of Two-Photon Lithography, opening a concrete window for its adoption in industry, lies in its combination with holography approaches: in this way it is possible to generate dozens of foci from a single laser beam, thus parallelizing the fabrication of periodic structures, or to engineer the intensity distribution on the writing plane in a complex way, obtaining 3D microstructures with a single exposure. Here, the fundamental concepts behind high-speed Two-Photon Lithography and its combination with holography are discussed, and the literary production of recent years that exploits such techniques is reviewed, and contextualized according to the topic covered.  相似文献   
99.
Turchet  Luca  Carraro  Marco  Tomasetti  Matteo 《Virtual Reality》2023,27(2):903-915
Virtual Reality - The intersection between sound and music computing and Virtual Reality (VR) has grown significantly over the past decades, amounting to an established area of research today....  相似文献   
100.
The natural instability of an inverted pendulum and its dynamics richness, in terms of nonlinearity, provide a nice apparatus to reproduce behaviors of analogous systems. In this way, it is useful to perform benchmark tests for new control approaches developed. In this paper, we address the main inverted pendulum problems: pendulum stabilization, tracking, and catching swing-up control. We show how robust recursive, control and filtering, techniques improve the system performance. They are developed to solve stochastic problems based on deterministic approaches, in order to decrease the worst influence of uncertainties. Experimental results of the proposed robust approach provide robust stability and performance despite parametric uncertainties, disturbances, and noise effects.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号