首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   928篇
  免费   40篇
  国内免费   1篇
电工技术   18篇
化学工业   251篇
金属工艺   11篇
机械仪表   13篇
建筑科学   31篇
矿业工程   3篇
能源动力   30篇
轻工业   97篇
水利工程   10篇
石油天然气   4篇
无线电   98篇
一般工业技术   133篇
冶金工业   31篇
自动化技术   239篇
  2024年   3篇
  2023年   8篇
  2022年   34篇
  2021年   25篇
  2020年   24篇
  2019年   32篇
  2018年   38篇
  2017年   26篇
  2016年   35篇
  2015年   27篇
  2014年   31篇
  2013年   57篇
  2012年   75篇
  2011年   59篇
  2010年   45篇
  2009年   41篇
  2008年   52篇
  2007年   60篇
  2006年   45篇
  2005年   25篇
  2004年   38篇
  2003年   17篇
  2002年   22篇
  2001年   13篇
  2000年   10篇
  1999年   13篇
  1998年   6篇
  1997年   15篇
  1996年   9篇
  1995年   7篇
  1994年   7篇
  1993年   4篇
  1992年   2篇
  1991年   8篇
  1990年   1篇
  1989年   5篇
  1988年   4篇
  1987年   7篇
  1986年   9篇
  1985年   5篇
  1984年   4篇
  1983年   8篇
  1982年   3篇
  1981年   1篇
  1980年   2篇
  1979年   2篇
  1977年   3篇
  1976年   2篇
排序方式: 共有969条查询结果,搜索用时 15 毫秒
71.
72.
His paper presents a tool facilitating developers of user interfaces (UIs) to experience accessibility limitations that can be posed from various disabilities during the interaction of impaired users with their developments. In this respect, various aspects of visual, hearing, physical and cognitive impairments have been modelled through filters providing approximate, yet, realistic simulations over them. These filters have formed the basis for the developed tool, which can be used either on its own (as a standalone application), or be embedded in the NetBeans Integrated Development Environment. The tool, named DIAS, allows for impairment simulations to be performed over Java, mobile and web applications. Moreover, it integrates two of the most common assistive technologies (ATs), namely a screen reader and a magnifier. As a result, developers of UIs can not only experience how interaction would be affected from various impairments, but they can also understand how their developments would be perceived by impaired users through an AT. This work aims to provide an integrated, practical solution for impairment simulation, which could be easily adopted by developers, thus realistically increasing the possibilities for the future development of interactive applications that are more accessible to users with disabilities.  相似文献   
73.
We study a simple technique, originally presented by Herlihy (ACM Trans. Program. Lang. Syst. 15(5):745–770, 1993), for executing concurrently, in a wait-free manner, blocks of code that have been programmed for sequential execution and require significant synchronization in order to be performed in parallel. We first present an implementation of this technique, called Sim, which employs a collect object. We describe a simple implementation of a collect object from a single shared object that supports atomic Add (or XOR) in addition to read; this implementation has step complexity O(1). By plugging in to Sim this implementation, Sim exhibits constant step complexity as well. This allows us to derive lower bounds on the step complexity of implementations of several shared objects, like Add, XOR, collect, and snapshot objects, from LL/SC objects. We then present a practical version of Sim, called PSim, which is implemented in a real shared-memory machine. From a theoretical perspective, PSim has worse step complexity than Sim, its theoretical analog; in practice though, we experimentally show that PSim is highly-efficient: it outperforms several state-of-the-art lock-based and lock-free synchronization techniques, and this given that it is wait-free, i.e. that it satisfies a stronger progress condition than all the algorithms that it outperforms. We have used PSim to get highly-efficient wait-free implementations of stacks and queues.  相似文献   
74.
The present work proposes a systematic methodology for the optimal selection of controller parameters in the sense of minimizing a performance index, which is a quadratic function of the tracking error and the control effort. The performance index is calculated explicitly as an algebraic function of the controller parameters by solving Zubov's partial differential equation (PDE). Standard optimization techniques are then employed for the calculation of the optimal values of the controller parameters. The solution of Zubov's PDE is also used to estimate the closed-loop stability region for the chosen values of the controller parameters. The proposed approach is finally illustrated in a chemical reactor control problem.  相似文献   
75.
76.
Probabilistic model checking for the quantification of DoS security threats   总被引:1,自引:0,他引:1  
Secure authentication features of communication and electronic commerce protocols involve computationally expensive and memory intensive cryptographic operations that have the potential to be turned into denial-of-service (DoS) exploits. Recent proposals attempt to improve DoS resistance by implementing a trade-off between the resources required for the potential victim(s) with the resources used by a prospective attacker. Such improvements have been proposed for the Internet Key Exchange (IKE), the Just Fast Keying (JFK) key agreement protocol and the Secure Sockets Layer (SSL/TLS) protocol. In present article, we introduce probabilistic model checking as an efficient tool-assisted approach for systematically quantifying DoS security threats. We model a security protocol with a fixed network topology using probabilistic specifications for the protocol participants. We attach into the protocol model, a probabilistic attacker model which performs DoS related actions with assigned cost values. The costs for the protocol participants and the attacker reflect the level of some resource expenditure (memory, processing capacity or communication bandwidth) for the associated actions. From the developed model we obtain a Discrete Time Markov Chain (DTMC) via property preserving discrete-time semantics. The DTMC model is verified using the PRISM model checker that produces probabilistic estimates for the analyzed DoS threat. In this way, it is possible to evaluate the level of resource expenditure for the attacker, beyond which the likelihood of widespread attack is reduced and subsequently to compare alternative design considerations for optimal resistance to the analyzed DoS threat. Our approach is validated through the analysis of the Host Identity Protocol (HIP). The HIP base-exchange is seen as a cryptographic key-exchange protocol with special features related to DoS protection. We analyze a serious DoS threat, for which we provide probabilistic estimates, as well as results for the associated attacker and participants' costs.  相似文献   
77.
To safely and efficiently guide personnel of search and rescue operations in disaster areas, swift gathering of relevant information such as the locations of victims, must occur. Using the concept of ‘repellent virtual pheromones’ inspired by insect colony coordination behaviors, miniature robots can be quickly dispersed to survey a disaster site. Assisted by visual servoing, dispersion of the miniature robots can quickly cover an area. An external observer such as another robot or an overhead camera is brought into the control loop to provide each miniature robot estimations of the positions of all of the other near-by robots in the robotic team. These miniature robots can then move away from the other near-by robots on the team, resulting in the robot collective becoming swiftly distributed through the local area. The technique has been simulated with differing pheromone persistence levels and implemented using the miniature Scout robots, developed by the Center for Distributed Robotics at the University of Minnesota, which are well-suited to surveillance and reconnaissance missions.  相似文献   
78.
In this paper, we strive towards the development of efficient techniques in order to segment document pages resulting from the digitization of historical machine-printed sources. This kind of documents often suffer from low quality and local skew, several degradations due to the old printing matrix quality or ink diffusion, and exhibit complex and dense layout. To face these problems, we introduce the following innovative aspects: (i) use of a novel Adaptive Run Length Smoothing Algorithm (ARLSA) in order to face the problem of complex and dense document layout, (ii) detection of noisy areas and punctuation marks that are usual in historical machine-printed documents, (iii) detection of possible obstacles formed from background areas in order to separate neighboring text columns or text lines, and (iv) use of skeleton segmentation paths in order to isolate possible connected characters. Comparative experiments using several historical machine-printed documents prove the efficiency of the proposed technique.  相似文献   
79.
In this paper, a novel multi-view human movement recognition method is presented. A novel representation of multi-view human movement videos is proposed that is based on learning basic multi-view human movement primitives, called multi-view dynemes. The movement video is represented in a new feature space (called dyneme space) using these multi-view dynemes, thus producing a time invariant multi-view movement representation. Fuzzy distances from the multi-view dynemes are used to represent the human body postures in the dyneme space. Three variants of Linear Discriminant Analysis (LDA) are evaluated to achieve a discriminant movement representation in a low dimensionality space. The view identification problem is solved either by using a circular block shift procedure followed by the evaluation of the minimum Euclidean distance from any dyneme, or by exploiting the circular shift invariance property of the Discrete Fourier Transform (DFT). The discriminant movement representation combined with camera viewpoint identification and a nearest centroid classification step leads to a high human movement classification accuracy.  相似文献   
80.
Chremmos I  Uzunoglu N 《Applied optics》2007,46(31):7730-7738
The resonant properties of a closed and symmetric cyclic array of N coupled microring resonators (coupled-microring resonator regular N-gon) are for the first time determined analytically by applying the transfer matrix approach and Floquet theorem for periodic propagation in cylindrically symmetric structures. By solving the corresponding eigenvalue problem with the field amplitudes in the rings as eigenvectors, it is shown that, for even or odd N, this photonic molecule possesses 1 + N/2 or 1+N resonant frequencies, respectively. The condition for resonances is found to be identical to the familiar dispersion equation of the infinite coupled-microring resonator waveguide with a discrete wave vector. This result reveals the so far latent connection between the two optical structures and is based on the fact that, for a regular polygon, the field transfer matrix over two successive rings is independent of the polygon vertex angle. The properties of the resonant modes are discussed in detail using the illustration of Brillouin band diagrams. Finally, the practical application of a channel-dropping filter based on polygons with an even number of rings is also analyzed.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号