首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4168篇
  免费   155篇
  国内免费   10篇
电工技术   47篇
综合类   5篇
化学工业   1026篇
金属工艺   78篇
机械仪表   86篇
建筑科学   291篇
矿业工程   6篇
能源动力   102篇
轻工业   401篇
水利工程   26篇
石油天然气   22篇
无线电   238篇
一般工业技术   662篇
冶金工业   785篇
原子能技术   58篇
自动化技术   500篇
  2022年   46篇
  2021年   42篇
  2020年   42篇
  2019年   50篇
  2018年   51篇
  2017年   73篇
  2016年   83篇
  2015年   54篇
  2014年   96篇
  2013年   282篇
  2012年   138篇
  2011年   197篇
  2010年   181篇
  2009年   157篇
  2008年   180篇
  2007年   182篇
  2006年   172篇
  2005年   141篇
  2004年   131篇
  2003年   122篇
  2002年   101篇
  2001年   86篇
  2000年   68篇
  1999年   66篇
  1998年   92篇
  1997年   80篇
  1996年   56篇
  1995年   59篇
  1994年   70篇
  1993年   58篇
  1992年   51篇
  1991年   49篇
  1990年   56篇
  1989年   66篇
  1988年   61篇
  1987年   36篇
  1986年   58篇
  1985年   58篇
  1984年   61篇
  1983年   51篇
  1982年   52篇
  1981年   55篇
  1980年   46篇
  1979年   57篇
  1978年   58篇
  1977年   46篇
  1976年   44篇
  1975年   32篇
  1974年   31篇
  1973年   37篇
排序方式: 共有4333条查询结果,搜索用时 15 毫秒
91.
In this paper, we aim to provide adaptive multimedia services especially video ones to end-users in an efficient and secure manner. Users moving outside the office should be able to maintain an office-like environment at their current locations. First, the agents within our proposed architecture negotiate the different communication and interaction factors autonomously and dynamically. Moreover, we needed to develop a user agent in addition to service and system agents that could negotiate the requirements and capabilities at run time to furnish best possible service results. Thus we designed and integrated a video indexing and key framing service within our overall agent-based architecture. We integrated this video indexing and content-based analysis service to adapt the video content according to run time conditions. We designed a video XML schema to validate the media content out of this multimedia service according to specific requirements and features, as we will describe later.
Ahmed KarmouchEmail:
  相似文献   
92.
Curved cross-sections extracted from medical volume images are useful for analyzing nonplanar anatomic structures such as the aorta arch or the pelvis. For visualization and for performing distance measurements, extracted surface sections need to be adequately flattened. We present two different distance preserving surface flattening methods which preserve distances according to a user-specified center of interest and according to user-specified orientations. The first method flattens surface sections by preserving distances along surface curves located within planes having a user specified constant orientation. The second method flattens surfaces along curves located within radial planes crossing the center of interest. We study and compare the properties of the two flattening methods by analyzing their distortion maps. Thanks to a multiresolution approach, we provide surface flattening at interactive rates, allowing users to displace their focus point while visualizing the resulting flattened surface. These distance preserving flattening methods provide new means of inspecting curved cross-sections extracted from medical images.  相似文献   
93.
Photometric reconstruction is the process of estimating the illumination and surface reflectance properties of an environment, given a geometric model of the scene and a set of photographs of its surfaces. For mixed-reality applications, such data is required if synthetic objects are to be correctly illuminated or if synthetic light sources are to be used to re-light the scene. Current methods of estimating such data are limited in the practical situations in which they can be applied, due to the fact that the geometric and radiometric models of the scene which are provided by the user must be complete, and that the position (and in some cases, intensity) of the light sources must also be specified a-priori. In this paper, a novel algorithm is presented which overcomes these constraints, and allows photometric data to be reconstructed in less restricted situations. This is achieved through the use of virtual light sources which mimic the effect of direct illumination from unknown luminaires, and indirect illumination reflected off unknown geometry. The intensity of these virtual light sources and the surface material properties are estimated using an iterative algorithm which attempts to match calculated radiance values to those observed in photographs. Results are presented for both synthetic and real scenes that show the quality of the reconstructed data and its use in off-line mixed-reality applications.  相似文献   
94.
Surveyed the extent to which Psychology Today (PT) has maintained an empirical basis for its articles and the degree to which psychologists and individuals with doctorates have been responsible for PT articles. Two samples of PT were selected for review by 2 raters (the present authors). Findings indicate that not only have PT articles significantly shifted away from a presentation of empirically based data, but the proportion of articles authored by psychologists, as well as the educational level of authors, has declined, particularly in the last 3 yrs. (4 ref) (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
95.
DIVAST is a two-dimensional hydrodynamic and water quality numerical model developed for estuarine and coastal modelling. The original model enables the simulation of problems such as pollution and flooding in surface waters. In this paper the existing model is extended to allow the modelling of 2-D groundwater as well as surface water in the same model, using an integrated approach rather than two disparate models. The changes to the original model are summarised and the method of implementation is outlined. The new extended model (DIVAST-SG) is then tested against an analytical solution to verify that the model solves the equations correctly. The model is shown to predict the analytical solution for two different scenarios to within approximately 1 % of the height of flood wave.  相似文献   
96.
In this letter, we examine the computational mechanisms of reinforce-ment-based decision making. We bridge the gap across multiple levels of analysis, from neural models of corticostriatal circuits-the basal ganglia (BG) model (Frank, 2005 , 2006 ) to simpler but mathematically tractable diffusion models of two-choice decision making. Specifically, we generated simulated data from the BG model and fit the diffusion model (Ratcliff, 1978 ) to it. The standard diffusion model fits underestimated response times under conditions of high response and reinforcement conflict. Follow-up fits showed good fits to the data both by increasing nondecision time and by raising decision thresholds as a function of conflict and by allowing this threshold to collapse with time. This profile captures the role and dynamics of the subthalamic nucleus in BG circuitry, and as such, parametric modulations of projection strengths from this nucleus were associated with parametric increases in decision boundary and its modulation by conflict. We then present data from a human reinforcement learning experiment involving decisions with low- and high-reinforcement conflict. Again, the standard model failed to fit the data, but we found that two variants similar to those that fit the BG model data fit the experimental data, thereby providing a convergence of theoretical accounts of complex interactive decision-making mechanisms consistent with available data. This work also demonstrates how to make modest modifications to diffusion models to summarize core computations of the BG model. The result is a better fit and understanding of reinforcement-based choice data than that which would have occurred with either model alone.  相似文献   
97.
It is increasingly common to see computer-based simulation being used as a vehicle to model and analyze business processes in relation to process management and improvement. While there are a number of business process management (BPM) and business process simulation (BPS) methodologies, approaches and tools available, it is more desirable to have a systemic BPS approach for operational decision support, from constructing process models based on historical data to simulating processes for typical and common problems. In this paper, we have proposed a generic approach of BPS for operational decision support which includes business processes modeling and workflow simulation with the models generated. Processes are modeled with event graphs through process mining from workflow logs that have integrated comprehensive information about the control-flow, data and resource aspects of a business process. A case study of a credit card application is presented to illustrate the steps involved in constructing an event graph. The evaluation detail is also given in terms of precision, generalization and robustness. Based on the event graph model constructed, we simulate the process under different scenarios and analyze the simulation logs for three generic problems in the case study: 1) suitable resource allocation plan for different case arrival rates; 2) teamwork performance under different case arrival rates; and 3) evaluation and prediction for personal performances. Our experimental results show that the proposed approach is able to model business processes using event graphs and simulate the processes for common operational decision support which collectively play an important role in process management and improvement.  相似文献   
98.
Perfect fit for people has always been a target for product design. Designers commonly use traditional anthropometric dimensions for 3D product design thus creating a lot of fitting problems when dealing with the complexities of human body shapes. The development of recent 3D anthropometric survey has created an opportunity for complex shape analysis on human model by collecting 3D scan data. Using 3D point cloud data from the SizeChina survey, a methodology of creating a homologous 3D head and face model was demonstrated in this study. Anatomical and virtual landmarks, and surface modeling algorithm based on point cloud data were applied in building the model. The head and face models for all scans had the same amount of vertices with consistent features. The average Chinese models showed obvious differences between male and female. The variations of head and face shapes were analyzed using Principal Component Analysis and the results showed that the largest variations among people were general size, especially for width and depth. However face height, forehead, back of the head, chin and jaw area were also important when describing the 3D shape. The results from this study may be useful in the design of head and facial products.  相似文献   
99.
One of the many complex problems that arise from the transmission and marketing of natural gas is when a shipper draws a contract with a pipeline company to deliver a certain amount of gas among several points. What is actually delivered is often different from the amount that had been originally agreed upon. This phenomenon is called an imbalance. When an imbalance occurs, the pipeline penalizes the shipper by imposing a cash-out penalty policy. Since this penalty is a function of the operating daily imbalances, an important decision-making problem for the shippers is how to carry out their daily imbalances so as to minimize their incurred penalty. In this paper, we introduce the problem of minimizing the cash-out penalty costs from the point of view of a natural gas shipping party. We present a mixed integer bilevel linear programming model and discuss its underlying assumptions. To solve it efficiently, we reformulate it as a standard mathematical program and describe a penalty-function algorithm functions for its solution. The algorithm is well-founded and its convergence is proved. Results of numerical experiments support the algorithm’s robustness providing a valuable solution technique for this very important and complex problem in the natural gas market.  相似文献   
100.
Fault and attack management in all-optical networks   总被引:2,自引:0,他引:2  
Network management for optical networks faces additional security challenges that arise by using transparent optical network components in communication systems. While some available management mechanisms are applicable to different types of network architectures, many of these are not adequate for all-optical networks. These have unique features and requirements in terms of security and quality of service, thus requiring a much more targeted approach in terms of network management. In this article we consider management issues with particular emphasis on complications that arise due to the unique characteristics and peculiar behaviors of transparent network components. In particular, signal quality monitoring is still a major complication in all-optical networks. Despite new methods for detection and localization of attacks having been proposed, no robust standards or techniques exist to date for guaranteeing the quality of service in these networks. Therefore, sophisticated mechanisms that assist in managing and assessing the proper function of transparent network components are highly desirable. Accordingly, we present an algorithm for multiple attack localization and identification that can participate in some tasks for fault management of all-optical networks  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号