首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3234篇
  免费   73篇
  国内免费   3篇
电工技术   39篇
综合类   1篇
化学工业   432篇
金属工艺   53篇
机械仪表   53篇
建筑科学   98篇
矿业工程   7篇
能源动力   40篇
轻工业   341篇
水利工程   16篇
石油天然气   6篇
无线电   215篇
一般工业技术   439篇
冶金工业   1136篇
原子能技术   17篇
自动化技术   417篇
  2022年   20篇
  2021年   33篇
  2020年   36篇
  2019年   42篇
  2018年   37篇
  2017年   41篇
  2016年   37篇
  2015年   33篇
  2014年   52篇
  2013年   137篇
  2012年   89篇
  2011年   118篇
  2010年   92篇
  2009年   85篇
  2008年   110篇
  2007年   117篇
  2006年   100篇
  2005年   76篇
  2004年   76篇
  2003年   73篇
  2002年   77篇
  2001年   50篇
  2000年   60篇
  1999年   80篇
  1998年   278篇
  1997年   185篇
  1996年   126篇
  1995年   76篇
  1994年   78篇
  1993年   88篇
  1992年   40篇
  1991年   35篇
  1990年   31篇
  1989年   42篇
  1988年   30篇
  1987年   29篇
  1986年   32篇
  1985年   40篇
  1984年   26篇
  1983年   31篇
  1982年   39篇
  1981年   34篇
  1980年   37篇
  1979年   26篇
  1978年   22篇
  1977年   27篇
  1976年   49篇
  1975年   24篇
  1973年   13篇
  1963年   13篇
排序方式: 共有3310条查询结果,搜索用时 0 毫秒
41.
The purpose of this paper is to introduce an effective and structured methodology for carrying out a biometric system sensitivity analysis. The goal of sensitivity analysis is to provide the researcher/developer with insight and understanding of the key factors—algorithmic, subject-based, procedural, image quality, environmental, among others—that affect the matching performance of the biometric system under study. This proposed methodology consists of two steps: (1) the design and execution of orthogonal fractional factorial experiment designs which allow the scientist to efficiently investigate the effect of a large number of factors—and interactions—simultaneously, and (2) the use of a select set of statistical data analysis graphical procedures which are fine-tuned to unambiguously highlight important factors, important interactions, and locally-optimal settings. We illustrate this methodology by application to a study of VASIR (Video-based Automated System for Iris Recognition)—NIST iris-based biometric system. In particular, we investigated k = 8 algorithmic factors from the VASIR system by constructing a (26?1 × 31  × 41) orthogonal fractional factorial design, generating the corresponding performance data, and applying an appropriate set of analysis graphics to determine the relative importance of the eight factors, the relative importance of the 28 two-term interactions, and the local best settings of the eight algorithms. The results showed that VASIR’s performance was primarily driven by six factors out of the eight, along with four two-term interactions. A virtue of our two-step methodology is that it is systematic and general, and hence may be applied with equal rigor and effectiveness to other biometric systems, such as fingerprints, face, voice, and DNA.  相似文献   
42.
Since 2002, the Royal Air Force (RAF) has been working towards developing role-related physical tests for use as an operational fitness test (OFT). The purpose of this study was to establish reliability of the OFT (comprising four tests), investigate gym-based tests as predictors of performance and establish performance standards. Fifty-eight RAF personnel performed the OFT on three occasions. A separate cohort carried out fitness and anthropometric tests before performing the OFT, by way of establishing performance predictors. Documented evidence and views of an expert panel were used to determine OFT standards. Reliability ranged from moderate to good for three tests, with one test (Dig) showing poor reliability. The 95% limits of agreement for the prediction models ranged from good to poor (6.7-34.2%). The prediction models were not sufficiently accurate to estimate confidently OFT performance, but could be used as a guide to quantify likely outcome and training needs.  相似文献   
43.
Given the prevalence of computers in education today, it is critical to understand teachers’ perspectives regarding computer integration in their classrooms. The current study surveyed a random sample of a heterogeneous group of 185 elementary and 204 secondary teachers in order to provide a comprehensive summary of teacher characteristics and variables that best discriminate between teachers who integrate computers and those who do not. Discriminant Function Analysis indicated seven variables for elementary teachers and six for secondary teachers (accounting for 74% and 68% of the variance, respectively) that discriminated between high and low integrators. Variables included positive teaching experiences with computers; teacher’s comfort with computers; beliefs supporting the use of computers as an instructional tool; training; motivation; support; and teaching efficacy. Implications for support of computer integration in the classroom are discussed.  相似文献   
44.
Perovskite light-emitting diodes (PeLEDs) are advancing because of their superior external quantum efficiencies (EQEs) and color purity. Still, additional work is needed for blue PeLEDs to achieve the same benchmarks as the other visible colors. This study demonstrates an extremely efficient blue PeLED with a 488 nm peak emission, a maximum luminance of 8600 cd m−2, and a maximum EQE of 12.2% by incorporating the double-sided ethane-1,2-diammonium bromide (EDBr2) ligand salt along with the long-chain ligand methylphenylammonium chloride (MeCl). The EDBr2 successfully improves the interaction between 2D perovskite layers by reducing the weak van der Waals interaction and creating a Dion–Jacobson (DJ) structure. Whereas the pristine sample (without EDBr2) is inhibited by small stacking number (n) 2D phases with nonradiative recombination regions that diminish the PeLED performance, adding EDBr2 successfully enables better energy transfer from small n phases to larger n phases. As evidenced by photoluminescence (PL), scanning electron microscopy (SEM), and atomic force microscopy (AFM) characterization, EDBr2 improves the morphology by reduction of pinholes and passivation of defects, subsequently improving the efficiencies and operational lifetimes of quasi-2D blue PeLEDs.  相似文献   
45.
Saha  Surojit  Elhabian  Shireen  Whitaker  Ross 《Machine Learning》2022,111(11):4003-4038
Machine Learning - Mapping data from and/or onto a known family of distributions has become an important topic in machine learning and data analysis. Deep generative models (e.g., generative...  相似文献   
46.
This paper examines the dynamics of entrepreneurial acquisitions undertaken by UK high growth small and medium enterprises (SMEs). While entrepreneurial acquisitions are increasingly deployed by SMEs, little is known about their antecedents, motivational drivers and organisational outcomes. Drawing on detailed case study evidence from Scotland, the key factor found to be driving these acquisitions was the desire to augment and exploit technological complementarities between the acquiring and acquired firms. Acquisition can therefore be conceptualised as an advanced stage of the outside-in ‘open innovation’ strategies proactively used within these innovative SMEs. Firms executing this strategy typically have an acute propensity for risk, a desire for close customer engagement, effective business models and strong external orientation. The work suggests that greater attention should be paid within M&A theory to the dynamics of these types of smaller scale entrepreneurial acquisitions.  相似文献   
47.
This paper investigates detecting significant increases in communication patterns and levels between small groups of individuals within a moderate‐size targeted group. Potential applications range from trying to establish emerging thought leaders within an organisation to the detection of the planning stages of a crime. The scan statistic is a popular choice for monitoring and detecting spatio‐temporal outbreaks, but it is difficult to apply to large‐scale target groups because of the computational effort required. When monitoring communication levels between thousands of people, the number of combinations of people whose communication may have increased is very high, and to scan through all of these to find which combinations have increased communications significantly is an enormous task. A successful surveillance plan will have early communication outbreak detection properties and good diagnostic capabilities for identifying individuals contributing to this outbreak. This paper proposes a new computationally feasible approach for detecting communication outbreaks based on exponentially weighted moving average smoothed communication counts between individuals within the network. We apply a cumulative sum of ordered signal‐to‐noise (SN) ratios for communication counts to flag significant departures from their respective median values. This plan is demonstrated to be efficient at detecting changes in communication levels for a small part of the network and diagnosing who is involved in the outbreak. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   
48.
People who are totally blind or who have vevere visual impairments (e.g. less than 20/200 acuity, central macular scotomas, or advanced diabetic retinopathy) see the environment in a fashion that may be completely foreign to those who operate in a very visual fashion. For this population, the visual complexity of the environment is not a concern. What is of concern are salient features found within the environment that relate to their ability to navigate successfully in, and/or interact with, the environment as needed. Toward the purpose of representing these salient features in comprehensive form, investigators at the Atlanta Veterans Affairs Research and Development Center are employing wearable computer technology to develop a virtual environment interface. The long-range goal is to create a simplistic virtual representation of the environment that includes only features related to the current navigational task and/or interactive needs of the person. In a completed study, the use of digital infrared transmitters as beacons representing salient features of the environment was explored. The purpose of a current study now in progress is to evaluate and compare various user interface structures that were suggested by subjects during the preliminary study. The problem of interest in the current study is street-crossing; however, the results of this research should be applicable to many other problems, including identifying and locating building entrances, and identifying, locating and interacting with electronic devices such as information kiosks, automated teller machines, and self-serve point-of-sale terminals. The long-range result desired is a wearable computer with which one can easily identify and interact with a wide variety of devices in the environment via one familiar, easy-to-use interface.  相似文献   
49.
50.
The Youth Risk Behavior Surveillance System (YRBSS) monitors priority health-risk behaviors among US high school students. To better understand the ramifications of changing the YRBSS from paper-and-pencil to Web administration, in 2008 the Centers for Disease Control and Prevention conducted a study comparing these two modes of administration. Eighty-five schools in 15 states agreed to participate in the study. Within each participating school, four classrooms of students in grades 9 or 10 were randomly assigned to complete the Youth Risk Behavior Survey questionnaire in one of four conditions (in-class paper-and-pencil, in-class Web without programmed skip patterns, in-class Web with programmed skip patterns, and “on your own” Web without programmed skip patterns). Findings included less missing data for the paper-and-pencil condition (1.5% vs. 5.3%, 4.4%, 6.4%; p < .001), less perceived privacy and anonymity among respondents for the in-class Web conditions, and a lower response rate for the “on your own” Web condition than for in-class administration by either mode (28.0% vs. 91.2%, 90.1%, 91.4%; p < .001). Although Web administration might be useful for some surveys, these findings do not favor the use of a Web survey for the YRBSS.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号