首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   38103篇
  免费   2831篇
  国内免费   888篇
电工技术   1488篇
技术理论   1篇
综合类   1383篇
化学工业   7229篇
金属工艺   1778篇
机械仪表   2297篇
建筑科学   2090篇
矿业工程   573篇
能源动力   1345篇
轻工业   2829篇
水利工程   422篇
石油天然气   1340篇
武器工业   118篇
无线电   5502篇
一般工业技术   6079篇
冶金工业   2133篇
原子能技术   498篇
自动化技术   4717篇
  2024年   65篇
  2023年   556篇
  2022年   809篇
  2021年   1473篇
  2020年   1014篇
  2019年   1001篇
  2018年   1085篇
  2017年   1236篇
  2016年   1236篇
  2015年   1320篇
  2014年   1821篇
  2013年   2442篇
  2012年   2457篇
  2011年   2789篇
  2010年   2165篇
  2009年   2259篇
  2008年   2106篇
  2007年   1821篇
  2006年   1871篇
  2005年   1624篇
  2004年   1265篇
  2003年   1143篇
  2002年   1158篇
  2001年   839篇
  2000年   787篇
  1999年   850篇
  1998年   951篇
  1997年   701篇
  1996年   627篇
  1995年   470篇
  1994年   390篇
  1993年   282篇
  1992年   238篇
  1991年   172篇
  1990年   141篇
  1989年   129篇
  1988年   119篇
  1987年   88篇
  1986年   62篇
  1985年   51篇
  1984年   44篇
  1983年   20篇
  1982年   33篇
  1981年   22篇
  1980年   12篇
  1979年   17篇
  1978年   8篇
  1977年   7篇
  1976年   14篇
  1973年   7篇
排序方式: 共有10000条查询结果,搜索用时 328 毫秒
991.
基于深度图像的非接触式呼吸检测算法研究   总被引:1,自引:0,他引:1       下载免费PDF全文
呼吸是人的基本生命活动,监测呼吸可以得知呼吸道和胸廓运动的生理、病理学状态,对某些呼吸系统疾病的诊断有重要的参考价值;提出了一种非接触式呼吸监测方法:对红外视频流中的每帧胸腹部区域数据进行降维,计算所有胸腹部区域数据的方差,将一定时间段内的方差序列进行低通滤波;最后根据方差序列可以获得该段时间内的呼吸频率和呼吸暂停时间;提出的非接触式呼吸检测算法在不影响被监测者正常睡眠活动的情况下,可以准确获取呼吸频率与其他相关参数,为健康监测和相关疾病的诊断提供了数据支持;日常家居场景的实验中,检测到的呼吸次数与实际完全一致,并且与实际胸腹部起伏变化基本同步,较好的保证了结果的准确性。  相似文献   
992.
This paper investigates the attainability of the minimum average data rate for stabilization of linear systems via logarithmic quantization. It is shown that a finite-level logarithmic quantizer suffices to approach the well-known minimum average data rate for stabilizing an unstable linear discrete-time system under two basic network configurations. In particular, we derive explicit finite-level logarithmic quantizers and the corresponding controllers to approach the minimum average data rate.  相似文献   
993.
Target sales rebate (TSR) contracts have been shown to be useful in coordinating supply chains with risk-neutral agents. However, there have been few studies on the cases with risk sensitive agents. As a result, based on the classic Markowitz portfolio theory in finance, we carry out in this paper a mean–variance (MV) analysis of supply chains under TSR contracts. We study a supply chain with a single supplier and a single risk averse retailer. We propose TSR contracts for achieving coordination. We demonstrate how TSR contracts can coordinate the supply chain which takes into consideration the degree of risk aversion of the retailer. We find that the supplier can coordinate the channel with flexible TSR contracts. In addition, we extend the supply chain model to include sales effort decision of the retailer. Conditions for TSR contracts to coordinate the supply chain with sales effort of retailer are also derived.  相似文献   
994.
A signature-based intrusion detection system identifies intrusions by comparing the data traffic with known signature patterns. In this process, matching of packet strings against signature patterns is the most time-consuming step and dominates the overall system performance. Many signature-based network intrusion detection systems (NIDS), e.g., the Snort, employ one or multiple pattern matching algorithms to detect multiple attack types. So far, many pattern matching algorithms have been proposed. Most of them use single-byte standard unit for search, while a few algorithms such as the Modified Wu-Manber (MWM) algorithm use typically two-byte unit, which guarantees better performance than others even as the number of different signatures increases. Among those algorithms, the MWM algorithm has been known as the fastest pattern matching algorithm when the patterns in a rule set rarely appear in packets. However, the matching time of the MWM algorithm increases as the length of the shortest pattern in a signature group decreases.In this paper, by extending the length of the shortest pattern, we minimize the pattern matching time of the algorithm which uses multi-byte unit. We propose a new pattern matching algorithm called the L+1-MWM algorithm for multi-pattern matching. The proposed algorithm minimizes the performance degradation that is originated from the dependency on the length of the shortest pattern. We show that the L+1-MWM algorithm improves the performance of the MWM algorithm by as much as 20% in average under various lengths of shortest patterns and normal traffic conditions. Moreover, when the length of the shortest pattern in a rule set is less than 5, the L+1-MWM algorithm shows 38.87% enhancement in average. We also conduct experiments on a real campus network and show that 12.48% enhancement is obtained in average. In addition, it is shown that the L+1-MWM algorithm provides a better performance than the MWM algorithm by as much as 25% in average under various numbers of signatures and normal traffic conditions, and 20.12% enhancement in average with real on-line traffic.  相似文献   
995.
We propose a novel 2D image-based approach that can simultaneously handle illumination and pose variations to enhance face recognition rate. It is much simpler, requires much less computational effort than the methods based on 3D models, and provides a comparable or better recognition rate.  相似文献   
996.
RFID has emerged as a potential tool to combat product counterfeiting, which undermines the global economy hugely. Recently, a number of anti-counterfeiting approaches have been proposed for such purpose. This paper presents a track-and-trace system for RFID-based anti-counterfeiting, and addresses possible implementation issues, such as tag selection, product tagging, tag programming and locking. A packaging line for bottled products is developed and integrated with the proposed system for investigation of these issues. Experiments are conducted to determine the critical tag moving speed beyond which the tag programming rate or reliability of tagged products being transferred on a convey drops significantly. The critical tag moving speed is vital not only for determining the maximum production throughput possible, but also for setting up RFID equipment needed to ensure tagged products with erroneous tagging can be sorted out from the packaging line accordingly.  相似文献   
997.
We propose a new partial correlation approach using Gaussian copula. Our empirical study found that the Gaussian copula partial correlation has the same value as that which is obtained by performing a Pearson’s partial correlation. With the proposed method, based on canonical vine and d-vine, we captured direct interactions among eight histone genes.  相似文献   
998.
Tap-n-drag is a popular navigation method for small touch-screen interfaces. When an information space is too large compared to the touch-screen size, navigating the information space using tap-n-drag requires too many drags, resulting in poor usability such as long navigation time or fatigue. In this study, the effect of control-to-display gain on the usability of tap-n-drag was experimentally investigated to determine whether increasing the control-to-display gain can resolve this problem. The effect of movement direction of the information space relative to the drag direction was also investigated (push background vs. push viewport). In experiments, increasing control-to-display gain seemed to increase the usability of tap-n-drag, but excessively large gain seemed to have the opposite effect on some measures such as task completion time, ease of use and overall preference; as a result these measures-vs.-GAIN curves were U-shaped or inverted-U-shaped. Overall, both task completion time and number of touches required to locate a target were lower when using push viewport than when using push background, except at GAIN = 1.

Relevance to industry

The results of this study can be used to enhance the usability of tap-n-drag and other navigation methods in small touch-screen devices when users navigate a large information space.  相似文献   
999.

Objective

To control the workflow for surgical patients, we in-cooperate radio-frequency identification (RFID) technology to develop a Patient Advancement Monitoring System (PAMS) in operation theater.

Methods

The web-based PAMS is designed to monitor the whole workflow for the handling of surgical patients. The system integrates multiple data entry ports Across the multi-functional surgical teams. Data are entered into the system through RFID, bar code, palm digital assistance (PDA), ultra-mobile personal computer (UMPC), or traditional keyboard at designated checkpoints. Active radio-frequency identification (RFID) tag can initiate data demonstration on the computer screens upon a patient's arrival at any particular checkpoint along the advancement pathway.

Results

The PAMS can manage the progress of operations, patient localization, identity verification, and peri-operative care. The workflow monitoring provides caregivers’ instant information sharing to enhance management efficiency.

Conclusion

RFID-initiate surgical workflow control is valuable to meet the safety, quality, efficiency requirements in operation theater.  相似文献   
1000.
通过对Apriori算法的研究和分析,结合算法存在的缺陷,利用"桶"技术及压缩组合项集技术,对频繁项集提出了前缀概念,并提出了基于前缀的频繁项集挖掘算法。该算法将具有同一前缀的频繁项集的子集合作为一个节点,由频繁k-项集的子集合直接产生候选(k+1)-项集,从而省略了连接步中判断I1、I2是否能连接。同时,该算法使得整个程序中节点数目减少,这样不仅减少了内存消耗,而且提高了查找Ck和Lk的速度,尤其便于大型数据库的分布式处理。经实验证实,改进后的算法是可行的。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号