首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   24368篇
  免费   2780篇
  国内免费   1305篇
电工技术   6425篇
技术理论   2篇
综合类   1220篇
化学工业   1096篇
金属工艺   313篇
机械仪表   1070篇
建筑科学   539篇
矿业工程   214篇
能源动力   3061篇
轻工业   215篇
水利工程   496篇
石油天然气   815篇
武器工业   99篇
无线电   2535篇
一般工业技术   1291篇
冶金工业   383篇
原子能技术   133篇
自动化技术   8546篇
  2024年   131篇
  2023年   468篇
  2022年   760篇
  2021年   924篇
  2020年   945篇
  2019年   836篇
  2018年   722篇
  2017年   966篇
  2016年   978篇
  2015年   1044篇
  2014年   1691篇
  2013年   1433篇
  2012年   1638篇
  2011年   1996篇
  2010年   1367篇
  2009年   1467篇
  2008年   1394篇
  2007年   1434篇
  2006年   1282篇
  2005年   1133篇
  2004年   949篇
  2003年   799篇
  2002年   679篇
  2001年   581篇
  2000年   489篇
  1999年   423篇
  1998年   300篇
  1997年   289篇
  1996年   227篇
  1995年   212篇
  1994年   173篇
  1993年   139篇
  1992年   105篇
  1991年   98篇
  1990年   63篇
  1989年   48篇
  1988年   34篇
  1987年   29篇
  1986年   31篇
  1985年   38篇
  1984年   35篇
  1983年   20篇
  1982年   15篇
  1981年   13篇
  1980年   15篇
  1979年   9篇
  1978年   9篇
  1977年   11篇
  1976年   3篇
  1974年   3篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
81.
Anomaly detection in resource constrained wireless networks is an important challenge for tasks such as intrusion detection, quality assurance and event monitoring applications. The challenge is to detect these interesting events or anomalies in a timely manner, while minimising energy consumption in the network. We propose a distributed anomaly detection architecture, which uses multiple hyperellipsoidal clusters to model the data at each sensor node, and identify global and local anomalies in the network. In particular, a novel anomaly scoring method is proposed to provide a score for each hyperellipsoidal model, based on how remote the ellipsoid is relative to their neighbours. We demonstrate using several synthetic and real datasets that our proposed scheme achieves a higher detection performance with a significant reduction in communication overhead in the network compared to centralised and existing schemes.  相似文献   
82.
Due to increase in the number of Intellectual Property (IP) cores, clock generation in current day System-on-Chips (SoCs) is facing a crisis. The conventional method of using a dedicated Phase Locked Loop (PLL) to generate the clock for each IP core is becoming inefficient in terms of power and cost. We propose an algorithm based on Least Common Multiple (LCM) to minimize the number of PLLs required to generate the clocks for the IP cores in a SoC. This is done by finding an Optimum Operating Frequency (OOF) for each IP core within 10% below the maximum operating frequency of the core. The OOF is chosen such that the LCM of the OOF of all the IP cores is minimized. Simulated annealing is used to find the LCM. This LCM is the crucial high frequency from which maximum number of clocks can be derived by clock dividers.  相似文献   
83.
《Pattern recognition》2014,47(2):588-602
Fingerprint matching has emerged as an effective tool for human recognition due to the uniqueness, universality and invariability of fingerprints. Many different approaches have been proposed in the literature to determine faithfully if two fingerprint images belong to the same person. Among them, minutiae-based matchers highlight as the most relevant techniques because of their discriminative capabilities, providing precise results. However, performing a fingerprint identification over a large database can be an inefficient task due to the lack of scalability and high computing times of fingerprint matching algorithms.In this paper, we propose a distributed framework for fingerprint matching to tackle large databases in a reasonable time. It provides a general scheme for any kind of matcher, so that its precision is preserved and its time of response can be reduced.To test the proposed system, we conduct an extensive study that involves both synthetic and captured fingerprint databases, which have different characteristics, analyzing the performance of three well-known minutiae-based matchers within the designed framework. With the available hardware resources, our distributed model is able to address up to 400 000 fingerprints in approximately half a second. Additional details are provided at http://sci2s.ugr.es/ParallelMatching.  相似文献   
84.
This study investigates perceived risk and trust in relationship to the Diffusion of Innovation Theory [Rogers, E.M., 1962. Diffusion of innovations. Glencoe, IL: The Free Press; 1983. Diffusion of innovations. 3rd ed. New York: The Free Press] from a cultural perspective to understand the determinants of behavioural intent to adopt mobile commerce among the Y Generation in Kazakhstan. Surveys from 345 university-level students and subsequent structural equation modelling revealed perceived risk, trustworthiness and Rogers’ five innovation characteristics are important determinants. Perceived risk and trustworthiness are important determinants because of the high uncertainty avoidance characteristics of the Kazakh society. This study advances theory regarding culture- and generation-based characteristics to transition economies by verifying theoretical proposition regarding the behavioural intent towards mobile commerce adoption, resulting in a greater understanding of mobile commerce adoption among the Y Generation in transition economies. Marketing implications are discussed.  相似文献   
85.
The prototyping of complex sheet metal parts using single point incremental forming (SPIF) requires the generation of optimal tool paths and/or tool path sequences that ensure that the formed part is within geometric design specifications. The presence of a multitude of features on complex parts leads to multiple inaccuracy inducing phenomena occurring simultaneously due to interactions between the features. This paper proposes a network analysis methodology using topological conceptual graphs to capture the effects of different phenomena on the final accuracy of a sheet metal part manufactured by SPIF. Using this framework optimized tool paths can be generated that compensate for the inaccuracy inducing behavior. Tool path generation algorithms to create partial tool paths that account for the accuracy of specific features in the part based on the proposed framework are also presented. Finally, the creation of integrated tool paths maintaining complementarity between tool paths and desired continuity behavior using non-uniform cubic B-splines is illustrated. A number of case studies demonstrating the applicability of the integrated framework are discussed, where the maximum deviations in the part are significantly reduced and the average absolute deviations for the complete part are brought down to less than 0.5 mm.  相似文献   
86.
It has been recently shown in Ren et al. (2010) that by collecting noise-contaminated time series generated by a coupled-oscillator system at each node of a network, it is possible to robustly reconstruct its topology, i.e. determine the graph Laplacian. Restricting ourselves to linear consensus dynamics over undirected communication networks, in this paper we introduce a new dynamic average consensus least-squares algorithm to locally estimate these time series at each node, thus making the reconstruction process fully distributed and more easily applicable in the real world. We also propose a novel efficient method for separating the off-diagonal entries of the reconstructed Laplacian, and examine several concepts related to the trace of the dynamic correlation matrix of the coupled single integrators, which is a distinctive element of our network reconstruction method. The theory is illustrated with examples from computer, power and transportation systems.  相似文献   
87.
Analysis of the usability of an interactive system requires both an understanding of how the system is to be used and a means of assessing the system against that understanding. Such analytic assessments are particularly important in safety-critical systems as latent vulnerabilities may exist which have negative consequences only in certain circumstances. Many existing approaches to assessment use tasks or scenarios to provide explicit representation of their understanding of use. These normative user behaviours have the advantage that they clarify assumptions about how the system will be used but have the disadvantage that they may exclude many plausible deviations from these norms. Assessments of how a design fails to support these user behaviours can be a matter of judgement based on individual experience rather than evidence. We present a systematic formal method for analysing interactive systems that is based on constraints rather than prescribed behaviour. These constraints capture precise assumptions about what information resources are used to perform action. These resources may either reside in the system itself or be external to the system. The approach is applied to two different medical device designs, comparing two infusion pumps currently in common use in hospitals. Comparison of the two devices is based on these resource assumptions to assess consistency of interaction within the design of each device.  相似文献   
88.
Selection of strategies that help reduce riverine inputs requires numerical models that accurately quantify hydrologic processes. While numerous models exist, information on how to evaluate and select the most robust models is limited. Toward this end, we developed a comprehensive approach that helps evaluate watershed models in their ability to simulate flow regimes critical to downstream ecosystem services. We demonstrated the method using the Soil and Water Assessment Tool (SWAT), the Hydrological Simulation Program–FORTRAN (HSPF) model, and Distributed Large Basin Runoff Model (DLBRM) applied to the Maumee River Basin (USA). The approach helped in identifying that each model simulated flows within acceptable ranges. However, each was limited in its ability to simulate flows triggered by extreme weather events, owing to algorithms not being optimized for such events and mismatched physiographic watershed conditions. Ultimately, we found HSPF to best predict river flow, whereas SWAT offered the most flexibility for evaluating agricultural management practices.  相似文献   
89.
Software-based reconfiguration of distributed real-time systems is a complex problem with many sides to it ranging from system-wide concerns down to the intrinsic non-robust nature of the specific middleware layer and the used programming techniques. In a completely open distributed system, mixing reconfiguration and real-time is not possible; the set of possible target states can be very large threatening the temporal predictability of the reconfiguration process. Over the last years, middle ware solutions have appeared mainly for general purpose systems where efficient state transitions are sought for, but real-time properties are not considered. One of the few contributions to run-time software reconfiguration in distributed real-time environments has been the iLAND middleware, where the germ of a solution with high potential has been conceived and delivered in practice.1 The key idea has been the fact that a set of bounds and limitations to the structure of systems and to their open nature needs to be imposed in order to come up with practical solutions. In this paper, the authors present the different sides of the problem of software reconfiguration from two complementary middleware perspectives comparing two strategies built inside distribution middleware. We highlight the lessons learned in the iLAND project aimed at service-based reconfiguration and compare it to our experience in the development of distributed real-time Java reconfiguration based on distributed tasks rescheduling. Authors also provide a language view of both solutions. Lastly, empirical results are shown that validate these solutions and compare them on the basis of different programming language realizations.  相似文献   
90.
The novel distributed mobility management trend is a promising direction to cope with the increasing mobile data traffic and flatten network architectures. Most of the novel mobility approaches distribute the mobility anchors through the access level, as opposed to the centralized mobility anchoring model. Other recent approaches argue that mobility anchors closer to the content servers may be the solution to optimize the mobility performance. However, none of the mobility anchoring models is ideal for all scenarios, since it depends on the user, the session and the network. Hence, we propose an IP mobility approach driven by the context of the user, sessions and the network, where the mobility anchors for IP address allocation and for routing/forwarding are distributed through the network nodes, while the mobility context is managed by the mobile devices. Although each session is properly anchored in the establishment phase, the routing/forwarding is adapted over time, according to the user, the session and the network context: the proposed approach is able to signal different mobility anchors to optimize the routing path to new and ongoing sessions of the user. The outcome of the evaluation shows that the proposed approach overall reduces the data cost, the data delay, the tunneled packets and the tunnel length, when compared with other anchoring models.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号