首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   35387篇
  免费   3713篇
  国内免费   2516篇
电工技术   2574篇
技术理论   8篇
综合类   5202篇
化学工业   2781篇
金属工艺   901篇
机械仪表   2312篇
建筑科学   3420篇
矿业工程   1260篇
能源动力   1254篇
轻工业   494篇
水利工程   1029篇
石油天然气   880篇
武器工业   596篇
无线电   3165篇
一般工业技术   4215篇
冶金工业   2118篇
原子能技术   326篇
自动化技术   9081篇
  2024年   118篇
  2023年   555篇
  2022年   732篇
  2021年   955篇
  2020年   1093篇
  2019年   995篇
  2018年   1032篇
  2017年   1187篇
  2016年   1284篇
  2015年   1314篇
  2014年   2027篇
  2013年   2480篇
  2012年   2245篇
  2011年   2568篇
  2010年   2049篇
  2009年   2158篇
  2008年   2223篇
  2007年   2335篇
  2006年   2171篇
  2005年   1889篇
  2004年   1525篇
  2003年   1269篇
  2002年   1100篇
  2001年   881篇
  2000年   764篇
  1999年   673篇
  1998年   523篇
  1997年   470篇
  1996年   394篇
  1995年   382篇
  1994年   314篇
  1993年   270篇
  1992年   245篇
  1991年   176篇
  1990年   144篇
  1989年   166篇
  1988年   127篇
  1987年   65篇
  1986年   90篇
  1985年   67篇
  1984年   66篇
  1983年   47篇
  1982年   53篇
  1981年   41篇
  1980年   31篇
  1979年   31篇
  1978年   29篇
  1977年   26篇
  1964年   26篇
  1955年   35篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
971.
当图像亮度不均匀、对比度低时,提取图像前景较困难。为此,提出一种图像分割方法,结合正弦基函数和绝对值距离测度构建背景模型,依据优化理论和迭代法求解背景模型,通过比较背景模型中各像素点亮度与实际图像中各像素点亮度来判别各像素点是背景还是前景。为应对图像亮度不均匀的情况,在图像分割前对图像进行分块,在分块图像中依据背景模型或相邻分块背景相似度进行图像分割。实验结果表明,在普适性方面,相对于经典的模糊C均值法和OTSU法,该方法的分割误差小,尤其是对亮度不均匀和对比度低的图像;在掌纹图像分割应用方面,与迭代线跟踪法和模糊粗糙集法相比,该方法的错误率低、信噪比高、处理时间短。最后将提出的分割算法应用在人脸识别上,实验结果表明了该算法的先进性。  相似文献   
972.
973.
This paper addresses the synthesis of Petri net (PN) controller for the forbidden state transition problem with a new utilisation of the theory of regions. Moreover, as any method of control synthesis based on a reachability graph, the theory of regions suffers from the combinatorial explosion problem. The proposed work minimises the number of equations in the linear system of theory of regions and therefore one can reduce the computation time. In this paper, two different approaches are proposed to select minimal cuts in the reachability graph in order to synthesise a PN controller. Thanks to a switch from one cut to another, one can activate and deactivate the corresponding?PNcontroller. An application is implemented in a flexible manufacturing system to illustrate the present method. Finally, comparison with previous works with experimental results in obtaining a maximally permissive controller is presented.  相似文献   
974.
This article proposes a systematic analysis for a tracking problem which ensures cooperation amongst a swarm of unmanned aerial vehicles (UAVs), modelled as nonlinear systems with linear and angular velocity constraints, in order to achieve different goals. A distributed Takagi–Sugeno (TS) framework design is adopted for the representation of the nonlinear model of the dynamics of the UAVs. The distributed control law which is introduced is composed of both node and network level information. Firstly, feedback gains are synthesised using a parallel distributed compensation (PDC) control law structure, for a collection of isolated UAVs; ignoring communications among the swarm. Then secondly, based on an alternation-like procedure, the resulting feedback gains are used to determine Lyapunov matrices which are utilised at network level to incorporate into the control law, the relative differences in the states of the vehicles, and to induce cooperative behaviour. Eventually stability is guaranteed for the entire swarm. The control synthesis is performed using tools from linear control theory: in particular the design criteria are posed as linear matrix inequalities (LMIs). An example based on a UAV tracking scenario is included to outline the efficacy of the approach.  相似文献   
975.
Information technology is becoming increasingly important for entrepreneurs. Protecting their technical infrastructure and stored data is, therefore, also becoming more vital. Nevertheless, research into the safety and security of entrepreneurs in general, and online threats targeted at entrepreneurs in particular, is still limited. This study investigates to what extent self-employed entrepreneurs protect themselves against online threats, and what motivates them to do so. Based on secondary analyses on data collected from 1622 Dutch entrepreneurs, we observe that the majority implement technical and personal coping measures. By adopting protection motivation theory as a theoretical basis for our study, we found that coping appraisal explains the adoption of protective measures. Entrepreneurs are likely to implement protective measures when they believe a measure is effective, when they are capable of using internet technology, when their attitude towards online protection is positive and when they believe they are responsible for their own online security. Although the secondary analysis provides some limitations, this study offers new insights into the usage of protective measures and the motivation for taking them. These insights can help to improve information security campaigns.  相似文献   
976.
We consider the problem of revenue maximization on multi‐unit auctions where items are distinguished by their relative values; any pair of items has the same ratio of values to all buyers. As is common in the study of revenue maximizing problems, we assume that buyers' valuations are drawn from public known distributions and they have additive valuations for multiple items. Our problem is well motivated by sponsored search auctions, which made money for Google and Yahoo! in practice. In this auction, each advertiser bids an amount bi to compete for ad slots on a web page. The value of each ad slot corresponds to its click‐through‐rate, and each buyer has her own per‐click valuations, which is her private information. Obviously, a strategic bidder may bid an amount that is different with her true valuation to improve her utility. Our goal is to design truthful mechanisms avoiding this misreporting. We develop the optimal (with maximum revenue) truthful auction for a relaxed demand model (where each buyer i wants at most di items) and a sharp demand model (where buyer i wants exactly di items). We also find an auction that always guarantees at least half of the revenue of the optimal auction when the buyers are budget constrained. Moreover, all of the auctions we design can be computed efficiently, that is, in polynomial time.  相似文献   
977.
《Information & Management》2016,53(6):740-751
This study develops a research model that explains the continuance of corporate social network service (SNS) pages. In order to find antecedents that influence end users’ continuance intention, this study adopts communicative ecology theory from media and communication studies. Results indicate that the quality of social interaction is the most salient feature, as indicated by the fact that it has the highest impact on perceived usefulness and enjoyment. Moreover, content quality also increases both perceived usefulness and enjoyment, while SNS platform quality and service quality increase perceived usefulness only. In addition, perceived network size moderates the impact of social interaction quality on perceived enjoyment.  相似文献   
978.
《Information & Management》2016,53(7):857-867
The past decade has witnessed a growing number of business models that facilitate economic exchanges between individuals with limited institutional mediation. One of the important innovative business models is online peer-to-peer lending, which has received wide attention from government, industry, and researchers. Using the signaling theory, we compare the effects of various signals on the likelihood of successful funding in three models (i.e., first-time borrowing, repeated borrowing without prior lending, and repeated borrowing with prior lending). Using data collected from PPDAI.com, we verify the three proposed models by employing logistic regression. Results and implications are analyzed and discussed.  相似文献   
979.
The Internet is the preferred source of health information followed by healthcare providers, friends and family, print media, and television (Baxter & Egbert, 2008). Yet, previous research about online sexual health resources for LGBTQ (lesbian, gay, bisexual, transgendered, queer) groups, especially lesbian and bisexual (LB) women, primarily consists of introductions and reviews of related websites rather than critique of the quality of the information present (e.g. Clark, 2003; Finlon, 2002; McKay, 2011). Thus, the goals of this study were to examine the LB women’s sexual and relational health content in online sources and identify the degree to which the online sources considered LB women’s identity and standpoint when presenting sexual and relational health messages. The analysis includes a comparison of text-based and video-based online messages related to LB women’s sexual and relational health. We argue that there is an overall lack of quality in the online sexual and relational health messages for LB women, and that websites are not comprehensive enough in their coverage of LB women’s sexual and relational health.  相似文献   
980.
Ever since its appearance on the scene in the 1940s, in the then nascent field of statistical decision theory, Wald's maximin paradigm has played a vital role in many disciplines in the treatment of nonprobabilistic uncertainty, both as a tool of thought and as a practical instrument. In fact, in some fields, such as modern robust optimization, Wald's paradigm dominates the scene. It is important to note that this paradigm's preeminence in many fields continues unabated, despite its obvious limitations and the criticism that had been and continues to be leveled at it. So, in this tutorial we examine the methodological aspects of this stalwart of decision theory from the viewpoint of robust decision‐making, paying special attention to its obvious and not so obvious limitations and to its relation to other maximin paradigms.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号