首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2259篇
  免费   334篇
  国内免费   165篇
电工技术   104篇
综合类   91篇
化学工业   322篇
金属工艺   36篇
机械仪表   108篇
建筑科学   111篇
矿业工程   18篇
能源动力   139篇
轻工业   334篇
水利工程   48篇
石油天然气   34篇
武器工业   37篇
无线电   136篇
一般工业技术   190篇
冶金工业   149篇
原子能技术   93篇
自动化技术   808篇
  2024年   7篇
  2023年   24篇
  2022年   50篇
  2021年   74篇
  2020年   81篇
  2019年   97篇
  2018年   101篇
  2017年   102篇
  2016年   136篇
  2015年   119篇
  2014年   163篇
  2013年   268篇
  2012年   164篇
  2011年   178篇
  2010年   130篇
  2009年   138篇
  2008年   158篇
  2007年   136篇
  2006年   109篇
  2005年   108篇
  2004年   76篇
  2003年   46篇
  2002年   58篇
  2001年   37篇
  2000年   33篇
  1999年   18篇
  1998年   22篇
  1997年   10篇
  1996年   16篇
  1995年   9篇
  1994年   8篇
  1993年   6篇
  1992年   5篇
  1991年   4篇
  1990年   3篇
  1985年   4篇
  1981年   4篇
  1979年   3篇
  1978年   2篇
  1966年   3篇
  1965年   2篇
  1964年   3篇
  1961年   2篇
  1960年   3篇
  1959年   6篇
  1958年   2篇
  1957年   2篇
  1956年   3篇
  1955年   2篇
  1951年   3篇
排序方式: 共有2758条查询结果,搜索用时 173 毫秒
51.
主要研究并建立直升机飞行性能仿真模型,在直升机动力学和运动学微分方程的基础上重点解算作用在直升机各部件上的气动力和力矩模型,建立旋翼和尾桨的气动仿真模型,对旋翼挥舞运动进行了分析研究,还考虑了平尾、垂尾、机身和重力的仿真模型。最后通过对各飞行性能指标及其验证原理方法的分析研究,验证了静态性能指标,应用标量指标法验证动态性能指标。  相似文献   
52.
Current extensions of hidden Markov models such as structural, hierarchical, coupled, and others have the power to classify complex and highly organized patterns. However, one of their major limitations is the inability to cope with topology: When applied to a visible observation (VO) sequence, the traditional HMM-based techniques have difficulty predicting the n-dimensional shape formed by the symbols of the VO sequence. To fulfill this need, we propose a novel paradigm named “topological hidden Markov models” (THMMs) that classifies VO sequences by embedding the nodes of an HMM state transition graph in a Euclidean space. This is achieved by modeling the noise embedded in the shape generated by the VO sequence. We cover the first and second level topological HMMs. We describe five basic problems that are assigned to a second level topological hidden Markov model: (1) sequence probability evaluation, (2) statistical decoding, (3) structural decoding, (4) topological decoding, and (5) learning. To show the significance of this research, we have applied the concept of THMMs to: (i) predict the ASCII class assigned to a handwritten numeral, and (ii) map protein primary structures to their 3D folds. The results show that the second level THMMs outperform the SHMMs and the multi-class SVM classifiers significantly.  相似文献   
53.
Natural ventilation of buildings refers to the replacement of indoor air with outdoor air due to pressure differences caused by wind and/or buoyancy. It is often expressed in terms of the air change rate per hour (ACH). The pressure differences created by the wind depend - among others - on the wind speed, the wind direction, the configuration of surrounding buildings and the surrounding topography. Computational Fluid Dynamics (CFD) has been used extensively in natural ventilation research. However, most CFD studies were performed for only a limited number of wind directions and/or without considering the urban surroundings. This paper presents isothermal CFD simulations of coupled urban wind flow and indoor natural ventilation to assess the influence of wind direction and urban surroundings on the ACH of a large semi-enclosed stadium. Simulations are performed for eight wind directions and for a computational model with and without the surrounding buildings. CFD solution verification is conducted by performing a grid-sensitivity analysis. CFD validation is performed with on-site wind velocity measurements. The simulated differences in ACH between wind directions can go up to 75% (without surrounding buildings) and 152% (with surrounding buildings). Furthermore, comparing the simulations with and without surrounding buildings showed that neglecting the surroundings can lead to overestimations of the ACH with up to 96%.  相似文献   
54.
面向切面的数据验证组件研究与实现   总被引:1,自引:0,他引:1  
传统的数据验证方法会造成数据验证代码纠缠在一起,使得软件的维护性与重用性大大降低.面向切面编程技术(AOP)可将应用程序中的"横切关注点"从"纵向关注点"中分离出来并被封装到一个可重用的模块中,再利用反转控制(IoC)实现数据验证逻辑与其它业务逻辑间的松散耦合.在此基础上具体构建了一个基于服务器端的数据验证组件All4Validate,并将其以低侵入的方式融入到现有的J2EE/EJB开发过程的组件产品中,有效地解决了传统数据验证方法的弊端,并极大地提高软件的开发效率.  相似文献   
55.
QSAR研究中,判断模型预测能力至关重要。长期以来,模型的预测能力是使用留一法或留k法等内部验证来确定,但在2004年形成的OECD规则中,已明确规定必须使用外部验证集去评价模型的预测能力。为了研究内部验证和外部验证与模型预测能力之间的关系,本文以45种睾酮和二氢睾酮衍生物以及37种萘锟酯衍生物为研究对象,以E-Dragon计算的分子描述符作为自变量,在增n减l算法选择变量的基础上,采用SVM算法对同种物质的不同活性以及不同物质的不同活性建立QSAR模型,研究QSAR/QSPR建模时的不同验证方式与模型预测能力的关系。研究结果表明,模型的预测能力与内部验证结果的好坏无必然联系,而结合外部验证的检验结果则是判断模型预测能力的可靠依据。  相似文献   
56.
Business–IT alignment has been consistently ranked as the number one concern of IT and business executives. Maintaining the alignment has been found to lead to stronger business performance, higher perceived value of IT and improved IS strategic planning; therefore addressing the issue is both important and timely. The economic growth in China in the last decade has led to greater availability of IT and its widespread use as a critical resource. Despite the increasing interest in Chinese IS issues by both researchers and practitioners, empirical research focusing on human- and organization-related IS issues in China is scarce. Using data collected from 130 business and IT executives from 22 companies in China, 11 of which were multinationals operating in China, we explored several questions in the area of business–IT alignment. An instrument designed to measure the six dimensions of business–IT alignment maturity was cross-validated using a sample of companies in China. Then, the instrument was refined to develop a measurement method that offered better reliability and validity in the context of Chinese companies. The relationship between the alignment maturity dimensions and IS strategic alignment was then examined. Finally, the alignment maturity of companies in China was assessed to provide a snapshot of business–IT alignment in China. A comparison between the 11 Chinese domestic companies and 11 multinational operating in China provided insight into the different IT practices of the two types of companies. Implications for researchers and practitioners are discussed.  相似文献   
57.
针对以耦合率为指标之一的C4ISR系统体系结构设计合理性验证评估问题,从功能系统间交互信息的安全性需求出发,通过推理揭示出密钥关系的耦合本质,进而提出并分析了密钥关联耦合的概念及其属性。给出了密钥关联耦合的定量度量方法,采用该方法能在体系结构设计结束后就实施并完成度量,且不必考虑密码算法及密钥长度等细节问题。利用Briand等人提出的准则证明了度量方法的科学性与合理性,并结合案例说明了度量方法的可行性与易操作性。  相似文献   
58.
Public key certificates (PKCs) are used nowadays in several security protocols and applications, so as to secure data exchange via transport layer security channels, or to protect data at the application level by means of digital signatures. However, many security applications often fail to manage properly the PKCs, in particular when checking their validity status. These failures are partly due to the lack of experience (or training) of the users who configure these applications or protocols, and partly due to the scarce support offered by some common cryptographic libraries to the application developers. This paper describes the design and implementation of a light middleware dealing with certificate validation in a unified way. Our middleware exploits on one side the libraries that have already been defined or implemented for certificate validation, and it constructs a thin layer, which provides flexibility and security features to the upper layer applications. In our current approach, this layer boasts an integrated approach to support various certificate revocation mechanisms, it protects the applications from some common security attacks, and offers several configuration and performance options to the programmers and to the end users. We describe the architecture of this approach as well as its practical implementation in the form of a library based on the famous OpenSSL security library, and that can be easily integrated with other certificate‐aware security applications. Copyright © 2009 John Wiley & Sons, Ltd.  相似文献   
59.
Today, due to the availability of free remote sensing data, efficient algorithms for image classification and increased connectivity and computing power, together with international policy initiatives, such as the United Nations Programme on Reducing Emissions from Deforestation and Forest Degradation (UN-REDD), more and more countries are investing in their own national forest monitoring schemes. However, tropical forests remain under threat worldwide. Recently, a citizen science project that enables citizens around the globe to be involved in forest monitoring tasks has been proposed, called “ForestWatchers” (www.forestwatchers.net). Its main goal is to allow volunteers (many of them with no scientific training) around the globe, with their own smartphones, tablets and notebooks, review satellite images of forested regions and confirm whether automatic assignments of forested and deforested regions are correct. Inspected images are then sent to a central database where the results are integrated to generate up-to-date deforestation maps. This approach offers a low-cost way to both strengthen the scientific infrastructure and engage members of the public in science. Here, we describe the methods developed within the scope of the ForestWatchers project to assess the volunteers’ performance. These tools have been evaluated with data of two of the project’s preliminary tasks. The first, called “BestTile”, asks volunteers to select which of several images of the same area has the least cloud cover, while in the second, called “Deforestation”, volunteers draw polygons on satellite images delimiting areas they believe have been deforested. The results from more than 500 volunteers show that using simple statistical tests, it is possible to achieve a triple goal: to increase the overall efficiency of the data collecting tasks by reducing the required number of volunteers per task, to identify malicious behavior and outliers, and to motivate volunteers to continue their contributions.  相似文献   
60.
A medium‐sized domain‐engineering process can contain thousands of features that all have constraint dependency rules between them. Therefore, the validation of the content of domain‐engineering process is vital to produce high‐quality software products. However, it is not feasible to do this manually. This paper aims to improve the quality of the software products generated by the domain‐engineering process by ensuring the validity of the results of that process. We propose rules for two operations: inconsistency detection and inconsistency prevention. We introduce first‐order logic (FOL) rules to detect three types of inconsistency and prevent the direct inconsistency in the domain‐engineering process. Developing FOL rules to detect and prevent inconsistency in the domain‐engineering process directly without the need to the configuration process is our main contribution. We performed some experiments to test the scalability and applicability of our approach on domain‐engineered software product lines containing 1000 assets to 20000 assets. The results show that our approach is scalable and could be utilized to improve the domain‐engineering process.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号