首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1141篇
  免费   38篇
  国内免费   1篇
电工技术   11篇
综合类   3篇
化学工业   103篇
金属工艺   11篇
机械仪表   12篇
建筑科学   24篇
矿业工程   1篇
能源动力   8篇
轻工业   76篇
水利工程   5篇
无线电   92篇
一般工业技术   120篇
冶金工业   501篇
原子能技术   1篇
自动化技术   212篇
  2023年   3篇
  2022年   16篇
  2021年   21篇
  2020年   19篇
  2019年   14篇
  2018年   21篇
  2017年   16篇
  2016年   14篇
  2015年   25篇
  2014年   22篇
  2013年   43篇
  2012年   34篇
  2011年   34篇
  2010年   44篇
  2009年   31篇
  2008年   47篇
  2007年   41篇
  2006年   28篇
  2005年   32篇
  2004年   37篇
  2003年   28篇
  2002年   26篇
  2001年   32篇
  2000年   27篇
  1999年   29篇
  1998年   112篇
  1997年   65篇
  1996年   50篇
  1995年   31篇
  1994年   37篇
  1993年   30篇
  1992年   17篇
  1991年   8篇
  1990年   14篇
  1989年   16篇
  1988年   10篇
  1987年   23篇
  1986年   8篇
  1985年   5篇
  1984年   2篇
  1983年   2篇
  1982年   2篇
  1981年   3篇
  1980年   6篇
  1979年   1篇
  1978年   4篇
  1977年   14篇
  1976年   32篇
  1974年   2篇
  1973年   1篇
排序方式: 共有1180条查询结果,搜索用时 15 毫秒
1.
In this paper, we shall generalize the concepts of fairness, TCP-friendliness and TCP-compatibility such that more source adaptation schemes can be designed to support diverse applications over the Internet. A simple but efficient framework, in the form of a monotonic response function (MRF), is proposed for the analysis and the design of memoryless window-based source adaptation protocols by using these concepts. We first derive a necessary and sufficient condition for step-wise convergence to the weighted fairness. It is then used to construct increase-decrease policies. The requirements of our increase-decrease policy are less conservative than those of the CYRF (Choose Your Response Function) that was proposed in . Our MRF is suitable for transmission control protocol (TCP) and user datagram protocol (UDP), and can be used to design TCP-friendly and multimedia-friendly source adaptation schemes. Meanwhile, our MRF can be applied to provide bandwidth differentiation service without any change to the router of the existing Internet.  相似文献   
2.
3.
In cellular networks, QoS degradation or forced termination may occur when there are insufficient resources to accommodate handoff requests. One solution is to predict the trajectory of mobile terminals so as to perform resource reservations in advance. With the vision that future mobile devices are likely to be equipped with reasonably accurate positioning capability, we investigate how this new feature may be used for mobility predictions. We propose a mobility prediction technique that incorporates road topology information, and describe its use for dynamic resource reservation. Simulation results are presented to demonstrate the improvement in reservation efficiency compared with several other schemes.  相似文献   
4.
In multiple pregnancies, survival of remaining fetuses after premature death and delivery of one fetus is uncommon. We report a case of a triplet pregnancy that was reduced to twins at the 14th gestational week and then had preterm premature rupture of membranes and intrauterine fetal death of one twin at the 17th gestational week. To save the surviving fetus, delivery of the dead fetus and ligation of the umbilical cord at the cervical level were performed. We also performed McDonald cervical cerclage to keep the placenta of the dead fetus as well as that of the surviving one in the uterine cavity. After a series of aggressive procedures, including immediate administration of tocolytic agents, and antibiotic prophylaxis to prevent infection and preterm labor, the surviving fetus was delivered vaginally 73 days later due to intractable uterine contractions. After a 10-week hospital stay, the infant boy, weighing 2,500 g, was discharged without any sequelae. To our knowledge, this was the longest interval between deliveries in a triplet pregnancy reported in Taiwan. With adequate intensive management, a satisfactory outcome of the fetus and mother in such cases is possible.  相似文献   
5.
6.
7.
In two studies, we explored the effects of trait self-esteem and threats to the self-concept on evaluations of others. In Study 1, subjects high, moderate, and low in self-esteem received either success, failure, or no feedback on a test and later evaluated three pairs of targets: ingroups and outgroups based on a minimal intergroup manipulation, those who scored above average and those who scored below average on the test, and themselves and the average college student. Study 2 explored the effects of self-esteem and threat on ingroup favoritism in a real-world setting, campus sororities. Together, the results of these studies indicate that individuals high in self-esteem, but not those low in self-esteem, respond to threats to the self-concept by derogating outgroups relative to the ingroup when the group boundaries have evaluative implications. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
8.
Given a stability region of a polytope of polynomials, the edge theorem can be used to verify certain root-clustering properties of the polytope. The authors consider the inverse problem; starting with a polytope of real polynomials, they present a result that allows the construction of the smallest set of regions in the complex plane which characterizes its zero location  相似文献   
9.
Closed laboratories are becoming an increasingly popular approach to teaching introductory computer science courses. Unlike open laboratories that tend to be an informal environment provided for students to practice their skills with attendance optional, closed laboratories are structured meeting times that support the lecture component of the course, and attendance is required. This paper reports on an integrated approach to designing, implementing, and assessing laboratories with an embedded instructional research design. The activities reported here are parts of a departmentwide effort not only to improve student learning in computer science and computer engineering (CE) but also to improve the agility of the Computer Science and Engineering Department in adapting the curriculum to changing technologies, incorporate research, and validate the instructional strategies used. This paper presents the design and implementation of the laboratories and the results and analysis of student performance. Also described in this paper is cooperative learning in the laboratories and its impact on student learning.  相似文献   
10.
Investigated whether (1) feminist identity development for women therapists was related to their use of feminist therapy behaviors (FTBs) and (2) feminist identity development and use of FTBs for women therapists were related to self-identification as a feminist therapist. 153 women psychologists (aged 30–77 yrs) were administered a women's issues in therapy questionnaire, which included a short version of the Feminist Identity Scale (FIS; K. M. Rickard, 1989, 1990). Ss were categorized into stages of feminine identity development according to their scores on 4 subscales of the FIS: Passive-Acceptance (PA), Revelation (REV), Embeddedness (EMB), and Synthesis (SYN). Ss scoring high on SYN and REV, and low on PA, reported greater use of FTBs; scores on the EMB were not related to the use of FTBs. All 4 subscales were predictive of women therapists who self-identified as feminist therapists. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号