首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   492篇
  免费   30篇
电工技术   10篇
综合类   1篇
化学工业   147篇
金属工艺   7篇
机械仪表   19篇
建筑科学   23篇
能源动力   48篇
轻工业   32篇
水利工程   3篇
石油天然气   12篇
无线电   18篇
一般工业技术   80篇
冶金工业   51篇
原子能技术   2篇
自动化技术   69篇
  2023年   14篇
  2022年   12篇
  2021年   23篇
  2020年   17篇
  2019年   20篇
  2018年   31篇
  2017年   22篇
  2016年   21篇
  2015年   16篇
  2014年   18篇
  2013年   51篇
  2012年   23篇
  2011年   30篇
  2010年   18篇
  2009年   15篇
  2008年   9篇
  2007年   11篇
  2006年   8篇
  2005年   14篇
  2004年   7篇
  2003年   8篇
  2002年   6篇
  2001年   6篇
  1999年   3篇
  1998年   26篇
  1997年   12篇
  1996年   11篇
  1995年   3篇
  1994年   2篇
  1993年   5篇
  1992年   5篇
  1991年   3篇
  1990年   2篇
  1989年   3篇
  1988年   3篇
  1987年   3篇
  1986年   5篇
  1985年   4篇
  1984年   7篇
  1983年   6篇
  1981年   2篇
  1979年   2篇
  1977年   2篇
  1976年   1篇
  1975年   2篇
  1974年   1篇
  1973年   2篇
  1971年   1篇
  1970年   1篇
  1969年   1篇
排序方式: 共有522条查询结果,搜索用时 15 毫秒
1.
Pattern Analysis and Applications - Efficient high-dimensional analyses of hyperspectral datasets and their utilization within classification algorithms is a popular topic in the field of data...  相似文献   
2.
The use of hydrogen as a fuel is increasing exponentially, and the most economical way to store and transport hydrogen for fuel use is as a high-pressure gas. Polymers are widely used for hydrogen distribution and storage systems because they are chemically inert towards hydrogen. However, when exposed to high-pressure hydrogen, some hydrogen diffuses through polymers and occupies the preexisting cavities inside the material. Upon depressurization, the hydrogen trapped inside polymer cavities can cause blistering or cracking by expanding these cavities. A continuum mechanics–based deformation model was deployed to predict the stress distribution and damage propagation while the polymer undergoes depressurization after high-pressure hydrogen exposure. The effects of cavity size, cavity location, and pressure inside the cavity on damage initiation and evolution inside the polymer were studied. The stress and damage evolution in the presence of multiple cavities was also studied, because interaction among cavities alters the damage and stress field. It was found that all these factors significantly change the stress state in the polymer, resulting in different paths for damage propagation. The effect of adding carbon black filler particles and plasticizer on the damage was also studied. It was found that damage tolerance of the polymer increases drastically with the addition of carbon black fillers, but decreases with the addition of the plasticizer.  相似文献   
3.
This note describes a method for measurement of isokinetic strength for prediction of manual materials handling capacity of individuals. The apparatus used in this methodology and measurement technique are illustrated in detail.  相似文献   
4.
The main objective of this paper is to generate ergonomic software that can be used in the design and evaluation of manual materials handling tasks so as to minimize the risk of injury. Specifically, this study is aimed at developing a microcomputer-based model for the design of frequent manual lifting tasks based ont he concept of job saverity index. The microcomputer-based software package is intended to be used by non-experts in the field of MMH. Possible engineering and administrative controls are implemented in the software in case if human lifting abilities are exceeded. The software was written in AutoLISP for the IBM personal computer. The knowledge base of the software is built upon a set of two models which were developed in the present study. The models were based on 2,736 observations.  相似文献   
5.
6.
Even though a lot of researches have been conducted in order to solve the problem of unconstrained handwriting recognition, an effective solution is still a serious challenge. In this article, we address two Arabic handwriting recognition-related issues. Firstly, we present IESK-arDB, a new multi-propose off-line Arabic handwritten database. It is publicly available and contains more than 4,000 word images, each equipped with binary version, thinned version as well as a ground truth information stored in separate XML file. Additionally, it contains around 6,000 character images segmented from the database. A letter frequency analysis showed that the database exhibits letter frequencies similar to that of large corpora of digital text, which proof the database usefulness. Secondly, we proposed a multi-phase segmentation approach that starts by detecting and resolving sub-word overlaps, then hypothesizing a large number of segmentation points that are later reduced by a set of heuristic rules. The proposed approach has been successfully tested on IESK-arDB. The results were very promising, indicating the efficiency of the suggested approach.  相似文献   
7.
The Internet of Things (IoT) is a network of heterogeneous and smart devices that can make decisions without human intervention. It can connect millions of devices across the universe. Their ability to collect information, perform analysis, and even come to meaningful conclusions without human capital intervention matters. Such circumstances require stringent security measures and, in particular, the extent of authentication. Systems applied in the IoT paradigm point out high-interest levels since enormous damage will occur if a malicious, wrongly authenticated device finds its way into the IoT system. This research provides a clear and updated view of the trends in the IoT authentication area. Among the issues covered include a series of authentication protocols that have remained research gaps in various studies. This study applies a comparative evaluation of authentication protocols, including their strengths and weaknesses. Thus, it forms the foundation in the IoT authentication field of study. In that direction, a multi authentication architecture that involves secured means is proposed for protocol authentication. Informal analysis can affect the security of the protocols. Burrows-Abadi-Needham (BAN) logic provides proof of the attainment of mutual authentication. NS3 simulator tool is used to compare the performance of the proposed protocol to verify the formal security offered by the BAN logic.  相似文献   
8.
Relaxation oscillations occur when a capacitor is inserted in series with a field emission tube, a DC high-voltage power supply, and a ballast resistor. The waveform of these oscillations is highly reproducible with a dominant frequency of 200 MHz and a decay time of 20 ns. The peak current as high as 320 mA has been observed although the tungsten emitter is only rated for 10 microA. We have shown that these oscillations are due to a displacement current, charging of the anode-tip capacitance, and are not of a field emission origin. We conclude that the effects of displacement current should be considered in measurements of field emission with microsecond pulses, where high-current densities can be observed.  相似文献   
9.
The objective of this study is to understand the viewpoint of healthcare providers with regard to patient safety in outpatient surgery settings. Two methods were used to gather data from the healthcare providers: (1) questionnaire with open-ended questions about six predefined stages of the patient care process; (2) survey with closed questions. With the first method, the main quality and safety of care issues concerned communication to patients, coordination of reports and forms, patient and staff time pressures and standards of care. The first two stages of the outpatient surgery process, i.e. patient work-up prior to day of surgery and patient admission and preparation on the day of surgery, yielded many more comments than the other four stages. The results of the structured questionnaire show that, overall, the healthcare providers report high quality of care provided by themselves (98%) and their surgery centre (96%). With regard to patient safety (i.e. cancellations of surgeries, patient safety problems and serious mistakes), there was a clear difference in perceptions reported by the physicians vs. the nurses and other staff. Nurses and other staff were more likely to report patient safety problems than physicians. The combination of qualitative data from the initial questionnaire and the quantitative data from the structured questionnaire provides a rather complete view of the outpatient surgery staff perceptions of quality and safety of care. This research highlights the importance of getting input from the healthcare providers regarding the quality and safety of care rather than relying only on traditional measures about patient outcomes.  相似文献   
10.
In this work, we will present a new concept of POS tagging that will be implemented for the Arabic language. Indeed, we will see that in Arabic there are a numerous cases where the determination of the morpho-syntactic state of a word depends on the states of the subsequent words, which represents the theoretical foundation of the approach: how to consider, in addition of the past elements, the future ones. We will then demonstrate how the POS tagging in its statistical application: the HMM, is based mainly on the past elements, and how to combine both direct and reverse taggers to tag the same sequence of words in both senses. Thus, we will propose a hypothesis for the result selecting. In the practical part, we will present, in general, the used resource and the changes made on it. Then we will explain the experiment steps and the parameters collected and presented on graphics, that we will discuss later to lead to the final conclusion.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号