首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3168篇
  免费   204篇
  国内免费   7篇
工业技术   3379篇
  2024年   7篇
  2023年   39篇
  2022年   71篇
  2021年   142篇
  2020年   115篇
  2019年   132篇
  2018年   121篇
  2017年   109篇
  2016年   142篇
  2015年   112篇
  2014年   147篇
  2013年   286篇
  2012年   236篇
  2011年   264篇
  2010年   210篇
  2009年   192篇
  2008年   179篇
  2007年   152篇
  2006年   124篇
  2005年   96篇
  2004年   77篇
  2003年   64篇
  2002年   69篇
  2001年   35篇
  2000年   33篇
  1999年   27篇
  1998年   29篇
  1997年   20篇
  1996年   21篇
  1995年   20篇
  1994年   12篇
  1993年   19篇
  1992年   8篇
  1991年   8篇
  1990年   7篇
  1989年   5篇
  1988年   3篇
  1987年   2篇
  1986年   2篇
  1985年   5篇
  1984年   4篇
  1983年   5篇
  1982年   3篇
  1981年   5篇
  1977年   5篇
  1976年   2篇
  1974年   2篇
  1973年   5篇
  1967年   1篇
  1945年   1篇
排序方式: 共有3379条查询结果,搜索用时 15 毫秒
991.
Stability of gaseous samples is a major concern when dealing with odours and airborne pollutants sampling. In terms of odours, the representativeness of the sample can be very seriously compromised, despite the rigorous application of the maximum storage time established by EN-13725. The present paper is focused on the use of the cryo-condensation technique (Cryocore) for time-weighted-average (TWA) sampling in waste water treatment plants (WWTPs), with the aim of comparing the values of TWA odour and H(2)S concentration when using the Cryocore system and other well established sampling methods, such as those described in EN-13725 and passive sampling. The study showed comparable results when comparing all the methodologies tested.  相似文献   
992.
993.
The modular exponentiation operation of the current algorithms for asymmetric cryptography is the most expensive part in terms of computational cost. The RSA algorithm, for example, uses the modular exponentiation algorithm in encryption and decryption procedure. Thus, the overall performance of those asymmetric cryptosystems depends heavily on the performance of the specific algorithm used for modular exponentiation. This work proposes new parallel algorithms to perform this arithmetical operation and determines the optimal number of processors that yields the greatest speedup. The optimal number is obtained by balancing the processing load evenly among the processors. Practical implementations are also performed to evaluate the theoretical proposals.  相似文献   
994.
The phenomenon of birefringence may be observed when light arrives at an anisotropic crystal surface and refracts through it, causing the incident light ray to split into two rays; these become polarized in mutually orthogonal directions, and two images are formed. The principal goal of this paper is the study of the directional issues involved in the behavior of light when refracting through a homogeneous, non-participating medium, including both isotropic and anisotropic media (uniaxial and, for the first time, biaxial). The paper focuses on formulating and solving the non-linear algebraic system that is obtained when the refraction process is simulated using the geometric model of Huygens. The main contribution focuses on the case of biaxial media. In the case of uniaxial media, we rely on symbolic calculus techniques to formulate and solve the problem.  相似文献   
995.
996.
This paper proposes a new method to perform real-time face pose estimation for ± 90° yaw rotations and under low light conditions. The algorithm works on the basis of a completely automatic and run-time incremental 3D face modelling. The model is initially made up upon a set of 3D points derived from stereo grey-scale images. As new areas of the subject face appear to the cameras, new 3D points are automatically added to complete the model. In this way, we can estimate the pose for a wide range of rotation angles, where typically 3D frontal points are occluded.  相似文献   
997.
In peer-to-peer (P2P) networks, trust management is a key tool to minimize the impact of malicious nodes. EigenTrust is claimed to be one of the most powerful distributed reputation management systems focused on P2P file-sharing applications. It is the theoretical base of other systems, and it has also been directly modified in an attempt to improve its performance. However, none of them give appropriate importance to all the information about transactions. This paper proposes an enhancement of EigenTrust, which considers unsatisfactory transactions in greater depth. Pos&Neg EigenTrust is able to obtain a blacklist of the identities of the malicious nodes. Therefore, it is able to significantly reduce the number of unsatisfactory transactions in the network.  相似文献   
998.
Developing fraud management policies and fraud detection systems is a vital capability for financial institutions towards minimising the effect of fraud upon customer service delivery, bottom line financial losses and the adverse impact on the organisation’s brand image reputation. Rapidly changing attacks in real-time financial service platforms continue to demonstrate fraudster’s ability to actively re-engineer their methods in response to ad hoc security protocol deployments, and highlights the distinct gap between the speed of transaction execution within streaming financial data and corresponding fraud technology frameworks that safeguard the platform. This paper presents the design of FFML, a rule-based policy modelling language and encompassing architecture for facilitating the conceptual level expression and implementation of proactive fraud controls within multi-channel financial service platforms. It is demonstrated how a domain specific language can be used to abstract the financial platform into a data stream based information model to reduce policy modelling complexity and deployment latencies through an innovative policy mapping language usable by both expert and non-expert users. FFML is part of a comprehensive suite of assistive tools and knowledge-based systems developed to support fraud analysts’ daily work of designing new high level fraud management policies, mapping into executable code of the underpinning application programming interface and deployment of active monitoring and compliance functionality within the financial platform.  相似文献   
999.
This paper focuses on the robust stability analysis of the filtered Smith predictor (FSP) dead-time compensator for uncertain processes with time-varying delays. For this purpose, a delay-dependent LMI-based condition is used to compute a maximum delay interval and tolerance to model uncertainties such that the closed-loop system remains stable. Some simulation results illustrate that the proposed controller gives larger delays intervals or better performance than similar approaches proposed in literature applied both to stable and unstable processes.  相似文献   
1000.
This paper presents the design, analysis, and performance evaluation of a novel cascade observer for attitude estimation. A sensor-based observer, which resorts to rate gyro readings and a set of vector observations, estimates the rate gyro bias. Afterwards, a cascaded observer explicitly estimates the attitude in the form of a rotation matrix based on the rate gyro measurements, the vector observations, and the estimated gyro bias. The overall error dynamics are globally exponentially stable and the proposed system is computationally efficient. Finally, the resulting estimator is successfully evaluated, in simulation and experimentally, with ground truth data in both cases.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号