首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1760篇
  免费   104篇
  国内免费   1篇
工业技术   1865篇
  2023年   22篇
  2022年   38篇
  2021年   37篇
  2020年   50篇
  2019年   51篇
  2018年   55篇
  2017年   65篇
  2016年   66篇
  2015年   53篇
  2014年   63篇
  2013年   125篇
  2012年   109篇
  2011年   151篇
  2010年   99篇
  2009年   98篇
  2008年   111篇
  2007年   87篇
  2006年   87篇
  2005年   72篇
  2004年   58篇
  2003年   47篇
  2002年   39篇
  2001年   15篇
  2000年   15篇
  1999年   25篇
  1998年   24篇
  1997年   35篇
  1996年   23篇
  1995年   16篇
  1994年   19篇
  1993年   18篇
  1992年   11篇
  1991年   8篇
  1990年   9篇
  1989年   6篇
  1988年   10篇
  1987年   5篇
  1986年   4篇
  1985年   4篇
  1984年   6篇
  1983年   5篇
  1982年   5篇
  1977年   5篇
  1976年   4篇
  1975年   3篇
  1974年   1篇
  1973年   1篇
  1971年   1篇
  1967年   1篇
  1954年   1篇
排序方式: 共有1865条查询结果,搜索用时 0 毫秒
31.
Motion study of the hip joint in extreme postures   总被引:2,自引:0,他引:2  
Many causes can be at the origin of hip osteoarthritis (e.g., cam/pincer impingements), but the exact pathogenesis for idiopathic osteoarthritis has not yet been clearly delineated. The aim of the present work is to analyze the consequences of repetitive extreme hip motion on the labrum cartilage. Our hypothesis is that extreme movements can induce excessive labral deformations and lead to early arthritis. To verify this hypothesis, an optical motion capture system is used to estimate the kinematics of patient-specific hip joint, while soft tissue artifacts are reduced with an effective correction method. Subsequently, a physical simulation system is used during motion to compute accurate labral deformations and to assess the global pressure of the labrum, as well as any local pressure excess that may be physiologically damageable. Results show that peak contact pressures occur at extreme hip flexion/abduction and that the pressure distribution corresponds with radiologically observed damage zones in the labrum.
Nadia Magnenat-ThalmannEmail:
  相似文献   
32.
We present a Hoare logic for proving semantic security and determining exact security bounds of a block cipher mode of operation. We propose a simple yet expressive programming language to specify encryption modes, semantic functions for each command (statement) in the language, an assertion language that allows to state predicates and axioms, and rules to propagate the predicates through the commands of a program. We also provide heuristics for finding loop invariants that are necessary for the application of our rule on for-loops. This enables us to prove the security of protocols that take arbitrary length messages as input. We implemented a prototype that uses this logic to automatically prove the security of block cipher modes of operation. This prototype can prove the security of many standard modes of operation, such as Cipher Block Chaining (CBC), Cipher FeedBack mode (CFB), Output FeedBack (OFB), and CounTeR mode (CTR).  相似文献   
33.
Multiple human pose estimation is an important yet challenging problem. In an operating room (OR) environment, the 3D body poses of surgeons and medical staff can provide important clues for surgical workflow analysis. For that purpose, we propose an algorithm for localizing and recovering body poses of multiple human in an OR environment under a multi-camera setup. Our model builds on 3D Pictorial Structures and 2D body part localization across all camera views, using convolutional neural networks (ConvNets). To evaluate our algorithm, we introduce a dataset captured in a real OR environment. Our dataset is unique, challenging and publicly available with annotated ground truths. Our proposed algorithm yields to promising pose estimation results on this dataset.  相似文献   
34.
This article investigates portfolio management in double unknown situations. Double unknown refers to a situation in which the level of uncertainty is high and both technology and markets are as yet unknown. This situation can be an opportunity for new discoveries, creation of new performance solutions and giving direction to portfolio structuring. The literature highlights that the double unknown situation is a prerequisite to designing generic technologies that are able to address many existing and emerging markets and create value across a broad range of applications. The purpose of this paper is to investigate the initial phases of generic technology governance and associated portfolio structuring in multi‐project firms. We studied three empirical contexts of portfolio structuring at the European semiconductor provider STMicroelectronics. The results demonstrate that (1) portfolio management for generic technologies is highly transversal and comprises creating both modules to address market complementarities and the core element of a technological system – the platform, and (2) the design of generic technologies requires ‘cross‐application’ managers who are able to supervise the interactions among innovative concepts developed in different business and research groups and who are responsible for structuring and managing technological and marketing exploration portfolios within the organizational structures of a company.  相似文献   
35.
The objective of this paper is to elucidate an organizational process for the design of generic technologies (GTs). While recognizing the success of GTs, the literature on innovation management generally describes their design according to evolutionary strategies featuring multiple and uncertain trials, resulting in the discovery of common features among multiple applications. This random walk depends on multiple market and technological uncertainties that are considered exogenous: as smart as he can be, the ‘gambler’ must play in a given probability space. However, what happens when the innovator is not a gambler but a designer, i.e., when the actor is able to establish new links between previously independent emerging markets and technologies? Formally speaking, the actor designs a new probability space. Building on a case study of two technological development programmes at the French Center for Atomic Energy, we present cases of GTs that correspond to this logic of designing the probability space, i.e. the logic of intentionally designing common features that bridge the gap between a priori heterogeneous applications and technologies. This study provides another example showing that the usual trial‐and‐learning strategy is not the only strategy to design GTs and that these technologies can be designed by intentionally building new interdependences between markets and technologies. Our main result is that building these interdependences requires organizational patterns that correspond to a ‘design of exploration’ phase in which multiple technology suppliers and application providers are involved in designing both the probability space itself and the instruments to explore and benefit from this new space.  相似文献   
36.
37.
An important question for the upcoming Semantic Web is how to best combine open world ontology languages, such as the OWL-based ones, with closed world rule-based languages. One of the most mature proposals for this combination is known as hybrid MKNF knowledge bases (Motik and Rosati, 2010 [52]), and it is based on an adaptation of the Stable Model Semantics to knowledge bases consisting of ontology axioms and rules. In this paper we propose a well-founded semantics for nondisjunctive hybrid MKNF knowledge bases that promises to provide better efficiency of reasoning, and that is compatible with both the OWL-based semantics and the traditional Well-Founded Semantics for logic programs. Moreover, our proposal allows for the detection of inconsistencies, possibly occurring in tightly integrated ontology axioms and rules, with only little additional effort. We also identify tractable fragments of the resulting language.  相似文献   
38.
A new DFM approach to combine machining and additive manufacturing   总被引:1,自引:0,他引:1  
Design for manufacturing (DFM) approaches aim to integrate manufacturability aspects during the design stage. Most of DFM approaches usually consider only one manufacturing process, but product competitiveness may be improved by designing hybrid modular products, in which products are seen as 3-D puzzles with modules realized individually by the best manufacturing process and further gathered. A new DFM system is created in order to give quantitative information during the product design stage of which modules will benefit in being machined and which ones will advantageously be realized by an additive process (such as Selective Laser Sintering or laser deposition). A methodology for a manufacturability evaluation in case of a subtractive or an additive manufacturing process is developed and implemented in a CAD software. Tests are carried out on industrial products from automotive industry.  相似文献   
39.
Because of the distortions produced by the insertion of a mirror, catadioptric images cannot be processed similarly to classical perspective images. Now, although the equivalence between such images and spherical images is well known, the use of spherical harmonic analysis often leads to image processing methods which are more difficult to implement. In this paper, we propose to define catadioptric image processing from the geodesic metric on the unitary sphere. We show that this definition allows to adapt very simply classical image processing methods. We focus more particularly on image gradient estimation, interest point detection, and matching. More generally, the proposed approach extends traditional image processing techniques based on Euclidean metric to central catadioptric images. We show in this paper the efficiency of the approach through different experimental results and quantitative evaluations.  相似文献   
40.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号