首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4076篇
  免费   320篇
  国内免费   2篇
电工技术   25篇
综合类   2篇
化学工业   721篇
金属工艺   62篇
机械仪表   78篇
建筑科学   159篇
矿业工程   11篇
能源动力   80篇
轻工业   749篇
水利工程   39篇
石油天然气   14篇
无线电   210篇
一般工业技术   755篇
冶金工业   879篇
原子能技术   13篇
自动化技术   601篇
  2024年   6篇
  2023年   26篇
  2022年   24篇
  2021年   82篇
  2020年   83篇
  2019年   83篇
  2018年   140篇
  2017年   143篇
  2016年   150篇
  2015年   128篇
  2014年   168篇
  2013年   316篇
  2012年   280篇
  2011年   263篇
  2010年   208篇
  2009年   200篇
  2008年   212篇
  2007年   180篇
  2006年   123篇
  2005年   95篇
  2004年   98篇
  2003年   84篇
  2002年   87篇
  2001年   52篇
  2000年   48篇
  1999年   56篇
  1998年   316篇
  1997年   188篇
  1996年   133篇
  1995年   87篇
  1994年   59篇
  1993年   61篇
  1992年   24篇
  1991年   28篇
  1990年   25篇
  1989年   14篇
  1988年   17篇
  1987年   13篇
  1986年   9篇
  1985年   10篇
  1984年   4篇
  1983年   9篇
  1982年   8篇
  1981年   6篇
  1980年   3篇
  1979年   3篇
  1977年   10篇
  1976年   24篇
  1975年   3篇
  1972年   2篇
排序方式: 共有4398条查询结果,搜索用时 31 毫秒
81.
The efficient use of resources is a matter of great concern in today’s society, especially in the energy sector. Although the main strategy to decrease energy use has long been focused on supply, over the last few years, there has been a shift to the demand side. Under this new line of action, demand-side management networks have emerged and extended from the household level to larger installations, with the appearance of the concepts of Smart Grids and even Smart Cities. The extended use of Smart Meters for measuring residential electricity consumption facilitates the creation of such intelligent environments. In this context, this article proposes a system which extracts value from the collected consumer information to identify the appliances belonging to that smart environment by means of machine learning techniques. Considering the large amount of information that would be handled when millions of homes were sending data, big data technology has been used. An experiment to evaluate the classification method was carried out with seven devices and three different configurations. The results are also reported, achieving promising results, with recognition rates of 75 % after 1 h of training and 100 % after 4 h.  相似文献   
82.
83.
84.
Edge matching puzzles have been amongst us for a long time now and traditionally they have been considered, both, a children’s game and an interesting mathematical divertimento. Their main characteristics have already been studied, and their worst-case complexity has been properly classified as a NP-complete problem. It is in recent times, specially after being used as the problem behind a money-prized contest, with a prize of 2US$ million for the first solver, that edge matching puzzles have attracted mainstream attention from wider audiences, including, of course, computer science people working on solving hard problems. We consider these competitions as an interesting opportunity to showcase SAT/CSP solving techniques when confronted to a real world problem to a broad audience, a part of the intrinsic, i.e. monetary, interest of such a contest. This article studies the NP-complete problem known as edge matching puzzle using SAT and CSP approaches for solving it. We will focus on providing, first and foremost, a theoretical framework, including a generalized definition of the problem. We will design and show algorithms for easy and fast problem instances generation, generators with easily tunable hardness. Afterwards we will provide with SAT and CSP models for the problems and we will study problem complexity, both typical case and worst-case complexity. We will also provide some specially crafted heuristics that result in a boost in solving time and study which is the effect of such heuristics.  相似文献   
85.
This paper describes the generation of temporally anchored infobox attribute data from the Wikipedia history of revisions. By mining (attribute, value) pairs from the revision history of the English Wikipedia we are able to collect a comprehensive knowledge base that contains data on how attributes change over time. When dealing with the Wikipedia edit history, vandalic and erroneous edits are a concern for data quality. We present a study of vandalism identification in Wikipedia edits that uses only features from the infoboxes, and show that we can obtain, on this dataset, an accuracy comparable to a state-of-the-art vandalism identification method that is based on the whole article. Finally, we discuss different characteristics of the extracted dataset, which we make available for further study.  相似文献   
86.
Cloud computing is posing several challenges, such as security, fault tolerance, access interface singularity, and network constraints, both in terms of latency and bandwidth. In this scenario, the performance of communications depends both on the network fabric and its efficient support in virtualized environments, which ultimately determines the overall system performance. To solve the current network constraints in cloud services, their providers are deploying high-speed networks, such as 10 Gigabit Ethernet. This paper presents an evaluation of high-performance computing message-passing middleware on a cloud computing infrastructure, Amazon EC2 cluster compute instances, equipped with 10 Gigabit Ethernet. The analysis of the experimental results, confronted with a similar testbed, has shown the significant impact that virtualized environments still have on communication performance, which demands more efficient communication middleware support to get over the current cloud network limitations.  相似文献   
87.
Transfer in variable-reward hierarchical reinforcement learning   总被引:2,自引:1,他引:1  
Transfer learning seeks to leverage previously learned tasks to achieve faster learning in a new task. In this paper, we consider transfer learning in the context of related but distinct Reinforcement Learning (RL) problems. In particular, our RL problems are derived from Semi-Markov Decision Processes (SMDPs) that share the same transition dynamics but have different reward functions that are linear in a set of reward features. We formally define the transfer learning problem in the context of RL as learning an efficient algorithm to solve any SMDP drawn from a fixed distribution after experiencing a finite number of them. Furthermore, we introduce an online algorithm to solve this problem, Variable-Reward Reinforcement Learning (VRRL), that compactly stores the optimal value functions for several SMDPs, and uses them to optimally initialize the value function for a new SMDP. We generalize our method to a hierarchical RL setting where the different SMDPs share the same task hierarchy. Our experimental results in a simplified real-time strategy domain show that significant transfer learning occurs in both flat and hierarchical settings. Transfer is especially effective in the hierarchical setting where the overall value functions are decomposed into subtask value functions which are more widely amenable to transfer across different SMDPs.  相似文献   
88.
The problem of efficient resource location is an important open issue in P2P systems. This paper introduces DANTE, a self-adapting P2P system that changes its peer links to form topologies where resources are located in an efficient manner via random walks. Additionally, this same self-adaptation capacity makes DANTE capable of reacting to events like changes in the system load or attacks on well-connected nodes by adjusting the topology to the new scenario. This adaptive behavior emerges as the global result of the individual work of nodes, without the intervention of any central entity or the need for global knowledge. Simulations show that this adaptation process makes the system scalable, resilient to attacks, and tolerant to a high transitivity of peers. Simulations are also used to compare this solution with other well-known self-adapting P2P system. From these results it can be concluded that the topologies achieved by DANTE offer better performance.  相似文献   
89.
This article presents an adaptive approach to improving the infection algorithm that we have used to solve the dense stereo matching problem. The algorithm presented here incorporates two different epidemic automata along a single execution of the infection algorithm. The new algorithm attempts to provide a general behavior of guessing the best correspondence between a pair of images. Our aim is to provide a new strategy inspired by evolutionary computation, which combines the behaviors of both automata into a single correspondence problem. The new algorithm will decide which automata will be used based on the transmission of information and mutation, as well as the attributes, texture, and geometry, of the input images. This article gives details about how the rules used in the infection algorithm are coded. Finally, we show experiments with a real stereo pair, as well as with a standard test bed, to show how the infection algorithm works.  相似文献   
90.
Partial discharges are a transient phenomena whose measurement is remarkably important for electrical equipment diagnosis and maintenance. These discharges appear in the measurement circuit as very narrow current pulses of some nanoseconds. Therefore, discharge pulse detection is a particularly difficult problem, especially because they are superposed on the high voltage waveforms that cause them. In this paper, we present an inductively coupled probe able to measure this physical phenomenon by means of a very simple and inexpensive device that can be installed in the equipment under test. After modeling the probe, its response will be compared to that of commercial devices using both calibrated discharges and partial discharges occurring at real power.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号