首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4186篇
  免费   354篇
  国内免费   27篇
电工技术   54篇
综合类   25篇
化学工业   1160篇
金属工艺   135篇
机械仪表   217篇
建筑科学   168篇
矿业工程   11篇
能源动力   229篇
轻工业   342篇
水利工程   97篇
石油天然气   63篇
武器工业   3篇
无线电   363篇
一般工业技术   717篇
冶金工业   138篇
原子能技术   33篇
自动化技术   812篇
  2024年   17篇
  2023年   60篇
  2022年   82篇
  2021年   216篇
  2020年   240篇
  2019年   286篇
  2018年   375篇
  2017年   325篇
  2016年   296篇
  2015年   187篇
  2014年   325篇
  2013年   511篇
  2012年   363篇
  2011年   347篇
  2010年   221篇
  2009年   217篇
  2008年   117篇
  2007年   100篇
  2006年   62篇
  2005年   32篇
  2004年   29篇
  2003年   20篇
  2002年   20篇
  2001年   13篇
  2000年   13篇
  1999年   19篇
  1998年   5篇
  1997年   6篇
  1996年   6篇
  1995年   12篇
  1994年   3篇
  1993年   6篇
  1992年   4篇
  1991年   4篇
  1990年   4篇
  1989年   4篇
  1988年   2篇
  1986年   2篇
  1984年   6篇
  1982年   5篇
  1980年   1篇
  1979年   1篇
  1978年   1篇
  1974年   1篇
  1967年   1篇
排序方式: 共有4567条查询结果,搜索用时 15 毫秒
91.
There has been a growing interest in combining both neural network and fuzzy system, and as a result, neuro-fuzzy computing techniques have been evolved. ANFIS (adaptive network-based fuzzy inference system) model combined the neural network adaptive capabilities and the fuzzy logic qualitative approach. In this paper, a novel structure of unsupervised ANFIS is presented to solve differential equations. The presented solution of differential equation consists of two parts; the first part satisfies the initial/boundary condition and has no adjustable parameter whereas the second part is an ANFIS which has no effect on initial/boundary conditions and its adjustable parameters are the weights of ANFIS. The algorithm is applied to solve differential equations and the results demonstrate its accuracy and convince us to use ANFIS in solving various differential equations.  相似文献   
92.
This paper presents a new individual based optimization algorithm, which is inspired from asexual reproduction known as a remarkable biological phenomenon, called as asexual reproduction optimization (ARO). ARO can be essentially considered as an evolutionary based algorithm that mathematically models the budding mechanism of asexual reproduction. In ARO, a parent produces a bud through a reproduction operator; thereafter the parent and its bud compete to survive according to a performance index obtained from the underlying objective function of the optimization problem; this leads to the fitter individual. ARO adaptive search ability along with its strength and weakness points are fully described in the paper. Furthermore, the ARO convergence to the global optimum is mathematically analyzed. To approve the effectiveness of the ARO performance, it is tested with several benchmark functions frequently used in the area of optimization. Finally, the ARO performance is statistically compared with that of an improved genetic algorithm (GA). Results of simulation illustrate that ARO remarkably outperforms GA.  相似文献   
93.
Data envelopment analysis (DEA) models assume real‐valued inputs and outputs, but on many occasions, some inputs and/or outputs can only take integer values. In these cases, using DEA models can result in misleading efficiency assessments and inaccurate performance targets. In this paper, we propose an enumeration algorithm for computing efficiency scores and performance targets of decision‐making units with integer value inputs/outputs. In the presented algorithm, we do not use any of the mixed integer linear programming (MILP) models that are used in previous studies. We show that the result of our algorithm and that of the MILP model presented in this context is the same. We also generalize our algorithm for different types of returns to scale as well as for the hybrid setting with real‐valued data.  相似文献   
94.
The general problem of answering top-k queries can be modeled using lists of data items sorted by their local scores. The main algorithm proposed so far for answering top-k queries over sorted lists is the Threshold Algorithm (TA). However, TA may still incur a lot of useless accesses to the lists. In this paper, we propose two algorithms that are much more efficient than TA. First, we propose the best position algorithm (BPA). For any database instance (i.e. set of sorted lists), we prove that BPA stops as early as TA, and that its execution cost is never higher than TA. We show that there are databases over which BPA executes top-k queries O(m) times faster than that of TA, where m is the number of lists. We also show that the execution cost of our algorithm can be (m−1) times lower than that of TA. Second, we propose the BPA2 algorithm, which is much more efficient than BPA. We show that the number of accesses to the lists done by BPA2 can be about (m−1) times lower than that of BPA. We evaluated the performance of our algorithms through extensive experimental tests. The results show that over our test databases, BPA and BPA2 achieve significant performance gains in comparison with TA.  相似文献   
95.
Content distribution networks (CDN) are fundamental, yet expensive technologies for distributing the content of web-servers to large audiences. The P2P model is a perfect match to build a low-cost and scalable CDN infrastructure for popular websites by exploiting the underutilized resources of their user communities. However, building a P2P-based CDN is not a straightforward endeavor. In contrast to traditional CDNs, peers are autonomous and volunteer participants with their own heterogeneous interests that should be taken into account in the design of the P2P system. Moreover, churn rate is much higher than in dedicated CDN infrastructures, which can easily destabilize the system and severely degrade the performance. Finally and foremostly, while many P2P systems abstract any topological information about the underlying network, a top priority of a CDN is to incorporate locality-awareness in query routing in order to locate close-by content. This paper aims at building a P2P CDN with high performance, scalability and robustness. Our proposed protocols combine DHT efficiency with gossip robustness and take into account the interests and localities of peers. In short, Flower-CDN provides a hybrid and locality-aware routing infrastructure for user queries. PetalUp-CDN is a highly scalable version of Flower-CDN that dynamically adapts to variable rates of participation and prevent overload situations. In addition, we ensure the robustness of our P2P CDN via low-cost maintenance protocols that can detect and recover from churn and dynamicity. Our extensive performance evaluation shows that our protocols yield high performance gains under both static and highly dynamic environments. Furthermore, they incur acceptable and tunable overhead. Finally we provide main guidelines to deploy Flower-CDN for the public use.  相似文献   
96.
97.
The bipartite edge frustration of a graph G, denoted by φ(G), is the smallest number of edges that have to be deleted from G to obtain a bipartite spanning subgraph of G. This topological index is related to the well-known Max-cut problem, and has important applications in computing stability of fullerenes. In this paper, the bipartite edge frustration of an infinite family of fullerenes is computed. Moreover, this quantity for four classes of graphs arising from a given graph under different types of edge subdivisions is investigated.  相似文献   
98.
This study presents an intelligent model based on fuzzy systems for making a quantitative formulation between seismic attributes and petrophysical data. The proposed methodology comprises two major steps. Firstly, the petrophysical data, including water saturation (Sw) and porosity, are predicted from seismic attributes using various fuzzy inference systems (FISs), including Sugeno (SFIS), Mamdani (MFIS) and Larsen (LFIS). Secondly, a committee fuzzy inference system (CFIS) is constructed using a hybrid genetic algorithms-pattern search (GA-PS) technique. The inputs of the CFIS model are the outputs and averages of the FIS petrophysical data. The methodology is illustrated using 3D seismic and petrophysical data of 11 wells of an Iranian offshore oil field in the Persian Gulf. The performance of the CFIS model is compared with a probabilistic neural network (PNN). The results show that the CFIS method performed better than neural network, the best individual fuzzy model and a simple averaging method.  相似文献   
99.
In recent years, network coding has emerged as a new communication paradigm that can significantly improve the efficiency of network protocols by requiring intermediate nodes to mix packets before forwarding them. Recently, several real-world systems have been proposed to leverage network coding in wireless networks. Although the theoretical foundations of network coding are well understood, a real-world system needs to solve a plethora of practical aspects before network coding can meet its promised potential. These practical design choices expose network coding systems to a wide range of attacks.We identify two general frameworks (inter-flow and intra-flow) that encompass several network coding-based systems proposed in wireless networks. Our systematic analysis of the components of these frameworks reveals vulnerabilities to a wide range of attacks, which may severely degrade system performance. Then, we identify security goals and design challenges in achieving security for network coding systems. Adequate understanding of both the threats and challenges is essential to effectively design secure practical network coding systems. Our paper should be viewed as a cautionary note pointing out the frailty of current network coding-based wireless systems and a general guideline in the effort of achieving security for network coding systems.  相似文献   
100.
Computer-aided process planning (CAPP) is an important interface between computer-aided design (CAD) and computer-aided manufacturing (CAM) in the computer integrated manufacturing (CIM) environment. A good process plan of a part is built up based on two elements: (1) optimized sequence of the operations of the part; and (2) optimized selection of the machine, cutting tool and tool access direction (TAD) for each operation. On the other hand, two levels of planning in the process planning is suggested: (1) preliminary and (2) secondary and detailed planning. In this paper for the preliminary stage, the feasible sequences of operations are generated based on the analysis of constraints and using a genetic algorithm (GA). Then in the detailed planning stage, using a genetic algorithm again which prunes the initial feasible sequences, the optimized operations sequence and the optimized selection of the machine, cutting tool, and TAD for each operation are obtained. By applying the proposed GA in two levels of planning, the CAPP system can generate optimal or near-optimal process plans based on a selected criterion. A number of case studies are carried out to demonstrate the feasibility and robustness of the proposed algorithm. This algorithm performs well on all the test problems, exceeding or matching the solution quality of the results reported in the literature for most problems. The main contribution of this work is to emerge the preliminary and detailed planning, implementation of compulsive and additive constraints, optimization sequence of the operations of the part, and optimization selection of machine, cutting tool and TAD for each operation using the proposed GA, simultaneously.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号