首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1378篇
  免费   72篇
  国内免费   4篇
电工技术   15篇
综合类   1篇
化学工业   334篇
金属工艺   25篇
机械仪表   20篇
建筑科学   52篇
矿业工程   12篇
能源动力   47篇
轻工业   79篇
水利工程   9篇
石油天然气   12篇
无线电   105篇
一般工业技术   382篇
冶金工业   84篇
原子能技术   28篇
自动化技术   249篇
  2024年   2篇
  2023年   17篇
  2022年   16篇
  2021年   51篇
  2020年   34篇
  2019年   36篇
  2018年   36篇
  2017年   50篇
  2016年   39篇
  2015年   47篇
  2014年   63篇
  2013年   117篇
  2012年   89篇
  2011年   109篇
  2010年   68篇
  2009年   56篇
  2008年   90篇
  2007年   77篇
  2006年   58篇
  2005年   56篇
  2004年   37篇
  2003年   49篇
  2002年   43篇
  2001年   18篇
  2000年   13篇
  1999年   13篇
  1998年   13篇
  1997年   18篇
  1996年   14篇
  1995年   9篇
  1994年   13篇
  1993年   13篇
  1992年   7篇
  1991年   7篇
  1990年   5篇
  1989年   11篇
  1987年   3篇
  1986年   3篇
  1985年   2篇
  1984年   6篇
  1983年   7篇
  1982年   5篇
  1981年   2篇
  1980年   3篇
  1979年   7篇
  1976年   3篇
  1971年   5篇
  1969年   2篇
  1955年   1篇
  1954年   1篇
排序方式: 共有1454条查询结果,搜索用时 15 毫秒
31.
This paper studies a heavy-tailed stochastic volatility (SV) model with leverage effect, where a bivariate Student-t distribution is used to model the error innovations of the return and volatility equations. Choy et al. (2008) studied this model by expressing the bivariate Student-t distribution as a scale mixture of bivariate normal distributions. We propose an alternative formulation by first deriving a conditional Student-t distribution for the return and a marginal Student-t distribution for the log-volatility and then express these two Student-t distributions as a scale mixture of normal (SMN) distributions. Our approach separates the sources of outliers and allows for distinguishing between outliers generated by the return process or by the volatility process, and hence is an improvement over the approach of Choy et al. (2008). In addition, it allows an efficient model implementation using the WinBUGS software. A simulation study is conducted to assess the performance of the proposed approach and its comparison with the approach by Choy et al. (2008). In the empirical study, daily exchange rate returns of the Australian dollar to various currencies and daily stock market index returns of various international stock markets are analysed. Model comparison relies on the Deviance Information Criterion and convergence diagnostic is monitored by Geweke’s convergence test.  相似文献   
32.
This paper proposes an approach that solves the Robot Localization problem by using a conditional state-transition Hidden Markov Model (HMM). Through the use of Self Organized Maps (SOMs) a Tolerant Observation Model (TOM) is built, while odometer-dependent transition probabilities are used for building an Odometer-Dependent Motion Model (ODMM). By using the Viterbi Algorithm and establishing a trigger value when evaluating the state-transition updates, the presented approach can easily take care of Position Tracking (PT), Global Localization (GL) and Robot Kidnapping (RK) with an ease of implementation difficult to achieve in most of the state-of-the-art localization algorithms. Also, an optimization is presented to allow the algorithm to run in standard microprocessors in real time, without the need of huge probability gridmaps.  相似文献   
33.
An additive spectral method for fuzzy clustering is proposed. The method operates on a clustering model which is an extension of the spectral decomposition of a square matrix. The computation proceeds by extracting clusters one by one, which makes the spectral approach quite natural. The iterative extraction of clusters, also, allows us to draw several stopping rules to the procedure. This applies to several relational data types differently normalized: network structure data (the first eigenvector subtracted), affinity between multidimensional vectors (the pseudo-inverse Laplacian transformation), and conventional relational data including in-house data of similarity between research topics according to working of a research center. The method is experimentally compared with several classic and recent techniques and shown to be competitive.  相似文献   
34.
A variational method of generating a structured mesh on a two-dimensional domain is considered. To this end, a quasiconformal mapping of the parametric domain with a given Cartesian mesh onto the underlying physical domain is used. The functions implementing the mapping are sought by solving the Dirichlet problem for the system of elliptic second-order partial differential equations. An additional control for the cell shape is executed by introducing a local mapping which induces a control metric. In some particular cases, instead of an additional local mapping, a global mapping of the parametric domain onto the intermediate domain is used, where the curvilinear mesh is produced, and next this domain is mapped onto the underlying physical domain. The control metric allows to obtain a mesh with required properties: grid line orthogonality and prescribed mesh point clustering near the domain boundary. Examples of mesh in the annulus and near airfoil are presented.  相似文献   
35.
The linear partially observed discrete-continuous (hybrid) stochastic controllable system described by differential equations with measures is considered. The optimal filtering equations in the form of generalized Kalman filter are obtained in the case of non-anticipating control. This result could be a theoretical basis for the optimal control in stochastic hybrid systems with incomplete information.  相似文献   
36.
A substantial portion of the database programming efforts are invested in integrity constraints enforcement. Traditionally, both the constraint semantics and their enforcement were embedded inside application programs. In recent years several studies have dealt with specifying integrity constraints as separate entities (e.g. rules), and relating the database consistency requirements to these rules. In this paper we deal with the complementary issue of stabilizing the database when update exceptions occur. While a simplistic approach is to abort any transaction that inflicts consistency violations, this is not always the desired action. We take advantage of the empirical observation that most of the exception-handling policies follow a small number of behavior patterns. Unlike some previous approaches that base their repair solution on syntactic analysis of the constraints and performance issues, we base our approach on the application semantics as reflected in these behavioral patterns. We describe a model that uses high-level abstractions called stabilizer types denoting these behavior patterns for consistency restorations, whose exact semantics is case dependent. It follows the fault tolerance's self-stabilization approach. An inference mechanism translates these abstractions into executable active rules. This approach provides high-level language to the exception handling portion of the application and substantially reduces the required programming.  相似文献   
37.
Ellipsoidal outer-bounding of the set of all feasible state vectors under model uncertainty is a natural extension of state estimation for deterministic models with unknown-but-bounded state perturbations and measurement noise. The technique described in this paper applies to linear discrete-time dynamic systems; it can also be applied to weakly non-linear systems if non-linearity is replaced by uncertainty. Many difficulties arise because of the non-convexity of feasible sets. Combined quadratic constraints on model uncertainty and additive disturbances are considered in order to simplify the analysis. Analytical optimal or suboptimal solutions of the basic problems involved in parameter or state estimation are presented, which are counterparts in this context of uncertain models to classical approximations of the sum and intersection of ellipsoids. The results obtained for combined quadratic constraints are extended to other types of model uncertainty.  相似文献   
38.
In large‐scale fires, the input of energy to burning materials occurs predominantly by radiative transfer. The in‐depth (rather than just surface) absorption of radiant energy by a polymer influences its ignition time and burning rate. The present investigation examines two methods for obtaining the absorption coefficient of polymers for infrared radiation from high‐temperature sources: a broadband method and a spectral method. Data on the total average broadband transmittance for 11 thermoplastics are presented (as are reflectance data), and the absorption coefficient is found to vary with thickness. Implications for modeling of mass loss experiments are discussed. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   
39.
Quantum Key Recycling (QKR) is a quantum cryptographic primitive that allows one to reuse keys in an unconditionally secure way. By removing the need to repeatedly generate new keys, it improves communication efficiency. ?kori? and de Vries recently proposed a QKR scheme based on 8-state encoding (four bases). It does not require quantum computers for encryption/decryption but only single-qubit operations. We provide a missing ingredient in the security analysis of this scheme in the case of noisy channels: accurate upper bounds on the required amount of privacy amplification. We determine optimal attacks against the message and against the key, for 8-state encoding as well as 4-state and 6-state conjugate coding. We provide results in terms of min-entropy loss as well as accessible (Shannon) information. We show that the Shannon entropy analysis for 8-state encoding reduces to the analysis of quantum key distribution, whereas 4-state and 6-state suffer from additional leaks that make them less effective. From the optimal attacks we compute the required amount of privacy amplification and hence the achievable communication rate (useful information per qubit) of qubit-based QKR. Overall, 8-state encoding yields the highest communication rates.  相似文献   
40.
Kolmogorov complexity furnishes many useful tools for studying different natural processes that can be expressed using sequences of symbols from a finite alphabet (texts), such as genetic texts, literary and music texts, animal communications, etc. Although Kolmogorov complexity is not algorithmically computable, in a certain sense it can be estimated by means of data compressors. Here we suggest a method of analysis of sequences based on ideas of Kolmogorov complexity and mathematical statistics, and apply this method to biological (ethological) ??texts.?? A distinction of the suggested method from other approaches to the analysis of sequential data by means of Kolmogorov complexity is that it belongs to the framework of mathematical statistics, more specifically, that of hypothesis testing. This makes it a promising candidate for being included in the toolbox of standard biological methods of analysis of different natural texts, from DNA sequences to animal behavioural patterns (ethological ??texts??). Two examples of analysis of ethological texts are considered in this paper. Theses examples show that the proposed method is a useful tool for distinguishing between stereotyped and flexible behaviours, which is important for behavioural and evolutionary studies.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号