首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3157篇
  免费   235篇
  国内免费   91篇
电工技术   112篇
综合类   128篇
化学工业   632篇
金属工艺   176篇
机械仪表   174篇
建筑科学   192篇
矿业工程   66篇
能源动力   134篇
轻工业   355篇
水利工程   55篇
石油天然气   120篇
武器工业   22篇
无线电   290篇
一般工业技术   435篇
冶金工业   196篇
原子能技术   16篇
自动化技术   380篇
  2024年   20篇
  2023年   57篇
  2022年   72篇
  2021年   128篇
  2020年   97篇
  2019年   103篇
  2018年   102篇
  2017年   97篇
  2016年   95篇
  2015年   119篇
  2014年   157篇
  2013年   247篇
  2012年   202篇
  2011年   205篇
  2010年   179篇
  2009年   171篇
  2008年   185篇
  2007年   131篇
  2006年   145篇
  2005年   119篇
  2004年   71篇
  2003年   87篇
  2002年   84篇
  2001年   73篇
  2000年   61篇
  1999年   74篇
  1998年   79篇
  1997年   54篇
  1996年   50篇
  1995年   60篇
  1994年   40篇
  1993年   15篇
  1992年   16篇
  1991年   13篇
  1990年   12篇
  1989年   8篇
  1988年   6篇
  1987年   7篇
  1986年   6篇
  1985年   4篇
  1984年   4篇
  1983年   6篇
  1982年   5篇
  1981年   3篇
  1980年   3篇
  1978年   3篇
  1971年   1篇
  1967年   1篇
  1966年   2篇
  1935年   1篇
排序方式: 共有3483条查询结果,搜索用时 234 毫秒
61.
We study the price of anarchy and the structure of equilibria in network creation games. A network creation game is played by n players {1,2,…,n}, each identified with a vertex of a graph (network), where the strategy of player i, i=1,…,n, is to build some edges adjacent to i. The cost of building an edge is α>0, a fixed parameter of the game. The goal of every player is to minimize its creation cost plus its usage cost. The creation cost of player i is α times the number of built edges. In the SumGame variant, the usage cost of player i is the sum of distances from i to every node of the resulting graph. In the MaxGame variant, the usage cost is the eccentricity of i in the resulting graph of the game. In this paper we improve previously known bounds on the price of anarchy of the game (of both variants) for various ranges of α, and give new insights into the structure of equilibria for various values of α. The two main results of the paper show that for α>273?n all equilibria in SumGame are trees and thus the price of anarchy is constant, and that for α>129 all equilibria in MaxGame are trees and the price of anarchy is constant. For SumGame this answers (almost completely) one of the fundamental open problems in the field—is price of anarchy of the network creation game constant for all values of α?—in an affirmative way, up to a tiny range of α.  相似文献   
62.
In this paper, a fuzzy logic controller (FLC) based variable structure control (VSC) is presented. The main objective is to obtain an improved performance of highly non‐linear unstable systems. New functions for chattering reduction and error convergence without sacrificing invariant properties are proposed. The main feature of the proposed method is that the switching function is added as an additional fuzzy variable and will be introduced in the premise part of the fuzzy rules; together with the state variables. In this work, a tuning of the well known weighting parameters approach is proposed to optimize local and global approximation and modelling capability of the Takagi‐Sugeno (T‐S) fuzzy model to improve the choice of the performance index and minimize it. The main problem encountered is that the T‐S identification method can not be applied when the membership functions are overlapped by pairs. This in turn restricts the application of the T‐S method because this type of membership function has been widely used in control applications. The approach developed here can be considered as a generalized version of the T‐S method. An inverted pendulum mounted on a cart is chosen to evaluate the robustness, effectiveness, accuracy and remarkable performance of the proposed estimation approach in comparison with the original T‐S model. Simulation results indicate the potential, simplicity and generality of the estimation method and the robustness of the chattering reduction algorithm. In this paper, we prove that the proposed estimation algorithm converge the very fast, thereby making it very practical to use. The application of the proposed FLC‐VSC shows that both alleviation of chattering and robust performance are achieved.  相似文献   
63.
This paper presents the Region Splitting and Merging-Fuzzy C-means Hybrid Algorithm (RFHA), an adaptive unsupervised clustering approach for color image segmentation, which is important in image analysis and in understanding pattern recognition and computer vision field. Histogram thresholding technique is applied in the formation of all possible cells, used to split the image into multiple homogeneous regions. The merging technique is applied to merge perceptually close homogeneous regions and obtain better initialization for the Fuzzy C-means clustering approach. Experimental results have demonstrated that the proposed scheme could obtain promising segmentation results, with 12% average improvement in clustering quality and 63% reduction in classification error compared with other existing segmentation approaches.  相似文献   
64.
65.
Various solutions have been proposed to enable mobile users to access location-based services while preserving their location privacy. Some of these solutions are based on a centralized architecture with the participation of a trustworthy third party, whereas some other approaches are based on a mobile peer-to-peer (P2P) architecture. The former approaches suffer from the scalability problem when networks grow large, while the latter have to endure either low anonymization success rates or high communication overheads. To address these issues, this paper deals with an enhanced dual-active spatial cloaking algorithm (EDA) for preserving location privacy in mobile P2P networks. The proposed EDA allows mobile users to collect and actively disseminate their location information to other users. Moreover, to deal with the challenging characteristics of mobile P2P networks, e.g., constrained network resources and user mobility, EDA enables users (1) to perform a negotiation process to minimize the number of duplicate locations to be shared so as to significantly reduce the communication overhead among users, (2) to predict user locations based on the latest available information so as to eliminate the inaccuracy problem introduced by using some out-of-date locations, and (3) to use a latest-record-highest-priority (LRHP) strategy to reduce the probability of broadcasting fewer useful locations. Extensive simulations are conducted for a range of P2P network scenarios to evaluate the performance of EDA in comparison with the existing solutions. Experimental results demonstrate that the proposed EDA can improve the performance in terms of anonymity and service time with minimized communication overhead.  相似文献   
66.
本文着重介绍摩天岭隧道左线进口段反坡施工,多次、多点发生大规模涌水的特点及其成因,并详细介绍了经过专家论证后制定采取的综合治理方案,为长大隧道灰岩地区反坡施工涌水处理提供了宝贵经验。  相似文献   
67.
Matlab是一个数据分析和处理功能十分强大的工程实用软件。为输出提供了十分方便的函数和命令并且Matlab简单直观的图形用户接口易于掌握和使用。本文介绍了一种使用GUI工具箱。用Matlab实现应报信号发生器的设计。文章设计的信号发生器可以加深对信号处理概念的理解,具有一定的借鉴应用价值。  相似文献   
68.
本文结合一个小实例提出了几种混合编程的方法。  相似文献   
69.
提出了FCMAC网络的一种基于NiosII的软硬件协同设计方法,解决了FCMAC软件实现速度慢、硬件实现耗资源的不足。通过Matlab仿真得出FCMAC网络的各参数。分析影响软件实现FCMAC速度的关键算法,对FCMAC算法进行软硬件划分。在NiosII IDE开发环境下,基于C实现软件模块,以用户自定义指令形式实现硬件模块和软硬件的衔接,即完成软硬件的协同设计。试验结果表明,FCMAC的软硬件协同实现在软件实现速度慢、硬件实现耗资源之间实现了折中,可通过不同的软硬件划分,实现速度与资源的互换。  相似文献   
70.
Network traffic classification based on ensemble learning and co-training   总被引:4,自引:0,他引:4  
Classification of network traffic is the essential step for many network researches. However,with the rapid evolution of Internet applications the effectiveness of the port-based or payload-based identifi-cation approaches has been greatly diminished in recent years. And many researchers begin to turn their attentions to an alternative machine learning based method. This paper presents a novel machine learning-based classification model,which combines ensemble learning paradigm with co-training tech-niques. Compared to previous approaches,most of which only employed single classifier,multiple clas-sifiers and semi-supervised learning are applied in our method and it mainly helps to overcome three shortcomings:limited flow accuracy rate,weak adaptability and huge demand of labeled training set. In this paper,statistical characteristics of IP flows are extracted from the packet level traces to establish the feature set,then the classification model is created and tested and the empirical results prove its feasibility and effectiveness.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号