首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9871篇
  免费   708篇
  国内免费   10篇
电工技术   106篇
综合类   4篇
化学工业   2554篇
金属工艺   190篇
机械仪表   285篇
建筑科学   422篇
矿业工程   36篇
能源动力   391篇
轻工业   1218篇
水利工程   90篇
石油天然气   43篇
无线电   682篇
一般工业技术   1778篇
冶金工业   788篇
原子能技术   64篇
自动化技术   1938篇
  2024年   25篇
  2023年   126篇
  2022年   137篇
  2021年   476篇
  2020年   293篇
  2019年   312篇
  2018年   401篇
  2017年   400篇
  2016年   401篇
  2015年   332篇
  2014年   474篇
  2013年   820篇
  2012年   669篇
  2011年   830篇
  2010年   578篇
  2009年   568篇
  2008年   511篇
  2007年   494篇
  2006年   382篇
  2005年   299篇
  2004年   245篇
  2003年   251篇
  2002年   210篇
  2001年   119篇
  2000年   122篇
  1999年   101篇
  1998年   120篇
  1997年   125篇
  1996年   86篇
  1995年   75篇
  1994年   57篇
  1993年   52篇
  1992年   35篇
  1991年   35篇
  1990年   36篇
  1989年   37篇
  1988年   21篇
  1987年   20篇
  1986年   22篇
  1985年   31篇
  1984年   16篇
  1983年   21篇
  1982年   22篇
  1981年   16篇
  1980年   20篇
  1979年   18篇
  1978年   23篇
  1977年   12篇
  1976年   28篇
  1975年   13篇
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
91.
There have been few attempts, so far, to document the history of artificial intelligence. It is argued that the historical sociology of scientific knowledge can provide a broad historiographical approach for the history of AI, particularly as it has proved fruitful within the history of science in recent years. The article shows how the sociology of knowledge can inform and enrich four types of project within the history of AI; organizational history; AI viewed as technology; AI viewed as cognitive science and historical biography. In the latter area the historical treatments of Darwin and Turing are compared to warn against the pitfalls of rational reconstructions of the past.  相似文献   
92.

This paper proposes an improved version of a recently proposed modified simulated annealing algorithm (MSAA) named as an improved MSAA (I-MSAA) to tackle the size optimization of truss structures with frequency constraint. This kind of problem is problematic because its feasible region is non-convex while the boundaries are highly non-linear. The main motivation is to improve the exploitative behavior of MSAA, taking concept from water wave optimization metaheuristic (WWO). An interesting concept of WWO is its breaking operation. Thirty functions extracted from the CEC2014 test suite and four benchmark truss optimization problems with frequency constraints are explored for the validity of the proposed algorithm. Numerical results indicate that I-MSAA is more reliable, stable and efficient than those found by other existing metaheuristics in the literature.

  相似文献   
93.
We are investigating semantically configurable model-driven engineering (MDE). The goal of this work is a modelling environment that supports flexible, configurable modelling notations, in which specifiers can configure the semantics of notations to suit their needs and yet still have access to the types of analysis tools and code generators normally associated with MDE. In this paper, we describe semantically configurable code generation for a family of behavioural modelling notations. The family includes variants of statecharts, process algebras, Petri Nets, and SDL88. The semantics of this family is defined using template semantics, which is a parameterized structured operational semantics in which parameters represent semantic variation points. A specific notation is derived by instantiating the family’s template semantics with parameter values that specify semantic choices. We have developed a code-generator generator (CGG) that creates a suitable Java code generator for a subset of derivable modelling notations. Our prototype CGG supports 26 semantics parameters, 89 parameter values, and 7 composition operators. As a result, we are able to produce code generators for a sizable family of modelling notations, though at present the performance of our generated code is about an order of magnitude slower than that produced by commercial-grade generators.  相似文献   
94.
Predicting whether the intended audience will be able to recognize the meaning of an icon or pictograph is not an easy task. Many icon recognition studies have been conducted in the past. However, their findings cannot be generalized to other icons that were not included in the study, which, we argue, is their main limitation. In this paper, we propose a comprehensive taxonomy of icons that is intended to enable the generalization of the findings of recognition studies. To accomplish this, we analyzed a sample of more than eight hundred icons according to three axes: lexical category, semantic category, and representation strategy. Three basic representation strategies were identified: visual similarity; semantic association; and arbitrary convention. These representation strategies are in agreement with the strategies identified in previous taxonomies. However, a greater number of subcategories of these strategies were identified. Our results also indicate that the lexical and semantic attributes of a concept influence the choice of representation strategy.  相似文献   
95.
In this paper, we study the sensitivity of centrality metrics as a key metric of social networks to support visual reasoning. As centrality represents the prestige or importance of a node in a network, its sensitivity represents the importance of the relationship between this and all other nodes in the network. We have derived an analytical solution that extracts the sensitivity as the derivative of centrality with respect to degree for two centrality metrics based on feedback and random walks. We show that these sensitivities are good indicators of the distribution of centrality in the network, and how changes are expected to be propagated if we introduce changes to the network. These metrics also help us simplify a complex network in a way that retains the main structural properties and that results in trustworthy, readable diagrams. Sensitivity is also a key concept for uncertainty analysis of social networks, and we show how our approach may help analysts gain insight on the robustness of key network metrics. Through a number of examples, we illustrate the need for measuring sensitivity, and the impact it has on the visualization of and interaction with social and other scale-free networks.  相似文献   
96.
Model-based testing is focused on testing techniques which rely on the use of models. The diversity of systems and software to be tested implies the need for research on a variety of models and methods for test automation. We briefly review this research area and introduce several papers selected from the 22nd International Conference on Testing Software and Systems (ICTSS).  相似文献   
97.
Spam has become a major issue in computer security because it is a channel for threats such as computer viruses, worms, and phishing. More than 86% of received e-mails are spam. Historical approaches to combating these messages, including simple techniques such as sender blacklisting or the use of e-mail signatures, are no longer completely reliable. Many current solutions feature machine-learning algorithms trained using statistical representations of the terms that most commonly appear in such e-mails. However, these methods are merely syntactic and are unable to account for the underlying semantics of terms within messages. In this paper, we explore the use of semantics in spam filtering by introducing a pre-processing step of Word Sense Disambiguation (WSD). Based upon this disambiguated representation, we apply several well-known machine-learning models and show that the proposed method can detect the internal semantics of spam messages.  相似文献   
98.
Conclusion Significant improvements are required in the performance of MSW dispersive delay lines and filter banks before they are ready for systems application. Typically delay lines with bandwidths of 1 GHz or greater, differential delays in the range 200 ns to 1s, and minimum phase errors (<±1 °) are required for large (40 dB) dynamic range compressive receivers. However, techniques are evolving (see rest of this issue) in this relatively new area of technology which will allow systems performance requirements on phase errors to be met. Possible approaches to low phase error dispersive delay lines include reflective arrays, stepped ground planes, and multiple YIG films. The stepped ground plane technique is the most advanced and uses an optimization approach to the delay-line design, which results in a minimum phase error [20]. Ultimately the minimum achievable phase error will be limited by reflections from transducers and multiple mode effects in the delay lines. The MSW compressive receiver requires parallel advances in high-speed digital processing techniques to achieve its full potential.The MSW filter bank provides a simple channelization technique applicable up to approximately 20 GHz. Narrowband channels with 10 dB insertion loss, 3 dB bandwidths of 10 to 40 MHz, and 50 dB bandwidths of 30 to 120 MHz are possible with the already demonstrated techniques. Broader bandwidth channels in the range 50 to 200 MHz with flat passband response require improved transducer design techniques. The channelized receiver does not require extremely high-speed operations but, since a large number of channels are involved, size and cost become very significant.  相似文献   
99.
In response to K. Danzinger's (see record 1986-00068-001) suggestion that the first use of the term subject in the English-language psychological literature occurred in 1886 in the context of experiments involving the hypnotic state, the present author points out that there are examples of the use of the term in discussions of experiments on thought transference published by the Society for Psychical Research in the 1880's. (8 ref) (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
100.
Iranian Polymer Journal - The present work focuses on the assessment of the ability of porcine plasma protein (PPP) to be electrospun satisfactorily to form fibre mats, and their rheological and...  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号