首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2131篇
  免费   130篇
  国内免费   19篇
电工技术   29篇
综合类   3篇
化学工业   476篇
金属工艺   48篇
机械仪表   42篇
建筑科学   56篇
矿业工程   1篇
能源动力   95篇
轻工业   147篇
水利工程   9篇
石油天然气   12篇
无线电   255篇
一般工业技术   484篇
冶金工业   185篇
原子能技术   3篇
自动化技术   435篇
  2024年   5篇
  2023年   35篇
  2022年   72篇
  2021年   94篇
  2020年   92篇
  2019年   97篇
  2018年   123篇
  2017年   113篇
  2016年   111篇
  2015年   70篇
  2014年   83篇
  2013年   168篇
  2012年   142篇
  2011年   157篇
  2010年   115篇
  2009年   102篇
  2008年   103篇
  2007年   71篇
  2006年   69篇
  2005年   59篇
  2004年   41篇
  2003年   41篇
  2002年   29篇
  2001年   26篇
  2000年   16篇
  1999年   10篇
  1998年   27篇
  1997年   19篇
  1996年   24篇
  1995年   20篇
  1994年   11篇
  1993年   17篇
  1992年   18篇
  1991年   6篇
  1990年   11篇
  1989年   3篇
  1988年   7篇
  1987年   12篇
  1986年   5篇
  1985年   8篇
  1983年   6篇
  1980年   3篇
  1979年   2篇
  1978年   3篇
  1977年   3篇
  1976年   8篇
  1975年   6篇
  1974年   6篇
  1973年   4篇
  1970年   2篇
排序方式: 共有2280条查询结果,搜索用时 31 毫秒
71.
Oumar  Amit   《Neurocomputing》2009,72(13-15):3131
Perceptrons, proposed in the seminal paper McCulloch–Pitts of 1943, have remained of interest to neural network community because of their simplicity and usefulness in classifying linearly separable data and can be viewed as implementing iterative procedures for “solving” linear inequalities. Gradient descent and conjugate gradient methods, normally used for linear equalities, can be used to solve linear inequalities by simple modifications that have been proposed in the literature but not been analyzed completely. This paper applies a recently proposed control-inspired approach to the design of iterative steepest descent and conjugate gradient algorithms for perceptron training in batch mode, by regarding certain parameters of the training/algorithm as controls and then using a control Liapunov technique to choose appropriate values of these parameters.  相似文献   
72.
This paper is concerned with the problem of non-fragile robust optimal guaranteed cost control for a class of uncertain two-dimensional (2-D) discrete state-delayed systems described by the general model with norm-bounded uncertainties. Our attention is focused on the design of non-fragile state feedback controllers such that the resulting closed-loop system is asymptotically stable and the closed-loop cost function value is not more than a specified upper bound for all admissible parameter uncertainties and controller gain variations. A sufficient condition for the existence of such controllers is established under the linear matrix inequality framework. Moreover, a convex optimisation problem is proposed to select a non-fragile robust optimal guaranteed cost controller stabilising the 2-D discrete state-delayed system as well as achieving the least guaranteed cost for the resulting closed-loop system. The proposed method is compared with the previously reported criterion. Finally, illustrative examples are given to show the potential of the proposed technique.  相似文献   
73.
The accurate and early detection of epileptic seizures in continuous electroencephalographic (EEG) data has a growing role in the management of patients with epilepsy. Early detection allows for therapy to be delivered at the start of seizures and for caregivers to be notified promptly about potentially debilitating events. The challenge to detecting epileptic seizures, however, is that seizure morphologies exhibit considerable inter-patient and intra-patient variability. While recent work has looked at addressing the issue of variations across different patients (inter-patient variability) and described patient-specific methodologies for seizure detection, there are no examples of systems that can simultaneously address the challenges of inter-patient and intra-patient variations in seizure morphology. In our study, we address this complete goal and describe a multi-task learning approach that trains a classifier to perform well across many kinds of seizures rather than potentially overfitting to the most common seizure types. Our approach increases the generalizability of seizure detection systems and improves the tradeoff between latency and sensitivity versus false positive rates. When compared against the standard approach on the CHB–MIT multi-channel scalp EEG data, our proposed method improved discrimination between seizure and non-seizure EEG for almost 83 % of the patients while reducing false positives on nearly 70 % of the patients studied.  相似文献   
74.
To protect the remote server from various malicious attacks, many authentication schemes have been proposed. Some schemes have to maintain a password verification table in the remote server for checking the legitimacy of the login users. To overcome potential risks of verification tables, researchers proposed remote user authentication schemes using smartcard, in which the remote server only keeps a secret key for computing the user’s passwords and does not need any verification table for verifying legal user. In 2003 Shen, Lin, and Hwang proposed a timestamp-based password authentication scheme using smartcards in which the remote server does not need to store the passwords or verification table for user authentication. Unfortunately, this scheme is vulnerable to some deadly attacks. In this paper, we analyze few attacks and finally propose an improved timestamp-based remote user authentication scheme. The modified scheme is more efficient and secure than original scheme.  相似文献   
75.
There has been an explosion in the types, availability and volume of data accessible in an information system, thanks to the World Wide Web (the Web) and related inter-networking technologies. In this environment, there is a critical need to replace or complement earlier database integration approaches and current browsing and keyword-based techniques with concept-based approaches. Ontologies are increasingly becoming accepted as an important part of any concept or semantics based solution, and there is increasing realization that any viable solution will need to support multiple ontologies that may be independently developed and managed. In particular, we consider the use of concepts from pre-existing real world domain ontologies for describing the content of the underlying data repositories. The most challenging issue in this approach is that of vocabulary sharing, which involves dealing with the use of different terms or concepts to describe similar information. In this paper, we describe the architecture, design and implementation of the OBSERVER system. Brokering across the domain ontologies is enabled by representing and utilizing interontology relationships such as (but not limited to) synonyms, hyponyms and hypernyms across terms in different ontologies. User queries are rewritten by using these relationships to obtain translations across ontologies. Well established metrics like precision and recall based on the extensions underlying the concepts are used to estimate the loss of information, if any.  相似文献   
76.
Fructose-2,6-bisphosphatase (FBPase-2) is a switch between gluconeogenesis and glycolysis in the hepatic cells. The structural features required for inhibitory activity of FBPase-2 were unidentified; no leads are available for inhibiting this important enzyme. In this paper pharmacophore mapping, molecular docking methods were employed in a virtual screening strategy to identify leads for FBPase-2. A receptor based pharmacophore map was modeled which comprised of important interactions as observed in co-crystal of rat liver isozyme with the product inhibitor fructose-6-phosphate. The pharmacophore model was validated against two databases of best docked structural analogues of fructose-2,6-bisphosphate and fructose-6-phosphate. The query generated was submitted for flexible search of ligands in chemical databases, namely LeadQuest, Maybridge and NCI. The hits obtained were further screened by molecular docking using FlexX.  相似文献   
77.
Previous high-temperature compression creep studies of NiAl have shown peculiar behaviour in the temperature range 700 to 900° C, which was perhaps due to precipitation of impurities in the matrix. To isolate the impurity effect, high-purity NiAl samples with 0.15 at% and 0.20 at% carbon (graphite) additions have been creep tested at four temperatures between 700 and 850° C. Addition of graphite has been shown to produce a significant reduction in the creep strength of the alloyS. However, alloys with higher graphite concentrations have shown better creep resistance than those with lower graphite concentrations. Transmission electron microscopy indicates the presence of competing softening and hardening mechanisms in the alloys. Softening is due to the graphite particles acting as a dislocation source. Hardening results from a grain-boundary hardening mechanism due to the graphite particles segregating at grain boundaries and a dislocation-impurity (fine graphite) interaction, developing a Cottrell-like atmosphere.  相似文献   
78.
Kumar et al. (Appl. Math. Model. 35:817?C823, 2011) pointed out that there is no method in literature to find the exact fuzzy optimal solution of fully fuzzy linear programming (FFLP) problems and proposed a new method to find the fuzzy optimal solution of FFLP problems with equality constraints having non-negative fuzzy variables and unrestricted fuzzy coefficients. There may exist several FFLP problems with equality constraints in which no restriction can be applied on all or some of the fuzzy variables but due to the limitation of the existing method these types of problems can not be solved by using the existing method. In this paper a new method is proposed to find the exact fuzzy optimal solution of FFLP problems with equality constraints having non-negative fuzzy coefficients and unrestricted fuzzy variables. The proposed method can also be used to solve the FFLP problems with equality constraints having non-negative fuzzy variables and unrestricted fuzzy coefficients. To show the advantage of the proposed method over existing method the results of some FFLP problems with equality constraints, obtained by using the existing and proposed method, are compared. Also, to show the application of proposed method a real life problem is solved by using the proposed method.  相似文献   
79.
一、印度钢铁工业发展历史和现状从远古时代开始,铁在人类的生活中就非常重要。无论是战争还是和平年代,钢铁对现代文明的发展是必不可少的。为了了解印度的钢铁工业,首先有必要简要地回顾一下印度的钢铁制造史。印度是一个古老的国度,文化遗产丰富。印度是一片不同地域间存在惊人差异的土地,而两百多年的殖民统治更造就了多样化的印度。除了几家糖厂和纺  相似文献   
80.
The coordination of multi-robots is required in many scenarios for efficiency and task completion. Combined with teleoperation capabilities, coordinating robots provide a powerful tool. Add to this the Internet and now it is possible for multi-experts at multi-remote sites to control multi-robots in a coordinated fashion. For this to be feasible there are several hurdles to be crossed including Internet type delays, uncertainties in the environment and uncertainties in the object manipulated. In addition, there is a need to measure and control the quality of tele-coordination. To this end, the measure of force sensed by each robot is suggested and justified as a coordination index. It was proven that if n robots are event-transparent and event-synchronous then they can be teleoperated under random delay conditions to coordinate to any index value, which is feasible under no delay conditions. The design procedure that ensures a system can satisfy a small coordination index was presented and analyzed.In addition, the design and analysis of event-synchronous systems using Petri Nets is detailed. The Petri Net design methodology is presented for both event-synchronous single operator single robot teleoperation systems and event-synchronous multi-operator multi-robot teleoperation systems.The theory developed was tested by bilaterally tele-coordinating two mobile manipulators via the Internet. The experimental results confirmed the theoretical results presented.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号