首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4182篇
  免费   354篇
  国内免费   27篇
电工技术   54篇
综合类   25篇
化学工业   1157篇
金属工艺   135篇
机械仪表   216篇
建筑科学   168篇
矿业工程   11篇
能源动力   229篇
轻工业   342篇
水利工程   97篇
石油天然气   63篇
武器工业   3篇
无线电   363篇
一般工业技术   718篇
冶金工业   138篇
原子能技术   33篇
自动化技术   811篇
  2024年   17篇
  2023年   60篇
  2022年   82篇
  2021年   217篇
  2020年   240篇
  2019年   286篇
  2018年   375篇
  2017年   325篇
  2016年   295篇
  2015年   187篇
  2014年   325篇
  2013年   510篇
  2012年   363篇
  2011年   347篇
  2010年   221篇
  2009年   217篇
  2008年   117篇
  2007年   99篇
  2006年   62篇
  2005年   32篇
  2004年   29篇
  2003年   20篇
  2002年   20篇
  2001年   12篇
  2000年   13篇
  1999年   18篇
  1998年   5篇
  1997年   6篇
  1996年   6篇
  1995年   12篇
  1994年   3篇
  1993年   6篇
  1992年   4篇
  1991年   4篇
  1990年   4篇
  1989年   4篇
  1988年   2篇
  1986年   2篇
  1984年   6篇
  1982年   5篇
  1980年   1篇
  1979年   1篇
  1978年   1篇
  1974年   1篇
  1967年   1篇
排序方式: 共有4563条查询结果,搜索用时 15 毫秒
91.
Data envelopment analysis (DEA) models assume real‐valued inputs and outputs, but on many occasions, some inputs and/or outputs can only take integer values. In these cases, using DEA models can result in misleading efficiency assessments and inaccurate performance targets. In this paper, we propose an enumeration algorithm for computing efficiency scores and performance targets of decision‐making units with integer value inputs/outputs. In the presented algorithm, we do not use any of the mixed integer linear programming (MILP) models that are used in previous studies. We show that the result of our algorithm and that of the MILP model presented in this context is the same. We also generalize our algorithm for different types of returns to scale as well as for the hybrid setting with real‐valued data.  相似文献   
92.
The general problem of answering top-k queries can be modeled using lists of data items sorted by their local scores. The main algorithm proposed so far for answering top-k queries over sorted lists is the Threshold Algorithm (TA). However, TA may still incur a lot of useless accesses to the lists. In this paper, we propose two algorithms that are much more efficient than TA. First, we propose the best position algorithm (BPA). For any database instance (i.e. set of sorted lists), we prove that BPA stops as early as TA, and that its execution cost is never higher than TA. We show that there are databases over which BPA executes top-k queries O(m) times faster than that of TA, where m is the number of lists. We also show that the execution cost of our algorithm can be (m−1) times lower than that of TA. Second, we propose the BPA2 algorithm, which is much more efficient than BPA. We show that the number of accesses to the lists done by BPA2 can be about (m−1) times lower than that of BPA. We evaluated the performance of our algorithms through extensive experimental tests. The results show that over our test databases, BPA and BPA2 achieve significant performance gains in comparison with TA.  相似文献   
93.
Content distribution networks (CDN) are fundamental, yet expensive technologies for distributing the content of web-servers to large audiences. The P2P model is a perfect match to build a low-cost and scalable CDN infrastructure for popular websites by exploiting the underutilized resources of their user communities. However, building a P2P-based CDN is not a straightforward endeavor. In contrast to traditional CDNs, peers are autonomous and volunteer participants with their own heterogeneous interests that should be taken into account in the design of the P2P system. Moreover, churn rate is much higher than in dedicated CDN infrastructures, which can easily destabilize the system and severely degrade the performance. Finally and foremostly, while many P2P systems abstract any topological information about the underlying network, a top priority of a CDN is to incorporate locality-awareness in query routing in order to locate close-by content. This paper aims at building a P2P CDN with high performance, scalability and robustness. Our proposed protocols combine DHT efficiency with gossip robustness and take into account the interests and localities of peers. In short, Flower-CDN provides a hybrid and locality-aware routing infrastructure for user queries. PetalUp-CDN is a highly scalable version of Flower-CDN that dynamically adapts to variable rates of participation and prevent overload situations. In addition, we ensure the robustness of our P2P CDN via low-cost maintenance protocols that can detect and recover from churn and dynamicity. Our extensive performance evaluation shows that our protocols yield high performance gains under both static and highly dynamic environments. Furthermore, they incur acceptable and tunable overhead. Finally we provide main guidelines to deploy Flower-CDN for the public use.  相似文献   
94.
95.
The bipartite edge frustration of a graph G, denoted by φ(G), is the smallest number of edges that have to be deleted from G to obtain a bipartite spanning subgraph of G. This topological index is related to the well-known Max-cut problem, and has important applications in computing stability of fullerenes. In this paper, the bipartite edge frustration of an infinite family of fullerenes is computed. Moreover, this quantity for four classes of graphs arising from a given graph under different types of edge subdivisions is investigated.  相似文献   
96.
This study presents an intelligent model based on fuzzy systems for making a quantitative formulation between seismic attributes and petrophysical data. The proposed methodology comprises two major steps. Firstly, the petrophysical data, including water saturation (Sw) and porosity, are predicted from seismic attributes using various fuzzy inference systems (FISs), including Sugeno (SFIS), Mamdani (MFIS) and Larsen (LFIS). Secondly, a committee fuzzy inference system (CFIS) is constructed using a hybrid genetic algorithms-pattern search (GA-PS) technique. The inputs of the CFIS model are the outputs and averages of the FIS petrophysical data. The methodology is illustrated using 3D seismic and petrophysical data of 11 wells of an Iranian offshore oil field in the Persian Gulf. The performance of the CFIS model is compared with a probabilistic neural network (PNN). The results show that the CFIS method performed better than neural network, the best individual fuzzy model and a simple averaging method.  相似文献   
97.
In recent years, network coding has emerged as a new communication paradigm that can significantly improve the efficiency of network protocols by requiring intermediate nodes to mix packets before forwarding them. Recently, several real-world systems have been proposed to leverage network coding in wireless networks. Although the theoretical foundations of network coding are well understood, a real-world system needs to solve a plethora of practical aspects before network coding can meet its promised potential. These practical design choices expose network coding systems to a wide range of attacks.We identify two general frameworks (inter-flow and intra-flow) that encompass several network coding-based systems proposed in wireless networks. Our systematic analysis of the components of these frameworks reveals vulnerabilities to a wide range of attacks, which may severely degrade system performance. Then, we identify security goals and design challenges in achieving security for network coding systems. Adequate understanding of both the threats and challenges is essential to effectively design secure practical network coding systems. Our paper should be viewed as a cautionary note pointing out the frailty of current network coding-based wireless systems and a general guideline in the effort of achieving security for network coding systems.  相似文献   
98.
Computer-aided process planning (CAPP) is an important interface between computer-aided design (CAD) and computer-aided manufacturing (CAM) in the computer integrated manufacturing (CIM) environment. A good process plan of a part is built up based on two elements: (1) optimized sequence of the operations of the part; and (2) optimized selection of the machine, cutting tool and tool access direction (TAD) for each operation. On the other hand, two levels of planning in the process planning is suggested: (1) preliminary and (2) secondary and detailed planning. In this paper for the preliminary stage, the feasible sequences of operations are generated based on the analysis of constraints and using a genetic algorithm (GA). Then in the detailed planning stage, using a genetic algorithm again which prunes the initial feasible sequences, the optimized operations sequence and the optimized selection of the machine, cutting tool, and TAD for each operation are obtained. By applying the proposed GA in two levels of planning, the CAPP system can generate optimal or near-optimal process plans based on a selected criterion. A number of case studies are carried out to demonstrate the feasibility and robustness of the proposed algorithm. This algorithm performs well on all the test problems, exceeding or matching the solution quality of the results reported in the literature for most problems. The main contribution of this work is to emerge the preliminary and detailed planning, implementation of compulsive and additive constraints, optimization sequence of the operations of the part, and optimization selection of machine, cutting tool and TAD for each operation using the proposed GA, simultaneously.  相似文献   
99.
In this paper, electroencephalogram (EEG) signals of 13 schizophrenic patients and 18 age-matched control participants are analyzed with the objective of classifying the two groups. For each case, multi-channels (22 electrodes) scalp EEG is recorded. Several features including autoregressive (AR) model parameters, band power and fractal dimension are extracted from the recorded signals. Leave-one (participant)-out cross validation is used to have an accurate estimation for the separability of the two groups. Boosted version of Direct Linear Discriminant Analysis (BDLDA) is selected as an efficient classifier which applied on the extracted features. To have comparison, classifiers such as standard LDA, Adaboost, support vector machine (SVM), and fuzzy SVM (FSVM) are applied on the features. Results show that the BDLDA is more discriminative than others such that their classification rates are reported 87.51%, 85.36% and 85.41% for the BDLDA, LDA, Adaboost, respectively. Results of SVM and FSVM classifiers were lower than 50% accuracy because they are more sensitive to outlier instances. In order to determine robustness of the suggested classifier, noises with different amplitudes are added to the test feature vectors and robustness of the BDLDA was higher than the other compared classifiers.  相似文献   
100.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号