首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   12702篇
  免费   2152篇
  国内免费   1520篇
电工技术   1657篇
综合类   1227篇
化学工业   321篇
金属工艺   232篇
机械仪表   554篇
建筑科学   482篇
矿业工程   209篇
能源动力   334篇
轻工业   153篇
水利工程   375篇
石油天然气   178篇
武器工业   155篇
无线电   1710篇
一般工业技术   1052篇
冶金工业   408篇
原子能技术   170篇
自动化技术   7157篇
  2024年   46篇
  2023年   255篇
  2022年   499篇
  2021年   493篇
  2020年   506篇
  2019年   473篇
  2018年   450篇
  2017年   611篇
  2016年   644篇
  2015年   740篇
  2014年   943篇
  2013年   1051篇
  2012年   1054篇
  2011年   1090篇
  2010年   800篇
  2009年   848篇
  2008年   905篇
  2007年   894篇
  2006年   719篇
  2005年   616篇
  2004年   479篇
  2003年   383篇
  2002年   327篇
  2001年   301篇
  2000年   237篇
  1999年   156篇
  1998年   117篇
  1997年   118篇
  1996年   95篇
  1995年   87篇
  1994年   64篇
  1993年   60篇
  1992年   51篇
  1991年   36篇
  1990年   28篇
  1989年   30篇
  1988年   24篇
  1987年   14篇
  1986年   19篇
  1985年   11篇
  1984年   7篇
  1983年   12篇
  1982年   16篇
  1981年   11篇
  1980年   11篇
  1979年   9篇
  1978年   6篇
  1977年   4篇
  1976年   6篇
  1975年   8篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
21.
针对带容量约束的车辆路径问题,提出一种融合量子进化算法和变邻域优化策略的变邻域量子烟花算法。该算法采用等分随机键与最大位置法结合的实数编码方式,通过量子旋转门和非门变异提高算法全局搜索能力,同时运用结合2-Opt的变邻域优化策略加强局部搜索能力。选取17个基准算例进行参数实验和对比实验,实验结果表明,相对于对比算法,所提出的算法具有较好的寻优能力和收敛速度。  相似文献   
22.
在恶劣天气和机械故障等原因造成航班不能按照原计划执行时,航空公司需要采取相应的措施对航班进行恢复。本文基于经典的资源指派模型,综合考虑了调整时间、换机、联程拉直、取消航班和调机5种恢复策略,提出一种以最小化加权成本为优化目标的航班恢复模型,并设计一种迭代局部搜索算法。首先用构造-修复启发式方法构造可行解,然后从该初始解出发,在飞机路线对的邻域中进行局部搜索。当陷入局部最优后,对解进行扰动,然后从扰动后的解重新出发进行局部搜索。为了提高搜索效率,同时降低陷入局部最优解的概率,局部搜索过程采用模拟退火算法。实例结果表明,本文提出的模型及算法能够在短时间内对受到影响的大规模航班计划进行恢复。  相似文献   
23.
Non-maximum suppression (NMS) plays a key role in many modern object detectors. It is responsible to remove detection boxes that cover the same object. NMS greedily selects the detection box with maximum score; other detection boxes are suppressed when the degree of overlap between these detection boxes and the selected box exceeds a predefined threshold. Such a strategy easily retain some false positives, and it limits the ability of NMS to perceive nearby objects in cluttered scenes. This paper proposes an effective method combining harmony search algorithm and NMS to alleviate this problem. This method regards the task of NMS as a combination optimization problem. It seeks final detection boxes under the guidance of an objective function. NMS is applied to each harmony to remove imprecise detection boxes, and the remaining boxes are used to calculate the fitness value. The remaining detection boxes in a harmony with highest fitness value are chosen as the final detection results. The standard Pattern Analysis, Statistical Modeling and Computational Learning Visual Object Classes dataset and the Microsoft Common Objects in Context dataset are used in all of the experiments. The proposed method is applied to two popular detection networks, namely Faster Region-based Convolutional Neural Networks and Region-based Fully Convolutional Networks. The experimental results show that the proposed method improves the average precision of these two detection networks. Moreover, the location performance and average recall of these two detectors are also improved.  相似文献   
24.
In this work, novel application of evolutionary computational heuristics is presented for parameter identification problem of nonlinear Hammerstein controlled auto regressive auto regressive (NHCARAR) systems through global search competency of backtracking search algorithm (BSA), differential evolution (DE) and genetic algorithms (GAs). The mean squared error metric is used for the fitness function of NHCARAR system based on difference between actual and approximated design variables. Optimization of the cost function is conducted with BSA for NHCARAR model by varying degrees of freedom and noise variances. To verify and validate the worth of the presented scheme, comparative studies are carried out with its counterparts DE and GAs through statistical observations by means of weight deviation factor, root of mean squared error, and Thiel’s inequality coefficient as well as complexity measures.  相似文献   
25.
带关键字搜索的公钥加密(PEKS)是一种有用的加密原语,它允许用户将在加密数据上搜索的功能委托给不可信的第三方服务器,而不影响原始数据的安全性和隐私性。但是,由于缺乏对于数据的加密以及解密能力,PEKS方案不能单独进行使用,必须与标准的公钥加密方案(PKE)相结合。因此,Baek等人在2006年引入了一种新的加密原语,称为结合PKE和PEKS的加密方案(PKE+PEKS),它同时提供了PKE和PEKS的功能。目前,已有文献提出了几种PKE+PEKS方案。然而,他们都没有考虑关键字猜测攻击的问题。本文提出一个新的高效且能够抵抗关键字猜测攻击的PKE+PEKS方案,与已有方案相比,该方案在性能上有很大的提升,并且在生成关键字和数据密文时,不需要使用双线性对,极大地降低了计算和存储成本。安全性分析表明,本文中所提出的方案能够满足密文隐私安全性、陷门不可区分性和抗关键字猜测攻击的安全性。效率分析表明,本分提出的方案更加高效。  相似文献   
26.
The Fourth Amendment to the U.S. Constitution functions as a shield against excess governmental or police power by prohibiting unreasonable searches and seizures. Since its ratification, legal challenges have tempered this shield by frequently disputing the application of investigative processes and tools, including those that bypass the traditional – and simpler – analysis that focused on physical trespass. But recent technological advancements have prompted novel challenges and have forced the U.S. Supreme Court to adopt a parallel inquiry that evaluates society’s expectations of privacy as an alternate path to invoke the Fourth Amendment’s protections apart from any physical trespass. As revolutionary technology continues to present unique issues, this 200-year-old shield manifests a reflective luster as if polished by years of legal discourse that reveals the priorities of those who would interpret its text. Viewing the Fourth Amendment’s shield as a mirror illustrates not only the thoughts of the drafters that revolved primarily around protecting property interests but also the expectations of modern society with its insistence on promoting privacy. And where the drafters channeled their outrage against the loathsome writs of assistance in colonial times, later Americans continued to denounce the similarly invasive general warrants and attempts by investigators to expand the tools in their arsenal beyond constitutional bounds, especially in the surveillance context. Yet, the problems posed by new technology upon privacy concerns are best resolved by relying on the core principles supporting the Fourth Amendment, previous U.S. Supreme Court precedent, and current societal perspectives regarding privacy as a top priority proven by recently enacted legislation both foreign and domestic.

By applying a similar method to address advancing communication technology and its use as a surveillance tool in Carpenter v. United States, the Court turned this shield-become-mirror upon society to conclude that cell phone location information deserves Fourth Amendment protection because of its untiring comprehensiveness and its uniquely detailed nature. Moreover, nearly every American adult carries a cell phone with them almost all the time, making it possible to create a time-stamped map of any cell-phone-carrying-individual’s movements reaching back years and years. Unfortunately, the Carpenter Court did not extend this crucial protection far enough to protect all cell phone location data, and the unmistakable gap in its holding leaves a potential privacy vulnerability the exploitation of which could cause greater harm than all previously disputed surveillance technology combined because of cell phone usage’s general – near universal – applicability. Allowing cell phone location information to be obtained without probable cause and a proper search warrant not only fails to meet the spirit of the Fourth Amendment, it also begins to tarnish that shield such that it no longer reflects historical or current societal values, reducing its goal of protecting Americans to a hollow incantation of words left to languish as time (and technology) marches on.  相似文献   

27.
为了获得具有较强适应工况变化能力的上游泵送机械密封,以微间隙内流场的CFD计算为基础,建立涉及多工况的多目标优化数学模型,综合分析相关研究成果和密封特性确定了优化变量及其取值范围、工况参数取值范围和优化目标。应用模糊集理论确定不同工况下的液膜刚度和泄漏量的权重因子,并研究人工神经网络模型对优化结果的影响。基于穷尽搜索法和遗传算法对密封进行优化设计,对比分析2种优化方法得到的优化结果,并对优化前后的密封润滑膜流场特性进行BVF诊断分析。优化研究表明:人工神经网络模型很好地拟合了液膜刚度、泄漏量随槽型参数变化的函数关系;2种优化方法都能提高密封性能,但遗传算法优化比穷尽搜索法优化能获得更好的优化结果。  相似文献   
28.
29.
Quantifying change after large habitat restoration efforts is critical to assessing the effort's success. After river restoration activities, fish abundance is expected to increase and also fluctuates naturally by season and with environmental conditions. A side‐looking hydroacoustic system was used to estimate fish abundance in the Penobscot River, ME, from 2010 to 2016 during predam (2010–2013) and postdam (2014–2016) removal years during nonice periods. Automated data processing enabled continuous abundance estimates from fish tracks. A threefold increase in mean fish abundance was recorded after dam removal. A fourfold increase in median fish abundance occurred in the fall relative to spring and summer of the same year, regardless of dam presence. Interannual fish abundance in every season monitored increased at least twofold after dam removal. We related variability in fish abundance to tide, discharge, temperature, diurnal cycle, daylength, moon phase, and restoration activities (focusing on dam presence). Daylength corresponding to the fall and summer was the most important indicator for higher fish abundance. Fish abundance was generally greatest in the fall during outgoing tides at night, with lesser peaks occurring during the month of June at night. Before dam removal, fish abundance peaked when water temperature was less than 9.25°C, at night, during outgoing tides. After dam removal, fish abundance peaked when daylength was less than 11.3 hr, at night, during outgoing tides, when water temperature was above 4.56°C and no full moon was present. Peak fish abundance occurred during only 0.02–2.3% of the total time sampled. The threefold increase in fish abundance recorded after dam removal was observed despite yearly stocking efforts of adult alewife increasing 24% in postdam removal years. Finally, parallel studies of fish presence in the Penobscot River were used to compare the utility of this method as an indicator of fish abundance in response to dam removal.  相似文献   
30.
ABSTRACT

This study investigates how a search interface that displays users’ ultimate query (i.e. users’ current search goal) can cope with the age-related decrease of fluid abilities and support older users’ search behaviours. 30 young and 18 older adults completed 9 search problems with a regular web browser or with the experimental search interface. Results showed that older adults spent longer time on the search engine result pages, they needed more time to reformulate, and they had more difficulties exploring the search paths elaborated. Age-differences also appeared as soon as the beginning of the search. The support tool helped older users reformulate their queries more rapidly and elaborate more flexible search strategies at the beginning of the activity. Indeed, older adults who interacted with the support tool switched to the processing of a new search path more rapidly instead of exploiting their initial query (i.e. they visited fewer websites for the initial query produced and reformulated a query instead of keeping on conducting a deeper investigation of the search results provided in the search engine result page). Implications of these findings for the design of effective support tools for older users are discussed.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号