首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6401篇
  免费   504篇
  国内免费   8篇
电工技术   77篇
综合类   2篇
化学工业   1716篇
金属工艺   112篇
机械仪表   203篇
建筑科学   285篇
矿业工程   24篇
能源动力   262篇
轻工业   965篇
水利工程   60篇
石油天然气   34篇
无线电   428篇
一般工业技术   1040篇
冶金工业   310篇
原子能技术   47篇
自动化技术   1348篇
  2024年   16篇
  2023年   81篇
  2022年   88篇
  2021年   308篇
  2020年   208篇
  2019年   231篇
  2018年   277篇
  2017年   291篇
  2016年   281篇
  2015年   235篇
  2014年   313篇
  2013年   571篇
  2012年   445篇
  2011年   548篇
  2010年   372篇
  2009年   403篇
  2008年   339篇
  2007年   312篇
  2006年   263篇
  2005年   197篇
  2004年   145篇
  2003年   165篇
  2002年   134篇
  2001年   78篇
  2000年   83篇
  1999年   65篇
  1998年   50篇
  1997年   55篇
  1996年   34篇
  1995年   42篇
  1994年   30篇
  1993年   28篇
  1992年   14篇
  1991年   20篇
  1990年   12篇
  1989年   19篇
  1988年   11篇
  1987年   11篇
  1986年   11篇
  1985年   14篇
  1984年   9篇
  1983年   8篇
  1982年   13篇
  1981年   6篇
  1980年   9篇
  1979年   10篇
  1978年   19篇
  1976年   8篇
  1975年   5篇
  1973年   5篇
排序方式: 共有6913条查询结果,搜索用时 218 毫秒
991.
Network and service management is an established research field within the general area of computer networks. A few years ago, an initial taxonomy, organizing a comprehensive list of terms and topics, was established through interviews with experts from both industry and academia. This taxonomy has since been used to better partition standardization efforts, identify classes of managed objects and improve the assignment of reviewers to papers submitted in the field. Because the field of network and service management is rapidly evolving, a biyearly update of the taxonomy was proposed. In this paper, a large-scale questionnaire is presented which was answered by experts in the field, evaluating the relevance of each individual topic for the next five years. Missing topics, which are likely to become relevant over the next few years, are identified as well. Furthermore, an analysis is performed of the records of papers submitted to major conferences in the area. Based on the obtained results, an updated version of the taxonomy is proposed.  相似文献   
992.

Smart devices, such as smartphones, wearables, robots, and others, can collect vast amounts of data from their environment. This data is suitable for training machine learning models, which can significantly improve their behavior, and therefore, the user experience. Federated learning is a young and popular framework that allows multiple distributed devices to train deep learning models collaboratively while preserving data privacy. Nevertheless, this approach may not be optimal for scenarios where data distribution is non-identical among the participants or changes over time, causing what is known as concept drift. Little research has yet been done in this field, but this kind of situation is quite frequent in real life and poses new challenges to both continual and federated learning. Therefore, in this work, we present a new method, called Concept-Drift-Aware Federated Averaging (CDA-FedAvg). Our proposal is an extension of the most popular federated algorithm, Federated Averaging (FedAvg), enhancing it for continual adaptation under concept drift. We empirically demonstrate the weaknesses of regular FedAvg and prove that CDA-FedAvg outperforms it in this type of scenario.

  相似文献   
993.
994.

Dynamic fault trees (DFTs) are widely adopted in industry to assess the dependability of safety-critical equipment. Since many systems are too large to be studied numerically, DFTs dependability is often analysed using Monte Carlo simulation. A bottleneck here is that many simulation samples are required in the case of rare events, e.g. in highly reliable systems where components seldom fail. Rare event simulation (RES) provides techniques to reduce the number of samples in the case of rare events. In this article, we present a RES technique based on importance splitting to study failures in highly reliable DFTs, more precisely, on a variant of repairable fault trees (RFT). Whereas RES usually requires meta-information from an expert, our method is fully automatic. For this, we propose two different methods to derive the so-called importance function. On the one hand, we propose to cleverly exploit the RFT structure to compositionally construct such function. On the other hand, we explore different importance functions derived in different ways from the minimal cut sets of the tree, i.e., the minimal units that determine its failure. We handle RFTs with Markovian and non-Markovian failure and repair distributions—for which no numerical methods exist—and implement the techniques on a toolchain that includes the RES engine FIG, for which we also present improvements. We finally show the efficiency of our approach in several case studies.

  相似文献   
995.
Wireless Personal Communications - This paper presents the development of a compact monopole antenna bioinspired in the Opuntia ficus-indica plant-shape, generated by Gielis formula, built in...  相似文献   
996.
In this paper, a steganographic method for real-time data hiding is proposed. The main goal of the research is to develop steganographic method with increased robustness to unintentional image processing attacks. In addition, we prove the validity of the method in real-time applications. The method is based on a discrete cosine transform (DCT) where the values of a DCT coefficients are modified in order to hide data. This modification is invisible to a human observer. We further the investigation by implementing the proposed method using different target architectures and analyze their performance. Results show that the proposed method is very robust to image compression, scaling and blurring. In addition, modification of the image is imperceptible even though the number of embedded bits is high. The steganalysis of the method shows that the detection of the modification of the image is unreliable for a lower relative payload size embedded. Analysis of OpenCL implementation of the proposed method on four different target architectures shows considerable speedups.  相似文献   
997.
We present new methods for uniformly sampling the solid angle subtended by a disk. To achieve this, we devise two novel area‐preserving mappings from the unit square [0,1]2 to a spherical ellipse (i.e. the projection of the disk onto the unit sphere). These mappings allow for low‐variance stratified sampling of direct illumination from disk‐shaped light sources. We discuss how to efficiently incorporate our methods into a production renderer and demonstrate the quality of our maps, showing significantly lower variance than previous work.  相似文献   
998.
This paper is devoted to the numerical analysis of a family of finite element approximations for the axisymmetric, meridian Brinkman equations written in terms of the stream-function and vorticity. A mixed formulation is introduced involving appropriate weighted Sobolev spaces, where well-posedness is derived by means of the Babu?ka–Brezzi theory. We introduce a suitable Galerkin discretization based on continuous piecewise polynomials of degree \(k\ge 1\) for all the unknowns, where its solvability is established using the same framework as the continuous problem. Optimal a priori error estimates are derived, which are robust with respect to the fluid viscosity, and valid also in the pure Darcy limit. A few numerical examples are presented to illustrate the convergence and performance of the proposed schemes.  相似文献   
999.
1000.
We provide a new mixed finite element analysis for linear elastodynamics with reduced symmetry. The problem is formulated as a second order system in time by imposing only the Cauchy stress tensor and the rotation as primary and secondary variables, respectively. We prove that the resulting variational formulation is well-posed and provide a convergence analysis for a class of \({\mathrm {H}}(\mathop {{\mathrm {div}}}\nolimits )\)-conforming semi-discrete schemes. In addition, we use the Newmark trapezoidal rule to obtain a fully discrete version of the problem and carry out the corresponding convergence analysis. Finally, numerical tests illustrating the performance of the fully discrete scheme are presented.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号