首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1388篇
  免费   276篇
  国内免费   221篇
电工技术   80篇
综合类   147篇
化学工业   30篇
金属工艺   11篇
机械仪表   43篇
建筑科学   104篇
矿业工程   28篇
能源动力   13篇
轻工业   8篇
水利工程   15篇
石油天然气   12篇
武器工业   18篇
无线电   273篇
一般工业技术   83篇
冶金工业   26篇
原子能技术   6篇
自动化技术   988篇
  2024年   5篇
  2023年   20篇
  2022年   49篇
  2021年   59篇
  2020年   48篇
  2019年   53篇
  2018年   47篇
  2017年   55篇
  2016年   78篇
  2015年   80篇
  2014年   135篇
  2013年   117篇
  2012年   119篇
  2011年   122篇
  2010年   111篇
  2009年   131篇
  2008年   117篇
  2007年   137篇
  2006年   71篇
  2005年   78篇
  2004年   58篇
  2003年   40篇
  2002年   33篇
  2001年   27篇
  2000年   24篇
  1999年   14篇
  1998年   13篇
  1997年   9篇
  1996年   5篇
  1995年   5篇
  1994年   9篇
  1993年   2篇
  1992年   2篇
  1991年   2篇
  1987年   1篇
  1986年   2篇
  1985年   2篇
  1984年   1篇
  1981年   1篇
  1979年   1篇
  1975年   1篇
  1959年   1篇
排序方式: 共有1885条查询结果,搜索用时 296 毫秒
1.
Redundancy allocation problem (RAP) is one of the best-developed problems in reliability engineering studies. This problem follows to optimize the reliability of a system containing s sub-systems under different constraints, including cost, weight, and volume restrictions using redundant components for each sub-system. Various solving methodologies have been used to optimize this problem, including exact, heuristic, and meta-heuristic algorithms. In this paper, an efficient multi-objective meta-heuristic algorithm based on simulated annealing (SA) is developed to solve multi-objective RAP (MORAP). This algorithm is knowledge-based archive multi-objective simulated annealing (KBAMOSA). KBAMOSA applies a memory matrix to reinforce the neighborhood structure to achieve better quality solutions. The results analysis and comparisons demonstrate the performance of the proposed algorithm for solving MORAP.  相似文献   
2.
Attribute Allocation and Retrieval Scheme for Large-Scale Sensor Networks   总被引:1,自引:0,他引:1  
Wireless sensor network is an emerging technology that enables remote monitoring of large geographical regions. In this paper, we address the problem of distributing attributes over such a large-scale sensor network so that the cost of data retrieval is minimized. The proposed scheme is a data-centric storage scheme where the attributes are distributed over the network depending on the correlations between them. The problem addressed here is similar to the Allocation Problem of distributed databases. In this paper, we have defined the Allocation Problem in the context of sensor networks and have proposed a scheme for finding a good distribution of attributes to the sensor network. We also propose an architecture for query processing given such a distribution of attributes. We analytically determine the conditions under which the proposed architecture is beneficial and present simulation results to demonstrate the same. To the best of our knowledge, this is the first attempt to determine an allocation of attributes over a sensor network based on the correlations between attributes.  相似文献   
3.
4.
Single-assignment and functional languages have value semantics that do not permit side-effects. This lack of side-effects makes automatic detection of parallelism and optimization for data locality in programs much easier. However, the same property poses a challenge in implementing these languages efficiently. This paper describes an optimizing compiler system that solves the key problem of aggregate copy elimination. The methods developed rely exclusively on compile-time algorithms, including interprocedural analysis, that are applied to an intermediate data flow representation. By dividing the problem into update-in-place and build-in-place analysis, a small set of relatively simple techniques—edge substitution, graph pattern matching, substructure sharing and substructure targeting—was found to be very powerful. If combined properly and implemented carefully, the algorithms eliminate unnecessary copy operations to a very high degree. No run-time overhead is imposed on the compiled programs.  相似文献   
5.
用APACHE+PHP+MYSQL实现网站自动更新   总被引:1,自引:0,他引:1  
在分析建立自动更新网站必要性的基础上,较详细地说明了如何利用APACHE+PHP+MYSQL工具实现网站自动更新中的权限控制、资料上传、自动更新,并给出了网页的部分源代码.  相似文献   
6.
GPRS全称通用分组无线业务,它在改进了现有GSM系统后能实现高速的数据传输。首先对GPRS系统做了简单介绍,然后在此基础上详细介绍了GPRS的板间切换在CPX8216硬件平台上的实现方法。  相似文献   
7.
A new return method for implicit integration of linear isotropic yield criteria is presented. The basic idea is to perform all the manipulations in the principal stress space and thereby achieve very simple formulae for calculating the plastic corrector stresses, based on the constant gradient of such criteria. The return formulae are in closed form and no iteration is required. The method accounts for three types of stress return: return to a single yield plane, to a discontinuity line at the intersection of two yield planes and to a discontinuity point at the intersection between three or more yield planes. The infinitesimal and the consistent elastoplastic constitutive matrix are calculated for each type of stress return, as are the conditions to ascertain which type of return is required. The method is exemplified with the Mohr–Coulomb yield criterion. Copyright © 2005 John Wiley & Sons, Ltd.  相似文献   
8.
Key-insulated encryption schemes use a combination of key splitting and key evolution to protect against key exposure. Existing schemes, however scale poorly, having cost proportional to the number t of time periods that may be compromised by the adversary, and thus are practical only for small values of t. Yet in practice t might be large. This paper presents a strongly key-insulated encryption scheme with optimal threshold. In our scheme, t need not be known in advance and can be as large as one less than the total number of periods, yet the cost of the scheme is not impacted. This brings key-insulated encryption closer to practice. Our scheme is based on the Boneh-Franklin identity-based encryption (IBE) scheme [9], and exploits algebraic properties of the latter. Another contribution of this paper is to show that (not strongly) key-insulated encryption with optimal threshold and allowing random-access key updates (which our scheme and all others known allow) is equivalent to a restricted form of IBE. This means that the connection between key-insulated encryption and IBE is not accidental. Supported in part by NSF grants CCR-0098123, ANR-0129617 and CCR-0208842, and by an IBM Faculty Partnership Development Award. Supported in part by an NSF graduate fellowship.  相似文献   
9.
An efficient return algorithm for stress update in numerical plasticity computations is presented. The yield criterion must be linear in principal stress space and can be composed of any number of yield planes. Each of these yield planes may have an associated or non-associated flow rule. The stress return and the formation of the constitutive matrix is carried out in principal stress space. Here the manipulations simplify and rely on geometrical arguments. The singularities arising at the intersection of yield planes are dealt with in a straightforward way also based on geometrical considerations. The method is exemplified on non-associated Mohr–Coulomb plasticity throughout the paper.  相似文献   
10.
针对跟踪过程中目标形态不断变化或部分遮挡导致鲁棒性差的问题,提出一种基于多特征自适应融合的粒子滤波跟踪算法.该算法从视觉特征集中选取了描述能力强的2种特征,并将其按照与目标模型的多尺度相似度进行线性融合;为了减小跟踪漂移,通过计算当前目标模型与初始目标模型的多尺度相似度自适应地更新目标模型.大量仿真实验结果表明,文中算法可以鲁棒地跟踪到部分遮挡和形态变化的运动目标.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号