首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1092篇
  免费   49篇
电工技术   13篇
综合类   1篇
化学工业   269篇
金属工艺   3篇
机械仪表   12篇
建筑科学   33篇
矿业工程   2篇
能源动力   39篇
轻工业   81篇
水利工程   11篇
石油天然气   4篇
无线电   175篇
一般工业技术   131篇
冶金工业   28篇
原子能技术   4篇
自动化技术   335篇
  2024年   2篇
  2023年   14篇
  2022年   36篇
  2021年   48篇
  2020年   41篇
  2019年   41篇
  2018年   36篇
  2017年   45篇
  2016年   40篇
  2015年   33篇
  2014年   56篇
  2013年   88篇
  2012年   68篇
  2011年   81篇
  2010年   54篇
  2009年   79篇
  2008年   67篇
  2007年   69篇
  2006年   35篇
  2005年   23篇
  2004年   26篇
  2003年   18篇
  2002年   17篇
  2001年   6篇
  2000年   6篇
  1999年   5篇
  1998年   8篇
  1997年   6篇
  1996年   5篇
  1995年   3篇
  1994年   9篇
  1993年   5篇
  1992年   5篇
  1991年   4篇
  1990年   3篇
  1989年   7篇
  1988年   7篇
  1987年   7篇
  1986年   4篇
  1985年   8篇
  1984年   5篇
  1983年   4篇
  1982年   3篇
  1981年   4篇
  1980年   3篇
  1979年   3篇
  1978年   1篇
  1977年   2篇
  1973年   1篇
排序方式: 共有1141条查询结果,搜索用时 15 毫秒
1.
This note incorporates tool life variability in the geometric programming formulation of machining economics problems by transforming the probability of tool failure while machining a part to a function of the cutting variables for both Markovian and non-Markovian tool failure processes. Numerical examples show that the stochastic nature of tool life cannot be ignored, since it results in different optimal cutting variable values compared to the deterministic tool life case.  相似文献   
2.
3.
Several researchers have recently investigated the connection between reinforcement learning and classification. We are motivated by proposals of approximate policy iteration schemes without value functions, which focus on policy representation using classifiers and address policy learning as a supervised learning problem. This paper proposes variants of an improved policy iteration scheme which addresses the core sampling problem in evaluating a policy through simulation as a multi-armed bandit machine. The resulting algorithm offers comparable performance to the previous algorithm achieved, however, with significantly less computational effort. An order of magnitude improvement is demonstrated experimentally in two standard reinforcement learning domains: inverted pendulum and mountain-car.  相似文献   
4.
This article focuses on the optimization of PCDM, a parallel, two-dimensional (2D) Delaunay mesh generation application, and its interaction with parallel architectures based on simultaneous multithreading (SMT) processors. We first present the step-by-step effect of a series of optimizations on performance. These optimizations improve the performance of PCDM by up to a factor of six. They target issues that very often limit the performance of scientific computing codes. We then evaluate the interaction of PCDM with a real SMT-based SMP system, using both high-level metrics, such as execution time, and low-level information from hardware performance counters.  相似文献   
5.
We consider discrete event systems (DES) involving tasks with real-time constraints and seek to control processing times so as to minimize a cost function subject to each task meeting its own constraint. When tasks are processed over a single stage, it has been shown that there are structural properties of the optimal sample path that lead to very efficient solutions of such problems. When tasks are processed over multiple stages and are subject to end-to-end real-time constraints, these properties no longer hold and no obvious extensions are known. We consider a two-stage problem with homogeneous cost functions over all tasks at each stage and derive several new optimality properties. These properties lead to the idea of introducing “virtual” deadlines at the first stage, thus partially decoupling the stages so that the known efficient solutions for single-stage problems can be used. We prove that the solution obtained by an iterative virtual deadline algorithm (VDA) converges to the global optimal solution of the two-stage problem and illustrate the efficiency of the VDA through numerical examples.
Christos G. CassandrasEmail:
  相似文献   
6.
Perturbation Analysis of Multiclass Stochastic Fluid Models   总被引:1,自引:5,他引:1  
We use a stochastic fluid model (SFM) to capture the operation of finite-capacity queueing systems with multiple customer classes. We derive gradient estimators for class-dependent loss and workload related performance metrics with respect to any one of several threshold parameters used for buffer control. These estimators are shown to be unbiased and directly observable from a sample path without any knowledge of underlying stochastic characteristics of the traffic processes. This renders them computable in on-line environments and easily implementable in settings such as communication networks.  相似文献   
7.
Thymic Epithelial Tumors (TETs) represent a rare tumor family, originating from the epithelial component of the thymus gland. Clinicopathologically, they are segregated into six major subtypes, associated with distinct histological features and clinical outcomes. Their emergence and evolution are accompanied by the generation of a complex tumor microenvironment (TME), dominated by phenotypically and functionally divergent immune cellular subsets, in different maturation states and in analogies that vary significantly among different subtypes. These heterogenous leukocyte populations exert either immune-permissive and tumor-suppressive functions or vice versa, and the dynamic equilibrium established among them either dictates the tumor immune milieu towards an immune-tolerance state or enables the development of a productive spontaneous tumoricidal response. The immunologically “hot” microenvironment, defining a significant proportion of TETs, makes them a promising candidate for the implementation of immune checkpoint inhibitors (ICIs). A number of phase I and II clinical trials have already demonstrated significant, type-specific clinical efficacy of PD-L1 inhibitors, even though substantial limitations in their utilization derive from their immune-mediated adverse effects. Moreover, the completed clinical studies involved relatively restricted patient samples and an expansion in the enrolled cohorts is required, so that more trustworthy conclusions regarding the benefit from ICIs in TETs can be extracted.  相似文献   
8.
Stereotactic ablative body radiotherapy (SABR) is currently used as a salvage intervention for men with oligometastatic prostate cancer (PC), and increasingly so since the results of the Stereotactic Ablative Body Radiotherapy for the Comprehensive Treatment of Oligometastatic Cancers (SABR-COMET) trial reported a significant improvement in overall survival with SABR. The addition of androgen deprivation therapy (ADT) to localised prostate radiotherapy improves survival as it sensitises PC to radiotherapy-induced cell death. The importance of the androgen receptor (AR) gene pathway in the development of resistance to radiotherapy is well established. In this review paper, we will examine the data to determine how we can overcome the upregulation of the AR pathway and suggest a strategy for improving outcomes in men with oligometastatic hormone-sensitive PC.  相似文献   
9.
Motivated by the increasing dependence of many systems on battery energy, we study the problem of optimally controlling how to discharge and recharge a non-ideal battery so as to maximize the work it can perform over a given time period and still maintain a desired final energy level. Modeling a battery as a dynamic system, we adopt a Kinetic Battery Model (KBM) and formulate a finite-horizon optimal control problem when recharging is always feasible under the constraint that discharging and recharging cannot occur at the same time. The solution is shown to be of bang–bang type with the property that the battery is always in recharging mode during the last part of the interval. When the length of the time horizon exceeds a critical value, we also show that the optimal policy includes chattering. Numerical results are included to illustrate our analysis. We then extend the problem to settings where recharging is only occasionally feasible and show that it can be reduced to a nonlinear optimization problem which can be solved at least numerically.  相似文献   
10.
Rosa  Panayiotis  Christos   《Ad hoc Networks》2007,5(1):87-99
Multipath routing in ad hoc networks increases the resiliency against security attacks of collaborating malicious nodes, by maximizing the number of nodes that an adversary must compromise in order to take control of the communication. In this paper, we identify several attacks that render multipath routing protocols vulnerable to collaborating malicious nodes. We propose an on-demand multipath routing protocol, the secure multipath routing protocol (SecMR), and we analyze its security properties. Finally, through simulations, we evaluate the performance of the SecMR protocol in comparison with existing secure multipath routing protocols.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号