首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   19183篇
  免费   830篇
  国内免费   142篇
电工技术   325篇
综合类   32篇
化学工业   4264篇
金属工艺   589篇
机械仪表   630篇
建筑科学   377篇
矿业工程   47篇
能源动力   1371篇
轻工业   1177篇
水利工程   153篇
石油天然气   85篇
武器工业   1篇
无线电   2370篇
一般工业技术   4333篇
冶金工业   1442篇
原子能技术   175篇
自动化技术   2784篇
  2024年   102篇
  2023年   421篇
  2022年   999篇
  2021年   1168篇
  2020年   919篇
  2019年   945篇
  2018年   1221篇
  2017年   965篇
  2016年   929篇
  2015年   604篇
  2014年   842篇
  2013年   1515篇
  2012年   889篇
  2011年   1076篇
  2010年   863篇
  2009年   809篇
  2008年   715篇
  2007年   573篇
  2006年   472篇
  2005年   367篇
  2004年   275篇
  2003年   242篇
  2002年   189篇
  2001年   181篇
  2000年   172篇
  1999年   170篇
  1998年   290篇
  1997年   238篇
  1996年   221篇
  1995年   172篇
  1994年   158篇
  1993年   153篇
  1992年   104篇
  1991年   131篇
  1990年   99篇
  1989年   97篇
  1988年   81篇
  1987年   89篇
  1986年   76篇
  1985年   85篇
  1984年   75篇
  1983年   73篇
  1982年   62篇
  1981年   70篇
  1980年   49篇
  1979年   32篇
  1978年   29篇
  1977年   26篇
  1976年   36篇
  1975年   13篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
141.
Liouville numbers were the first class of real numbers which were proven to be transcendental. It is easy to construct non-normal Liouville numbers. Kano (1993) and Bugeaud (2002) have proved, using analytic techniques, that there are normal Liouville numbers. Here, for a given base k ≥ 2, we give a new construction of a Liouville number which is normal to the base k. This construction is combinatorial, and is based on de Bruijn sequences.  相似文献   
142.
Diploid genetic algorithms (DGAs) promise robustness as against simple genetic algorithms which only work towards optimization. Moreover, these algorithms outperform others in dynamic environments. The work examines the theoretical aspect of the concept by examining the existing literature. The present work takes the example of dynamic TSP to compare greedy approach, genetic algorithms and DGAs. The work also implements a greedy genetic approach for the problem. In the experiments carried out, the three variants of dominance were implemented and 115 runs proved the point that none of them outperforms the other.  相似文献   
143.
144.
In classification tasks, the error rate is proportional to the commonality among classes. In conventional GMM-based modeling technique, since the model parameters of a class are estimated without considering other classes in the system, features that are common across various classes may also be captured, along with unique features. This paper proposes to use unique characteristics of a class at the feature-level and at the phoneme-level, separately, to improve the classification accuracy. At the feature-level, the performance of a classifier has been analyzed by capturing the unique features while modeling, and removing common feature vectors during classification. Experiments were conducted on speaker identification task, using speech data of 40 female speakers from NTIMIT corpus, and on a language identification task, using speech data of two languages (English and French) from OGI_MLTS corpus. At the phoneme-level, performance of a classifier has been analyzed by identifying a subset of phonemes, which are unique to a speaker with respect to his/her closely resembling speaker, in the acoustic sense, on a speaker identification task. In both the cases (feature-level and phoneme-level) considerable improvement in classification accuracy is observed over conventional GMM-based classifiers in the above mentioned tasks. Among the three experimental setup, speaker identification task using unique phonemes shows as high as 9.56 % performance improvement over conventional GMM-based classifier.  相似文献   
145.
In many physical systems, when implementing quantum gate operations unavoidable global and relative phases occur as by-products due to the internal structure of the governing Hamiltonian. To correct, additional phase rotation gates are used, which increases the computational overhead. Here, we show how these phase by-products can actually be used to our advantage by using them to implement universal quantum computing between qubits not directly coupled to each other. The gate operations, CNOT, Toffoli, and swap gates, require much less computational overhead than present schemes, and are achieved with fidelity greater than 99%. We then present a linear nearest-neighbor architecture that takes full advantage of the phase by-products, and we show how to implement gates from a universal set efficiently in this layout. In this scheme gate operations are realized by only varying a single control parameter per data qubit, and the ability to tune couplings is not required.  相似文献   
146.
In mobile commerce, companies provide location based services to mobile users, who report their locations with a certain level of granularity to maintain a degree of anonymity. This level of granularity depends on their perceived risk as well as the incentives they receive in the form of monetary benefits or improved mobile services. This paper formulates a quantitative model in which information theoretic metrics such as entropy, quantify the anonymity level of mobile users. The individual perceived risks of users and the benefits they obtain are defined as functions of their chosen location information granularity. The interaction between the mobile commerce company and its users is investigated using mechanism design techniques as a privacy game. The user best responses and optimal strategies for the company are derived under budgetary constraints on incentives, which are provided to users in order to convince them to share their private information at the desired level of granularity. Information limitations in the system are analyzed to capture more realistic scenarios where the companies do not have access to user utility functions. Iterative distributed algorithm and regression learning methods are investigated to design mechanisms that overcome these limitations. The results obtained are demonstrated with a numerical example and simulations based on real GPS data.  相似文献   
147.
The pre-processing stage of finite element analysis of the Navier–Stokes equations is becoming increasingly important as the desire for more general boundary conditions, as well as applications to parallel computers increases. The set up of general boundary conditions and communication structures for parallel computations should be accomplished during the pre-processing phase of the analysis, if possible, to ensure efficient computations for large scale problems in computational fluid dynamics. This paper introduces a general methodology for geometry based boundary condition application and pre-computing of parallel communication tasks. A. K. Karanam was supported by NSF Grant No. 9985340. C. H. Whiting was supported by a grant from NASA LaRC.  相似文献   
148.
In the domain of manufacturing, computer numerically controllers (CNC) technology is a major contributor to the production capacity of the enterprises. The advances in CNC technology coupled with enhancements in computing systems have provided the basis to re-examine the way in which computer-aided systems (CAx) can be used to enable global manufacturing. Interoperability of the various components of the CAx chain is therefore a major prerequisite for manufacturing enterprises for becoming strategically agile and consequently globally competitive. Being interoperable, resources can be utilized interchangeably in a plug-and-produce manner. Over the last 8 years the eminence of a STEP standard for machining entitled STEP-NC (numerical control) has become a well-known vehicle for research to improve the level of information availability at the CNC machine tool. In this paper, the authors introduce the background to the evolution of CNC manufacturing over the last 50 years and the current standards available for programming. A review of the literature in interoperable CNC manufacturing is then provided relating to milling, turn–mill and other NC processes. The major part of the paper provides a strategic view of how interoperability can be implemented across the CAx chain with a range of standards used to regulate the flow of information. Finally, the paper outlines the advantages and major issues for future developments in interoperability, identifying future key requirements and limiting factors.  相似文献   
149.
The high-conductance state of cortical networks   总被引:3,自引:0,他引:3  
We studied the dynamics of large networks of spiking neurons with conductance-based (nonlinear) synapses and compared them to networks with current-based (linear) synapses. For systems with sparse and inhibition-dominated recurrent connectivity, weak external inputs induced asynchronous irregular firing at low rates. Membrane potentials fluctuated a few millivolts below threshold, and membrane conductances were increased by a factor 2 to 5 with respect to the resting state. This combination of parameters characterizes the ongoing spiking activity typically recorded in the cortex in vivo. Many aspects of the asynchronous irregular state in conductance-based networks could be sufficiently well characterized with a simple numerical mean field approach. In particular, it correctly predicted an intriguing property of conductance-based networks that does not appear to be shared by current-based models: they exhibit states of low-rate asynchronous irregular activity that persist for some period of time even in the absence of external inputs and without cortical pacemakers. Simulations of larger networks (up to 350,000 neurons) demonstrated that the survival time of self-sustained activity increases exponentially with network size.  相似文献   
150.
Object identification is a specialized type of recognition in which the category (e.g. cars) is known and the goal is to recognize an object’s exact identity (e.g. Bob’s BMW). Two special challenges characterize object identification. First, inter-object variation is often small (many cars look alike) and may be dwarfed by illumination or pose changes. Second, there may be many different instances of the category but few or just one positive “training” examples per object instance. Because variation among object instances may be small, a solution must locate possibly subtle object-specific salient features, like a door handle, while avoiding distracting ones such as specular highlights. With just one training example per object instance, however, standard modeling and feature selection techniques cannot be used. We describe an on-line algorithm that takes one image from a known category and builds an efficient “same” versus “different” classification cascade by predicting the most discriminative features for that object instance. Our method not only estimates the saliency and scoring function for each candidate feature, but also models the dependency between features, building an ordered sequence of discriminative features specific to the given image. Learned stopping thresholds make the identifier very efficient. To make this possible, category-specific characteristics are learned automatically in an off-line training procedure from labeled image pairs of the category. Our method, using the same algorithm for both cars and faces, outperforms a wide variety of other methods.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号