首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1682篇
  免费   125篇
  国内免费   16篇
电工技术   33篇
综合类   12篇
化学工业   390篇
金属工艺   35篇
机械仪表   84篇
建筑科学   80篇
矿业工程   3篇
能源动力   127篇
轻工业   108篇
水利工程   30篇
石油天然气   88篇
无线电   118篇
一般工业技术   304篇
冶金工业   49篇
原子能技术   11篇
自动化技术   351篇
  2024年   8篇
  2023年   29篇
  2022年   49篇
  2021年   87篇
  2020年   93篇
  2019年   116篇
  2018年   170篇
  2017年   143篇
  2016年   146篇
  2015年   80篇
  2014年   129篇
  2013年   196篇
  2012年   118篇
  2011年   124篇
  2010年   86篇
  2009年   75篇
  2008年   51篇
  2007年   40篇
  2006年   16篇
  2005年   8篇
  2004年   13篇
  2003年   4篇
  2002年   6篇
  2001年   1篇
  2000年   1篇
  1998年   7篇
  1995年   1篇
  1994年   3篇
  1992年   1篇
  1991年   1篇
  1990年   1篇
  1989年   1篇
  1988年   2篇
  1986年   4篇
  1985年   4篇
  1984年   2篇
  1981年   1篇
  1979年   1篇
  1978年   1篇
  1977年   1篇
  1976年   1篇
  1973年   2篇
排序方式: 共有1823条查询结果,搜索用时 15 毫秒
11.
Wireless mesh networks (WMNs) introduce a new type of network that has been applied over the last few years. One of the most important developing issues in WMNs is multicast routing, which is a key technology that provides dissemination of data to a group of members in an efficient way. In this article, after an introduction about the structure of a WMN, multicast routing algorithms and protocols in WMNs are surveyed in a detailed and efficient manner. Moreover, effort is made to scale the study into one of the important potential capabilities of multicast routing mechanisms in WMNs, which is taking advantage of using different channels and radios association. While nodes in a single-radio mesh network operating on single-channel have restrictions for capacity, equipping mesh routers with multiple radios using multiple channels can decrease the intention of capacity problem as well as increase the aggregate bandwidth available to the network and improving the throughput. Hence, the purpose of channel assignment is to decrease the interferences while increasing the network capacity and keeping the connectivity of the network. Therefore, this article investigates the multicast protocols considering a definition of three types of WMNs, based on channel-radio association including SRSC, SRMC and MRMC. In its follow, a classification for multicast routing algorithms regarding the achieved optimal solutions will be presented. Finally, a study of MRMC and its relevant problems will be offered, considering the joint channel assignment and the multicast tree construction problem.  相似文献   
12.
Most search techniques within ILP require the evaluation of a large number of inconsistent clauses. However, acceptable clauses typically need to be consistent, and are only found at the “fringe” of the search space. A search approach is presented, based on a novel algorithm called QG (Quick Generalization). QG carries out a random-restart stochastic bottom-up search which efficiently generates a consistent clause on the fringe of the refinement graph search without needing to explore the graph in detail. We use a Genetic Algorithm (GA) to evolve and re-combine clauses generated by QG. In this QG/GA setting, QG is used to seed a population of clauses processed by the GA. Experiments with QG/GA indicate that this approach can be more efficient than standard refinement-graph searches, while generating similar or better solutions. Editors: Ramon Otero, Simon Colton.  相似文献   
13.
In this paper, we extend the single relaxation time Lattice-Boltzmann Method (LBM) to the 3D body-centered cubic (BCC) lattice. We show that the D3bQ15 lattice defined by a 15 neighborhood connectivity of the BCC lattice is not only capable of more accurately discretizing the velocity space of the continuous Boltzmann equation as compared to the D3Q15 Cartesian lattice, it also achieves a comparable spatial discretization with 30 percent less samples. We validate the accuracy of our proposed lattice by investigating its performance on the 3D lid-driven cavity flow problem and show that the D3bQ15 lattice offers significant cost savings while maintaining a comparable accuracy. We demonstrate the efficiency of our method and the impact on graphics and visualization techniques via the application of line-integral convolution on 2D slices as well as the extraction of streamlines of the 3D flow. We further study the benefits of our proposed lattice by applying it to the problem of simulating smoke and show that the D3bQ15 lattice yields more detail and turbulence at a reduced computational cost.  相似文献   
14.
A number of recent initiatives in both academia and industry have sought to achieve improvements in e-businesses through the utilization of Business Process Management (BPM) methodologies and tools. However there are still some inadequacies that need to be addressed when it comes to achieving alignment between business goals and business processes. The User Requirements Notation (URN), recently standardized by ITU-T, has some unique features and capabilities beyond what is available in other notations that can help address alignment issues. In this paper, a URN-based framework and its supporting toolset are introduced which provide business process monitoring and performance management capabilities integrated across the BPM lifecycle. The framework extends the URN notation with Key Performance Indicators (KPIs) and other concepts to measure and align processes and goals. An example process for controlling access to a healthcare data warehouse is used to illustrate and evaluate the framework. Early results indicate the feasibility of the approach.  相似文献   
15.
When individuals encounter new information (data), that information is incorporated with their existing beliefs (prior) to form a new belief (posterior) in a process referred to as belief updating. While most studies on rational belief updating in visual data analysis elicit beliefs immediately after data is shown, we posit that there may be critical movement in an individual's beliefs when elicited immediately after data is shown v. after a temporal delay (e.g., due to forgetfulness or weak incorporation of the data). Our paper investigates the hypothesis that posterior beliefs elicited after a time interval will “decay” back towards the prior beliefs compared to the posterior beliefs elicited immediately after new data is presented. In this study, we recruit 101 participants to complete three tasks where beliefs are elicited immediately after seeing new data and again after a brief distractor task. We conduct (1) a quantitative analysis of the results to understand if there are any systematic differences in beliefs elicited immediately after seeing new data or after a distractor task and (2) a qualitative analysis of participants' reflections on the reasons for their belief update. While we find no statistically significant global trends across the participants beliefs elicited immediately v. after the delay, the qualitative analysis provides rich insight into the reasons for an individual's belief movement across 9 prototypical scenarios, which includes (i) decay of beliefs as a result of either forgetting the information shown or strongly held prior beliefs, (ii) strengthening of confidence in updated beliefs by positively integrating the new data and (iii) maintaining a consistently updated belief over time, among others. These results can guide subsequent experiments to disambiguate when and by what mechanism new data is truly incorporated into one's belief system.  相似文献   
16.
Wireless Personal Communications - The Internet of Things (IoT) is a concept that has attracted significant attention since the emergence of wireless technology. The knowledge diffusion of IoT...  相似文献   
17.
The Journal of Supercomputing - We present a probabilistic method for classifying chest computed tomography (CT) scans into COVID-19 and non-COVID-19. To this end, we design and train, in an...  相似文献   
18.

This research introduces a new probabilistic and meta-heuristic optimization approach inspired by the Corona virus pandemic. Corona is an infection that originates from an unknown animal virus, which is of three known types and COVID-19 has been rapidly spreading since late 2019. Based on the SIR model, the virus can easily transmit from one person to several, causing an epidemic over time. Considering the characteristics and behavior of this virus, the current paper presents an optimization algorithm called Corona virus optimization (CVO) which is feasible, effective, and applicable. A set of benchmark functions evaluates the performance of this algorithm for discrete and continuous problems by comparing the results with those of other well-known optimization algorithms. The CVO algorithm aims to find suitable solutions to application problems by solving several continuous mathematical functions as well as three continuous and discrete applications. Experimental results denote that the proposed optimization method has a credible, reasonable, and acceptable performance.

  相似文献   
19.

Spectrum-based fault localization (SFL) techniques have shown considerable effectiveness in localizing software faults. They leverage a ranking metric to automatically assign suspiciousness scores to certain entities in a given faulty program. However, for some programs, the current SFL ranking metrics lose effectiveness. In this paper, we introduce ConsilientSFL that is served to synthesize a new ranking metric for a given program, based on a customized combination of a set of given ranking metrics. ConsilientSFL can be significant since it demonstrates the usage of voting systems into a software engineering task. First, several mutated, faulty versions are generated for a program. Then, the mutated versions are executed with the test data. Next, the effectiveness of each existing ranking metric is computed for each mutated version. After that, for each mutated version, the computed existing metrics are ranked using a preferential voting system. Consequently, several top metrics are chosen based on their ranks across all mutated versions. Finally, the chosen ranking metrics are normalized and synthesized, yielding a new ranking metric. To evaluate ConsilientSFL, we have conducted experiments on 27 subject programs from Code4Bench and Siemens benchmarks. In the experiments, we found that ConsilientSFL outperformed every single ranking metric. In particular, for all programs on average, we have found performance measures recall, precision, f-measure, and percentage of code inspection, to be nearly 7, 9, 12, and 5 percentages larger than using single metrics, respectively. The impact of this work is twofold. First, it can mitigate the issue with the choice and usage of a proper ranking metric for the faulty program at hand. Second, it can help debuggers find more faults with less time and effort, yielding higher quality software.

  相似文献   
20.
In the present work, reflectance properties of one-dimensional photonic crystal (1D PC) containing a metamaterial and high-temperature superconductor have been investigated theoretically and analyzed. The reflectance/transmittance spectrum of the proposed structure is obtained by using the characteristic or transfer-matrix method (TMM). The results show that by increasing the thickness of the metamaterial layer, the width of the second reflection band decreases while the width of the first reflection band remains almost the same though it shifts towards the higher frequency side. In addition to this, a new band gap arises in the lower side of frequency. But, when the thickness of the superconductor layer is increased, the width of both the bands increases and no additional band arises in this case. Moreover, the reflection band is also affected by varying the operating temperature of the superconducting layer and the results show that bands get narrower by increasing the operating temperature. Finally, the effect of incident angle on the reflection band has been discussed for both transverse electric (TE) and transverse magnetic (TM) polarizations.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号