首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3097篇
  免费   186篇
  国内免费   4篇
电工技术   35篇
综合类   2篇
化学工业   740篇
金属工艺   33篇
机械仪表   54篇
建筑科学   90篇
矿业工程   7篇
能源动力   96篇
轻工业   480篇
水利工程   25篇
石油天然气   6篇
无线电   253篇
一般工业技术   453篇
冶金工业   522篇
原子能技术   22篇
自动化技术   469篇
  2024年   3篇
  2023年   34篇
  2022年   129篇
  2021年   131篇
  2020年   68篇
  2019年   56篇
  2018年   100篇
  2017年   78篇
  2016年   94篇
  2015年   97篇
  2014年   134篇
  2013年   179篇
  2012年   188篇
  2011年   193篇
  2010年   134篇
  2009年   145篇
  2008年   112篇
  2007年   119篇
  2006年   92篇
  2005年   71篇
  2004年   63篇
  2003年   74篇
  2002年   61篇
  2001年   38篇
  2000年   43篇
  1999年   52篇
  1998年   192篇
  1997年   125篇
  1996年   89篇
  1995年   63篇
  1994年   56篇
  1993年   43篇
  1992年   16篇
  1991年   20篇
  1990年   13篇
  1989年   17篇
  1988年   10篇
  1987年   12篇
  1986年   14篇
  1985年   10篇
  1984年   13篇
  1983年   14篇
  1982年   10篇
  1981年   13篇
  1980年   11篇
  1979年   6篇
  1978年   8篇
  1977年   14篇
  1976年   15篇
  1973年   3篇
排序方式: 共有3287条查询结果,搜索用时 15 毫秒
41.
Privacy preserving technologies are likely to become an essential component of adaptive services in pervasive and mobile computing. Although privacy issues have been studied for a long time in computer science as well as in other fields, most studies are focused on the release of data from large repositories. Mobile and pervasive computing pose new challenges, requiring specific formal models for attacks and new privacy preserving techniques. This paper considers a specific pervasive computing scenario, and shows that the application of state-of-the-art techniques for the anonymization of service requests is insufficient to protect the privacy of users. A specific class of attacks, called shadow attacks, is formally defined and a defense technique is proposed. This defense is formally proved to be correct, and its effectiveness is validated by extensive experiments in a simulated environment.  相似文献   
42.
We analyze generalization in XCSF and introduce three improvements. We begin by showing that the types of generalizations evolved by XCSF can be influenced by the input range. To explain these results we present a theoretical analysis of the convergence of classifier weights in XCSF which highlights a broader issue. In XCSF, because of the mathematical properties of the Widrow-Hoff update, the convergence of classifier weights in a given subspace can be slow when the spread of the eigenvalues of the autocorrelation matrix associated with each classifier is large. As a major consequence, the system's accuracy pressure may act before classifier weights are adequately updated, so that XCSF may evolve piecewise constant approximations, instead of the intended, and more efficient, piecewise linear ones. We propose three different ways to update classifier weights in XCSF so as to increase the generalization capabilities of XCSF: one based on a condition-based normalization of the inputs, one based on linear least squares, and one based on the recursive version of linear least squares. Through a series of experiments we show that while all three approaches significantly improve XCSF, least squares approaches appear to be best performing and most robust. Finally we show how XCSF can be extended to include polynomial approximations.  相似文献   
43.
In retrieval from image databases, evaluation of similarity, based both on the appearance of spatial entities and on their mutual relationships, depends on content representation based on attributed relational graphs. This kind of modeling entails complex matching and indexing, which presently prevents its usage within comprehensive applications. In this paper, we provide a graph-theoretical formulation for the problem of retrieval based on the joint similarity of individual entities and of their mutual relationships and we expound its implications on indexing and matching. In particular, we propose the usage of metric indexing to organize large archives of graph models, and we propose an original look-ahead method which represents an efficient solution for the (sub)graph error correcting isomorphism problem needed to compute object distances. Analytic comparison and experimental results show that the proposed lookahead improves the state-of-the-art in state-space search methods and that the combined use of the proposed matching and indexing scheme permits for the management of the complexity of a typical application of retrieval by spatial arrangement  相似文献   
44.
In this paper we discuss reasoning about reasoning in a multiple agent scenario. We consider agents that are perfect reasoners, loyal, and that can take advantage of both the knowledge and ignorance of other agents. The knowledge representation formalism we use is (full) first order predicate calculus, where different agents are represented by different theories, and reasoning about reasoning is realized via a meta-level representation of knowledge and reasoning. The framework we provide is pretty general: we illustrate it by showing a machine checked solution to the three wisemen puzzle. The agents' knowledge is organized into units: the agent's own knowledge about the world and its knowledge about other agents are units containing object-level knowledge; a unit containing meta-level knowledge embodies the reasoning about reasoning and realizes the link among units. In the paper we illustrate the meta-level architecture we propose for problem solving in a multi-agent scenario; we discuss our approach in relation to the modal one and we compare it with other meta-level architectures based on logic. Finally, we look at a class of applications that can be effectively modeled by exploiting the meta-level approach to reasoning about knowledge and reasoning.  相似文献   
45.
We present a decidability result for the model checking of a certain class of properties that can be conveniently expressed as ground formulae of a first-order temporal fragment. The decidability result is obtained by importing into the context of model-checking problems some techniques developed for the combination of decision procedures for the satisfiability of constraints. The general decidability result is then specialized for checking properties of particular interest, such as liveness and safety, and, for the latter case, a more optimized algorithm has been proposed.  相似文献   
46.
Evaluation of patient satisfaction has become an important indicator for assessing health care quality. Fresenius Medical Care (FME) as a global provider of dialysis services through its NephroCare network has a strong interest in monitoring patient satisfaction.The aim of the paper is to test and validate a methodology for detecting a residual area of low satisfaction in dialysis patients.The FME Patient Satisfaction Programme questionnaire was distributed to haemodialysis (HD) patients treated in 335 centers of its network. It contained 79 questions covering various satisfaction aspects regarding Dialysis Unit, Dialysis Arrangement, Nurses, Doctors, etc.To analyse the data provided by the questionnaire, the Self-Organising Map (SOM) method was used. SOM is a neural network model for clustering and projecting high-dimensional data into a low-dimensional space, preserving topological relationships of original high-dimensional data spaces.10,632 HD patients completed the questionnaire. Mean age was 63.05 ± 14.93 years with 56.69% males. Response rate was 66%. Overall level of satisfaction was 1.99 (range from ?3 to +3). On average patients were very satisfied with all issues. Nevertheless, a group of patients, around 60 years old, balanced gender ratio, whose level of satisfaction was lower than 1, were highlighted.In the NephroCare clinics patient satisfaction with service is rather high. While traditional analysis usually stops here, the SOM method allows identification of areas of potential improvement for specific patient groups.  相似文献   
47.
A multiplanar positron camera is proposed, made of six MWPC modules, arranged to form the lateral surface of a hexagonal prism. Each 50 x 50 cm(2) module has a single MWPC sandwiched by two 2-cm thick lead glass tube converters. The experimental results for a 15 x 15 cm(2) test module are reported. For 511 keV gamma-rays incident almost perpendicular onto a 1.0-cm thick converter, a detection efficiency of 4.3%, a time resolution of 130 ns (FWHM) and a spatial resolution of 2.8 mm (FWHM) have been measured with a standard Argon-Methane (70-30) mixture at 1.2 atm. The chamber may also be operated in high resolution mode: 1.2-mm (FWHM) spatial resolution has been measured at a 50% lower efficiency. The use of fast delay lines (specific delay 8 ns/cm) for the position read-out ensures a high rate capability. The expected performance of the six-module MWPC camera is discussed and compared with that of a BGO crystal ring camera. The MWPC solution seems very attractive not only for its low cost and simplicity of construction, but also for its fully three-dimensional imaging capability.  相似文献   
48.
Multiaxial fatigue and failure analysis of helical compression springs   总被引:1,自引:0,他引:1  
Multiaxial fatigue criteria are applied to the analysis of helical compression springs. The critical plane approaches, Fatemi–Socie and Wang–Brown, and the Coffin–Manson method based on shear deformation, were used to predict fatigue lives of the springs under constant amplitude loading. Experimental fatigue lives are compared with the multiaxial fatigue criteria predictions. The stress analysis was carried out in the finite element code ANSYS, and the multiaxial fatigue study was performed using the fatigue software nCode. A failure analysis was conducted in order to determine the fatigue crack initiation point and a comparison of that location with the most damaged zone predicted by the numerical analysis is made. The Fatemi–Socie critical plane approach gives a good prediction of fatigue life. While the Wang–Brown criterion overestimates spring fatigue life, the Coffin–Mason model gives conservative results.  相似文献   
49.
A fiber-optic sensor sensitive to hydrogen peroxide has been designed based on the electrostatic layer-by-layer self-assembly method. Prussian blue has been deposited in a polymeric structure formed by Poly(allylamine hydrochloride) and poly(acrylic acid). The concentration that can be detected range between 10/sup -6/-10/sup -3/ M, and recovery of the sensor after immersion into a reductive agent was demonstrated. The response of the sensor is independent of the pH for values that range between 4-7.4. Some rules for estimation of the refractive index of the material deposited and the thickness of the bilayers are also presented.  相似文献   
50.
Electronic neuromorphic devices with on-chip, on-line learning should be able to modify quickly the synaptic couplings to acquire information about new patterns to be stored (synaptic plasticity) and, at the same time, preserve this information on very long time scales (synaptic stability). Here, we illustrate the electronic implementation of a simple solution to this stability-plasticity problem, recently proposed and studied in various contexts. It is based on the observation that reducing the analog depth of the synapses to the extreme (bistable synapses) does not necessarily disrupt the performance of the device as an associative memory, provided that 1) the number of neurons is large enough; 2) the transitions between stable synaptic states are stochastic; and 3) learning is slow. The drastic reduction of the analog depth of the synaptic variable also makes this solution appealing from the point of view of electronic implementation and offers a simple methodological alternative to the technological solution based on floating gates. We describe the full custom analog very large-scale integration (VLSI) realization of a small network of integrate-and-fire neurons connected by bistable deterministic plastic synapses which can implement the idea of stochastic learning. In the absence of stimuli, the memory is preserved indefinitely. During the stimulation the synapse undergoes quick temporary changes through the activities of the pre- and postsynaptic neurons; those changes stochastically result in a long-term modification of the synaptic efficacy. The intentionally disordered pattern of connectivity allows the system to generate a randomness suited to drive the stochastic selection mechanism. We check by a suitable stimulation protocol that the stochastic synaptic plasticity produces the expected pattern of potentiation and depression in the electronic network.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号