首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1439篇
  免费   60篇
  国内免费   2篇
电工技术   35篇
综合类   4篇
化学工业   408篇
金属工艺   10篇
机械仪表   54篇
建筑科学   62篇
矿业工程   1篇
能源动力   78篇
轻工业   89篇
水利工程   5篇
无线电   139篇
一般工业技术   245篇
冶金工业   51篇
原子能技术   32篇
自动化技术   288篇
  2023年   13篇
  2022年   68篇
  2021年   72篇
  2020年   28篇
  2019年   29篇
  2018年   47篇
  2017年   38篇
  2016年   48篇
  2015年   33篇
  2014年   62篇
  2013年   106篇
  2012年   104篇
  2011年   112篇
  2010年   80篇
  2009年   92篇
  2008年   63篇
  2007年   69篇
  2006年   64篇
  2005年   33篇
  2004年   45篇
  2003年   31篇
  2002年   35篇
  2001年   22篇
  2000年   18篇
  1999年   22篇
  1998年   19篇
  1997年   16篇
  1996年   19篇
  1995年   15篇
  1994年   8篇
  1993年   16篇
  1992年   6篇
  1991年   4篇
  1990年   4篇
  1989年   6篇
  1988年   3篇
  1987年   3篇
  1986年   3篇
  1985年   4篇
  1983年   3篇
  1982年   3篇
  1981年   3篇
  1980年   6篇
  1979年   4篇
  1978年   2篇
  1977年   3篇
  1976年   2篇
  1975年   2篇
  1973年   4篇
  1968年   2篇
排序方式: 共有1501条查询结果,搜索用时 15 毫秒
61.
In this paper, the Causal Recursive Back-Propagation (CRBP) algorithm is employed to train on-line an Infinite Impulse Response–Locally Recurrent Neural Network (IIR–LRNN) for modelling the dynamics of a next-generation nuclear reactor. The results demonstrate the advantages of the on-line training over the batch-mode learning in the reconstruction of complex nonlinear dynamic relationships.  相似文献   
62.
JPEG 2000 is the novel ISO standard for image and video coding. Besides its improved coding efficiency, it also provides a few error resilience tools in order to limit the effect of errors in the codestream, which can occur when the compressed image or video data are transmitted over an error-prone channel, as typically occurs in wireless communication scenarios. However, for very harsh channels, these tools often do not provide an adequate degree of error protection. In this paper, we propose a novel error-resilience tool for JPEG 2000, based on the concept of ternary arithmetic coders employing a forbidden symbol. Such coders introduce a controlled degree of redundancy during the encoding process, which can be exploited at the decoder side in order to detect and correct errors. We propose a maximum likelihood and a maximum a posteriori context-based decoder, specifically tailored to the JPEG 2000 arithmetic coder, which are able to carry out both hard and soft decoding of a corrupted code-stream. The proposed decoder extends the JPEG 2000 capabilities in error-prone scenarios, without violating the standard syntax. Extensive simulations on video sequences show that the proposed decoders largely outperform the standard in terms of PSNR and visual quality.  相似文献   
63.
The self-seeding crystallisation technique is applied to a dilute solution of polyethylene in xylene containing, in suspension, foreign particles; data concerning some pigments usually employed for colouring the plastics are reported. It is shown that this method allows easy demonstration of the interactions existing between the dissolved polymer and the pigment; at the same time, it is possible to study the morphology which is evolved as a consequence of these interactions under particularly simple conditions as only a small amount of polymer crystallises on the pigment particles. The behaviour of several pigments is consistent with the results obtained by crystallising the bulk polyethylene coloured with the same pigments. Some unusual morphologies are made evident.  相似文献   
64.
A mammalian two-hybrid system was developed for high-throughput screening of compounds that disrupt specific protein-protein interactions. The existing mammalian systems are unsatisfactory for drug screening due to nonregulated expression of interacting proteins. To construct a tightly regulated system, the tetracycline repressor was fused with the inhibitory KRAB domain as a suppressor. The binding of the suppressor to the tet operator entirely blocked expression of two interacting proteins. When both the inducer doxycycline and drugs were added to the culture, the reporter gene was either activated by interaction of the paired proteins with ineffective drugs or remained silent due to disruption of the protein interactions by the effective drugs. We demonstrate that interactions of the type I receptor for TGFbeta with FKBP12 and the epidermal growth factor receptor (EGFR) with p85 are effectively disrupted by FK506 and EGFR kinase inhibitor AG1478, respectively. The power of this system for drug screening was further demonstrated by rapid identification of inhibitors from a druglike library for the receptor kinases.  相似文献   
65.
We address the problem of the efficient visualization of large irregular volume data sets by exploiting a multiresolution model based on tetrahedral meshes. Multiresolution models, also called Level-Of-Detail (LOD) models, allow encoding the whole data set at a virtually continuous range of different resolutions. We have identified a set of queries for extracting meshes at variable resolution from a multiresolution model, based on field values, domain location, or opacity of the transfer function. Such queries allow trading off between resolution and speed in visualization. We define a new compact data structure for encoding a multiresolution tetrahedral mesh built through edge collapses to support selective refinement efficiently and show that such a structure has a storage cost from 3 to 5.5 times lower than standard data structures used for tetrahedral meshes. The data structures and variable resolution queries have been implemented together with state-of-the art visualization techniques in a system for the interactive visualization of three-dimensional scalar fields defined on tetrahedral meshes. Experimental results show that selective refinement queries can support interactive visualization of large data sets.  相似文献   
66.
In this paper we show that statistical properties of the transition graph of a system to be verified can be exploited to improve memory or time performances of verification algorithms.We show experimentally that protocols exhibit transition locality. That is, with respect to levels of a breadth-first state space exploration, state transitions tend to be between states belonging to close levels of the transition graph. We support our claim by measuring transition locality for the set of protocols included in the Mur verifier distribution .We present a cache-based verification algorithm that exploits transition locality to decrease memory usage and a disk-based verification algorithm that exploits transition locality to decrease disk read accesses, thus reducing the time overhead due to disk usage. Both algorithms have been implemented within the Mur verifier.Our experimental results show that our cache-based algorithm can typically save more than 40% of memory with an average time penalty of about 50% when using (Mur) bit compression and 100% when using bit compression and hash compaction, whereas our disk-based verification algorithm is typically more than ten times faster than a previously proposed disk-based verification algorithm and, even when using 10% of the memory needed to complete verification, it is only between 40 and 530% (300% on average) slower than (RAM) Mur with enough memory to complete the verification task at hand. Using just 300 MB of memory our disk-based Mur was able to complete verification of a protocol with about 109 reachable states. This would require more than 5 GB of memory using standard Mur .  相似文献   
67.
It is widely recognized that students in biology, the earth sciences, chemistry and the natural sciences need some basic knowledge of programming in order to find out what they can and should expect from the use of computing media. Often, however, their curricula does not include any courses in computer science. It is possible to tackle this educational problem by introducing elements of computer science into the mathematics and/or statistics courses which do appear in their curricula. In this paper we suggest a method for integrating the teaching of the two different topics, for example, programming with calculus or statistics. The suggested approach has been extensively tested in mathematics courses for earth sciences, chemistry and pharmaceutical chemistry students at the University of Genova, Italy. We also believe that our approach provides some useful suggestions towards the solution of similar educational problems in the higher level courses of secondary schools.  相似文献   
68.
69.
Computational aspects of prospect theory with asset pricing applications   总被引:1,自引:0,他引:1  
We develop an algorithm to compute asset allocations for Kahneman and Tversky’s (Econometrica, 47(2), 263–291, 1979) prospect theory. An application to benchmark data as in Fama and French (Journal of Financial Economics, 47(2), 427–465, 1992) shows that the equity premium puzzle is resolved for parameter values similar to those found in the laboratory experiments of Kahneman and Tversky (Econometrica, 47(2), 263–291, 1979). While previous studies like Benartzi and Thaler (The Quarterly Journal of Economics, 110(1), 73–92, 1995), Barberis, Huang and Santos (The Quarterly Journal of Economics, 116(1), 1–53, 2001), and Grüne and Semmler (Asset prices and loss aversion, Germany, Mimeo Bielefeld University, 2005) focussed on dynamic aspects of asset pricing but only used loss aversion to explain the equity premium puzzle our paper explains the unconditional moments of asset pricing by a static two-period optimization problem. However, we incorporate asymmetric risk aversion. Our approach allows reducing the degree of loss aversion from 2.353 to 2.25, which is the value found by Tversky and Kahneman (Journal of Risk and Uncertainty, 5, 297–323, 1992) while increasing the risk aversion from 1 to 0.894, which is a slightly higher value than the 0.88 found by Tversky and Kahneman (Journal of Risk and Uncertainty, 5, 297–323, 1992). The equivalence of these parameter settings is robust to incorporating the size and the value portfolios of Fama and French (Journal of Finance, 47(2), 427–465, 1992). However, the optimal prospect theory portfolios found on this larger set of assets differ drastically from the optimal mean-variance portfolio.  相似文献   
70.
A crack is steadily running in an elastic isotropic fluid-saturated porous solid at an intersonic constant speed c. The crack tip speeds of interest are bounded below by the slower between the slow longitudinal wave-speed and the shear wave-speed, and above by the fast longitudinal wave-speed. Biot’s theory of poroelasticity with inertia forces governs the motion of the mixture. The poroelastic moduli depend on the porosity, and the complete range of porosities n ∈ [0, 1] is investigated. Solids are obtained as the limit case n = 0, and the continuity of the energy release rate as the porosity vanishes is addressed. Three characteristic regions in the plane (n, c) are delineated, depending on the relative order of the body wave-speeds. Mode II loading conditions are considered, with a permeable crack surface. Cracks with and without process zones are envisaged. In each region, the analytical solution to a Riemann–Hilbert problem provides the stress, pore pressure and velocity fields near the tip of the crack. For subsonic propagation, the asymptotic crack tip fields are known to be continuous in the body [Loret and Radi (2001) J Mech Phys Solids 49(5):995–1020]. In contrast, for intersonic crack propagation without a process zone, the asymptotic stress and pore pressure might display a discontinuity across two or four symmetric rays emanating from the moving crack tip. Under Mode II loading condition, the singularity exponent for energetically admissible tip speeds turns out to be weaker than 1/2, except at a special point and along special curves of the (n, c)-plane. The introduction of a finite length process zone is required so that 1. the energy release rate at the crack tip is strictly positive and finite; 2. the relative sliding of the crack surfaces has the same direction as the applied loading. The presence of the process zone is shown to wipe out possible first order discontinuities.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号