首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   598篇
  免费   21篇
  国内免费   1篇
电工技术   7篇
综合类   1篇
化学工业   238篇
金属工艺   25篇
机械仪表   18篇
建筑科学   9篇
矿业工程   3篇
能源动力   33篇
轻工业   40篇
水利工程   4篇
石油天然气   2篇
无线电   29篇
一般工业技术   87篇
冶金工业   22篇
原子能技术   7篇
自动化技术   95篇
  2023年   8篇
  2022年   64篇
  2021年   63篇
  2020年   28篇
  2019年   30篇
  2018年   33篇
  2017年   26篇
  2016年   28篇
  2015年   26篇
  2014年   24篇
  2013年   30篇
  2012年   36篇
  2011年   27篇
  2010年   33篇
  2009年   26篇
  2008年   17篇
  2007年   17篇
  2006年   22篇
  2005年   14篇
  2004年   7篇
  2003年   10篇
  2002年   10篇
  2001年   4篇
  2000年   1篇
  1999年   4篇
  1998年   2篇
  1997年   2篇
  1996年   5篇
  1994年   1篇
  1993年   1篇
  1992年   1篇
  1990年   4篇
  1989年   4篇
  1988年   1篇
  1986年   1篇
  1985年   1篇
  1984年   3篇
  1980年   1篇
  1979年   2篇
  1977年   2篇
  1973年   1篇
排序方式: 共有620条查询结果,搜索用时 15 毫秒
531.
The computation of the optimal phonetic alignment andthe phonetic similarity between wordsis an important step in many applications in computational phonology,including dialectometry.After discussing several related algorithms,I present a novel approach to the problem that employsa scoring scheme for computing phonetic similarity between phonetic segmentson the basis of multivalued articulatory phonetic features.The scheme incorporates the key concept of feature salience,which is necessary to properly balance the importance of various features.The new algorithm combines several techniquesdeveloped for sequence comparison:an extended set of edit operations,local and semiglobal modes of alignment,and the capability of retrieving a set of near-optimal alignments.On a set of 82 cognate pairs,it performs better than comparable algorithms reported in the literature.  相似文献   
532.
We consider the problem of waking up n processors in a completely broadcast system. We analyze this problem in both globally and locally synchronous models, with or without n being known to the processors and with or without labeling of the processors. The main question we answer is: how fast we can wake up all the processors with probability 1 - ε in each of these eight models? In [12] a logarithmic waking algorithm for the strongest set of assumptions is described, while for weaker models only linear and quadratic algorithms were obtained. We prove that in the weakest model (local synchronization, no knowledge of n or labeling) the best waking time is O(n/log n). We also show logarithmic or polylogarithmic probabilistic waking algorithms for all stronger models, which in some cases gives an exponential improvement over previous results.  相似文献   
533.
Spatial averages for linear elements for two-parameter random field   总被引:1,自引:0,他引:1  
The paper deals with the modelling of the soil medium as a random field. The necessity of using local random averages in numerical and analytical stochastic calculations are the main interest. The paper concentrates on linear elements and on the calculation of the variances and covariances of local random variables averaged over these elements. Several equations are derived by analytical integration, both for isotropic and anisotropic random fields. These should be useful for calculation, analysis and a better understanding of the influence of the geometry of elements and the value of parameters of random fields on the covariances of local averages.  相似文献   
534.
The aim of this paper is to develop a formal theory of Mizar types. The examples are extracted from Mizar Mathematical Library (MML), some of them are simplified or presented in a bit different way. The presented theory is an approach to the structure of Mizar types as a sup-semilattice with widening (subtyping) relation as the order. It is an abstraction from the existing implementation of the Mizar verifier by Andrzej Trybulec and Czesław Byliński. The theory describes the structure of types of the base fragment of Mizar language.  相似文献   
535.
This paper studies the problem of maximizing the number of correct results of dependent tasks computed unreliably. We consider a distributed system composed of a reliable server that coordinates the computation of a massive number of unreliable workers. Any worker computes correctly with probability p < 1. Any incorrectly computed task corrupts all dependent tasks. The goal is to determine which tasks should be computed by the (reliable) server and which by the (unreliable) workers, and when, so as to maximize the expected number of correct results, under a constraint d on the computation time. This problem is motivated by distributed computing applications that persist partial results of computations for future use in other computations and that want to ensure that the persisted results are of high quality. We show that this optimization problem is NP-hard. Then we study optimal scheduling solutions for the mesh with the tightest deadline. We present combinatorial arguments that describe all optimal solutions for two ranges of values of worker reliability p, when p is close to zero and when p is close to one.  相似文献   
536.

One of the areas in which wireless networks based on visible light communication (VLC) are considered superior to traditional radio-based communication is security. The common slogan summarizing VLC security features is: WYSIWYS—”What You See Is What You Send”. However, especially in the case of infrastructure downlink communication, security with respect to data snooping, jamming and modification must be carefully provided for. This paper examines the physical layer aspects of VLC networks with respect to possible disruptions caused by rogue transmitters. We present the theoretical system model that we use in simulations to evaluate various rogue transmission scenarios in a typical indoor environment. We use estimated bit error rate as a measure of the effectiveness of jamming and rogue data transmission. We find that it is quite easy to disrupt, and in some cases to even hijack legitimate transmission.

  相似文献   
537.
538.
This paper addresses problem of designing water usage network that consists of fixed flow rate water using processes. A design method is founded on the solution of mixed-integer linear programming (MILP) model of network superstructure. The application of optimization to solve basic formulation of network synthesis has been reported in some works. However, this approach applies certain extensions of the standard formulation that allow accounting for several industrial scenarios. In particular, it is possible to apply various performance indices and imposing conditions on continuous variables as well as on network topology. Multiple contaminant case is easily accounted for. At least but not at last, the method is able to generate several solutions of identical values of major performance indices but of different structure and other features. All these possibilities are available within single optimization framework. Several examples are given to illustrate advantages of the approach.  相似文献   
539.
540.
Water network (called also water allocation) problem has been addressed in more than 200 papers to date – see recent reviews by Je?owski (2010) and Foo (2009). Though various solution methods have been developed they all have some limitations. This paper addresses water usage network with regeneration processes. Multiple contaminants and two types of water using processes are taken into regard. Simultaneous one stage optimization method was developed to synthesize the network. In order to solve complex MINLP formulation we propose to apply meta-heuristic optimization – adaptive random search method.The paper contains detailed solution algorithm. Several examples with specific features are solved to show efficiency and flexibility of the approach.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号