首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3998篇
  免费   333篇
  国内免费   5篇
电工技术   36篇
化学工业   1090篇
金属工艺   76篇
机械仪表   110篇
建筑科学   137篇
矿业工程   12篇
能源动力   162篇
轻工业   638篇
水利工程   36篇
石油天然气   19篇
无线电   291篇
一般工业技术   644篇
冶金工业   191篇
原子能技术   35篇
自动化技术   859篇
  2024年   12篇
  2023年   57篇
  2022年   145篇
  2021年   241篇
  2020年   135篇
  2019年   183篇
  2018年   175篇
  2017年   172篇
  2016年   206篇
  2015年   145篇
  2014年   207篇
  2013年   323篇
  2012年   304篇
  2011年   312篇
  2010年   234篇
  2009年   224篇
  2008年   201篇
  2007年   193篇
  2006年   106篇
  2005年   99篇
  2004年   103篇
  2003年   64篇
  2002年   71篇
  2001年   42篇
  2000年   33篇
  1999年   31篇
  1998年   44篇
  1997年   38篇
  1996年   34篇
  1995年   28篇
  1994年   22篇
  1993年   17篇
  1992年   14篇
  1991年   11篇
  1990年   12篇
  1989年   11篇
  1988年   11篇
  1987年   11篇
  1986年   11篇
  1985年   8篇
  1984年   7篇
  1983年   6篇
  1982年   6篇
  1981年   9篇
  1979年   4篇
  1978年   2篇
  1976年   4篇
  1975年   2篇
  1972年   2篇
  1957年   1篇
排序方式: 共有4336条查询结果,搜索用时 15 毫秒
101.
This work presents a methodology to formally model and to build three-dimensional interaction tasks in virtual environments using three different tools: Petri Nets, the Interaction Technique Decomposition taxonomy, and Object-Oriented techniques. User operations in the virtual environment are represented as Petri Net nodes; these nodes, when linked, represent the interaction process stages. In our methodology, places represent all the states an application can reach, transitions define the conditions to start an action, and tokens embody the data manipulated by the application. As a result of this modeling process we automatically generate the core of the application's source code. We also use a Petri Net execution library to run the application code. In order to facilitate the application modeling, we have adapted Dia, a well-known graphical diagram editor, to support Petri Nets creation and code generation. The integration of these approaches results in a modular application, based on Petri Nets formalism that allows for the specification of an interaction task and for the reuse of developed blocks in new virtual environment projects.  相似文献   
102.
A study on the convenient tuning of fractional-order hold electronic devices for digital control systems is presented. When certain constraints are fulfilled, this study assures in advance the attainment of inverse stable discrete plants. The main result is based on classic numerical analysis techniques and is applicable when the process to be digitally controlled is described as a second order plant or as a first order plant with time delay. In such cases, by using a conveniently tuned fractional-order hold, the discretization nonminimum-phase zeros emerged when using a common zero-order hold are avoided. In this way, the performance of the digitally controlled system may be improved.  相似文献   
103.
We present algorithms for parametrizing by radicals an irreducible curve, not necessarily plane, when the genus is less than or equal to 4 and the curve is defined over an algebraically closed field of characteristic zero. In addition, we also present an algorithm for parametrizing by radicals any irreducible plane curve of degree d having at least a point of multiplicity dr, with 1≤r≤4 and, as a consequence, every irreducible plane curve of degree d≤5 and every irreducible singular plane curve of degree 6.  相似文献   
104.
Kerberos is a well-known standard protocol which is becoming one of the most widely deployed for authentication and key distribution in application services. However, whereas service providers use the protocol to control their own subscribers, they do not widely deploy Kerberos infrastructures to handle subscribers coming from foreign domains, as happens in network federations. Instead, the deployment of Authentication, Authorization and Accounting (AAA) infrastructures has been preferred for that operation. Thus, the lack of a correct integration between these infrastructures and Kerberos limits the service access only to service provider's subscribers. To avoid this limitation, we design an architecture which integrates a Kerberos pre-authentication mechanism, based on the use of the Extensible Authentication Protocol (EAP), and advanced authorization, based on the standards SAML and XACML, to link the end user authentication and authorization performed through an AAA infrastructure with the delivery of Kerberos tickets in the service provider's domain. We detail the interfaces, protocols, operation and extensions required for our solution. Moreover, we discuss important aspects such as the implications on existing standards.  相似文献   
105.

Context

It is important for Product Line Architectures (PLA) to remain stable accommodating evolutionary changes of stakeholder’s requirements. Otherwise, architectural modifications may have to be propagated to products of a product line, thereby increasing maintenance costs. A key challenge is that several features are likely to exert a crosscutting impact on the PLA decomposition, thereby making it more difficult to preserve its stability in the presence of changes. Some researchers claim that the use of aspects can ameliorate instabilities caused by changes in crosscutting features. Hence, it is important to understand which aspect-oriented (AO) and non-aspect-oriented techniques better cope with PLA stability through evolution.

Objective

This paper evaluates the positive and negative change impact of component and aspect based design on PLAs. The objective of the evaluation is to assess how aspects and components promote PLA stability in the presence of various types of evolutionary change. To support a broader analysis, we also evaluate the PLA stability of a hybrid approach (i.e. combined use of aspects and components) against the isolated use of component-based, OO, and AO approaches.

Method

An quantitative and qualitative analysis of PLA stability which involved four different implementations of a PLA: (i) an OO implementation, (ii) an AO implementation, (iii) a component-based implementation, and (iv) a hybrid implementation where both components and aspects are employed. Each implementation has eight releases and they are functionally equivalent. We used conventional metrics suites for change impact and modularity to measure the architecture stability evaluation of the 4 implementations.

Results

The combination of aspects and components promotes superior PLA resilience than the other PLAs in most of the circumstances.

Conclusion

It is concluded that the combination of aspects and components supports the design of high cohesive and loosely coupled PLAs. It also contributes to improve modularity by untangling feature implementation.  相似文献   
106.
107.
Cross-entropy has been recently proposed as a heuristic method for solving combinatorial optimization problems. We briefly review this methodology and then suggest a hybrid version with the goal of improving its performance. In the context of the well-known max-cut problem, we compare an implementation of the original cross-entropy method with our proposed version. The suggested changes are not particular to the max-cut problem and could be considered for future applications to other combinatorial optimization problems.  相似文献   
108.
Particle swarm optimization (PSO) is an evolutionary metaheuristic inspired by the flocking behaviour of birds, which has successfully been used to solve several kinds of problems, although there are few studies aimed at solving discrete optimization problems. One disadvantage of PSO is the risk of a premature search convergence. To prevent this, we propose to introduce diversity into a discrete PSO by adding a random velocity. The degree of the introduced diversity is not static (i.e. preset before running PSO) but instead changes dynamically according to the heterogeneity of the population (i.e. if the search has converged or not). We solve the response time variability problem (RTVP) to test these two new ideas. The RTVP is an NP-hard combinatorial scheduling problem that has recently appeared in the literature. It occurs whenever products, clients or jobs need to be sequenced in such a way that the variability in the time between the instants at which they receive the necessary resources is minimized. The most efficient algorithm for solving non-small instances of the RTVP published to date is a classical PSO algorithm, referred to by the authors as PSO-M1F. In this paper, we propose 10 discrete PSO algorithms for solving the RTVP: one based on the ideas described above (PSO  -c3dync3dyn) and nine based on strategies proposed in the literature and adapted for solving a discrete optimization problem such as the RTVP. We compare all 11 PSO algorithms and the computational experiment shows that, on average, the best results obtained are due to our proposal of dynamic control mechanism for introducing diversity.  相似文献   
109.
This paper presents a systematic approach for decreasing conservativeness in stability analysis and control design for Takagi-Sugeno (TS) systems. This approach is based on the idea of multiple Lyapunov functions together with simple techniques for introducing slack matrices. Unlike some previous approaches based on multiple Lyapunov functions, both the stability and the stabilization conditions are written as linear matrix inequality (LMI) problems. The proposed approach reduces the number of inequalities and guarantees extra degrees of freedom to the LMI problems. Numeric examples illustrate the effectiveness of this method.  相似文献   
110.
Rafael  Bonifacio  Nicolas  Julian 《Neurocomputing》2009,72(16-18):3631
In this paper we explore the interest of computational intelligence tools in the management of heterogeneous communication networks, specifically to predict congestion, failures and other anomalies in the network that may eventually lead to degradation of the quality of offered services. We show two different applications based on neural and neuro-fuzzy systems for quality of service (QoS) management in next generation networks for voice and video service over heterogeneous Internet protocol (V2oIP) services. The two examples explained in this paper attempt to predict the communication network resources for new incoming calls, and visualizing the QoS of a communication network by means of self-organizing maps.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号