首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4669篇
  免费   198篇
  国内免费   13篇
电工技术   104篇
综合类   26篇
化学工业   761篇
金属工艺   89篇
机械仪表   115篇
建筑科学   199篇
矿业工程   12篇
能源动力   182篇
轻工业   430篇
水利工程   35篇
石油天然气   18篇
武器工业   1篇
无线电   770篇
一般工业技术   838篇
冶金工业   562篇
原子能技术   43篇
自动化技术   695篇
  2023年   35篇
  2022年   81篇
  2021年   89篇
  2020年   70篇
  2019年   76篇
  2018年   115篇
  2017年   136篇
  2016年   130篇
  2015年   110篇
  2014年   175篇
  2013年   324篇
  2012年   244篇
  2011年   267篇
  2010年   213篇
  2009年   215篇
  2008年   225篇
  2007年   192篇
  2006年   187篇
  2005年   136篇
  2004年   140篇
  2003年   121篇
  2002年   111篇
  2001年   82篇
  2000年   89篇
  1999年   104篇
  1998年   230篇
  1997年   162篇
  1996年   98篇
  1995年   85篇
  1994年   74篇
  1993年   87篇
  1992年   49篇
  1991年   29篇
  1990年   35篇
  1989年   23篇
  1988年   25篇
  1987年   21篇
  1986年   13篇
  1985年   17篇
  1984年   20篇
  1983年   18篇
  1982年   18篇
  1981年   24篇
  1980年   19篇
  1979年   13篇
  1977年   20篇
  1976年   22篇
  1975年   17篇
  1974年   14篇
  1973年   10篇
排序方式: 共有4880条查询结果,搜索用时 20 毫秒
81.
In this paper, we investigate convergence and approximation properties of a Chlodowsky type generalization of Stancu polynomials (we called Stancu–Chlodowsky polynomials).The rates of convergence of this generalization are obtained by means of modulus of continuity and by using the K-functional of Peetre. We also present and prove theorems on weighted approximation and the order of approximation of continuous functions by these operators on all positive semi-axis.  相似文献   
82.
In this paper, an inspection strategy is proposed for systems subject to random shocks and whose state is only known through inspection. The shocks magnitudes and times between shocks arrivals are random variables. Each shock induces an amount of damage to the system which is gradually weakened as damage accumulates. The system fails when the total damage exceeds some threshold level. The proposed inspection strategy suggests to inspect the system at predetermined times T1, T2,...T k . If failure is detected, then the system is repaired to a state as good as new, otherwise, it is kept operating. The expression of the system availability is derived. A numerical procedure is developed to generate an inspection sequence which maximizes the system availability. The proposed strategy has been developed for some critical subsystems of trees harvesters. An illustrative example is provided.  相似文献   
83.
In this study, we experiment with several multiobjective evolutionary algorithms to determine a suitable approach for clustering Web user sessions, which consist of sequences of Web pages visited by the users. Our experimental results show that the multiobjective evolutionary algorithm-based approaches are successful for sequence clustering. We look at a commonly used cluster validity index to verify our findings. The results for this index indicate that the clustering solutions are of high quality. As a case study, the obtained clusters are then used in a Web recommender system for representing usage patterns. As a result of the experiments, we see that these approaches can successfully be applied for generating clustering solutions that lead to a high recommendation accuracy in the recommender model we used in this paper.  相似文献   
84.
This paper proposes two maintenance schemes for reused products. In order to reduce the purchasing cost or conform to the concept of environmental protection, reuse is considered as one of the most efficient strategies. However, the initial quality of reused product is often inferior to the new one and then product failures will occur frequently during usage period. Therefore, two periodical preventive maintenance (PM) policies in this paper are developed to decrease the high failure rate of the second-hand products. When a second-hand product with Weibull life time distribution of known age is intended to be used for a pre-specified period of time, the optimal number of PM actions and the corresponding maintenance degree are derived such that the expected total maintenance cost is minimized. The impact of providing preventive maintenance is illustrated through numerical examples.  相似文献   
85.
Lo JT 《Neural computation》2011,23(10):2626-2682
A biologically plausible low-order model (LOM) of biological neural networks is proposed. LOM is a recurrent hierarchical network of models of dendritic nodes and trees; spiking and nonspiking neurons; unsupervised, supervised covariance and accumulative learning mechanisms; feedback connections; and a scheme for maximal generalization. These component models are motivated and necessitated by making LOM learn and retrieve easily without differentiation, optimization, or iteration, and cluster, detect, and recognize multiple and hierarchical corrupted, distorted, and occluded temporal and spatial patterns. Four models of dendritic nodes are given that are all described as a hyperbolic polynomial that acts like an exclusive-OR logic gate when the model dendritic nodes input two binary digits. A model dendritic encoder that is a network of model dendritic nodes encodes its inputs such that the resultant codes have an orthogonality property. Such codes are stored in synapses by unsupervised covariance learning, supervised covariance learning, or unsupervised accumulative learning, depending on the type of postsynaptic neuron. A masking matrix for a dendritic tree, whose upper part comprises model dendritic encoders, enables maximal generalization on corrupted, distorted, and occluded data. It is a mathematical organization and idealization of dendritic trees with overlapped and nested input vectors. A model nonspiking neuron transmits inhibitory graded signals to modulate its neighboring model spiking neurons. Model spiking neurons evaluate the subjective probability distribution (SPD) of the labels of the inputs to model dendritic encoders and generate spike trains with such SPDs as firing rates. Feedback connections from the same or higher layers with different numbers of unit-delay devices reflect different signal traveling times, enabling LOM to fully utilize temporally and spatially associated information. Biological plausibility of the component models is discussed. Numerical examples are given to demonstrate how LOM operates in retrieving, generalizing, and unsupervised and supervised learning.  相似文献   
86.
Wirtschaftsinformatik zwischen Wissenschaft und Unternehmertum   总被引:1,自引:1,他引:0  
One of the major success indicators for applied research sciences is the rate of transfer from research into practice. Only if concrete and economically successful products are derived from research results, such sciences can induce an impact. However, this process of innovation mandatorily needs entrepreneurship. Within the domain of business information systems, the two German enterprises SAP AG and IDS Scheer AG demonstrate that linking research and innovation is the key to lasting success in the information technology markets. German industry has significant disadvantages on the cost of human resources. Therefore it can be only successful with products that incorporate a high degree of innovation and that are consequently highly priced. But the invention of such products needs scientific research as a source of inspiration. Germany has a highly developed infrastructure of research facilities and organizations. However, they need to be better coordinated and aligned with business needs. Vice versa, enterprises need to actively approach the scientific community in order to clearly formulate their demand. Such a strategy needs changes on all sides. To achieve a change in the domain of science, it is necessary to change the profile of leading researchers, such as full professors. They should incorporate attributes of an entrepreneur and be profiled more as a research manager that tries to anticipate future needs and to develop its unit in terms of research subjects as well as personnel and financial resources. Consequently, the process of application, selection and review of leading researchers should be more oriented on processes that are common in enterprises. E. g. external head-hunters can be involved in the searching and assessing process in order to get the best qualified person for the research vacancy. Also enterprises need to change their attitude towards scientific research. In order to foster this process, executives could be invited to advisory and supervisory boards of research organisations. Furthermore, those executives must be proactively informed about the research activities and results in order to attract their interest and to show potentials for a transfer into products. There is still a long way in the hunt for innovation leadership and all these suggestions can only be a starting point.  相似文献   
87.
Interval state observers provide an estimate on the set of admissible values of the state vector at each instant of time. Ideally, the size of the evaluated set is proportional to the model uncertainty, thus interval observers generate the state estimates with estimation error bounds, similarly to Kalman filters, but in the deterministic framework. Main tools and techniques for design of interval observers are reviewed in this tutorial for continuous-time, discrete-time and time-delayed systems.  相似文献   
88.
This paper addresses the problem of interval observer design for unknown input estimation in linear time-invariant systems. Although the problem of unknown input estimation has been widely studied in the literature, the design of joint state and unknown input observers has not been considered within a set-membership context. While conventional interval observers could be used to propagate with some additional conservatism, unknown inputs by considering them as disturbances, the proposed approach allows their estimation. Under the assumption that the measurement noise and the disturbances are bounded, lower and upper bounds for the unmeasured state and unknown inputs are computed. Numerical simulations are presented to show the efficiency of the proposed approach.  相似文献   
89.
The alarming growth rate in the online game industry calls for a need of understanding the determinants of online gamers’ behaviour. Investigating how online gamers choose different online characters assists online game vendors to design characters that match the needs of different online gamers. Recently, numerous online game designers have introduced celebrity figures as characters for certain online games. The popularity of those celebrities has resulted in greater awareness of these games, and hopefully further increases the playability of online games. While different online gamers are motivated by different desires for playing, it is insufficiently researched whether these online celebrity characters have actually altered players’ choice in giving preference to these games. Thus, this study conducts an experimental design to study the reasons behind players’ choice of characters by studying how online games perceive the interpersonal attractiveness of celebrity online characters, and how online gamers with different playing motivations display different behaviours in their choice of online game characters. Results from the survey filled out by participants after the experiments show that the attractiveness of celebrity online characters is significantly higher than that of non-celebrity characters. Further, online game players with a social playing motivation tend to choose celebrities as their online game characters.  相似文献   
90.
Existing studies on the detection of mobile malware have focused mainly on static analyses performed to examine the code-structure signature of viruses, rather than the dynamic behavioral aspects. By contrast, the unidentified behavior of new mobile viruses using the self-modification, polymorphic, and mutation techniques for variants have largely been ignored. The problem of precision regarding malware variant detection has become one of the key concerns in mobile security. Accordingly, the present study proposed a threat risk analysis model for mobile viruses, using a heuristic approach incorporating both malware behavior analysis and code analysis to generate a virus behavior ontology associated with the Protégé platform. The proposed model can not only explicitly identify an attack profile in accordance with structural signature of mobile viruses, but also overcome the uncertainty regarding the probability of an attack being successful. This model is able to achieve this by extending frequent episode rules to investigate the attack profile of a given malware, using specific event sequences associated with the sandbox technique for mobile applications (apps) and hosts. For probabilistic analysis, defense evaluation metrics for each node were used to simulate the results of an attack. The simulations focused specifically on the attack profile of a botnet to assess the threat risk. The validity of the proposed approach was demonstrated numerically by using two malware cyber-attack examples. Overall, the results presented in this paper prove that the proposed scheme offers an effective countermeasure, evaluated using a set of security metrics, for mitigating network threats by considering the interaction between the attack profiles and defense needs.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号