首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   864篇
  免费   10篇
  国内免费   6篇
电工技术   29篇
化学工业   241篇
金属工艺   34篇
机械仪表   17篇
建筑科学   6篇
能源动力   28篇
轻工业   77篇
水利工程   2篇
石油天然气   2篇
无线电   78篇
一般工业技术   176篇
冶金工业   130篇
原子能技术   14篇
自动化技术   46篇
  2024年   4篇
  2022年   7篇
  2021年   18篇
  2020年   10篇
  2019年   9篇
  2018年   15篇
  2017年   16篇
  2016年   18篇
  2015年   8篇
  2014年   13篇
  2013年   62篇
  2012年   38篇
  2011年   58篇
  2010年   32篇
  2009年   58篇
  2008年   38篇
  2007年   42篇
  2006年   34篇
  2005年   32篇
  2004年   28篇
  2003年   22篇
  2002年   23篇
  2001年   15篇
  2000年   17篇
  1999年   13篇
  1998年   53篇
  1997年   31篇
  1996年   14篇
  1995年   21篇
  1994年   11篇
  1993年   15篇
  1992年   5篇
  1991年   8篇
  1990年   4篇
  1989年   7篇
  1988年   4篇
  1987年   6篇
  1986年   3篇
  1985年   7篇
  1984年   5篇
  1983年   11篇
  1982年   4篇
  1981年   3篇
  1980年   9篇
  1978年   5篇
  1977年   7篇
  1976年   12篇
  1974年   1篇
  1971年   1篇
  1968年   1篇
排序方式: 共有880条查询结果,搜索用时 15 毫秒
61.
We consider the mean–variance relationship of the number of flows in traffic aggregation, where flows are divided into several groups randomly, based on a predefined flow aggregation index, such as source IP address. We first derive a quadratic relationship between the mean and the variance of the number of flows belonging to a randomly chosen traffic aggregation group. Note here that the result is applicable to sampled flows obtained through packet sampling. We then show that our analytically derived mean–variance relationship fits well those in actual packet trace data sets. Next, we present two applications of the mean–variance relationship to traffic management. One is an application to detecting network anomalies through monitoring a time series of traffic. Using the mean–variance relationship, we determine the traffic aggregation level in traffic monitoring so that it meets two predefined requirements on false positive and false negative ratios simultaneously. The other is an application to load balancing among network equipments that require per-flow management. We utilize the mean–variance relationship for estimating the processing capability required in each network equipment.  相似文献   
62.
We address the issue of appropriate user modeling to generate cooperative responses to users in spoken dialogue systems. Unlike previous studies that have focused on a user’s knowledge, we propose more generalized modeling. We specifically set up three dimensions for user models: the skill level in use of the system, the knowledge level about the target domain, and the degree of urgency. Moreover, the models are automatically derived by decision tree learning using actual dialogue data collected by the system. We obtained reasonable accuracy in classification for all dimensions. Dialogue strategies based on user modeling were implemented on the Kyoto City Bus Information System that was developed at our laboratory. Experimental evaluations revealed that the cooperative responses adapted to each subject type served as good guides for novices without increasing the duration dialogue lasted for skilled users.  相似文献   
63.
Ion exchange of Na x WOP2O7 ·nH2O (x 1.4) prepared from WOP2O7 was attempted, using alkaline and alkaline earth ions. The degree of exchange was observed to be >50% at 90° C except for Mg2+. The basal spacing of ion-exchanged materials for the hydrated phase were dependent on the number of water molecules in the interlayer spaces, while those for the dehydrated phase increased with the size of ions in the interlayer spaces. The network of water molecules linked by the hydrogen bond in the interlayer spaces seems to determine the basal spacing. By the ion-exchange reaction,n-alkylammonium ions were intercalated into the interlayer spaces of Na x WOP2O7 ·nH2O (x 1.4) and Sn x H y WOP2O7 ·nH2O (2x +y 0.5). In spite of the difference in the charge density of the host layer, a similar arrangement of alkyl chains in the interlayer spaces resulted, and neutral amines were considered to be intercalated as well as ammonium ions. Direct reaction ofn-alkylamine with WOP2O7 produced an intercalation compound without reduction of tungsten. The arrangement of the amines in the interlayer spaces is similar to that supposed to the ion-exchanged derivatives when heated at 140° Cin vacuo.  相似文献   
64.
In general, manipulators used for industry and in academic laboratories have actuators to drive each joint. On the other hand, underactuated manipulators handled by our research have some passive or free joints without actuators and brakes. We recently developed a switching method of fuzzy energy regions to control such manipulators. In such a method, it is necessary to design parameters related to energy regions and the gains of some partly stable controllers based on the computed torque method. Here, the switching method is applied for a three-link underactuated manipulator. We optimize such design parameters related to fuzzy energy regions by a genetic algorithm. The effectiveness of the present method is illustrated with some simulations. This work was presented in part at the 12th International Symposium on Artificial Life and Robotics, Oita, Japan, January 25–27, 2007  相似文献   
65.
Due to rapid changes of markets and pressures of competitions, industries are adopting their production ways to support diversity of customer’s needs and increase of new product developments. This paper deals with development of an agent-based architecture of dynamic systems for process planning in the manufacturing systems. In consideration of alternative manufacturing processes and machine tools, the process plans and the schedules of the manufacturing resources are generated incrementally and dynamically. A previously proposed negotiation protocol is customized and improved to generate suitable process plans for the target products real-timely and dynamically, based on the alternative manufacturing processes. The alternative manufacturing processes are presented by the process plan networks and the suitable process plans are searched and generated to cope with both the dynamic status and disturbances of the manufacturing systems. We initiatively combine the heuristic search algorithms of the process plan networks with the negotiation protocols, in order to generate suitable process plans.  相似文献   
66.
We address the balanced clustering problem where cluster sizes are regularized with submodular functions. The objective function for balanced clustering is a submodular fractional function, i.e., the ratio of two submodular functions, and thus includes the well-known ratio cuts as special cases. In this paper, we present a novel algorithm for minimizing this objective function (submodular fractional programming) using recent submodular optimization techniques. The main idea is to utilize an algorithm to minimize the difference of two submodular functions, combined with the discrete Newton method. Thus, it can be applied to the objective function involving any submodular functions in both the numerator and the denominator, which enables us to design flexible clustering setups. We also give theoretical analysis on the algorithm, and evaluate the performance through comparative experiments with conventional algorithms by artificial and real datasets.  相似文献   
67.
Nine alkaloid constituents in the root of Aconitum yesoense var. macroyesoense, as well as three acetylated derivatives, were examined for their peripheral vaso-activities by measuring laser-flowmetrically the cutaneous blood flow in the hind foot of mice after intravenous administration. The major constitutive delcosine (1), 14-acetyldelcosine (2) and lucidusculine (3), respectively, had little or very mild vaso-activity. Kobusine (4) and pseudokobusine (5) and three minor constituents, luciculine (6), 1-acetylluciculine (7) and dehydroluciculine (8), together exhibited a rapid increase in blood flow reaching a peak with a magnitude almost equal to that produced by hydralazine, when administered intravenously at the same dosage level of 20 mg/kg. Among them, 4 was characterized by successive reversal of the increase to a decrease in blood flow, while 7 produced a flow with a more delayed peak time. Dehydrolucidusculine (9) exhibited a transient decrease in blood flow prior to occurrence of the increase, as did papaverine. Consequently, it is assumed that the alkaloids, especially those of the C20-diterpenoid type, in the root of this Aconitum plant have peripherally vaso-dilating activities to varying degrees in mice, probably due to their direct action on the cutaneous microvasculature in a similar fashion to that shown by hydralazine. The laser blood flowmetric method would be useful as an in vivo means of qualitative as well as quantitative screening of chemically modified derivatives of peripherally vasoactive agents in mice.  相似文献   
68.
The crystal structures of two PbSb2O6-type compounds containing titanium, CdTi2O4(OH)2 and LaTiSbO6 were refined by X-ray powder diffraction data. For both compounds structure refinements with the space group were successful and the R-factors were RWP = 6.46% and RP = 4.90% for CdTi2O4(OH)2 and RWP = 9.55% and RP = 7.17% for LaTiSbO6. These crystal structures were the same as that of the typical PbSb2O6-type compound in spite of the existence of protons in the interlayer or two different metal ions in the layer.  相似文献   
69.
Crystalline CeO2 films and patterns have been successfully fabricated in a single-step process at moderate temperature. In this process, the combination of the ink-jet technique and depositing the precursor on a hot substrate (≤300°C) gave crystalline CeO2 without further heat treatment. X-ray diffraction analysis revealed that the phase formed was crystallized ceria with nanosized (<10 nm) crystallites. The film thickness was several hundred nanometers and the pattern width was about 150 μm. Scanning electron microscopy analysis showed that the films and patterns were free of cracks and adhered to the substrate. This is the first report about the direct patterning of crystalline CeO2 without postfiring or posttreatments like masking, etching, etc.  相似文献   
70.
We consider the problem of maintaining end-to-end security in the presence of intelligent proxies that may adaptively modify data being transmitted across a network. The video coding community considers this problem in the context of transcoding media streams, but their approaches either fail to address authentication or fail to provide meaningful security guarantees. We present two provably-secure schemes, LISSA and TRESSA, that allow an intelligent network intermediary to intercept a stream signed by a content provider, and adapt it dynamically, while preserving the ultimate receiver's ability to securely verify the content provider's signature (and, hence, authenticity and integrity of the data received). Our schemes allow the intermediary to selectively remove portions of the stream and, thus, permit common media transcoding techniques such as scalable compression and multiple file switching. Moreover, a content provider only has to encode and sign its entire data stream once, as opposed to nondynamically encoding and signing different versions for each anticipated combination of device, network configuration, and channel condition. Our implementation results demonstrate efficiency.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号