首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2031篇
  免费   79篇
  国内免费   8篇
电工技术   26篇
化学工业   415篇
金属工艺   37篇
机械仪表   57篇
建筑科学   21篇
矿业工程   5篇
能源动力   127篇
轻工业   167篇
水利工程   46篇
石油天然气   4篇
无线电   228篇
一般工业技术   356篇
冶金工业   154篇
原子能技术   18篇
自动化技术   457篇
  2024年   4篇
  2023年   38篇
  2022年   60篇
  2021年   67篇
  2020年   47篇
  2019年   71篇
  2018年   86篇
  2017年   71篇
  2016年   75篇
  2015年   52篇
  2014年   80篇
  2013年   161篇
  2012年   76篇
  2011年   124篇
  2010年   84篇
  2009年   105篇
  2008年   74篇
  2007年   92篇
  2006年   58篇
  2005年   56篇
  2004年   41篇
  2003年   49篇
  2002年   44篇
  2001年   25篇
  2000年   36篇
  1999年   30篇
  1998年   49篇
  1997年   47篇
  1996年   33篇
  1995年   38篇
  1994年   23篇
  1993年   16篇
  1992年   22篇
  1991年   18篇
  1990年   19篇
  1989年   15篇
  1988年   19篇
  1987年   9篇
  1986年   9篇
  1985年   11篇
  1984年   9篇
  1983年   14篇
  1982年   10篇
  1981年   4篇
  1980年   7篇
  1979年   10篇
  1978年   5篇
  1977年   4篇
  1976年   5篇
  1972年   5篇
排序方式: 共有2118条查询结果,搜索用时 78 毫秒
41.
Given a clustering algorithm, how can we adapt it to find multiple, nonredundant, high-quality clusterings? We focus on algorithms based on vector quantization and describe a framework for automatic ‘alternatization’ of such algorithms. Our framework works in both simultaneous and sequential learning formulations and can mine an arbitrary number of alternative clusterings. We demonstrate its applicability to various clustering algorithms—k-means, spectral clustering, constrained clustering, and co-clustering—and effectiveness in mining a variety of datasets.  相似文献   
42.
In this paper, we apply evolutionary games to non-cooperative forwarding control in Delay Tolerant Networks (DTNs). The main focus is on mechanisms to rule the participation of the relays to the delivery of messages in DTNs. Thus, we express the success probability as a function of the competition that takes place within a large population of mobiles, and we characterize the effect of reward-based mechanisms on the performance of such systems. Devices acting as active relays, in fact, sacrifice part of their batteries in order to support message replication and thus increase the probability to reach the destination. In our scheme, a relay can choose the strategy by which they participate to the message relaying. A mobile that participates receives a unit of reward based on the reward mechanism selected by the network. A utility function is introduced as the difference between the expected reward and the energy cost, i.e., the cost spent by the relay to sustain forwarding operations. We show how the evolution dynamics and the equilibrium behavior (called Evolutionary Stable Strategy – ESS) are influenced by the characteristics of inter contact time, energy expenditure and pricing characteristics.We extend our analysis to mechanisms that the system can introduce in order to have the message delivered to the destination with high probability within a given deadline and under energy constraints which bound the number of released copies per message. Finally, we apply our findings in order to devise decentralized forwarding algorithms that are rooted in the theory of stochastic approximations. Thus, we demonstrate that the ESS can be attained without complete knowledge of the system state and letting the source monitor number of released copies per message only. We provide extensive numerical results to validate the proposed scheme.  相似文献   
43.
Given a graph with edges colored Red and Blue, we study the problem of sampling and approximately counting the number of matchings with exactly k Red edges. We solve the problem of estimating the number of perfect matchings with exactly k Red edges for dense graphs. We study a Markov chain on the space of all matchings of a graph that favors matchings with k Red edges. We show that it is rapidly mixing using non-traditional canonical paths that can backtrack. We show that this chain can be used to sample matchings in the 2-dimensional toroidal lattice of any fixed size with k Red edges, where the horizontal edges are Red and the vertical edges are Blue. An extended abstract appeared in J.R. Correa, A. Hevia and M.A. Kiwi (eds.) Proceedings of the 7th Latin American Theoretical Informatics Symposium, LNCS 3887, pp. 190–201, Springer, 2006. N. Bhatnagar’s and D. Randall’s research was supported in part by NSF grants CCR-0515105 and DMS-0505505. V.V. Vazirani’s research was supported in part by NSF grants 0311541, 0220343 and CCR-0515186. N. Bhatnagar’s and E. Vigoda’s research was supported in part by NSF grant CCR-0455666.  相似文献   
44.
In service-oriented computing (SOC) environments, service clients interact with service providers for services or transactions. From the point view of service clients, the trust status of a service provider is a critical issue to consider, particularly when the service provider is unknown to them. Typically, the trust evaluation is based on the feedback on the service quality provided by service clients. In this paper, we first present a trust management framework that is event-driven and rule-based. In this framework, trust computation is based on formulae. But rules are defined to determine which formula to use and what arguments to use, according to the event occurred during the transaction or service. In addition, we propose some trust evaluation metrics and a formula for trust computation. The formula is designed to be adaptable to different application domains by setting suitable arguments. Particularly, the proposed model addresses the incremental characteristics of trust establishment process. Furthermore, we propose a fuzzy logic based approach for determining reputation ranks that particularly differentiates new service providers and old (long-existing) ones. This is further incentive to new service providers and penalize poor quality services from service providers. Finally, a set of empirical studies has been conducted to study the properties of the proposed approaches, and the method to control the trust changes in both trust increment and decrement cases. The proposed framework is adaptable for different domains and complex trust evaluation systems.
Vijay VaradharajanEmail:
  相似文献   
45.
The Journal of Supercomputing - In the Attribute-Based Encryption (ABE) scheme, patients encrypt their electronic health record (EHR), attach the appropriate attributes with it, and outsource them...  相似文献   
46.
Haze degrades visual information of remotely sensed images. Therefore, haze removal is a demanding and significant task for visual multispectral information improvement. The existing haze removal techniques utilize different restrictions and before restoring hazy images in an efficient manner. The review of existing haze removal methods demonstrates that the haze-free images suffer from colour distortion and halo artefacts problems. To solve these issues, an improved restoration model based dark channel prior is proposed in this paper. The proposed technique has redefined transmission map, with the aim to reduce the colour distortion problem. The modified joint trilateral filter is also utilized to improve the coarse estimated atmospheric veil. The experimental results reveal that the proposed approach provides visually significant haze-free images and also preserves the significant detail.  相似文献   
47.
We have generated transgenic mice over-expressing human apolipoprotein CI (apo CI) using the native gene joined to the downstream 154-bp liver-specific enhancer that we defined for apo E. Human apo CI (HuCI)-transgenic mice showed elevation of plasma triglycerides (mg/dl) compared to controls in both the fasted (211 +/- 81 vs 123 +/- 52, P = 0.0001) and fed (265 +/- 105 vs 146 +/- 68, P < 0.0001) states. Unlike the human apo CII (HuCII)- and apo CIII (HuCIII)-transgenic mouse models of hypertriglyceridemia, plasma cholesterol was disproportionately elevated (95 +/- 23 vs 73 +/- 23, P = 0.002, fasted and 90 +/- 24 vs 61 +/- 14, P < 0.0001, fed). Lipoprotein fractionation showed increased VLDL and IDL + LDL with an increased cholesterol/triglyceride ratio (0.114 vs 0.065, P = 0.02, in VLDL). The VLDL apo E/apo B ratio was decreased 3.4-fold (P = 0.05) and apo CII and apo CIII decreased in proportion to apo E. Triglyceride and apo B production rates were normal, but clearance rates of VLDL triglycerides and postlipolysis lipoprotein "remnants" were significantly slowed. Plasma apo B was significantly elevated. Unlike HuCII- and HuCIII-transgenic mice, VLDL from HuCI transgenic mice bound heparin-Sepharose, a model for cell-surface glycosaminoglycans, normally. In summary, apo CI overexpression is associated with decreased particulate uptake of apo B-containing lipoproteins, leading to increased levels of several potentially atherogenic species, including cholesterol-enriched VLDL, IDL, and LDL.  相似文献   
48.
An analysis of the nature and distribution of disallowed Ramachandran conformations of amino acid residues observed in high resolution protein crystal structures has been carried out. A data set consisting of 110 high resolution, non-homologous, protein crystal structures from the Brookhaven Protein Data Bank was examined. The data set consisted of a total of 18,708 non-Gly residues, which were characterized on the basis of their backbone dihedral angles (phi, psi). Residues falling outside the defined "broad allowed limits" on the Ramachandran map were chosen and the reported B-factor value of the alpha-carbon atom was used to further select well defined disallowed conformations. The conformations of the selected 66 disallowed residues clustered in distinct regions of the Ramachandran map indicating that specific phi, psi angle distortions are preferred under compulsions imposed by local constraints. The distribution of various amino acid residues in the disallowed residue data set showed a predominance of small polar/charged residues, with bulky hydrophobic residues being infrequent. As a further check, for all the 66 cases non-hydrogen van der Waals short contacts in the protein structures were evaluated and compared with the ideal "Ala-dipeptide" constructed using disallowed dihedral angle (phi, psi) values. The analysis reveals that short contacts are eliminated in most cases by local distortions of bond angles. An analysis of the conformation of the identified disallowed residues in related protein structures reveals instances of conservation of unusual stereochemistry.  相似文献   
49.
This work demonstrates an optofluidic system, where dielectrophoretically controlled suspended nanoparticles are used to manipulate the properties of an optical waveguide. This optofluidic device is composed of a multimode polymeric rib waveguide and a microfluidic channel as its upper cladding. This channel integrates dielectrophoretic (DEP) microelectrodes and is infiltrated with suspended silica and tungsten trioxide nanoparticles. By applying electrical signals with various intensities and frequencies to the DEP microelectrodes, the nanoparticles can be concentrated close to the waveguide surface significantly altering the optical properties in this region. Depending on the particle refractive indices, concentrations, positions and dimensions, the light remains confined or is scattered into the surrounding media in the microfluidic channel.  相似文献   
50.
Study of symmetric or repeating patterns in scalar fields is important in scientific data analysis because it gives deep insights into the properties of the underlying phenomenon. Though geometric symmetry has been well studied within areas like shape processing, identifying symmetry in scalar fields has remained largely unexplored due to the high computational cost of the associated algorithms. We propose a computationally efficient algorithm for detecting symmetric patterns in a scalar field distribution by analysing the topology of level sets of the scalar field. Our algorithm computes the contour tree of a given scalar field and identifies subtrees that are similar. We define a robust similarity measure for comparing subtrees of the contour tree and use it to group similar subtrees together. Regions of the domain corresponding to subtrees that belong to a common group are extracted and reported to be symmetric. Identifying symmetry in scalar fields finds applications in visualization, data exploration, and feature detection. We describe two applications in detail: symmetry-aware transfer function design and symmetry-aware isosurface extraction.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号