首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   617篇
  免费   60篇
  国内免费   24篇
电工技术   12篇
综合类   6篇
化学工业   113篇
金属工艺   48篇
机械仪表   32篇
建筑科学   12篇
矿业工程   15篇
能源动力   17篇
轻工业   30篇
水利工程   6篇
石油天然气   6篇
无线电   65篇
一般工业技术   109篇
冶金工业   109篇
自动化技术   121篇
  2023年   8篇
  2022年   15篇
  2021年   20篇
  2020年   6篇
  2019年   14篇
  2018年   9篇
  2017年   18篇
  2016年   18篇
  2015年   14篇
  2014年   36篇
  2013年   40篇
  2012年   40篇
  2011年   35篇
  2010年   32篇
  2009年   29篇
  2008年   36篇
  2007年   24篇
  2006年   41篇
  2005年   38篇
  2004年   27篇
  2003年   16篇
  2002年   13篇
  2001年   13篇
  2000年   19篇
  1999年   17篇
  1998年   19篇
  1997年   12篇
  1996年   12篇
  1995年   11篇
  1994年   7篇
  1993年   12篇
  1992年   6篇
  1991年   2篇
  1990年   1篇
  1989年   7篇
  1988年   6篇
  1987年   3篇
  1985年   5篇
  1984年   5篇
  1983年   1篇
  1982年   1篇
  1981年   1篇
  1979年   2篇
  1977年   2篇
  1976年   2篇
  1975年   1篇
  1972年   1篇
  1971年   1篇
  1969年   1篇
  1963年   1篇
排序方式: 共有701条查询结果,搜索用时 877 毫秒
571.
陈铿  韩伯棠 《计算机科学》2007,34(8):190-192
关联维数是一个混沌时间序列分析中很重要的参数,在分析了噪声对关联维数求取的影响后,提出了一种应用小波分解求取含噪混沌时间序列关联维数的方法,数值试验证实了我们这种方法的正确性与可行性.  相似文献   
572.
The process capability index Cpk has been widely used as a process performance measure. In practice this index is estimated using sample data. Hence it is of great interest to obtain confidence limits for the actual index given a sample estimate. In this paper we depict graphically the relationship between process potential index (Cp), process shift index (k) and percentage non-conforming (p). Based on the monotone properties of the relationship, we derive two-sided confidence limits for k and Cpk under two different scenarios. These two limits are combined using the Bonferroni inequality to generate a third type of confidence limit. The performance of these limits of Cpk in terms of their coverage probability and average width is evaluated by simulation. The most suitable type of confidence limit for each specific range of k is then determined. The usage of these confidence limits is illustrated via examples. Finally a performance comparison is done between the proposed confidence limits and three non-parametric bootstrap confidence limits. The results show that the proposed method consistently gives the smallest width and yet provides the intended coverage probability. © 1997 John Wiley & Sons, Ltd.  相似文献   
573.
一种新的通用概念层次编码方法   总被引:1,自引:0,他引:1  
概念层次是目前数据挖掘和知识发现的前沿性方法。为了把概念层次用于数据挖掘,需要解决如何从现有数据集自动生成概念层次,如何存储和处理网状概念层次结构及如何提高概念层次结构的搜索效率等问题。文章提出适用于任何数据挖掘功能的通用编码方法——基于层次域的概念层次实数编码法,该方法有效地解决了概念层次的存储和检索问题,并在微机电系统领域进行了与典型算法的对比分析。  相似文献   
574.
Fault coupling is the phenomenon whereby a test set is able to detect faults when they occur in isolation, but fails to do so when they occur in combination. It is widely regarded as a nuisance in fault‐based approaches to software testing, which focus on the detection of single faults and normally neglect multiple faults. This paper presents a theoretical study of fault coupling, based on a simple model of fault‐based testing. This provides for the presence of two faults that interact with each other and thus includes the possibility of fault coupling between them. The model is analysed mathematically, the conclusion reached being that fault coupling only occurs infrequently. This result provides support for current approaches to fault‐based testing, but it is not quite enough to conclude that they are thereby validated. In effect, the paper generalizes the results of a previous paper that dealt with the restricted case where the functions underlying programs are bijective as well as finite. The restriction that functions be bijective is lifted here, but they are still required to be finite. Though the same theoretical framework is used in both cases, and more or less the same results are obtained, the techniques employed to arrive at the results in the general case are quite different. Copyright © 2000 John Wiley & Sons, Ltd.  相似文献   
575.
We describe a watermarking scheme for ownership verification and authentication. Depending on the desire of the user, the watermark can be either visible or invisible. The scheme can detect any modification made to the image and indicate the specific locations that have been modified. If the correct key is specified in the watermark extraction procedure, then an output image is returned showing a proper watermark, indicating the image is authentic and has not been changed since the insertion of the watermark. Any modification would be reflected in a corresponding error in the watermark. If the key is incorrect, or if the image was not watermarked, or if the watermarked image is cropped, the watermark extraction algorithm will return an image that resembles random noise. Since it requires a user key during both the insertion and the extraction procedures, it is not possible for an unauthorized user to insert a new watermark or alter the existing watermark so that the resulting image will pass the test. We present secret key and public key versions of the technique.  相似文献   
576.
577.
578.
579.
580.
Wah Khim Ang 《工程优选》2013,45(7):705-715
Over the past decade, one of the key research areas for water distribution networks has been the quantification of network reliability. An interesting approach in this research topic is the use of informational entropy as a surrogate measure for the reliability of water distribution network. Research on water distribution network entropy has progressed to the stage where practical applications are possible, but the actual meaning of the network entropy has never been fully elucidated. Recently, an alternative approach to calculate network entropy was proposed, which was termed the path entropy method (PEM). This alternative method was shown to be useful for the case of single-source water distribution networks. The purpose of this article is to explore the use of the PEM on multiple-source networks. A two-source and two-demand water distribution network is analysed to gain insight into the differences between single-source and multiple-source networks in terms of maximum-entropy flow distribution. This leads to the formal proof of the principle governing maximum-entropy flow ratios in multiple-source water distribution networks.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号