首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2989篇
  免费   238篇
  国内免费   22篇
电工技术   42篇
综合类   8篇
化学工业   615篇
金属工艺   50篇
机械仪表   97篇
建筑科学   102篇
能源动力   140篇
轻工业   213篇
水利工程   15篇
石油天然气   7篇
无线电   579篇
一般工业技术   594篇
冶金工业   188篇
原子能技术   9篇
自动化技术   590篇
  2023年   19篇
  2022年   56篇
  2021年   89篇
  2020年   59篇
  2019年   73篇
  2018年   91篇
  2017年   86篇
  2016年   101篇
  2015年   94篇
  2014年   141篇
  2013年   283篇
  2012年   197篇
  2011年   187篇
  2010年   177篇
  2009年   179篇
  2008年   167篇
  2007年   152篇
  2006年   119篇
  2005年   94篇
  2004年   76篇
  2003年   80篇
  2002年   78篇
  2001年   60篇
  2000年   57篇
  1999年   66篇
  1998年   95篇
  1997年   60篇
  1996年   41篇
  1995年   40篇
  1994年   34篇
  1993年   30篇
  1992年   23篇
  1991年   16篇
  1990年   15篇
  1989年   17篇
  1988年   8篇
  1987年   9篇
  1986年   7篇
  1985年   6篇
  1984年   11篇
  1983年   14篇
  1982年   5篇
  1981年   6篇
  1980年   4篇
  1979年   3篇
  1978年   3篇
  1977年   6篇
  1976年   3篇
  1974年   2篇
  1970年   4篇
排序方式: 共有3249条查询结果,搜索用时 0 毫秒
101.
In this paper, we propose a novel distributed resource-scheduling algorithm capable of handling multiple resource requirements for jobs that arrive in a Grid computing environment. In our proposed algorithm, referred to as multiple resource scheduling (MRS) algorithm, we take into account both the site capabilities and the resource requirements of jobs. The main objective of the algorithm is to obtain a minimal execution schedule through efficient management of available Grid resources. We first propose a model in which the job and site resource characteristics can be captured together and used in the scheduling algorithm. To do so, we introduce the concept of a n-dimensional virtual map and resource potential. Based on the proposed model, we conduct rigorous simulation experiments with real-life workload traces reported in the literature to quantify the performance. We compare our strategy with most of the commonly used algorithms in place on performance metrics such as job wait times, queue completion times, and average resource utilization. Our combined consideration of job and resource characteristics is shown to render high-performance with respect to above-mentioned metrics in the environment. Our study also reveals the fact that MRS scheme has a capability to adapt to both serial and parallel job requirements, especially when job fragmentation occurs. Our experimental results clearly show that MRS outperforms other strategies and we highlight the impact and importance of our strategy.  相似文献   
102.
Boolean satisfiability (SAT) is a well-known problem in computer science, artificial intelligence, and operations research. This paper focuses on the satisfiability problem of Model RB structure that is similar to graph coloring problems and others. We propose a translation method and three effective complete SAT solving algorithms based on the characterization of Model RB structure. We translate clauses into a graph with exclusive sets and relative sets. In order to reduce search depth, we determine search order using vertex weights and clique in the graph. The results show that our algorithms are much more effective than the best SAT solvers in numerous Model RB benchmarks, especially in those large benchmark instances.  相似文献   
103.
A new algorithm is presented for training of multilayer feedforward neural networks by integrating a genetic algorithm with an adaptive conjugate gradient neural network learning algorithm. The parallel hybrid learning algorithm has been implemented in C on an MIMD shared memory machine (Cray Y-MP8/864 supercomputer). It has been applied to two different domains, engineering design and image recognition. The performance of the algorithm has been evaluated by applying it to three examples. The superior convergence property of the parallel hybrid neural network learning algorithm presented in this paper is demonstrated.  相似文献   
104.
Journal of Mechanical Science and Technology - Creep behavior of 316L stainless steel was experimentally investigated using small punch (SP) specimens produced by the selective laser melting (SLM)...  相似文献   
105.
Journal of Mechanical Science and Technology - In this study, the effects of process parameters on the high temperature strength of 17-4PH stainless steel manufactured by selective laser melting...  相似文献   
106.
Temperature affects not only the performance but also the power, reliability, and cost of the embedded system. This paper proposes a temperature-aware task allocation and scheduling algorithm for MPSoC embedded systems. Thermal-aware heuristics are developed, and a temperature-aware floorplanning tool is used to reduce the peak temperature and achieve a thermally even distribution while meeting real time constraints. The paper investigates both power-aware and thermal-aware approaches to the task allocation and scheduling. The experimental results show that the thermal-aware approach outperforms the power-aware schemes in terms of maximal and average temperature reductions. To the best of our knowledge, this is the first MPSoC task allocation and scheduling algorithm that takes temperature into consideration.
  相似文献   
107.
基于Deform 3D的高速车削加工仿真研究   总被引:6,自引:2,他引:4  
基于有限元分析软件Deform 3D对高速车削加工进行仿真研究,通过实例分析了车削过程中切屑的形成过程,切削力大小、切削温度及应力应变的分布情况。该仿真结果对车削工艺效果的预测和优化具有现实的指导意义。  相似文献   
108.
Named data networking (NDN) is a new emerging architecture for future network, which may be a substitute of the current TCP/IP‐based network, for the content‐oriented data request mode becoming the future trend of development. The security of NDN has attracted much attention, as an implementation of next‐generation Internet architecture. Although NDN is immune to most current attack, it cannot resist the distributed denial of service like attack – Interest flooding attack (IFA) – effectively. IFA takes advantages of the forwarding mechanism of NDN, flooding a large number of malicious Interest packets at quite a high rate, and exploits the network resources, which may cause the paralysis of the network. Taking into account the severity of the destruction, we propose an algorithm to counter such new type of attack. We analyze three properties of IFA, and use them to judge and filter Interest packets. Vector space model and Markov model are used in our method to realize a cooperative detection. Meanwhile, we present the retransmission forwarding mechanism to ensure legitimate user request. The ndnSIM module of ns3 is used for the corresponding simulation, and results of the simulation will be given to show the effectiveness of our algorithm. Copyright © 2014 John Wiley & Sons, Ltd.  相似文献   
109.
Abstract

Improved robust CMAC control schemes are proposed for tracing dynamic trajectories in this paper. There are two main structures in the proposed control schemes: one is the robust controller and the other is the improved CMAC network. The robust controller technique can achieve a certain goal without concern for instability of the controlled system in the presence of significant plant uncertainties if the nominal parameter is roughly estimated. Next, in order to reduce the tracing error, a suitable nominal parameter needs to be chosen. Thus, the improved CMAC learning approach under the robust control structure, using the concept of credit assignment, will be employed to determine control variables that can trace other states repeatedly during control processes. Finally, simulation results demonstrate the capability of the proposed control schemes to trace dynamic trajectories.  相似文献   
110.
Adult image recognition is an important technique for preventing children from accessing offensive material on the Internet. Most of the related works focus on single image recognition. However, adult images usually exist as a group and rarely stand alone. Therefore, considering the entire image group as a whole for classification should be more effective. This paper presents a new method of detecting adult image groups, which aims at achieving optimal recognition accuracy. Adult image group recognition generally includes two components: an adult image recogniser and a final decision rule for classifying the image group. We provide a theoretical analysis to clarify the correlation of the two components and use probability formulae to estimate the recognition rates for different settings of the adult image recogniser and the decision rule. Then, a set of optimal receiver-operating characteristic (ROC) curves for different image numbers is solved. To recognise an unknown image group, a desired recall rate for adult (or benign) image groups is specified and the system is set according to the parameters acquired from the optimal ROC curves. The proposed method can be dynamically adapted to the recall rates that the user expects. This advantage makes the proposed system more suitable for real applications. Our work can be viewed as an extension of single image recognition and the experimental results demonstrate that it can attain higher recognition accuracy than the earlier methods.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号