首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2447篇
  免费   109篇
  国内免费   6篇
电工技术   30篇
综合类   5篇
化学工业   543篇
金属工艺   37篇
机械仪表   43篇
建筑科学   124篇
矿业工程   32篇
能源动力   40篇
轻工业   237篇
水利工程   29篇
石油天然气   5篇
无线电   214篇
一般工业技术   376篇
冶金工业   289篇
原子能技术   13篇
自动化技术   545篇
  2023年   21篇
  2022年   32篇
  2021年   61篇
  2020年   29篇
  2019年   33篇
  2018年   62篇
  2017年   60篇
  2016年   84篇
  2015年   74篇
  2014年   88篇
  2013年   107篇
  2012年   114篇
  2011年   148篇
  2010年   85篇
  2009年   127篇
  2008年   120篇
  2007年   103篇
  2006年   111篇
  2005年   87篇
  2004年   79篇
  2003年   62篇
  2002年   67篇
  2001年   44篇
  2000年   51篇
  1999年   49篇
  1998年   68篇
  1997年   61篇
  1996年   50篇
  1995年   53篇
  1994年   42篇
  1993年   36篇
  1992年   31篇
  1991年   26篇
  1990年   17篇
  1989年   14篇
  1988年   17篇
  1987年   23篇
  1986年   12篇
  1985年   23篇
  1984年   19篇
  1983年   18篇
  1982年   10篇
  1981年   15篇
  1980年   9篇
  1979年   11篇
  1978年   13篇
  1977年   9篇
  1976年   20篇
  1975年   10篇
  1971年   7篇
排序方式: 共有2562条查询结果,搜索用时 15 毫秒
81.
Extracting Interpretable Fuzzy Rules from RBF Networks   总被引:4,自引:0,他引:4  
Radial basis function networks and fuzzy rule systems are functionally equivalent under some mild conditions. Therefore, the learning algorithms developed in the field of artificial neural networks can be used to adapt the parameters of fuzzy systems. Unfortunately, after the neural network learning, the structure of the original fuzzy system is changed and interpretability, which is considered to be one of the most important features of fuzzy systems, is usually impaired. This Letter discusses the differences between RBF networks and interpretable fuzzy systems. Based on these discussions, a method for extracting interpretable fuzzy rules from RBF networks is suggested. Simulation examples are given to embody the idea of this paper.  相似文献   
82.
Mutation Testing in the Refinement Calculus   总被引:2,自引:0,他引:2  
This article discusses mutation testing strategies in the context of refinement. Here, a novel generalisation of mutation testing techniques is presented to be applied to contracts ranging from formal specifications to programs. It is demonstrated that refinement and its dual abstraction are the key notions leading to a precise and yet simple theory of mutation testing. The refinement calculus of Back and von Wright is used to express concepts like contracts, useful mutations, test cases and test coverage.  相似文献   
83.
Bernhard Klinger 《Computing》1997,59(3):223-236
We investigate quasi-Monte Carlo integration for functions on thes-dimensional unit cube having point singularities. Error bounds are proved and the theoretical results are verified by computations using Halton, Sobol’ and Niederreiter sequences. Supported by the Austrian Science Foundation (Project 10223-PHY).  相似文献   
84.
In a vehicle tracking system computers aboard moving vehicles determine periodically their geographical position and transmit it to a control center. This paper presents a commercial vehicle tracking system as an example of a distributed real-time system with mobile components and focuses on the issue of clock synchronization. The mobile components of the system obtain highly accurate timing information from the Global Positioning System which is used to synchronize their local clocks to UTC world time. Thus a tight clock synchronization is achieved without imposing additional load on the communication channels of the system.  相似文献   
85.
Definition of the problem: Physicians and nurses who work in neonatology—as in intensive care at all—are often forced to decide whether to stop or to continue with the treatment of a severely ill patient. The literature provides several decision making instruments, which are meant to help and to rationalize such decisions. Method and conclusion: Two of these instruments (“Schema zur ethischen Urteilsbildung nach dem Muster der aristotelischen Ethik”, Honnefelder 1994; “Nimwegener Methode für ethische Fallbesprechung”, Gordijn 1998) were tested by retrospectively examining two cases of our NICU. Results of our study show that the use of a decision making instrument is basically helpful. But the above mentioned instruments showed also shortcomings when used in the framework of neonatology. Therefore we developed the “Kölner Arbeitsbogen zur ethischen Entscheidungsfindung in der Neonatologie”, which is adapted to the specific needs of neonatology.  相似文献   
86.
The lack of privacy is one of the main reasons that limits trust in e-commerce. Current e-commerce practice enforces a customer to disclose her identity to the e-shop and the use of credit cards makes it straightforward for an e-shop to know the real identity of its customers. Although there are some payment systems based on untraceable tokens, they are not as widely used as credit cards. Furthermore, even without buying anything, a customer is already disclosing some information about who or where she may be by just connecting to the e-shop's web server and leaving behind an IP-address. In this paper, we present novel components that enable secure pseudonymous e-commerce. On the one hand, these components allow a customer to browse through an e-shop, select goods, and pay the goods with her credit card such that neither the e-shop operator nor the credit card issuer nor an eavesdropper is able to get any information about the customer's identity. On the other hand, it is guaranteed that none of the involved parties is able to act dishonestly during the credit card payment. Such a system could greatly enhance trust in e-commerce since it overcomes the customers' privacy concerns.  相似文献   
87.
Der ?elektronische Brief“ bzw. die elektronische Mail (E-Mail) ist seit über 30 Jahren im privaten wie beruflichen Umfeld im Einsatz. Behörden, Steuerbüros, Krankenhäuser, Finanzinstitute und viele weitere Gruppen versenden und empfangen E-Mails, um Informationen auszutauschen. Innerhalb kurzer Zeit findet eine E-Mail ihren Weg vom Sender in Deutschland zum Empfänger in beispielsweise den USA. Wie funktioniert das? Und was hat es mit E-Mail-Verschlüsselung auf sich? Dieser Artikel betrachtet die grundlegende technische Funktionsweise der E-Mail sowie Hintergründe und Funktionsweise der Verschlüsselung mit S/MIME und PGP.  相似文献   
88.
89.
This article reports the design concept of a novel acoustic beam aperture modifier using butt-jointed gradient-index phononic crystals (GRIN PCs) consisting of steel cylinders embedded in a homogeneous epoxy background. By gradually tuning the period of a GRIN PC, the propagating direction of acoustic waves can be continuously bent to follow a sinusoidal trajectory in the structure. The aperture of an acoustic beam can therefore be shrunk or expanded through change of the gradient refractive index profiles of the butt-jointed GRIN PCs. Our computational results elucidate the effectiveness of the proposed acoustic beam aperture modifier. Such an acoustic device can be fabricated through a simple process and will be valuable in applications, such as biomedical imaging and surgery, nondestructive evaluation, communication, and acoustic absorbers.  相似文献   
90.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号