首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2551篇
  免费   209篇
  国内免费   14篇
电工技术   49篇
综合类   17篇
化学工业   662篇
金属工艺   62篇
机械仪表   39篇
建筑科学   126篇
矿业工程   6篇
能源动力   132篇
轻工业   103篇
水利工程   12篇
石油天然气   7篇
无线电   252篇
一般工业技术   572篇
冶金工业   117篇
原子能技术   5篇
自动化技术   613篇
  2024年   6篇
  2023年   60篇
  2022年   123篇
  2021年   159篇
  2020年   107篇
  2019年   105篇
  2018年   109篇
  2017年   122篇
  2016年   131篇
  2015年   100篇
  2014年   159篇
  2013年   188篇
  2012年   209篇
  2011年   220篇
  2010年   134篇
  2009年   140篇
  2008年   123篇
  2007年   98篇
  2006年   82篇
  2005年   42篇
  2004年   46篇
  2003年   41篇
  2002年   32篇
  2001年   27篇
  2000年   22篇
  1999年   22篇
  1998年   29篇
  1997年   17篇
  1996年   7篇
  1995年   14篇
  1994年   6篇
  1993年   7篇
  1992年   10篇
  1991年   9篇
  1990年   14篇
  1989年   4篇
  1987年   3篇
  1985年   3篇
  1984年   2篇
  1983年   4篇
  1981年   4篇
  1979年   2篇
  1978年   2篇
  1977年   3篇
  1976年   4篇
  1975年   4篇
  1974年   3篇
  1973年   3篇
  1972年   4篇
  1971年   2篇
排序方式: 共有2774条查询结果,搜索用时 15 毫秒
181.
Xie X  Seung HS 《Neural computation》2003,15(2):441-454
Backpropagation and contrastive Hebbian learning are two methods of training networks with hidden neurons. Backpropagation computes an error signal for the output neurons and spreads it over the hidden neurons. Contrastive Hebbian learning involves clamping the output neurons at desired values and letting the effect spread through feedback connections over the entire network. To investigate the relationship between these two forms of learning, we consider a special case in which they are identical: a multilayer perceptron with linear output units, to which weak feedback connections have been added. In this case, the change in network state caused by clamping the output neurons turns out to be the same as the error signal spread by backpropagation, except for a scalar prefactor. This suggests that the functionality of backpropagation can be realized alternatively by a Hebbian-type learning algorithm, which is suitable for implementation in biological networks.  相似文献   
182.
The electron-beam (EB) degradation of volatile aromatics (benzene, toluene, ethylbenzene, xylenes: BTEX) in groundwater strip gas, which in the present work has been modeled by the introduction of the desired aromatic(s) to a stream of air or another gas, such as oxygen, is initiated essentially by the addition of *OH radicals to the aromatic ring, giving rise to hydroxycyclohexadienyl radicals, which form the corresponding peroxyl radicals upon addition of oxygen. As studied in some detail with benzene as a BTEX representative, various reactions of these lead to numerous oxidation products in a cascade of reactions, including the decomposition of products under the prevailing conditions of high turnover of the initial aromatic. Importantly, hydroxycyclohexadienylperoxyl radical formation is partly reversible, and the reactions of the hydroxycyclohexadienyl radicals, which thus have a significant presence in these systems, must therefore also be taken into consideration. In the gas phase, in contrast to the aqueous phase (see Part 1), the reactions of the hydroxycyclohexadienyl radicals lead to oligomeric products that appear to contribute, in addition to ionic clusters, to nucleation for the aerosols observed. Various nitrated products, among them nitrophenols, are observed when air is used for the stripping. However, these studies did not clear the pilot plant stage, since BTEX degradation using a bioreactor carried out in parallel was so successful that the EB technology was judged to be noncompetitive. As for the latter, expensive equipment consisting of a stripper, the EB machine, and an aerosol precipitator would be required. The condensed aerosols are biorefractory and would require further treatment for detoxification.  相似文献   
183.
The n-pebble tree transducer was recently proposed as a model for XML query languages. The four main results on deterministic transducers are: First, (1) the translation of an n-pebble tree transducer can be realized by a composition of n+1 0-pebble tree transducers. Next, the pebble tree transducer is compared with the macro tree transducer, a well-known model for syntax-directed semantics, with decidable type checking. The -pebble tree transducer can be simulated by the macro tree transducer, which, by the first result, implies that (2) can be realized by an (n+1)-fold composition of macro tree transducers. Conversely, every macro tree transducer can be simulated by a composition of 0-pebble tree transducers. Together these simulations prove that (3) the composition closure of n-pebble tree transducers equals that of macro tree transducers (and that of 0-pebble tree transducers). Similar results hold in the nondeterministic case. Finally, (4) the output languages of deterministic n-pebble tree transducers form a hierarchy with respect to the number n of pebbles.This revised version was published online in September 2003 with corrections to type sizes.Received: 16 January 2003, Sebastian Maneth: Present address: Swiss Institute of Technology Lausanne, Programming Methods Laboratory (LAMP), 1015 Lausanne, Switzerland, e-mail (sebastian.maneth@epfl.ch)  相似文献   
184.
Barnes JE  Bronner S  Beck R  Parikh NC 《Applied optics》2003,42(15):2647-2652
A CCD-based bistatic lidar (CLidar) system has been developed and constructed to measure scattering in the atmospheric boundary layer. The system uses a CCD camera, wide-angle optics, and a laser. Imaging a vertical laser beam from the side allows high-altitude resolution in the boundary layer all the way to the ground. The dynamic range needed for the molecular signal is several orders of magnitude in the standard monostatic method, but only approximately 1 order of magnitude with the CLidar method. Other advantages of the Clidar method include low cost and simplicity. Observations at Mauna Loa Observatory, Hawaii, show excellent agreement with the modeled molecular-scattering signal. The scattering depends on angle (altitude) and the polarization plane of the laser.  相似文献   
185.
Motivated by a growing need for intelligent housing to accommodate ageing populations, we propose a novel application of intertransaction association rule (IAR) mining to detect anomalous behaviour in smart home occupants. An efficient mining algorithm that avoids the candidate generation bottleneck limiting the application of current IAR mining algorithms on smart home data sets is detailed. An original visual interface for the exploration of new and changing behaviours distilled from discovered patterns using a new process for finding emergent rules is presented. Finally, we discuss our observations on the emergent behaviours detected in the homes of two real world subjects.  相似文献   
186.
For sheet metal forming, often the forming limit diagram (FLD) is used as failure criterion as it can be derived easily in experiments. It is based on the assumption that localization of strain in the sheet plane is responsible for crack initiation, but application of FLD is limited to linear strain paths. Hence, only forming processes with approximately the same deformation history as the experiments carried out for FLD determination should be evaluated by this criterion. Forming limit stress diagrams (FLSD) do not exhibit such strict limitations. They are based on the assumption that principal stresses in the sheet plane are responsible for crack initiation. As these stresses are usually calculated by FE analysis using elastic plastic material laws, strain hardening is considered. Two‐step forming tests as application examples prove the FLSD to be adequate for evaluation of non‐linear forming processes with alternating forming directions. Nevertheless, FLSD are derived in extensive investigations which makes them unattractive for most industrial applications. Furthermore, both FLD and FLSD do not consider the physical background of ductile crack initiation which is provoked by an interaction of local stress triaxiality and equivalent plastic strain. Hence, a reliable failure criterion should concentrate on these two parameters. The Gurson‐Tvergaard‐Needleman‐ (GTN‐) damage model can predict crack initiation during sheet metal forming. Application of the GTN model to 2 step forming tests with the bake hardening steel H220BD+Z showed good agreement to experimental results although a sensitivity of the model to mesh size and stress triaxiality is observed.  相似文献   
187.
Individuals with semantic dementia (SD; n=12) or Alzheimer's disease (AD; n=20) and healthy volunteers (n=40) were tested on tasks probing attribute rather than associative knowledge of animals and objects in the visual and verbal domains. The tasks were within modality, in that they probed knowledge in a single presentation modality (pictures or written words) and did not require cross-modal matching. Participants were required to make the same simple judgment about triads of animal stimuli ("Which is the largest and smallest?") and object stimuli ("Which is the heaviest and lightest?"). Control participants scored at ceiling on this simple task. Overall, the SD patients were significantly more impaired on this task than were the AD patients, who in turn were significantly more impaired than the controls. There was a strong trend for SD but not AD patients to show worse performance with verbal than visual material. However, no significant effects of category were found in either patient group. The Size/Weight Attribute Test has the potential to assess modality-specific deficits of semantic knowledge. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
188.
Scaffolds functionalized with delivery systems for the release of growth factors is a robust strategy to enhance tissue regeneration. However, after implantation, macrophages infiltrate the scaffold, eventually initiating the degradation and clearance of the delivery systems. Herein, it is hypothesized that fully embedding the poly(d,l ‐lactide‐co‐glycolide acid) microspheres (MS) in a highly structured collagen‐based scaffold (concealing) can prevent their detection, preserving the integrity of the payload. Confocal laser microscopy reveals that non‐embedded MS are easily internalized; when concealed, J774 and bone marrow‐derived macrophages (BMDM) cannot detect them. This is further demonstrated by flow cytometry, as a tenfold decrease is found in the number of MS engulfed by the cells, suggesting that collagen can cloak the MS. This correlates with the amount of nitric oxide and tumor necrosis factor‐α produced by J774 and BMDM in response to the concealed MS, comparable to that found for non‐functionalized collagen scaffolds. Finally, the release kinetics of a reporter protein is preserved in the presence of macrophages, only when MS are concealed. The data provide detailed strategies for fabricating three dimensional (3D) biomimetic scaffolds able to conceal delivery systems and preserve the therapeutic molecules for release.  相似文献   
189.
190.
In computational phylogenetics, supertree methods provide a way to reconstruct larger clades of the Tree of Life. The supertree problem can be formalized in different ways, to cope with contradictory information in the input. In particular, there exist methods based on encoding the input trees in a matrix, and methods based on finding minimum cuts in some graph. Matrix representation methods compute supertrees of superior quality, but the underlying optimization problems are computationally hard. In contrast, graph-based methods have polynomial running time, but supertrees are inferior in quality. In this paper, we present a novel approach for the computation of supertrees called FlipCut supertree. Our method combines the computation of minimum cuts from graph-based methods with a matrix representation method, namely Minimum Flip Supertrees. Here, the input trees are encoded in a 0/1/?-matrix. We present a heuristic to search for a minimum set of 0/1-flips such that the resulting matrix admits a directed perfect phylogeny. We then extend our approach by using edge weights to weight the columns of the 0/1/?-matrix. In our evaluation, we show that our method is extremely swift in practice, and orders of magnitude faster than the runner up. Concerning supertree quality, our method is sometimes on par with the “gold standard” Matrix Representation with Parsimony.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号