首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2879篇
  免费   175篇
  国内免费   5篇
电工技术   36篇
化学工业   757篇
金属工艺   67篇
机械仪表   69篇
建筑科学   65篇
矿业工程   4篇
能源动力   95篇
轻工业   395篇
水利工程   22篇
石油天然气   21篇
无线电   244篇
一般工业技术   568篇
冶金工业   341篇
原子能技术   13篇
自动化技术   362篇
  2023年   30篇
  2022年   130篇
  2021年   133篇
  2020年   75篇
  2019年   84篇
  2018年   95篇
  2017年   79篇
  2016年   93篇
  2015年   87篇
  2014年   114篇
  2013年   176篇
  2012年   183篇
  2011年   218篇
  2010年   158篇
  2009年   161篇
  2008年   153篇
  2007年   125篇
  2006年   106篇
  2005年   79篇
  2004年   80篇
  2003年   65篇
  2002年   61篇
  2001年   42篇
  2000年   32篇
  1999年   46篇
  1998年   103篇
  1997年   75篇
  1996年   51篇
  1995年   48篇
  1994年   30篇
  1993年   26篇
  1992年   11篇
  1991年   12篇
  1990年   6篇
  1989年   15篇
  1988年   11篇
  1987年   9篇
  1986年   8篇
  1985年   8篇
  1984年   6篇
  1983年   4篇
  1982年   5篇
  1981年   4篇
  1980年   8篇
  1979年   1篇
  1978年   2篇
  1976年   7篇
  1973年   1篇
  1972年   1篇
  1971年   1篇
排序方式: 共有3059条查询结果,搜索用时 31 毫秒
61.
This paper proposes a novel approach for privacy-preserving distributed model-based classifier training. Our approach is an important step towards supporting customizable privacy modeling and protection. It consists of three major steps. First, each data site independently learns a weak concept model (i.e., local classifier) for a given data pattern or concept by using its own training samples. An adaptive EM algorithm is proposed to select the model structure and estimate the model parameters simultaneously. The second step deals with combined classifier training by integrating the weak concept models that are shared from multiple data sites. To reduce the data transmission costs and the potential privacy breaches, only the weak concept models are sent to the central site and synthetic samples are directly generated from these shared weak concept models at the central site. Both the shared weak concept models and the synthetic samples are then incorporated to learn a reliable and complete global concept model. A computational approach is developed to automatically achieve a good trade off between the privacy disclosure risk, the sharing benefit and the data utility. The third step deals with validating the combined classifier by distributing the global concept model to all these data sites in the collaboration network while at the same time limiting the potential privacy breaches. Our approach has been validated through extensive experiments carried out on four UCI machine learning data sets and two image data sets.
Jianping FanEmail:
  相似文献   
62.
We present a method for computing the null space of finite element models, including models with equality constraints. The method is purely algebraic; it requires access to the element matrices, but not to the geometry or material properties of the model.Theoretical considerations show that under certain conditions, both the amount of computation and the amount of memory required by our method scale linearly with model size; memory scales linearly but computation scales quadratically with the dimension of the null space. Our experiments confirm this: the method scales extremely well on 3-dimensional model problems. In general, large industrial models do not satisfy all the conditions that the theoretical results assume; however, experimentally the method performs well and outperforms an established method on industrial models, including models with many equality constraints.The accuracy of the computed null vectors is acceptable, but the method is usually less accurate than a more naive (and computationally much more expensive) method.  相似文献   
63.
The pre-integrated volume rendering technique is widely used for creating high quality images. It produces good images even though the transfer function is nonlinear. Because the size of the pre-integration lookup table is proportional to the square of data precision, the required storage and computation load steeply increase for rendering of high-precision volume data. In this paper, we propose a method that approximates the pre-integration function proportional to the data precision. Using the arithmetic mean instead of the geometric mean and storing opacity instead of extinction density, this technique reduces the size and the update time of the pre-integration lookup table so that it classifies high-precision volume data interactively. We demonstrate performance gains for typical renderings of volume datasets.  相似文献   
64.
The oxidation behaviour of the intermetallic phase Ti-50 at% Al at 900 °C was studied. It was found that the oxidation behaviour strongly depends on the composition and distribution of the and 2-phases in the alloy microstructure. As this microstructure strongly depends on the alloy cooling rate, the oxidation behaviour of TiAl-based intermetallics is significantly affected by the casting procedure and subsequent heat treatment. Rapid cooling from high temperature (T 1400 °C) has a beneficial effect on oxidation behaviour.On leave from the Academy of Mining and Metallurgy, Krakow, Poland.  相似文献   
65.
Complaints from the Domingos Martins population about sewage odours in the city made the district attorney order an impact assessment of the odours emitted by the city wastewater treatment plant (WWTP). This study comprised various techniques, models and population surveys. In 2007, an odour emission model proved that the main hydrogen sulphide emitter was the aeration tank of the WWTP (13.5 g h(-1)) and such emissions, according to CALPUFF model, should be perceived in the whole Domingos Martins city centre area. In this area, 58% of those interviewed were annoyed by the WWTP odours. However, in 2009, the odour monitoring panel recorded few odour occurrences. A second population survey showed that hereafter only 20% of those interviewed were annoyed by the WWTP emissions. Odour emission and dispersion models run with 2010 data proved a drastic reduction of the WWTP aeration tank emissions and consequently the city centre was not bothered by WWTP emissions anymore. The odour emission reduction was due to the modification of the WWTP aeration tank system. Despite the odour emission reduction, houses located southeast of the WWTP were still annoyed by sewage odours. However, in this part of the town, other sources of sewage odours have been found.  相似文献   
66.
Computer Supported Collaborative Learning is a pedagogical approach that can be used for deploying educational games in the classroom. However, there is no clear understanding as to which technological platforms are better suited for deploying co-located collaborative games, nor the general affordances that are required. In this work we explore two different technological platforms for developing collaborative games in the classroom: one based on augmented reality technology and the other based on multiple-mice technology. In both cases, the same game was introduced to teach electrostatics and the results were compared experimentally using a real class.  相似文献   
67.
68.
Data clustering is a common technique for data analysis, which is used in many fields, including machine learning, data mining, customer segmentation, trend analysis, pattern recognition and image analysis. Although many clustering algorithms have been proposed, most of them deal with clustering of one data type (numerical or nominal) or with mix data type (numerical and nominal) and only few of them provide a generic method that clusters all types of data. It is required for most real-world applications data to handle both feature types and their mix. In this paper, we propose an automated technique, called SpectralCAT, for unsupervised clustering of high-dimensional data that contains numerical or nominal or mix of attributes. We suggest to automatically transform the high-dimensional input data into categorical values. This is done by discovering the optimal transformation according to the Calinski–Harabasz index for each feature and attribute in the dataset. Then, a method for spectral clustering via dimensionality reduction of the transformed data is applied. This is achieved by automatic non-linear transformations, which identify geometric patterns in the data, and find the connections among them while projecting them onto low-dimensional spaces. We compare our method to several clustering algorithms using 16 public datasets from different domains and types. The experiments demonstrate that our method outperforms in most cases these algorithms.  相似文献   
69.
The iPhone SDK provides a powerful platform for the development of applications that make use of iPhone capabilities, such as sensors, GPS, Wi‐Fi, or Bluetooth connectivity. We observe that so far the development of iPhone applications has mostly been restricted to using Objective‐C. However, developing applications in plain Objective‐C on the iPhone OS suffers from limitations, such as the need for explicit memory management and lack of syntactic extension mechanism. Moreover, when developing distributed applications in Objective‐C, programmers have to manually deal with distribution concerns, such as service discovery, remote communication, and failure handling. In this paper, we discuss our experience in porting the Scheme programming language to the iPhone OS and how it can be used together with Objective‐C to develop iPhone applications. To support the interaction between Scheme programs and the underlying iPhone APIs, we have implemented a language symbiosis layer that enables programmers to access the iPhone SDK libraries from Scheme. In addition, we have designed high‐level distribution constructs to ease the development of distributed iPhone applications in an event‐driven style. We validate and discuss these constructs with a series of examples, including an iPod controller, a maps application, and a distributed multiplayer Scrabble‐like game. We discuss the lessons learned from this experience for other programming language ports to mobile platforms. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   
70.
This study develops a new design method called the constraint force design method, which allows topology optimization for planar rigid-body mechanisms. In conventional mechanism synthesis methods, the kinematics of a mechanism are analytically derived and the positions and types of joints of a fixed configuration (hereafter the topology) are optimized to obtain an optimal rigid-body mechanism tracking the intended output trajectory. Therefore, in conventional methods, modification of the configuration or topology of joints and links is normally considered impossible. In order to circumvent the fixed topology limitation in optimally designing rigid-body mechanisms, we present the constraint force design method. This method distributes unit masses simulating revolute or prismatic joints depending on the number of assigned degrees of freedom, analyzes the kinetics of unit masses coupled with constraint forces, and designs the existence of these constraint forces to minimize the root-mean-square error of the output paths of synthesized linkages and a target linkage using a genetic algorithm. The applicability and limitations of the newly developed method are discussed in the context of its application to several rigid-body synthesis problems.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号