首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   18988篇
  免费   825篇
  国内免费   139篇
电工技术   324篇
综合类   32篇
化学工业   4202篇
金属工艺   588篇
机械仪表   628篇
建筑科学   369篇
矿业工程   47篇
能源动力   1363篇
轻工业   1152篇
水利工程   150篇
石油天然气   84篇
武器工业   1篇
无线电   2353篇
一般工业技术   4305篇
冶金工业   1435篇
原子能技术   172篇
自动化技术   2747篇
  2024年   101篇
  2023年   418篇
  2022年   994篇
  2021年   1155篇
  2020年   906篇
  2019年   936篇
  2018年   1214篇
  2017年   954篇
  2016年   924篇
  2015年   600篇
  2014年   836篇
  2013年   1503篇
  2012年   885篇
  2011年   1062篇
  2010年   852篇
  2009年   803篇
  2008年   707篇
  2007年   567篇
  2006年   469篇
  2005年   359篇
  2004年   270篇
  2003年   240篇
  2002年   187篇
  2001年   176篇
  2000年   169篇
  1999年   168篇
  1998年   290篇
  1997年   237篇
  1996年   219篇
  1995年   168篇
  1994年   157篇
  1993年   150篇
  1992年   102篇
  1991年   130篇
  1990年   99篇
  1989年   95篇
  1988年   79篇
  1987年   88篇
  1986年   75篇
  1985年   85篇
  1984年   73篇
  1983年   71篇
  1982年   60篇
  1981年   70篇
  1980年   48篇
  1979年   31篇
  1978年   27篇
  1977年   26篇
  1976年   35篇
  1971年   12篇
排序方式: 共有10000条查询结果,搜索用时 8 毫秒
101.
102.
This paper deals with the fuzzy set-valued functions of real variables on time scale whose values are normal, convex, upper semicontinuous and compactly supported fuzzy sets in \(\mathbb {R}^{n}\). We introduce and study the fundamental properties of new class of derivative called generalized delta derivative (\(\Delta _{g}\)-derivative) and generalized delta integral (\(\Delta _{g}\)-integral) for such fuzzy functions.  相似文献   
103.
Liouville numbers were the first class of real numbers which were proven to be transcendental. It is easy to construct non-normal Liouville numbers. Kano (1993) and Bugeaud (2002) have proved, using analytic techniques, that there are normal Liouville numbers. Here, for a given base k ≥ 2, we give a new construction of a Liouville number which is normal to the base k. This construction is combinatorial, and is based on de Bruijn sequences.  相似文献   
104.
Diploid genetic algorithms (DGAs) promise robustness as against simple genetic algorithms which only work towards optimization. Moreover, these algorithms outperform others in dynamic environments. The work examines the theoretical aspect of the concept by examining the existing literature. The present work takes the example of dynamic TSP to compare greedy approach, genetic algorithms and DGAs. The work also implements a greedy genetic approach for the problem. In the experiments carried out, the three variants of dominance were implemented and 115 runs proved the point that none of them outperforms the other.  相似文献   
105.
106.
In classification tasks, the error rate is proportional to the commonality among classes. In conventional GMM-based modeling technique, since the model parameters of a class are estimated without considering other classes in the system, features that are common across various classes may also be captured, along with unique features. This paper proposes to use unique characteristics of a class at the feature-level and at the phoneme-level, separately, to improve the classification accuracy. At the feature-level, the performance of a classifier has been analyzed by capturing the unique features while modeling, and removing common feature vectors during classification. Experiments were conducted on speaker identification task, using speech data of 40 female speakers from NTIMIT corpus, and on a language identification task, using speech data of two languages (English and French) from OGI_MLTS corpus. At the phoneme-level, performance of a classifier has been analyzed by identifying a subset of phonemes, which are unique to a speaker with respect to his/her closely resembling speaker, in the acoustic sense, on a speaker identification task. In both the cases (feature-level and phoneme-level) considerable improvement in classification accuracy is observed over conventional GMM-based classifiers in the above mentioned tasks. Among the three experimental setup, speaker identification task using unique phonemes shows as high as 9.56 % performance improvement over conventional GMM-based classifier.  相似文献   
107.
In many physical systems, when implementing quantum gate operations unavoidable global and relative phases occur as by-products due to the internal structure of the governing Hamiltonian. To correct, additional phase rotation gates are used, which increases the computational overhead. Here, we show how these phase by-products can actually be used to our advantage by using them to implement universal quantum computing between qubits not directly coupled to each other. The gate operations, CNOT, Toffoli, and swap gates, require much less computational overhead than present schemes, and are achieved with fidelity greater than 99%. We then present a linear nearest-neighbor architecture that takes full advantage of the phase by-products, and we show how to implement gates from a universal set efficiently in this layout. In this scheme gate operations are realized by only varying a single control parameter per data qubit, and the ability to tune couplings is not required.  相似文献   
108.
In mobile commerce, companies provide location based services to mobile users, who report their locations with a certain level of granularity to maintain a degree of anonymity. This level of granularity depends on their perceived risk as well as the incentives they receive in the form of monetary benefits or improved mobile services. This paper formulates a quantitative model in which information theoretic metrics such as entropy, quantify the anonymity level of mobile users. The individual perceived risks of users and the benefits they obtain are defined as functions of their chosen location information granularity. The interaction between the mobile commerce company and its users is investigated using mechanism design techniques as a privacy game. The user best responses and optimal strategies for the company are derived under budgetary constraints on incentives, which are provided to users in order to convince them to share their private information at the desired level of granularity. Information limitations in the system are analyzed to capture more realistic scenarios where the companies do not have access to user utility functions. Iterative distributed algorithm and regression learning methods are investigated to design mechanisms that overcome these limitations. The results obtained are demonstrated with a numerical example and simulations based on real GPS data.  相似文献   
109.
The pre-processing stage of finite element analysis of the Navier–Stokes equations is becoming increasingly important as the desire for more general boundary conditions, as well as applications to parallel computers increases. The set up of general boundary conditions and communication structures for parallel computations should be accomplished during the pre-processing phase of the analysis, if possible, to ensure efficient computations for large scale problems in computational fluid dynamics. This paper introduces a general methodology for geometry based boundary condition application and pre-computing of parallel communication tasks. A. K. Karanam was supported by NSF Grant No. 9985340. C. H. Whiting was supported by a grant from NASA LaRC.  相似文献   
110.
In the domain of manufacturing, computer numerically controllers (CNC) technology is a major contributor to the production capacity of the enterprises. The advances in CNC technology coupled with enhancements in computing systems have provided the basis to re-examine the way in which computer-aided systems (CAx) can be used to enable global manufacturing. Interoperability of the various components of the CAx chain is therefore a major prerequisite for manufacturing enterprises for becoming strategically agile and consequently globally competitive. Being interoperable, resources can be utilized interchangeably in a plug-and-produce manner. Over the last 8 years the eminence of a STEP standard for machining entitled STEP-NC (numerical control) has become a well-known vehicle for research to improve the level of information availability at the CNC machine tool. In this paper, the authors introduce the background to the evolution of CNC manufacturing over the last 50 years and the current standards available for programming. A review of the literature in interoperable CNC manufacturing is then provided relating to milling, turn–mill and other NC processes. The major part of the paper provides a strategic view of how interoperability can be implemented across the CAx chain with a range of standards used to regulate the flow of information. Finally, the paper outlines the advantages and major issues for future developments in interoperability, identifying future key requirements and limiting factors.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号