首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2639篇
  免费   163篇
  国内免费   23篇
电工技术   46篇
综合类   7篇
化学工业   757篇
金属工艺   75篇
机械仪表   110篇
建筑科学   111篇
矿业工程   10篇
能源动力   165篇
轻工业   168篇
水利工程   46篇
石油天然气   22篇
无线电   260篇
一般工业技术   426篇
冶金工业   82篇
原子能技术   17篇
自动化技术   523篇
  2024年   3篇
  2023年   43篇
  2022年   79篇
  2021年   180篇
  2020年   130篇
  2019年   181篇
  2018年   210篇
  2017年   190篇
  2016年   171篇
  2015年   117篇
  2014年   210篇
  2013年   286篇
  2012年   177篇
  2011年   201篇
  2010年   161篇
  2009年   115篇
  2008年   69篇
  2007年   40篇
  2006年   41篇
  2005年   32篇
  2004年   26篇
  2003年   18篇
  2002年   9篇
  2001年   8篇
  2000年   14篇
  1999年   4篇
  1998年   16篇
  1997年   4篇
  1996年   7篇
  1995年   10篇
  1994年   3篇
  1993年   11篇
  1992年   4篇
  1991年   3篇
  1990年   5篇
  1989年   5篇
  1988年   2篇
  1987年   4篇
  1986年   2篇
  1985年   3篇
  1984年   3篇
  1983年   8篇
  1982年   2篇
  1981年   3篇
  1980年   2篇
  1979年   3篇
  1978年   2篇
  1977年   2篇
  1976年   3篇
  1974年   2篇
排序方式: 共有2825条查询结果,搜索用时 31 毫秒
61.
The Multi-Agent Programming Contest is an annual international event on programming multi-agent systems: Teams of agents participate in a simulated cooperative scenario. It started in 2005 and is organised in 2010 for the sixth time. The contest is an attempt to stimulate research in the area of multi-agent system development and programming by (i) identifying key problems in the field and (ii) collecting suitable benchmarks that can serve as milestones for testing multi-agent programming languages, platforms and tools. This article provides a short history of the contest since it started and reports in more detail on the cows and cowboys scenario implemented for the 2008, 2009 and 2010 contest editions. We briefly discuss the underlying technological background and conclude with a critical discussion of the experiences and lessons learned.  相似文献   
62.
In problem of portfolio selection, financial Decision Makers (DMs) explain objectives and investment purposes in the frame of multi-objective mathematic problems which are more consistent with decision making realities. At present, various methods have introduced to optimize such problems. One of the optimization methods is the Compromise Programming (CP) method. Considering increasing importance of investment in financial portfolios, we propose a new method, called Nadir Compromising Programming (NCP) by expanding a CP-based method for optimization of multi-objective problems. In order to illustrate NCP performance and operational capability, we implement a case study by selecting a portfolio with 35 stock indices of Iran stock market. Results of comparing the CP method and proposed method under the same conditions indicate that NCP method results are more consistent with DM purposes.  相似文献   
63.
Making optimal use of available resources has always been of interest to humankind, and different approaches have been used in an attempt to make maximum use of existing resources. Limitations of capital, manpower, energy, etc., have led managers to seek ways for optimally using such resources. In fact, being informed of the performance of the units under the supervision of a manager is the most important task with regard to making sensible decisions for managing them. Data envelopment analysis (DEA) suggests an appropriate method for evaluating the efficiency of homogeneous units with multiple inputs and multiple outputs. DEA models classify decision making units (DMUs) into efficient and inefficient ones. However, in most cases, managers and researchers are interested in ranking the units and selecting the best DMU. Various scientific models have been proposed by researchers for ranking DMUs. Each of these models has some weakness(es), which makes it difficult to select the appropriate ranking model. This paper presents a method for ranking efficient DMUs by the voting analytic hierarchy process (VAHP). The paper reviews some ranking models in DEA and discusses their strengths and weaknesses. Then, we provide the method for ranking efficient DMUs by VAHP. Finally we give an example to illustrate our approach and then the new method is employed to rank efficient units in a real world problem.  相似文献   
64.
This paper presents an algorithm for synchronizing two different chaotic systems by using a combination of Unscented Kalman-Bucy Filter (UKBF) and sliding mode controller. It is assumed that the drive chaotic system is perturbed by white noise and shows stochastic chaotic behavior. In addition the output of the system does not contain the whole state variables of the system, and it is also affected by some independent white noise. By combining the UKBF and the sliding mode control, a synchronizing control law is proposed. Simulation results show the ability of the proposed method in synchronizing chaotic systems in presence of noise.  相似文献   
65.
In this paper, He’s homotopy perturbation method is applied to solve non-linear systems of mixed Volterra–Fredholm integral equations. Two examples are presented to illustrate the ability of the method. Also comparisons are made between the Adomian decomposition method and the homotopy perturbation method. The results reveal that He’s homotopy perturbation method is very effective and simple and in these examples leads to the exact solutions.  相似文献   
66.
One of the most encumbering issues in RF MEMS resonators is spurious modes. The problem of spurious modes becomes more critical, when the ring type resonators are used. In the ring shape anchored contour mode disk resonator, for achieving a low serial resistance, the inner radius of the disk must be increased. This causes the spurious modes to become too close to the desired mode and degrade the operation of the resonator. In this work, spurious modes of before-mentioned device are introduced and their characteristics are evaluated by exact analytical approach. Based on those analytical approaches, we introduce two techniques for spurious mode suppression. The first technique is based on exciting the desired mode by proper electrode engineering and hence is an electrical approach. The second technique is reconfiguring of the anchor from a continuous ring to crossed ring segments and locating the segments on the phase discriminating lines to increase the insertion loss for spurious modes and decrease the losses for the fundamental mode. The final harmonic analysis verifies that the proposed techniques result a resonator with a pure frequency spectrum and spurious modes excluded over a very wide frequency range.  相似文献   
67.
In this paper, we propose a hybrid approach using genetic algorithm and neural networks to classify Peer-to-Peer (P2P) traffic in IP networks. We first compute the minimum classification error (MCE) matrix using genetic algorithm. The MCE matrix is then used during the pre-processing step to map the original dataset into a new space. The mapped data set is then fed to three different classifiers: distance-based, K-Nearest Neighbors, and neural networks classifiers. We measure three different indexes, namely mutual information, Dunn, and SD to evaluate the extent of separation of the data points before and after mapping is performed. The experimental results demonstrate that with the proposed mapping scheme we achieve, on average, 8% higher accuracy in classification of the P2P traffic compare to the previous solutions. Moreover, the genetic-based MCE matrix increases the classification accuracy more than what the basic MCE does.  相似文献   
68.
We investigate the one-dimensional variable-sized bin-packing problem. This problem requires packing a set of items into a minimum-cost set of bins of unequal sizes and costs. Six optimization-based heuristics for this problem are presented and compared. We analyze their empirical performance on a large set of randomly generated test instances with up to 2000 items and seven bin types. The first contribution of this paper is to provide evidence that a set covering heuristic proves to be highly effective and capable of delivering very-high quality solutions within short CPU times. In addition, we found that a simple subset-sum problem-based heuristic consistently outperforms heuristics from the literature while requiring extremely short CPU times.  相似文献   
69.
In this paper, we present a topology control algorithm for ad hoc networks. By considering the weight of the links, each node orders its one-hop neighbors in an ordered list and then the ordered lists are exchanged between the neighbors. This information enables the nodes to compute their transmission radius on the basis of its one- and two-hop neighbors’ information. We demonstrate that compared to the best known algorithms, the degree and transmission radius of the nodes in the topology produced by the proposed algorithm are smaller. In addition to Euclidean graphs, the algorithm works correctly on general weighted graphs. Also an extension of our algorithm is proposed which adapts its topology to network changes. Finally, we use the four metrics, node degree, transmission radius, the power stretch factor and, packet loss ratio to measure the performance improvements of the presented algorithms through simulations.  相似文献   
70.
Insects are capable of robust visual navigation in complex environments using efficient information extraction and processing approaches. This paper presents an implementation of insect inspired visual navigation that uses spatial decompositions of the instantaneous optic flow to extract local proximity information. The approach is demonstrated in a corridor environment on an autonomous quadrotor micro-air-vehicle (MAV) where all the sensing and processing, including altitude, attitude, and outer loop control is performed on-board. The resulting methodology has the advantages of computation speed and simplicity, hence are consistent with the stringent size, weight, and power requirements of MAVs.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号