首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   19514篇
  免费   1299篇
  国内免费   27篇
电工技术   209篇
综合类   13篇
化学工业   4886篇
金属工艺   256篇
机械仪表   589篇
建筑科学   832篇
矿业工程   39篇
能源动力   601篇
轻工业   3764篇
水利工程   226篇
石油天然气   68篇
武器工业   6篇
无线电   1246篇
一般工业技术   3287篇
冶金工业   1391篇
原子能技术   94篇
自动化技术   3333篇
  2024年   64篇
  2023年   232篇
  2022年   434篇
  2021年   754篇
  2020年   546篇
  2019年   567篇
  2018年   798篇
  2017年   832篇
  2016年   927篇
  2015年   693篇
  2014年   897篇
  2013年   1694篇
  2012年   1550篇
  2011年   1548篇
  2010年   1012篇
  2009年   1000篇
  2008年   1004篇
  2007年   894篇
  2006年   720篇
  2005年   519篇
  2004年   471篇
  2003年   421篇
  2002年   393篇
  2001年   242篇
  2000年   250篇
  1999年   199篇
  1998年   387篇
  1997年   301篇
  1996年   209篇
  1995年   164篇
  1994年   128篇
  1993年   113篇
  1992年   64篇
  1991年   49篇
  1990年   48篇
  1989年   49篇
  1988年   47篇
  1987年   25篇
  1986年   36篇
  1985年   49篇
  1984年   54篇
  1983年   44篇
  1982年   37篇
  1981年   40篇
  1980年   32篇
  1979年   38篇
  1978年   23篇
  1977年   28篇
  1976年   38篇
  1975年   17篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
61.
The Journal of Supercomputing - The integration of a Supercomputer in the educational process improves student’s technological skills. The aim of the paper is to study the interaction between...  相似文献   
62.
We present a process to automatically generate three-dimensional mesh representations of the complex, arborized cell membrane surface of cortical neurons (the principal information processing cells of the brain) from nonuniform morphological measurements. Starting from manually sampled morphological points (3D points and diameters) from neurons in a brain slice preparation, we construct a polygonal mesh representation that realistically represents the continuous membrane surface, closely matching the original experimental data. A mapping between the original morphological points and the newly generated mesh enables simulations of electrophysiolgical activity to be visualized on this new membrane representation. We compare the new mesh representation with the state of the art and present a series of use cases and applications of this technique to visualize simulations of single neurons and networks of multiple neurons.  相似文献   
63.
A fuzzy queue-aware routing approach for wireless mesh networks   总被引:1,自引:0,他引:1  
Recent advances in Wireless Mesh Networks (WMNs) have overcome the drawbacks of traditional wired and ad-hoc networks and now they are seen as a means of allowing last mile communications with quality level assurance in Future Multimedia Systems. However, new routing schemes are needed to provide end-to-end Quality of Service (QoS) and Quality of Experience (QoE) support for delay/loss/jitter-sensitive multimedia applications. The well-known OLSR (Optimized Link State Routing) protocol with ETX (Expected Transmission Count) metric brings many benefits to the path selection process, but has a drawback with regard to queue availability management, which reduces the system performance. This problem is caused when OLSR-EXT control messages are exchanged and the queues of mesh routers along the end-to-end communication path are overloaded. As a result, multimedia-related packets will suffer from loss/delay/jitter and the overall system performance will decrease. This paper proposes the Optimized Link State Routing-Fuzzy ETX Queue (OLSR-FEQ) protocol to overcome the limitations of OLSR-ETX regarding queue availability, QoS and QoE assurance. OLSR-FEQ optimizes network and user-based parameters by coordinating queue availability, QoS and fuzzy issues in the routing decision process as a way of allocating the best paths for multimedia applications. Performance evaluations were carried out with the Network Simulator (NS-2.34) to show the benefits of the proposed solution when compared with existing routing schemes, namely OLSR-ETX, OLSR-FLC, OLSR-MD and HWMP (IEEE 802.11s standard), regarding QoS (unsuccessful packet delivery and throughput) and QoE (PSNR, SSIM, VQM and MOS) parameters.  相似文献   
64.
Network regression with predictive clustering trees   总被引:1,自引:1,他引:0  
Network data describe entities represented by nodes, which may be connected with (related to) each other by edges. Many network datasets are characterized by a form of autocorrelation, where the value of a variable at a given node depends on the values of variables at the nodes it is connected with. This phenomenon is a direct violation of the assumption that data are independently and identically distributed. At the same time, it offers an unique opportunity to improve the performance of predictive models on network data, as inferences about one entity can be used to improve inferences about related entities. Regression inference in network data is a challenging task. While many approaches for network classification exist, there are very few approaches for network regression. In this paper, we propose a data mining algorithm, called NCLUS, that explicitly considers autocorrelation when building regression models from network data. The algorithm is based on the concept of predictive clustering trees (PCTs) that can be used for clustering, prediction and multi-target prediction, including multi-target regression and multi-target classification. We evaluate our approach on several real world problems of network regression, coming from the areas of social and spatial networks. Empirical results show that our algorithm performs better than PCTs learned by completely disregarding network information, as well as PCTs that are tailored for spatial data, but do not take autocorrelation into account, and a variety of other existing approaches.  相似文献   
65.
This work presents a study of RTP multiplexing schemes, which are compared with the normal use of RTP, in terms of experienced quality. Bandwidth saving, latency and packet loss for different options are studied, and some tests of Voice over IP (VoIP) traffic are carried out in order to compare the quality obtained using different implementations of the router buffer. Voice quality is calculated using ITU R-factor, which is a widely accepted quality estimator. The tests show the bandwidth savings of multiplexing, and also the importance of packet size for certain buffers, as latency and packet loss may be affected. The customer’s experience improvement is measured, showing that the use of multiplexing can be interesting in some scenarios, like an enterprise with different offices connected via the Internet. The system is also tested using different numbers of samples per packet, and the distribution of the flows into different tunnels is found to be an important factor in order to achieve an optimal perceived quality for each kind of buffer. Grouping all the flows into a single tunnel will not always be the best solution, as the increase of the number of flows does not improve bandwidth efficiency indefinitely. If the buffer penalizes big packets, it will be better to group the flows into a number of tunnels. The router processing capacity has to be taken into account too, as the limit of packets per second it can manage must not be exceeded. The obtained results show that multiplexing is a good way to improve customer’s experience of VoIP in scenarios where many RTP flows share the same path.  相似文献   
66.
In this paper, a new approximation to off-line signature verification is proposed based on two-class classifiers using an expert decisions ensemble. Different methods to extract sets of local and a global features from the target sample are detailed. Also a normalization by confidence voting method is used in order to decrease the final equal error rate (EER). Each set of features is processed by a single expert, and on the other approach proposed, the decisions of the individual classifiers are combined using weighted votes. Experimental results are given using a subcorpus of the large MCYT signature database for random and skilled forgeries. The results show that the weighted combination outperforms the individual classifiers significantly. The best EER obtained were 6.3 % in the case of skilled forgeries and 2.31 % in the case of random forgeries.  相似文献   
67.
Fuzzy rule-based classification systems (FRBCSs) are known due to their ability to treat with low quality data and obtain good results in these scenarios. However, their application in problems with missing data are uncommon while in real-life data, information is frequently incomplete in data mining, caused by the presence of missing values in attributes. Several schemes have been studied to overcome the drawbacks produced by missing values in data mining tasks; one of the most well known is based on preprocessing, formerly known as imputation. In this work, we focus on FRBCSs considering 14 different approaches to missing attribute values treatment that are presented and analyzed. The analysis involves three different methods, in which we distinguish between Mamdani and TSK models. From the obtained results, the convenience of using imputation methods for FRBCSs with missing values is stated. The analysis suggests that each type behaves differently while the use of determined missing values imputation methods could improve the accuracy obtained for these methods. Thus, the use of particular imputation methods conditioned to the type of FRBCSs is required.  相似文献   
68.
Adaptive anisotropic refinement of finite element meshes allows one to reduce the computational effort required to achieve a specified accuracy of the solution of a PDE problem. We present a new approach to adaptive refinement and demonstrate that this allows one to construct algorithms which generate very flexible and efficient anisotropically refined meshes, even improving the convergence order compared to adaptive isotropic refinement if the problem permits.  相似文献   
69.
Model-based testing is focused on testing techniques which rely on the use of models. The diversity of systems and software to be tested implies the need for research on a variety of models and methods for test automation. We briefly review this research area and introduce several papers selected from the 22nd International Conference on Testing Software and Systems (ICTSS).  相似文献   
70.
We discuss how the standard Cost-Benefit Analysis should be modified in order to take risk (and uncertainty) into account. We propose different approaches used in finance (Value at Risk, Conditional Value at Risk, Downside Risk Measures, and Efficiency Ratio) as useful tools to model the impact of risk in project evaluation. After introducing the concepts, we show how they could be used in CBA and provide some simple examples to illustrate how such concepts can be applied to evaluate the desirability of a new project infrastructure.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号