首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5270篇
  免费   262篇
  国内免费   8篇
电工技术   62篇
综合类   7篇
化学工业   1069篇
金属工艺   75篇
机械仪表   58篇
建筑科学   444篇
矿业工程   9篇
能源动力   237篇
轻工业   886篇
水利工程   40篇
石油天然气   9篇
无线电   253篇
一般工业技术   939篇
冶金工业   526篇
原子能技术   18篇
自动化技术   908篇
  2023年   46篇
  2022年   50篇
  2021年   83篇
  2020年   68篇
  2019年   110篇
  2018年   173篇
  2017年   172篇
  2016年   174篇
  2015年   170篇
  2014年   206篇
  2013年   354篇
  2012年   275篇
  2011年   388篇
  2010年   276篇
  2009年   229篇
  2008年   259篇
  2007年   273篇
  2006年   257篇
  2005年   161篇
  2004年   163篇
  2003年   153篇
  2002年   135篇
  2001年   105篇
  2000年   96篇
  1999年   88篇
  1998年   174篇
  1997年   120篇
  1996年   98篇
  1995年   72篇
  1994年   55篇
  1993年   57篇
  1992年   32篇
  1991年   32篇
  1990年   28篇
  1989年   27篇
  1988年   14篇
  1987年   19篇
  1986年   20篇
  1985年   27篇
  1984年   42篇
  1983年   25篇
  1982年   18篇
  1981年   27篇
  1980年   25篇
  1979年   20篇
  1977年   24篇
  1976年   32篇
  1975年   15篇
  1974年   16篇
  1973年   17篇
排序方式: 共有5540条查询结果,搜索用时 15 毫秒
71.
In this paper, we wish to advocate that departments of computer science put emphasis on teaching programming and software engineering based on formal methods; and more emphasis on research into formal methods for the trustworthy development of software. We also wish to advocate that the concepts of domain science and domain engineering become an indispensable part of the science of informatics and of software engineering.  相似文献   
72.
We study the problem of sparse-matrix dense-vector multiplication (SpMV) in external memory. The task of SpMV is to compute y:=Ax, where A is a sparse N×N matrix and x is a vector. We express sparsity by a parameter k, and for each choice of k consider the class of matrices where the number of nonzero entries is kN, i.e., where the average number of nonzero entries per column is k.  相似文献   
73.
This paper presents an incremental learning solution for Linear Discriminant Analysis (LDA) and its applications to object recognition problems. We apply the sufficient spanning set approximation in three steps i.e. update for the total scatter matrix, between-class scatter matrix and the projected data matrix, which leads an online solution which closely agrees with the batch solution in accuracy while significantly reducing the computational complexity. The algorithm yields an efficient solution to incremental LDA even when the number of classes as well as the set size is large. The incremental LDA method has been also shown useful for semi-supervised online learning. Label propagation is done by integrating the incremental LDA into an EM framework. The method has been demonstrated in the task of merging large datasets which were collected during MPEG standardization for face image retrieval, face authentication using the BANCA dataset, and object categorisation using the Caltech101 dataset.  相似文献   
74.
We introduce a class of tree bimorphisms that define exactly the translations performed by syntax-directed translation schemata. We also show that these “quasi-alphabetic” tree bimorphisms preserve recognizability, and that their class is closed under composition and inverses.  相似文献   
75.
76.
The advent of the World Wide Web has made an enormous amount of information available to everyone and the widespread use of digital equipment enables end-users (peers) to produce their own digital content. This vast amount of information requires scalable data management systems. Peer-to-peer (P2P) systems have so far been well established in several application areas, with file-sharing being the most prominent. The next challenge that needs to be addressed is (more complex) data sharing, management and query processing, thus facilitating the delivery of a wide spectrum of novel data-centric applications to the end-user, while providing high Quality-of-Service. In this paper, we propose a self-organizing P2P system that is capable to identify peers with similar content and intentionally assign them to the same super-peer. During content retrieval, fewer super-peers need to be contacted and therefore efficient similarity search is supported, in terms of reduced network traffic and contacted peers. Our approach increases the responsiveness and reliability of a P2P system and we demonstrate the advantages of our approach using large-scale simulations.  相似文献   
77.
The aims were to evaluate the inter-method reliability of a registration sheet for patient handling tasks, to study the day-to-day variation of musculoskeletal complaints (MSC) and to examine whether patient handling tasks and psychosocial factors were associated with MSC.Nurses (n = 148) fulfilled logbooks for three consecutive working days followed by a day off. Low back pain (LBP), neck/shoulder pain (NSP), knee pain (KP), psychosocial factors (time pressure, stress, conscience of the quality of work) and patient transfers and care tasks were reported.The logbook was reliable for both transfer and care tasks. The numbers of nurses reporting MSC and the level of pain increased significantly during the three working days (15%-30% and 17%-37%, respectively) and decreased on the day off. Stress and transfer task were associated with LPB and transfer tasks were associated with KP.Our results confirm a relationship between work factors and MSC and indicate that logs could be one way to obtain a better understanding of the complex interaction of various nursing working conditions in relation to MSC.  相似文献   
78.
In this paper we give tight quantum query complexity bounds of some important linear algebra problems. We prove Θ(n2) quantum query bounds for verify the determinant, rank, matrix inverse and the matrix power problem.  相似文献   
79.
Design and validation of structures against blast loads are important for modern society in order to protect and secure its citizen. Since it is a challenge to validate and optimise protective structures against blast loads using full-scale experimental tests, we have to turn our attention towards advanced numerical tools like the finite element method. Several different finite element techniques can be used to describe the response of structures due to blast loads. Some of these are: (1) a pure Lagrangian formulation, (2) an initial Eulerian simulation (to determine the load) followed by a Lagrangian simulation (for the structural response) and (3) a hybrid technique that combines the advantages of Eulerian and Lagrangian methods to have a full coupling between the blast waves and the deformation of the structure. Ideally, all blast simulations should be carried out using the fully coupled Eulerian–Lagrangian approach, but this may not be practical as the computational time increases considerably when going from a pure Lagrangian to a fully coupled Eulerian–Lagrangian simulation. A major goal in this study is to investigate if a pure Lagrangian formulation can be applied to determine the structural response in a specified blast load problem or if more advanced approaches such as the fully coupled Eulerian–Lagrangian approach is required for reliable results. This is done by conducting numerical simulations of an unprotected 20 ft ISO container exposed to a blast load of 4000 kg TNT at 120 m standoff distance using the three different approaches presented above. To validate and discuss the results, the simulated response of the container is compared to available data from a full-scale blast test under such conditions.  相似文献   
80.
Iterative Feedback Tuning constitutes an attractive control loop tuning method for processes in the absence of an accurate process model. It is a purely data driven approach aiming at optimizing the closed loop performance. The standard formulation ensures an unbiased estimate of the loop performance cost function gradient with respect to the control parameters. This gradient is important in a search algorithm. The extension presented in this paper further ensures informative data to improve the convergence properties of the method and hence reduce the total number of required plant experiments especially when tuning for disturbance rejection. Informative data is achieved through application of an external probing signal in the tuning algorithm. The probing signal is designed based on a constrained optimization which utilizes an approximate black box model of the process. This model estimate is further used to guarantee nominal stability and to improve the parameter update using a line search algorithm for determining the iteration step size. The proposed algorithm is compared to the classical formulation in a simulation study of a disturbance rejection problem. This type of problem is notoriously difficult for Iterative Feedback Tuning due to the lack of excitation from the reference.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号