首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   32570篇
  免费   1491篇
  国内免费   119篇
电工技术   425篇
综合类   229篇
化学工业   5957篇
金属工艺   702篇
机械仪表   759篇
建筑科学   1145篇
矿业工程   102篇
能源动力   1080篇
轻工业   4521篇
水利工程   286篇
石油天然气   175篇
武器工业   6篇
无线电   2525篇
一般工业技术   4751篇
冶金工业   6395篇
原子能技术   256篇
自动化技术   4866篇
  2023年   186篇
  2022年   508篇
  2021年   959篇
  2020年   670篇
  2019年   757篇
  2018年   854篇
  2017年   913篇
  2016年   904篇
  2015年   718篇
  2014年   1066篇
  2013年   1821篇
  2012年   1579篇
  2011年   1964篇
  2010年   1449篇
  2009年   1465篇
  2008年   1336篇
  2007年   1171篇
  2006年   943篇
  2005年   961篇
  2004年   1001篇
  2003年   912篇
  2002年   869篇
  2001年   738篇
  2000年   583篇
  1999年   558篇
  1998年   2079篇
  1997年   1345篇
  1996年   950篇
  1995年   626篇
  1994年   489篇
  1993年   545篇
  1992年   227篇
  1991年   290篇
  1990年   234篇
  1989年   201篇
  1988年   211篇
  1987年   161篇
  1986年   167篇
  1985年   186篇
  1984年   131篇
  1983年   97篇
  1982年   120篇
  1981年   129篇
  1980年   119篇
  1979年   93篇
  1978年   76篇
  1977年   145篇
  1976年   229篇
  1975年   83篇
  1973年   56篇
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
841.
842.
International Journal of Control, Automation and Systems - This paper presents a Non-Uniform Predictor-Observer (NUPO) based control approach in order to deal with two of the main problems related...  相似文献   
843.
At present, many countries allow citizens or entities to interact with the government outside the telematic environment through a legal representative who is granted powers of representation. However, if the interaction takes place through the Internet, only primitive mechanisms of representation are available, and these are mainly based on non-dynamic offline processes that do not enable quick and easy identity delegation. This paper proposes a system of dynamic delegation of identity between two generic entities that can solve the problem of delegated access to the telematic services provided by public authorities. The solution herein is based on the generation of a delegation token created from a proxy certificate that allows the delegating entity to delegate identity to another on the basis of a subset of its attributes as delegator, while also establishing in the delegation token itself restrictions on the services accessible to the delegated entity and the validity period of delegation. Further, the paper presents the mechanisms needed to either revoke a delegation token or to check whether a delegation token has been revoked. Implications for theory and practice and suggestions for future research are discussed.  相似文献   
844.
Instance selection is becoming increasingly relevant due to the huge amount of data that is constantly being produced in many fields of research. Although current algorithms are useful for fairly large datasets, scaling problems are found when the number of instances is in the hundreds of thousands or millions. When we face huge problems, scalability becomes an issue, and most algorithms are not applicable.Thus, paradoxically, instance selection algorithms are for the most part impracticable for the same problems that would benefit most from their use. This paper presents a way of avoiding this difficulty using several rounds of instance selection on subsets of the original dataset. These rounds are combined using a voting scheme to allow good performance in terms of testing error and storage reduction, while the execution time of the process is significantly reduced. The method is particularly efficient when we use instance selection algorithms that are high in computational cost. The proposed approach shares the philosophy underlying the construction of ensembles of classifiers. In an ensemble, several weak learners are combined to form a strong classifier; in our method several weak (in the sense that they are applied to subsets of the data) instance selection algorithms are combined to produce a strong and fast instance selection method.An extensive comparison of 30 medium and large datasets from the UCI Machine Learning Repository using 3 different classifiers shows the usefulness of our method. Additionally, the method is applied to 5 huge datasets (from three hundred thousand to more than a million instances) with good results and fast execution time.  相似文献   
845.
846.
In recent years, the camera calibration using 1D patterns has been studied and improved by researchers all over the world. However, the progress in that area has been mainly in the sense of reducing the restrictions to the 1D pattern movement. On the other hand, the method's accuracy still demands improvements. In the present paper, the original technique proposed by Zhang is revisited and we demonstrate that the method's accuracy can be significantly improved, simply by analyzing and reformulating the problem. The numerical conditioning can be improved if a simple data normalization is performed. Furthermore, a non-linear solution based on the Partitioned Levenberg-Marquardt algorithm is proposed. That solution takes advantage of the problem's particular structure to reduce the computational complexity of the original method and to improve the accuracy. Tests using both synthetic and real images demonstrate that the calibration method using 1D patterns can be applied in practice, with accuracy comparable to other already traditional methods.  相似文献   
847.
This paper presents a novel approach to deal with dynamic and highly uncertain traffic in dynamic network scenarios. The Reactive Robust Routing (RRR) approach is introduced, a combination of proactive and reactive techniques to improve network efficiency and robustness, simplifying network operation. RRR optimizes routing for normal-operation traffic, using a time-varying extension of the already established Robust Routing technique that outperforms the stable approach. To deal with anomalous and unexpected traffic variations, RRR uses a fast anomaly detection and localization algorithm that rapidly detects and localizes abrupt changes in traffic flows, permitting an accurate routing adaptation. This algorithm presents well-established optimality properties in terms of detection/localization rates and localization delay, which allows for generalization of results, independently of particular evaluations. The algorithm is based on a novel parsimonious model for traffic demands which allows for detection of anomalies using easily available aggregated-traffic measurements, reducing the overheads of data collection.  相似文献   
848.
Recently, a multi-objective Sensitivity–Accuracy based methodology has been proposed for building classifiers for multi-class problems. This technique is especially suitable for imbalanced and multi-class datasets. Moreover, the high computational cost of multi-objective approaches is well known so more efficient alternatives must be explored. This paper presents an efficient alternative to the Pareto based solution when considering both Minimum Sensitivity and Accuracy in multi-class classifiers. Alternatives are implemented by extending the Evolutionary Extreme Learning Machine algorithm for training artificial neural networks. Experiments were performed to select the best option after considering alternative proposals and related methods. Based on the experiments, this methodology is competitive in Accuracy, Minimum Sensitivity and efficiency.  相似文献   
849.
Functional programs often combine separate parts using intermediate data structures for communicating results. Programs so defined are modular, easier to understand and maintain, but suffer from inefficiencies due to the generation of those gluing data structures. To eliminate such redundant data structures, some program transformation techniques have been proposed. One such technique is shortcut fusion, and has been studied in the context of both pure and monadic functional programs. In this paper, we study several shortcut fusion extensions, so that, alternatively, circular or higher-order programs are derived. These extensions are also provided for effect-free programs and monadic ones. Our work results in a set of generic calculation rules, that are widely applicable, and whose correctness is formally established.  相似文献   
850.
Enabling fast and detailed insights over large portions of source code is an important task in a global development ecosystem. Numerous data structures have been developed to store source code and to support various structural queries, to help in navigation, evaluation and analysis. Many of these data structures work with tree-based or graph-based representations of source code. The goal of this project is to elaborate a data storage that enables efficient storing and fast querying of structural information. The naive adjacency list method has been enhanced with the use of recent data compression approaches for column-oriented databases to allow no-loss albeit compact storage of fine-grained structural data. The graph indexing has enabled the proposed data model to expeditiously answer fine-grained structural queries. This paper describes the basics of the proposed approach and illustrates its technical feasibility.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号