首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   99452篇
  免费   8019篇
  国内免费   4272篇
电工技术   5611篇
技术理论   6篇
综合类   6249篇
化学工业   16548篇
金属工艺   6150篇
机械仪表   6952篇
建筑科学   8064篇
矿业工程   3402篇
能源动力   2905篇
轻工业   6272篇
水利工程   1658篇
石油天然气   7330篇
武器工业   805篇
无线电   10692篇
一般工业技术   11560篇
冶金工业   4915篇
原子能技术   1010篇
自动化技术   11614篇
  2024年   449篇
  2023年   1772篇
  2022年   3114篇
  2021年   4260篇
  2020年   3311篇
  2019年   2695篇
  2018年   2907篇
  2017年   3282篇
  2016年   3038篇
  2015年   4104篇
  2014年   4902篇
  2013年   5834篇
  2012年   6297篇
  2011年   6724篇
  2010年   5768篇
  2009年   5509篇
  2008年   5362篇
  2007年   5080篇
  2006年   5409篇
  2005年   4710篇
  2004年   2989篇
  2003年   2832篇
  2002年   2657篇
  2001年   2414篇
  2000年   2327篇
  1999年   2639篇
  1998年   2089篇
  1997年   1734篇
  1996年   1703篇
  1995年   1413篇
  1994年   1158篇
  1993年   738篇
  1992年   649篇
  1991年   439篇
  1990年   351篇
  1989年   303篇
  1988年   227篇
  1987年   150篇
  1986年   122篇
  1985年   70篇
  1984年   53篇
  1983年   44篇
  1982年   41篇
  1981年   28篇
  1980年   25篇
  1979年   16篇
  1978年   1篇
  1965年   1篇
  1959年   2篇
  1951年   1篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
191.
基于模糊数据挖掘和遗传算法的网络入侵检测技术   总被引:2,自引:0,他引:2  
文章通过开发一套新的网络入侵检测系统来证实应用模糊逻辑和遗传算法的数据挖掘技术的有效性;这个系统联合了基于模糊数据挖掘技术的异常检测和基于专家系统的滥用检测,在开发异常检测的部分时,利用模糊数据挖掘技术来从正常的行为存储模式中寻找差异,遗传算法用来调整模糊隶属函数和选择一个合适的特征集合,滥用检测部分用于寻找先前行为描述模式,这种模式很可能预示着入侵,网络的通信量和系统的审计数据被用做两个元件的输入;此系统的系统结构既支持异常检测又支持滥用检测、既适用于个人工作站又可以适用于复杂网络。  相似文献   
192.
介绍一种以ARM为核心的嵌入式服务机器人体感遥控器的设计。硬件上,本遥控器采用具有ARM Cortex—M3内核的STM32F103C8T6作为核心处理器,选用ST公司的iNEMO惯性导航模块进行手部姿态的识别,同时还具有LCD显示模块、无线收发模块和电源模块;软件上,采用嵌入式操作系统μC/OS—Ⅱ实现多任务的调度和外围设备的管理。经实验验证,本遥控器具有高稳定性、高实时性、高可靠性、低误码率等优点。  相似文献   
193.
随着信息化和网络技术的不断发展,以计算机为工具来盗取用户信息的犯罪日益增加。尤其是通过网络窃取上网计算机涉密信息,已经成为国内外不法分子窃取我国秘密信息的重要手段。本文对国内外计算机窃密与反窃密技术的各种手段进行研究与分析,并通过理论与实际的相结合,提出安全与实用并重的防范措施。  相似文献   
194.
Since Boolean network is a powerful tool in describing the genetic regulatory networks, accompanying the development of systems biology, the analysis and control of Boolean networks have attracted much attention from biologists, physicists, and systems scientists. From mathematical point of view, the dynamics of a Boolean (control) network is a discrete-time logical dynamic process. This paper surveys a recently developed technique, called the algebraic approach, based on semi-tensor product. The new technique can deal with not only Boolean networks, which allow each node to take two values, but also k-valued networks, which allow each node to take k different values, and mix-valued networks, which allow nodes to take different numbers of values.The paper provides a comprehensive introduction to the new technique, including (1) mathematical background of this new technique – semi-tensor product of matrices and the matrix expression of logic; (2) dynamic models of Boolean networks, and general (multi- or mix-valued) logical networks; (3) the topological structure of Boolean networks and general networks; (4) the basic control problems of Boolean/general control networks, which include the controllability, observability, realization, stability and stabilization, disturbance decoupling, identification and optimization, etc.; (5) some other related applications.  相似文献   
195.
Fuzzy local maximal marginal embedding for feature extraction   总被引:1,自引:0,他引:1  
In graph-based linear dimensionality reduction algorithms, it is crucial to construct a neighbor graph that can correctly reflect the relationship between samples. This paper presents an improved algorithm called fuzzy local maximal marginal embedding (FLMME) for linear dimensionality reduction. Significantly differing from the existing graph-based algorithms is that two novel fuzzy gradual graphs are constructed in FLMME, which help to pull the near neighbor samples in same class nearer and nearer and repel the far neighbor samples of margin between different classes farther and farther when they are projected to feature subspace. Through the fuzzy gradual graphs, FLMME algorithm has lower sensitivities to the sample variations caused by varying illumination, expression, viewing conditions and shapes. The proposed FLMME algorithm is evaluated through experiments by using the WINE database, the Yale and ORL face image databases and the USPS handwriting digital databases. The results show that the FLMME outperforms PCA, LDA, LPP and local maximal marginal embedding.  相似文献   
196.
Functional data learning is an extension of traditional data learning, that is, learning the data chosen from the Euclidean space ${\mathbb{R}^{n}}$ to a metric space. This paper focuses on the functional data learning with generalized single-hidden layer feedforward neural networks (GSLFNs) acting on some metric spaces. In addition, three learning algorithms, named Hilbert parallel overrelaxation backpropagation (H-PORBP) algorithm, ν-generalized support vector regression (ν-GSVR) and generalized extreme learning machine (G-ELM) are proposed to train the GSLFNs acting on some metric spaces. The experimental results on some metric spaces indicate that GELM with additive/RBF hidden-nodes has a faster learning speed, a better accuracy, and a better stability than HPORBP algorithm and ν-GSVR for training the functional data. The idea of GELM can be used to extend those improved extreme learning machines (ELMs) that act on the Euclidean space ${\mathbb{R}^{n}, }$ such as online sequential ELM, incremental ELM, pruning ELM and so on, to some metric spaces.  相似文献   
197.
The stability of a class of switched stochastic nonlinear retarded systems with asynchronous switching controller is investigated. By constructing a virtual switching signal and using the average dwell time approach incorporated with Razumikhin-type theorem, the sufficient criteria for pth moment exponential stability and global asymptotic stability in probability are given. It is shown that the stability of the asynchronous stochastic systems can be guaranteed provided that the average dwell time is sufficiently large and the mismatched time between the controller and the systems is sufficiently small. This result is then applied to a class of switched stochastic nonlinear delay systems where the controller is designed with both state and switching delays. A numerical example illustrates the effectiveness of the obtained results.  相似文献   
198.
A technique is proposed for measuring the group velocity of sound by a frequency-modulated (FM) continuous wave (CW) technique. Detailed calculations are presented, showing that V(g)=(deltaomega(m)/deltaphi)d , where V(g), deltaomega(m), deltaphi, and d are, respectively, the group velocity, change of modulation frequency, phase change of the received signal detected by a biphase lock-in amplifier, and the distance traveled by the sound. The approach has the advantage of high resolution compared to the conventional time-of-flight measurement technique.  相似文献   
199.
After analysing different plasma processes, we have designed and developed a 14kW d.c. plasma unit for generating ultrafine powders. Experiments to characterize the torch demonstrated that it is possible to operate the plasma unit over a wide range of conditions without losing its discharge stability. Temperature distribution profiles were determined radially as well as axially in the reaction chamber, and the efficiency of the torch was calculated for a fixed power input. Ultrafine powders of Ta, Mo and W were synthesized, and size and size distribution obtained. The particle size was found to be 0.03–0.1 m, with a perfect spherical shape. The analysis of the samples is discussed.  相似文献   
200.
Summary Byzantine Agreement is important both in the theory and practice of distributed computing. However, protocols to reach Byzantine Agreement are usually expensive both in the time required as well as in the number of messages exchanged. In this paper, we present a self-adjusting approach to the problem. The Mostly Byzantine Agreement is proposed as a more restrictive agreement problem that requires that in the consecutive attempts to reach agreement, the number of disagreements (i.e., failures to reach Byzantine Agreement) is finite. Fort faulty processes, we give an algorithm that has at mostt disagreements for 4t or more processes. Another algorithm is given forn3t+1 processes with the number of disagreements belowt 2/2. Both algorithms useO(n 3) message bits for binary value agreement. Yi Zhao is currently working on his Ph.D. degree in Computer Science at University of Houston. His research interests include fault tolerance, distributed computing, parallel computation and neural networks. He obtained his M.S. from University of Houston in 1988 and B.S. from Beijing University of Aeronautics and Astronautics in 1984, both in computer science. Farokh B. Bastani received the B. Tech. degree in electrical engineering from the Indian Institute of Technology, Bombay, India, and the M.S. and Ph.D. degrees in electrical engineering and computer science from the University of California, Berkeley. He joined the University of Houston in 1980, where he is currently an Associate Professor of Computer Science. His research interests include software design and validation techniques, distributed systems, and fault-tolerant systems. He is a member of the ACM and the IEEE and is on the editorial board of theIEEE Transactions on Software Engineering.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号