首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2006篇
  免费   163篇
  国内免费   6篇
电工技术   24篇
综合类   2篇
化学工业   553篇
金属工艺   45篇
机械仪表   34篇
建筑科学   79篇
能源动力   73篇
轻工业   240篇
水利工程   6篇
石油天然气   2篇
无线电   211篇
一般工业技术   400篇
冶金工业   53篇
原子能技术   36篇
自动化技术   417篇
  2024年   1篇
  2023年   18篇
  2022年   39篇
  2021年   66篇
  2020年   51篇
  2019年   45篇
  2018年   62篇
  2017年   72篇
  2016年   67篇
  2015年   78篇
  2014年   103篇
  2013年   161篇
  2012年   137篇
  2011年   224篇
  2010年   147篇
  2009年   135篇
  2008年   126篇
  2007年   87篇
  2006年   90篇
  2005年   79篇
  2004年   60篇
  2003年   64篇
  2002年   45篇
  2001年   25篇
  2000年   20篇
  1999年   30篇
  1998年   17篇
  1997年   13篇
  1996年   23篇
  1995年   9篇
  1994年   17篇
  1993年   17篇
  1992年   10篇
  1991年   6篇
  1990年   5篇
  1989年   2篇
  1988年   2篇
  1987年   2篇
  1986年   4篇
  1984年   3篇
  1983年   3篇
  1982年   3篇
  1980年   1篇
  1979年   2篇
  1977年   1篇
  1976年   1篇
  1975年   1篇
  1974年   1篇
排序方式: 共有2175条查询结果,搜索用时 15 毫秒
141.
Given a large collection of transactions containing items, a basic common data mining problem is to extract the so-called frequent itemsets (i.e., sets of items appearing in at least a given number of transactions). In this paper, we propose a structure called free-sets, from which we can approximate any itemset support (i.e., the number of transactions containing the itemset) and we formalize this notion in the framework of -adequate representations (H. Mannila and H. Toivonen, 1996. In Proc. of the Second International Conference on Knowledge Discovery and Data Mining (KDD'96), pp. 189–194). We show that frequent free-sets can be efficiently extracted using pruning strategies developed for frequent itemset discovery, and that they can be used to approximate the support of any frequent itemset. Experiments on real dense data sets show a significant reduction of the size of the output when compared with standard frequent itemset extraction. Furthermore, the experiments show that the extraction of frequent free-sets is still possible when the extraction of frequent itemsets becomes intractable, and that the supports of the frequent free-sets can be used to approximate very closely the supports of the frequent itemsets. Finally, we consider the effect of this approximation on association rules (a popular kind of patterns that can be derived from frequent itemsets) and show that the corresponding errors remain very low in practice.  相似文献   
142.
The M 1 radiative transfer model is considered in the present work in order to simulate the radiative fields and their interactions with the matter. The model is governed by an hyperbolic system of conservation laws supplemented by relaxation source terms. Several difficulties arise when approximating the solutions of the model; namely the positiveness of the energy, the flux limitation and and the limit diffusion behavior have to be satisfied. An HLLC scheme is exhibited and it is shown to satisfy all the required properties. A particular attention is payed concerning the approximate extreme waves. These approximations are crucial to obtain an accurate scheme. The extension to the full 2D problem is proposed. It satisfies, once again, all the expected properties. Numerical experiments are proposed. They show that the considered scheme is actually less diffusive than the currently used numerical methods.   相似文献   
143.
This paper investigates the modeling of styrene free radical polymerization in two different types of microreactor. A multiphysics model which simultaneously takes into account the hydrodynamics, thermal and mass transfer (convection, diffusion and chemical reaction) is proposed. The set of partial differential equations resulting from the model is solved with the help of the finite elements method either in a 2D or a 3D approach. The different modeled microreactors are on one hand an interdigital multilamination microreactor with a large focusing section, and on the other hand a simple T-junction followed by a straight tube with three different radii. The results are expressed in terms of reactor temperature, polydispersity index, number-average degree of polymerization and monomer conversion for different values of the chemical species diffusion coefficient. It was found that the 2D approach gives the same results as the 3D approach but allows to dramatically reduce the computing time. Despite the heat released by the polymerization reaction, it was found that the thermal transfer in such microfluidic devices is high enough to ensure isothermal conditions. Concerning the polydispersity index, the range of diffusion coefficients over which the polydispersity index can be maintained close to the theoretical value for ideal conditions increases as the tube reactor radius decreases. The interdigital multilamination microreactor was found to act as a tubular reactor of 0.78 mm ID but with a shorter length. This underlines that the use of microfluidic devices can lead to a better control of polymerization reactions.  相似文献   
144.
145.
Trimmed bagging   总被引:1,自引:0,他引:1  
Bagging has been found to be successful in increasing the predictive performance of unstable classifiers. Bagging draws bootstrap samples from the training sample, applies the classifier to each bootstrap sample, and then averages over all obtained classification rules. The idea of trimmed bagging is to exclude the bootstrapped classification rules that yield the highest error rates, as estimated by the out-of-bag error rate, and to aggregate over the remaining ones. In this note we explore the potential benefits of trimmed bagging. On the basis of numerical experiments, we conclude that trimmed bagging performs comparably to standard bagging when applied to unstable classifiers as decision trees, but yields better results when applied to more stable base classifiers, like support vector machines.  相似文献   
146.
Polycrystalline Boron-doped ZnO films deposited by low pressure chemical vapor deposition technique are developed for their use as transparent contacts for thin-film silicon solar cells. The size of the columnar grains that constitute the ZnO films is related to their light scattering capability, which has a direct influence on the current generation in thin-film silicon solar cells. Furthermore, if the doping level of the ZnO films is kept below 1 × 1020 cm− 3, the electron mobility can be drastically enhanced by growing large grains, and the free carrier absorption is reduced. All these considerations have been taken in account to develop ZnO films finely optimized for the fabrication of microcrystalline thin-film silicon solar cells. These TCO allow the achievement of solar cell conversion efficiencies close to 10%.  相似文献   
147.
This paper presents a new circuit architecture for turbo decoding, which achieves ultra high data rates when using product codes as error correcting codes. This architecture is able to decode product codes using binary BCH or m-ary Reed Solomon component codes. The major advantage of our full-parallel architecture is that it enables the memory block between each half-iteration to be removed. In fact, the proposed architecture opens the way to numerous applications such as optical transmission. In particular, our block turbo decoding architecture can support optical transmission at data rates above Gbit/s  相似文献   
148.
Advances in wireless sensing and actuation technology allow embedding significant amounts of application logic inside wireless sensor networks. Such active WSN applications are more autonomous, but are significantly more complex to implement. Event-based middleware lends itself to implementing these applications. It offers developers fine-grained control over how an individual node interacts with the other nodes of the network. However, this control comes at the cost of event handlers which lack composability and violate software engineering principles such as separation of concerns. In this paper, we present CrimeSPOT as a domain-specific language for programming WSN applications on top of event-driven middleware. Its node-centric features enable programming a node’s interactions through declarative rules rather than event handlers. Its network-centric features support reusing code within and among WSN applications. Unique to CrimeSPOT is its support for associating application-specific semantics with events that carry sensor readings. These preclude transposing existing approaches that address the shortcomings of event-based middleware to the domain of wireless sensor networks. We provide a comprehensive overview of the language and the implementation of its accompanying runtime. The latter comprises several extensions to the Rete forward chaining algorithm. We evaluate the expressiveness of the language and the overhead of its runtime using small, but representative active WSN applications.  相似文献   
149.
Given a graph G=(V,E) and a positive integer k, an edge modification problem for a graph property Π consists in deciding whether there exists a set F of pairs of V of size at most k such that the graph $H=(V,E\vartriangle F)$ satisfies the property Π. In the Π edge-completion problem, the set F is constrained to be disjoint from E; in the Π edge-deletion problem, F is a subset of E; no constraint is imposed on F in the Π edge-editing problem. A number of optimization problems can be expressed in terms of graph modification problems which have been extensively studied in the context of parameterized complexity (Cai in Inf. Process. Lett. 58:171–176, 1996; Fellows et al. in FCT, pp. 312–321, 2007; Heggernes et al. in STOC, pp. 374–381, 2007). When parameterized by the size k of the set F, it has been proved that if Π is a hereditary property characterized by a finite set of forbidden induced subgraphs, then the three Π edge-modification problems are FPT (Cai in Inf. Process. Lett. 58:171–176, 1996). It was then natural to ask (Bodlaender et al. in IWPEC, 2006) whether these problems also admit a polynomial kernel. in polynomial time to an equivalent instance (G′,k′) with size bounded by a polynomial in k). Using recent lower bound techniques, Kratsch and Wahlström answered this question negatively (Kratsch and Wahlström in IWPEC, pp. 264–275, 2009). However, the problem remains open on many natural graph classes characterized by forbidden induced subgraphs. question to characterize for which type of graph properties, the parameterized edge-modification problems have polynomial kernels. Kratsch and Wahlström asked whether the result holds when the forbidden subgraphs are paths or cycles and pointed out that the problem is already open in the case of P 4-free graphs (i.e. cographs). This paper provides positive and negative results in that line of research. We prove that Parameterized cograph edge-modification problems have cubic vertex kernels whereas polynomial kernels are unlikely to exist for the P l -free edge-deletion and the C l -free edge-deletion problems for l?7 and l≥4 respectively. Indeed, if they exist, then NP?coNP/poly.  相似文献   
150.
This paper deals with the optimization of a cross-docking system. It is modeled as a three-stage hybrid flowshop, in which shipments and orders are represented as batches. The first stage corresponds to the receiving docks, the second stage corresponds to the sorting stations, and the third stage corresponds to the shipping docks. The objective of the problem is to find a schedule that minimizes the completion time of the latest batch. In order to obtain good quality feasible solutions, we have developed several heuristic schemes depending on the main stage considered, and several rules to order the batches in this stage. Then, we propose a branch-and-bound algorithm that takes into account the decomposition of the problem into three stages. To evaluate the heuristics and to reduce the tree size during the branch-and-bound computation, we also propose lower bounds. Finally, the computational experiments are presented to demonstrate the efficiency of our heuristics. The results show that the exact approach can solve instances containing up to 9–10 batches in each stage (i.e., up to 100 jobs). In addition, our heuristics were evaluated over instances with up to 3000 jobs, and they can provide good quality feasible solutions in a few seconds (i.e., less than 2 s per heuristic).  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号