首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   283155篇
  免费   22576篇
  国内免费   12167篇
电工技术   16077篇
技术理论   25篇
综合类   19756篇
化学工业   47321篇
金属工艺   15976篇
机械仪表   17571篇
建筑科学   21836篇
矿业工程   8894篇
能源动力   7638篇
轻工业   20625篇
水利工程   4803篇
石油天然气   18485篇
武器工业   2201篇
无线电   30929篇
一般工业技术   32455篇
冶金工业   14775篇
原子能技术   2774篇
自动化技术   35757篇
  2024年   1266篇
  2023年   4635篇
  2022年   8275篇
  2021年   11326篇
  2020年   8844篇
  2019年   7401篇
  2018年   8150篇
  2017年   9174篇
  2016年   8303篇
  2015年   11063篇
  2014年   14273篇
  2013年   16697篇
  2012年   18157篇
  2011年   19847篇
  2010年   17545篇
  2009年   16610篇
  2008年   16358篇
  2007年   15555篇
  2006年   15786篇
  2005年   13519篇
  2004年   9242篇
  2003年   7818篇
  2002年   7101篇
  2001年   6272篇
  2000年   6475篇
  1999年   7149篇
  1998年   5892篇
  1997年   4780篇
  1996年   4517篇
  1995年   3765篇
  1994年   2995篇
  1993年   2097篇
  1992年   1634篇
  1991年   1306篇
  1990年   992篇
  1989年   797篇
  1988年   591篇
  1987年   366篇
  1986年   300篇
  1985年   213篇
  1984年   150篇
  1983年   123篇
  1982年   131篇
  1981年   100篇
  1980年   87篇
  1979年   45篇
  1978年   27篇
  1977年   20篇
  1976年   39篇
  1973年   13篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
Non-volatile memories are good candidates for DRAM replacement as main memory in embedded systems and they have many desirable characteristics. Nevertheless, the disadvantages of non-volatile memory co-exist with its advantages. First, the lifetime of some of the non-volatile memories is limited by the number of erase operations. Second, read and write operations have asymmetric speed or power consumption in non-volatile memory. This paper focuses on the embedded systems using non-volatile memory as main memory. We propose register allocation technique with re-computation to reduce the number of store instructions. When non-volatile memory is applied as the main memory, reducing store instructions will reduce write activities on non-volatile memory. To re-compute the spills effectively during register allocation, a novel potential spill selection strategy is proposed. During this process, live range splitting is utilized to split certain long live ranges such that they are more likely to be assigned into registers. In addition, techniques for re-computation overhead reduction is proposed on systems with multiple functional units. With the proposed approach, the lifetime of non-volatile memory is extended accordingly. The experimental results demonstrate that the proposed technique can efficiently reduce the number of store instructions on systems with non-volatile memory by 33% on average.  相似文献   
992.
The effective strategy of Internet of Things (IoT) can help firms to grasp the emerging opportunities from the IoT and then improve their competitive advantage. In this article, based on organizational capability perspective, we provide a theoretical framework which classifies IoT strategies into four archetypes from two dimensions of managers’ strategic intent and industrial driving force, and propose that market-based exploratory capabilities play a more important role for firms adopting get-ahead strategy, and market-based exploitative capabilities play a more important role for firms adopting catch-up strategy in market. The technology-based exploratory capabilities play a more important role for firms adopting get-ahead strategy in technology, and technology-based exploitative capabilities play a more important role for firms adopting catch-up strategy in technology. Especially, external industry information sharing more efficiently contributes to the enhancement of both market-based and technology-based exploratory capabilities, and internal industry information sharing more efficiently contributes to the enhancement of both market-based and technology-based exploitative capabilities.  相似文献   
993.
Given a directed graph, the problem of blackhole mining is to identify groups of nodes, called blackhole patterns, in a way such that the average in-weight of this group is significantly larger than the average out-weight of the same group. The problem of finding volcano patterns is a dual problem of mining blackhole patterns. Therefore, we focus on discovering the blackhole patterns. Indeed, in this article, we develop a generalized blackhole mining framework. Specifically, we first design two pruning schemes for reducing the computational cost by reducing both the number of candidate patterns and the average computation cost for each candidate pattern. The first pruning scheme is to exploit the concept of combination dominance to reduce the exponential growth search space. Based on this pruning approach, we develop the gBlackhole algorithm. Instead, the second pruning scheme is an approximate approach, named approxBlackhole, which can strike a balance between the efficiency and the completeness of blackhole mining. Finally, experimental results on real-world data show that the performance of approxBlackhole can be several orders of magnitude faster than gBlackhole, and both of them have huge computational advantages over the brute-force approach. Also, we show that the blackhole mining algorithm can be used to capture some suspicious financial fraud patterns.  相似文献   
994.
Cookies are the primary means for web applications to authenticate HTTP requests and to maintain client states. Many web applications (such as those for electronic commerce) demand a secure cookie scheme. Such a scheme needs to provide the following four services: authentication, confidentiality, integrity, and anti-replay. Several secure cookie schemes have been proposed in previous literature; however, none of them are completely satisfactory. In this paper, we propose a secure cookie scheme that is effective, efficient, and easy to deploy. In terms of effectiveness, our scheme provides all of the above four security services. In terms of efficiency, our scheme does not involve any database lookup or public key cryptography. In terms of deployability, our scheme can be easily deployed on existing web services, and it does not require any change to the Internet cookie specification. We implemented our secure cookie scheme using PHP and conducted experiments. The experimental results show that our scheme is very efficient on both the client side and the server side.A notable adoption of our scheme in industry is that our cookie scheme has been used by Wordpress since version 2.4. Wordpress is a widely used open source content management system.  相似文献   
995.
Fuzzy local maximal marginal embedding for feature extraction   总被引:1,自引:0,他引:1  
In graph-based linear dimensionality reduction algorithms, it is crucial to construct a neighbor graph that can correctly reflect the relationship between samples. This paper presents an improved algorithm called fuzzy local maximal marginal embedding (FLMME) for linear dimensionality reduction. Significantly differing from the existing graph-based algorithms is that two novel fuzzy gradual graphs are constructed in FLMME, which help to pull the near neighbor samples in same class nearer and nearer and repel the far neighbor samples of margin between different classes farther and farther when they are projected to feature subspace. Through the fuzzy gradual graphs, FLMME algorithm has lower sensitivities to the sample variations caused by varying illumination, expression, viewing conditions and shapes. The proposed FLMME algorithm is evaluated through experiments by using the WINE database, the Yale and ORL face image databases and the USPS handwriting digital databases. The results show that the FLMME outperforms PCA, LDA, LPP and local maximal marginal embedding.  相似文献   
996.
A set of elementary siphons plays a key role in the development of deadlock prevention policies for automated manufacturing systems. This paper addresses the computation problem for elementary siphons in a subclass of Petri nets which are basic systems of simple sequential processes with resources (BS3PR) and can model many automated manufacturing systems. An algorithm for enumerating elementary siphons is established by the one‐to‐one relationship between maximal perfect resource‐transition circuits (MPCs) and strict minimal siphons. A set of MPCs is first computed, followed by a set of elementary siphons in a BS3PR. The presented algorithm is proved to have polynomial‐time complexity. An example is used to illustrate the algorithm.  相似文献   
997.
This paper is concerned with the neutral‐delay‐dependent and discrete‐delay‐dependent stability for uncertain neutral systems with mixed delays and norm‐bounded uncertainties. Through constructing a new augmented Lyapunov‐Krasovskii functional and proving its positive definiteness, introducing some slack matrices and using integral inequality, the improved delay‐dependent stability criteria are derived in terms of linear matrix inequalities. Numerical examples are given to illustrate the significant improvement on the conservatism of the delay bound over some existing results. Copyright © 2010 John Wiley and Sons Asia Pte Ltd and Chinese Automatic Control Society  相似文献   
998.
In this paper, a feedback model predictive control method is presented to tackle control problems with constrained multivariables for uncertain discrete‐time nonlinear Markovian jump systems. An uncertain Markovian jump fuzzy system (MJFS) is obtained by employing the Takagi‐Sugeno (T‐S) fuzzy model to represent a discrete‐time nonlinear system with norm bounded uncertainties and Markovain jump parameters. To achieve more generality, the transition probabilities of the Markov chain are assumed to be partly unknown and partly accessible. The predictive formulation adopts an on‐line optimization paradigm that utilizes the closed‐loop state feedback controller and is solved using the standard semi‐definite programming (SDP). To reduce the on‐line computational burden, a mode independent control move is calculated at every sampling time based on a stochastic fuzzy Lyapunov function (FLF) and a parallel distributed compensation (PDC) scheme. The robust mean square stability, performance minimization and constraint satisfaction properties are guaranteed under the control move for all admissible uncertainties. A numerical example is given to show the efficiency of the developed approach. Copyright © 2011 John Wiley and Sons Asia Pte Ltd and Chinese Automatic Control Society  相似文献   
999.
Next-generation scientific applications feature complex workflows comprised of many computing modules with intricate inter-module dependencies. Supporting such scientific workflows in wide-area networks especially Grids and optimizing their performance are crucial to the success of collaborative scientific discovery. We develop a Scientific Workflow Automation and Management Platform (SWAMP), which enables scientists to conveniently assemble, execute, monitor, control, and steer computing workflows in distributed environments via a unified web-based user interface. The SWAMP architecture is built entirely on a seamless composition of web services: the functionalities of its own are provided and its interactions with other tools or systems are enabled through web services for easy access over standard Internet protocols while being independent of different platforms and programming languages. SWAMP also incorporates a class of efficient workflow mapping schemes to achieve optimal end-to-end performance based on rigorous performance modeling and algorithm design. The performance superiority of SWAMP over existing workflow mapping schemes is justified by extensive simulations, and the system efficacy is illustrated by large-scale experiments on real-life scientific workflows for climate modeling through effective system implementation, deployment, and testing on the Open Science Grid.  相似文献   
1000.
Considering sliding mode control (SMC) method using the estimation of upper bound on disturbances in motor servo system, if the upper bound is underestimated, the position tracking precision is poor. Contrarily, the control input is overlarge and even chatters violently. To solve the above problems, an adaptive sliding mode controller (ASMC) is proposed. It utilizes a fuzzy decision maker (FDM), which exports the estimation of upper bound on disturbances according to the information of position tracking error and control input. The computer simulations on a dc motor present that the proposed method guarantees satisfactory position tracking accuracy and the chattering at control input is evidently suppressed. Moreover, the output of FDM is sensitive to the changes of disturbances realtimely and precisely. Subsequently, the proposed scheme possesses strong robust performance against disturbances in motor servo system.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号