首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1574篇
  免费   97篇
电工技术   5篇
化学工业   639篇
金属工艺   13篇
机械仪表   38篇
建筑科学   51篇
能源动力   49篇
轻工业   287篇
水利工程   13篇
石油天然气   3篇
无线电   48篇
一般工业技术   193篇
冶金工业   85篇
原子能技术   7篇
自动化技术   240篇
  2024年   2篇
  2023年   15篇
  2022年   55篇
  2021年   188篇
  2020年   57篇
  2019年   50篇
  2018年   39篇
  2017年   42篇
  2016年   69篇
  2015年   64篇
  2014年   58篇
  2013年   126篇
  2012年   92篇
  2011年   123篇
  2010年   78篇
  2009年   78篇
  2008年   102篇
  2007年   63篇
  2006年   32篇
  2005年   46篇
  2004年   35篇
  2003年   37篇
  2002年   30篇
  2001年   16篇
  2000年   16篇
  1999年   20篇
  1998年   26篇
  1997年   17篇
  1996年   13篇
  1995年   13篇
  1994年   10篇
  1993年   9篇
  1992年   9篇
  1991年   5篇
  1990年   3篇
  1989年   2篇
  1988年   4篇
  1987年   2篇
  1986年   3篇
  1985年   4篇
  1984年   3篇
  1983年   1篇
  1982年   2篇
  1981年   4篇
  1980年   2篇
  1978年   1篇
  1977年   3篇
  1976年   1篇
  1973年   1篇
排序方式: 共有1671条查询结果,搜索用时 15 毫秒
41.
SNPs are positions of the DNA sequences where the differences among individuals are embedded. The knowledge of such SNPs is crucial for disease association studies, but even if the number of such positions is low (about 1% of the entire sequence), the cost to extract the complete information is actually very high. Recent studies have shown that DNA sequences are structured into blocks of positions, that are conserved during evolution, where there is strong correlation among values (alleles) of different loci. To reduce the cost of extracting SNPs information, the block structure of the DNA has suggested to limit the process to a subset of SNPs, the so-called Tag SNPs, that are able to maintain the most of the information contained in the whole sequence. In this paper, we apply a technique for feature selection based on integer programming to the problem of Tag SNP selection. Moreover, to test the quality of our approach, we consider also the problem of SNPs reconstruction, i.e. the problem of deriving unknown SNPs from the value of Tag SNPs and propose two reconstruction methods, one based on a majority vote and the other on a machine learning approach. We test our algorithm on two public data sets of different nature, providing results that are, when comparable, in line with the related literature. One of the interesting aspects of the proposed method is to be found in its capability to deal simultaneously with very large SNPs sets, and, in addition, to provide highly informative reconstruction rules in the form of logic formulas.  相似文献   
42.
This paper focuses on the control system for an autonomous robot for the surveillance of indoor environments. Our approach proposes a matrix-based formalism which allows us to merge in a single framework discrete-event supervisory control, conflict resolution and reactive control. As a consequence, the robot is able to autonomously handle high level tasks as well as low-level behaviors, solving control and decision-making issues simultaneously. Moreover, the matrix-based controller is modular and can be easily reconfigured if mission characteristics or robot hardware configuration change. An illustrative example and a report on experimental investigations are provided to illustrate the main features of the proposed approach.  相似文献   
43.
44.
This paper presents an efficient solution for modeling checking graph transformation systems. The approach transforms AGG specifications into Bogor models and supports both attributed typed graphs and layered transformations. Resulting models are amenable to check interesting properties expressed as combinations of LTL (Linear Temporal Logic) and graph transformation rules. The first experimental results are encouraging and show that in most cases our proposal improves existing approaches, both in terms of performance and expressiveness.  相似文献   
45.
46.
Cancer chemoprevention approaches use either pharmacological or dietary agents to impede, arrest or reverse the carcinogenic process. Although several agents have shown effectiveness against colon cancer, present intervention strategies provide only partial reduction. In this study, we utilized high-resolution endoscopy to obtain colon tumor biopsy specimens from Apc mutant mice before and after 2-wk sulindac intervention. To acquire information beyond genomics, proteome analysis using the ProteomeLab PF2D platform was implemented to generate 2-D protein expression maps from biopsies. Chromatograms produced common signature profiles between sulindac and nonsulindac treated samples, and contrasting profiles termed "fingerprints". We selected a double peak that appeared in tumor biopsies from sulindac-treated mice. Further analyses using MS sequencing identified this protein as histone H2B. The location of H2B in the 1(st) dimension strongly suggested PTM, consistent with identification of two oxidized methionines. While further studies on sulindac proteomic fingerprints are underway, this study demonstrates the feasibility and advantages of "real-time" proteomic analysis for obtaining information on biomarker discovery and drug activity that would not be revealed by a genetic assay. This approach should be broadly applicable for assessing lesion responsiveness in a wide range of translational and human clinical studies.  相似文献   
47.
Next-generation network infrastructure should support different services and several levels of quality of service (QoS) and resilience. The main requirements for such multiservice networks are flexibility, effective utilization of network resources, and ability to react to traffic demand changes with time. These requisites lead to the fact that next-generation networks should, to some extend, be "self-adapting," to cope with the need of promptly reacting to traffic demand changes, in an effective way, while taking into account the different requirements in terms of QoS. This paper sketches the reference network scenario and discusses the subject of self-adapting networks, attempting to focus on the key issues that need to be solved to realize future infrastructures. As a relevant example, this paper briefly reports a system developed by the authors' laboratory that implements a traffic engineering solution able to fulfill the mentioned requirements. This system could be regarded as a first concrete step toward the realization of self-adapting networks. In addition, some relevant results that were obtained either by simulation or by experiments on a real test bed are reported to discuss the main characteristics of such a system and assess the feasibility of the concept. Finally, the paper reviews the main hot issues that need to be addressed, in the authors' opinion, by the international research community.  相似文献   
48.
Mystery shopping is a well known marketing technique used by companies and marketing analysts to measure quality of service, and gather information about products and services. In this article, we analyse data from mystery shopping surveys via Bayesian Networks in order to examine and evaluate the quality of service offered by the loan departments of Greek Banks. We use mystery shopping visits to collect information about loan products and services and, by this way, evaluate the customer satisfaction and plan improvement strategies that will assist banks to reach their internal standards. Bayesian Networks not only provide a pictorial representation of the dependence structure between the characteristics of interest but also allow to evaluate, interpret and understand the effects of possible improvement strategies.  相似文献   
49.
This paper presents ALIAS, an agent architecture based on intelligent logic agents, where the main form of agent reasoning is abduction. The system is particularly suited for solving problems where knowledge is incomplete, where agents may need to make reasonable hypotheses about the problem domain and other agents, and where the raised hypotheses have to be consistent for the overall set of agents. ALIAS agents are pro-active, exhibiting a goal-directed behavior, and autonomous, since each one can solve problems using its own private knowledge base. ALIAS agents are also social, because they are able to interact with other agents, in order to cooperatively solve problems. The coordination mechanisms are modeled by means of LAILA, a logic-based language which allows to express intra-agent reasoning and inter-agent coordination. As an application, we show how LAILA can be used to implement inter-agent dialogues, e.g., for negotiation. In particular, LAILA is well-suited to coordinate the process of negotiation aimed at exchanging resources between agents, thus allowing them to execute the plans to achieve their goals.  相似文献   
50.
In this paper we propose a logic-based social approach to the specification and verification of agent interaction. We firstly introduce integrity constraints about social acts (called Social Integrity Constraints) as a formalism to express interaction protocols and to give a social semantics to the behavior of agents, focusing on communicative acts. Then, we discuss several possible kinds of verification of agent interaction, and we show how social integrity constraints can be used to verify some properties in this respect. We focus our attention on static verification of compliance of agent specifications to interaction protocols, and on run-time verification, based on agents' observable behavior. We adopt as a running example the NetBill security transaction protocol for the selling and delivery of information goods.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号