首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1796篇
  免费   119篇
  国内免费   17篇
电工技术   29篇
综合类   4篇
化学工业   420篇
金属工艺   38篇
机械仪表   33篇
建筑科学   45篇
矿业工程   2篇
能源动力   87篇
轻工业   118篇
水利工程   8篇
石油天然气   12篇
无线电   216篇
一般工业技术   413篇
冶金工业   116篇
原子能技术   3篇
自动化技术   388篇
  2024年   4篇
  2023年   29篇
  2022年   73篇
  2021年   84篇
  2020年   77篇
  2019年   83篇
  2018年   111篇
  2017年   98篇
  2016年   96篇
  2015年   64篇
  2014年   74篇
  2013年   143篇
  2012年   118篇
  2011年   135篇
  2010年   103篇
  2009年   85篇
  2008年   95篇
  2007年   64篇
  2006年   58篇
  2005年   50篇
  2004年   34篇
  2003年   32篇
  2002年   23篇
  2001年   22篇
  2000年   14篇
  1999年   6篇
  1998年   16篇
  1997年   16篇
  1996年   15篇
  1995年   13篇
  1994年   8篇
  1993年   11篇
  1992年   6篇
  1990年   5篇
  1989年   3篇
  1988年   5篇
  1987年   6篇
  1985年   6篇
  1984年   3篇
  1983年   8篇
  1978年   1篇
  1977年   2篇
  1976年   6篇
  1975年   6篇
  1974年   6篇
  1973年   4篇
  1972年   1篇
  1970年   2篇
  1963年   1篇
  1962年   1篇
排序方式: 共有1932条查询结果,搜索用时 15 毫秒
61.
Oumar  Amit   《Neurocomputing》2009,72(13-15):3131
Perceptrons, proposed in the seminal paper McCulloch–Pitts of 1943, have remained of interest to neural network community because of their simplicity and usefulness in classifying linearly separable data and can be viewed as implementing iterative procedures for “solving” linear inequalities. Gradient descent and conjugate gradient methods, normally used for linear equalities, can be used to solve linear inequalities by simple modifications that have been proposed in the literature but not been analyzed completely. This paper applies a recently proposed control-inspired approach to the design of iterative steepest descent and conjugate gradient algorithms for perceptron training in batch mode, by regarding certain parameters of the training/algorithm as controls and then using a control Liapunov technique to choose appropriate values of these parameters.  相似文献   
62.
This paper is concerned with the problem of non-fragile robust optimal guaranteed cost control for a class of uncertain two-dimensional (2-D) discrete state-delayed systems described by the general model with norm-bounded uncertainties. Our attention is focused on the design of non-fragile state feedback controllers such that the resulting closed-loop system is asymptotically stable and the closed-loop cost function value is not more than a specified upper bound for all admissible parameter uncertainties and controller gain variations. A sufficient condition for the existence of such controllers is established under the linear matrix inequality framework. Moreover, a convex optimisation problem is proposed to select a non-fragile robust optimal guaranteed cost controller stabilising the 2-D discrete state-delayed system as well as achieving the least guaranteed cost for the resulting closed-loop system. The proposed method is compared with the previously reported criterion. Finally, illustrative examples are given to show the potential of the proposed technique.  相似文献   
63.
The accurate and early detection of epileptic seizures in continuous electroencephalographic (EEG) data has a growing role in the management of patients with epilepsy. Early detection allows for therapy to be delivered at the start of seizures and for caregivers to be notified promptly about potentially debilitating events. The challenge to detecting epileptic seizures, however, is that seizure morphologies exhibit considerable inter-patient and intra-patient variability. While recent work has looked at addressing the issue of variations across different patients (inter-patient variability) and described patient-specific methodologies for seizure detection, there are no examples of systems that can simultaneously address the challenges of inter-patient and intra-patient variations in seizure morphology. In our study, we address this complete goal and describe a multi-task learning approach that trains a classifier to perform well across many kinds of seizures rather than potentially overfitting to the most common seizure types. Our approach increases the generalizability of seizure detection systems and improves the tradeoff between latency and sensitivity versus false positive rates. When compared against the standard approach on the CHB–MIT multi-channel scalp EEG data, our proposed method improved discrimination between seizure and non-seizure EEG for almost 83 % of the patients while reducing false positives on nearly 70 % of the patients studied.  相似文献   
64.
To protect the remote server from various malicious attacks, many authentication schemes have been proposed. Some schemes have to maintain a password verification table in the remote server for checking the legitimacy of the login users. To overcome potential risks of verification tables, researchers proposed remote user authentication schemes using smartcard, in which the remote server only keeps a secret key for computing the user’s passwords and does not need any verification table for verifying legal user. In 2003 Shen, Lin, and Hwang proposed a timestamp-based password authentication scheme using smartcards in which the remote server does not need to store the passwords or verification table for user authentication. Unfortunately, this scheme is vulnerable to some deadly attacks. In this paper, we analyze few attacks and finally propose an improved timestamp-based remote user authentication scheme. The modified scheme is more efficient and secure than original scheme.  相似文献   
65.
There has been an explosion in the types, availability and volume of data accessible in an information system, thanks to the World Wide Web (the Web) and related inter-networking technologies. In this environment, there is a critical need to replace or complement earlier database integration approaches and current browsing and keyword-based techniques with concept-based approaches. Ontologies are increasingly becoming accepted as an important part of any concept or semantics based solution, and there is increasing realization that any viable solution will need to support multiple ontologies that may be independently developed and managed. In particular, we consider the use of concepts from pre-existing real world domain ontologies for describing the content of the underlying data repositories. The most challenging issue in this approach is that of vocabulary sharing, which involves dealing with the use of different terms or concepts to describe similar information. In this paper, we describe the architecture, design and implementation of the OBSERVER system. Brokering across the domain ontologies is enabled by representing and utilizing interontology relationships such as (but not limited to) synonyms, hyponyms and hypernyms across terms in different ontologies. User queries are rewritten by using these relationships to obtain translations across ontologies. Well established metrics like precision and recall based on the extensions underlying the concepts are used to estimate the loss of information, if any.  相似文献   
66.
Fructose-2,6-bisphosphatase (FBPase-2) is a switch between gluconeogenesis and glycolysis in the hepatic cells. The structural features required for inhibitory activity of FBPase-2 were unidentified; no leads are available for inhibiting this important enzyme. In this paper pharmacophore mapping, molecular docking methods were employed in a virtual screening strategy to identify leads for FBPase-2. A receptor based pharmacophore map was modeled which comprised of important interactions as observed in co-crystal of rat liver isozyme with the product inhibitor fructose-6-phosphate. The pharmacophore model was validated against two databases of best docked structural analogues of fructose-2,6-bisphosphate and fructose-6-phosphate. The query generated was submitted for flexible search of ligands in chemical databases, namely LeadQuest, Maybridge and NCI. The hits obtained were further screened by molecular docking using FlexX.  相似文献   
67.
Previous high-temperature compression creep studies of NiAl have shown peculiar behaviour in the temperature range 700 to 900° C, which was perhaps due to precipitation of impurities in the matrix. To isolate the impurity effect, high-purity NiAl samples with 0.15 at% and 0.20 at% carbon (graphite) additions have been creep tested at four temperatures between 700 and 850° C. Addition of graphite has been shown to produce a significant reduction in the creep strength of the alloyS. However, alloys with higher graphite concentrations have shown better creep resistance than those with lower graphite concentrations. Transmission electron microscopy indicates the presence of competing softening and hardening mechanisms in the alloys. Softening is due to the graphite particles acting as a dislocation source. Hardening results from a grain-boundary hardening mechanism due to the graphite particles segregating at grain boundaries and a dislocation-impurity (fine graphite) interaction, developing a Cottrell-like atmosphere.  相似文献   
68.
Kumar et al. (Appl. Math. Model. 35:817?C823, 2011) pointed out that there is no method in literature to find the exact fuzzy optimal solution of fully fuzzy linear programming (FFLP) problems and proposed a new method to find the fuzzy optimal solution of FFLP problems with equality constraints having non-negative fuzzy variables and unrestricted fuzzy coefficients. There may exist several FFLP problems with equality constraints in which no restriction can be applied on all or some of the fuzzy variables but due to the limitation of the existing method these types of problems can not be solved by using the existing method. In this paper a new method is proposed to find the exact fuzzy optimal solution of FFLP problems with equality constraints having non-negative fuzzy coefficients and unrestricted fuzzy variables. The proposed method can also be used to solve the FFLP problems with equality constraints having non-negative fuzzy variables and unrestricted fuzzy coefficients. To show the advantage of the proposed method over existing method the results of some FFLP problems with equality constraints, obtained by using the existing and proposed method, are compared. Also, to show the application of proposed method a real life problem is solved by using the proposed method.  相似文献   
69.
一、印度钢铁工业发展历史和现状从远古时代开始,铁在人类的生活中就非常重要。无论是战争还是和平年代,钢铁对现代文明的发展是必不可少的。为了了解印度的钢铁工业,首先有必要简要地回顾一下印度的钢铁制造史。印度是一个古老的国度,文化遗产丰富。印度是一片不同地域间存在惊人差异的土地,而两百多年的殖民统治更造就了多样化的印度。除了几家糖厂和纺  相似文献   
70.
We report remote detections of physically buried specularly reflecting objects using microwave radar at two sites: Ashalim and Tseelim in the northern region of the Negev Desert, Israel. These detections provide confirmation that microwave subsurface remote sensing is a genuine phenomenon. At Ashalim, a scatterometer operating in the P-band (441 MHz, 68 cm) was mounted on a cherry picker truck at a height of 8 m and used to detect two triangular aluminum mesh reflectors (forming a 1-m square area reflector) buried down to a depth of 8 cm in dry sand. At Tseelim, the same scatterometer was mounted on an airplane flying at an altitude of 70 m and used to detect 1-m square aluminum reflectors (each one submerged at a different location along the airplane flight path) buried down to a depth of 20 cm. The experimental results compare favorably with a theoretical model that incorporates radar absorption effects arising in the sandy subsurface layer and radar interference effects arising from phase differences between reflections from the surface and buried reflector. The theoretical modeling also predicts the detection of a subsurface reflector down to a depth of about 4.4 m. This experiment and the associated modeling approach is the first of a series of planned experiments, which we outline for the detection and the theoretical evaluation of buried reflectors using remote microwave and VHF radar. We identify potential subject areas for environmental research.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号