首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2886篇
  免费   41篇
  国内免费   1篇
电工技术   22篇
综合类   2篇
化学工业   337篇
金属工艺   105篇
机械仪表   28篇
建筑科学   86篇
矿业工程   3篇
能源动力   27篇
轻工业   221篇
水利工程   6篇
无线电   194篇
一般工业技术   331篇
冶金工业   1247篇
原子能技术   15篇
自动化技术   304篇
  2021年   18篇
  2020年   17篇
  2019年   22篇
  2018年   21篇
  2017年   18篇
  2016年   18篇
  2015年   20篇
  2014年   40篇
  2013年   71篇
  2012年   64篇
  2011年   85篇
  2010年   57篇
  2009年   54篇
  2008年   76篇
  2007年   68篇
  2006年   89篇
  2005年   72篇
  2004年   54篇
  2003年   58篇
  2002年   66篇
  2001年   56篇
  2000年   36篇
  1999年   65篇
  1998年   309篇
  1997年   192篇
  1996年   143篇
  1995年   89篇
  1994年   81篇
  1993年   71篇
  1992年   43篇
  1991年   30篇
  1990年   48篇
  1989年   43篇
  1988年   33篇
  1987年   36篇
  1986年   28篇
  1985年   39篇
  1984年   28篇
  1983年   23篇
  1982年   30篇
  1981年   23篇
  1980年   26篇
  1979年   26篇
  1978年   26篇
  1977年   46篇
  1976年   89篇
  1975年   21篇
  1974年   18篇
  1973年   15篇
  1955年   10篇
排序方式: 共有2928条查询结果,搜索用时 431 毫秒
81.
This paper presents an analysis of the performance of the (μ/μ,λ)-ES with isotropically distributed mutations and cumulative step length adaptation on the noisy parabolic ridge. Several forms of dependency of the noise strength on the distance from the ridge axis are considered. Closed form expressions are derived that describe the mutation strength and the progress rate of the strategy in high-dimensional search spaces. It is seen that as for the sphere model, larger levels of noise present lead to cumulative step length adaptation generating increasingly inadequate mutation strengths, and that the problem can be ameliorated to some degree by working with larger populations.  相似文献   
82.
The frequent occurrence of implicitly thrown exceptions poses one of the challenges present in a Java compiler. Not only do these implicitly thrown exceptions directly affect the performance by requiring explicit checks, they also indirectly impact the performance by restricting code movement in order to satisfy the precise exception model in Java. In particular, instruction scheduling is one transformation that is restricted by implicitly thrown exceptions due to the heavy reliance on reordering instructions to exploit maximum hardware performance. The goal of this study is two-fold: first, investigate the degree to which implicitly thrown exceptions in Java hinder instruction scheduling, and second, find new techniques for allowing more efficient execution of Java programs containing implicitly thrown exceptions. Experimental results show that with aggressive scheduling techniques, such as superblock scheduling, the negative performance impact can be greatly reduced.  相似文献   
83.
Optimum tracking with evolution strategies   总被引:1,自引:0,他引:1  
Evolutionary algorithms are frequently applied to dynamic optimization problems in which the objective varies with time. It is desirable to gain an improved understanding of the influence of different genetic operators and of the parameters of a strategy on its tracking performance. An approach that has proven useful in the past is to mathematically analyze the strategy's behavior in simple, idealized environments. The present paper investigates the performance of a multiparent evolution strategy that employs cumulative step length adaptation for an optimization task in which the target moves linearly with uniform speed. Scaling laws that quite accurately describe the behavior of the strategy and that greatly contribute to its understanding are derived. It is shown that in contrast to previously obtained results for a randomly moving target, cumulative step length adaptation fails to achieve optimal step lengths if the target moves in a linear fashion. Implications for the choice of population size parameters are discussed.  相似文献   
84.
Symmetric tunneling junctions with 4000-Å-thick Pb electrodes and polycrystalline insulating barriers of Lu(OH)3, Er(OH)3, and Ho(OH)3 have been fabricated. In bulk, these three rare earth trihydroxides are nonmagnetic, antiferromagnetic (T N<1.1 K), and ferromagnetic (Tc=2.54 K), respectively. Tunneling resistances ranged from 600 to greater than 40,000 with a junction area of 6.25×10–2 cm2. Single-particle tunneling characteristics of these junctions were always broadened relative to the characteristics of Pb-PbO-Pb junctions, although the ratio of the zero-bias tunneling resistance to the normal tunneling resistance in some instances was of the order of 1000. A threefold splitting of the conductance peak at the gap was observed only in junctions with Ho(OH)3 barriers. The gap peak of junctions with Er(OH)3 barriers was broadened significantly relative to that of junctions with Lu(OH)3 barriers. From measurements of the temperature and magnetic field dependences of the tunneling conductance it is argued that the splitting in junctions with Ho(OH)3 barriers is consistent with the existence of a peak in the electronic density of states at an energy below that of the gap of each of the electrodes. This peak is believed to be the signature of a bound state near the barrier where the pair potential is depressed by virtue of the exchange coupling between the spins of the superconducting electrons and the localized spins of the barrier. Qualitative interpretations of the data support the view that the observed structure in Ho(OH)3 barrier junctions is neither a consequence of intrinsic gap anisotropy in Pb nor of inelastic magnon-assisted tunnelling.  相似文献   
85.
Summary This paper is devoted to developing and studying a precise notion of the encoding of a logical data structure in a physical storage structure, that is motivated by considerations of computational efficiency. The development builds upon the notion of an encoding of one graph in another. The cost of such an encoding is then defined so as to reflect the structural compatibility of the two graphs, the (externally specified) costs of implementing the host graph, and the (externally specified) set of intended usage patterns of the guest graph. The stability of the constructed framework is demonstrated in terms of a number of results; the faithfulness of the formalism is argued in terms of a number of examples from the literature; and the tractability of the model is hinted at by several results and by further references to the literature.  相似文献   
86.
Wireless sensor networks (WSNs) play an important role in forest fire risk monitoring. Various applications are in operation. However, the use of mobile sensors in forest risk monitoring remains largely unexplored. Our research contributes to fill this gap by designing a model which abstracts mobility constraints within different types of contexts for the inference of mobile sensor behaviour. This behaviour is focused on achieving a suitable spatial coverage of the WSN when monitoring forest fire risk. The proposed mobility constraint model makes use of a Bayesian network approach and consists of three components: (1) a context typology describing different contexts in which a WSN monitors a dynamic phenomenon; (2) a context graph encoding probabilistic dependencies among variables of interest; and (3) contextual rules encoding expert knowledge and application requirements needed for the inference of sensor behaviour. As an illustration, the model is used to simulate the behaviour of a mobile WSN to obtain a suitable spatial coverage in low and high fire risk scenarios. It is shown that the implemented Bayesian network within the mobility constraint model can successfully infer behaviour such as sleeping sensors, moving sensors, or deploying more sensors to enhance spatial coverage. Furthermore, the mobility constraint model contributes towards mobile sensing in which the mobile sensor behaviour is driven by constraints on the state of the phenomenon and the sensing system.  相似文献   
87.
The use of accelerators such as graphics processing units (GPUs) has become popular in scientific computing applications due to their low cost, impressive floating-point capabilities, high memory bandwidth, and low electrical power requirements. Hybrid high-performance computers, machines with nodes containing more than one type of floating-point processor (e.g. CPU and GPU), are now becoming more prevalent due to these advantages. In this paper, we present a continuation of previous work implementing algorithms for using accelerators into the LAMMPS molecular dynamics software for distributed memory parallel hybrid machines. In our previous work, we focused on acceleration for short-range models with an approach intended to harness the processing power of both the accelerator and (multi-core) CPUs. To augment the existing implementations, we present an efficient implementation of long-range electrostatic force calculation for molecular dynamics. Specifically, we present an implementation of the particle–particle particle-mesh method based on the work by Harvey and De Fabritiis. We present benchmark results on the Keeneland InfiniBand GPU cluster. We provide a performance comparison of the same kernels compiled with both CUDA and OpenCL. We discuss limitations to parallel efficiency and future directions for improving performance on hybrid or heterogeneous computers.  相似文献   
88.
89.
Individually housed DBA/2J mice were fed a liquid diet in which ethanol supplied 33% of the calories. The level of physical dependence that developed was estimated by scoring convulsions, elicited by handling the mice, after discontinuing the alcohol diet. The severity of the withdrawal reaction increased progressively with duration (5-12 days) of alcohol administration. A 2-day period on the diet produced no withdrawal reaction. Pretreatment of the mice with alcohol in their drinking water slightly increased the subsequent intake of the liquid diet. "Effective" alcohol intake was defined as uninterrupted alcohol consumption above 10 g/kg/day. Withdrawal scores correlated better with effective intake than with total intake under a variety of conditions. We interpret this to mean that brief interruptions in drinking (1 day) may allow the accrued physical dependence to disappear. On the basis of their effective alcohol intake, mice could be assigned to nondependent, moderately dependent or severely dependent groups for further study of the nature of physical dependence.  相似文献   
90.
Summary In this paper we analyze the (historical) co-evolution of technological development and economic progress (by relating public and private R&D investment, patenting, and corporate profitability). We relate to the work ofSchmookler(1966),Griliches(1990),Pakes&Griliches(1980) andPakes(1986) who all have studied the techno-economic interplay by considering patents as in indicator of technological performance. We use United States industry and government data over the period 1953-1998 (45 years). Co-evolution analysis over this period reveals a strong interdependency among the variables. Patent evolution is strongly related to the development of private R&D and corporate profitability; the levels of public and private R&D expenditure in combination with the level of technological output (i.e. patents) have a strong predictive and explanatory power towards corporate profitability (R2 value of 94.9%). Causality tests reveal a joint determination between R&D investment and corporate profitability (L=2; p<0.01).  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号