全文获取类型
收费全文 | 1524篇 |
免费 | 63篇 |
专业分类
电工技术 | 18篇 |
综合类 | 1篇 |
化学工业 | 407篇 |
金属工艺 | 19篇 |
机械仪表 | 32篇 |
建筑科学 | 46篇 |
矿业工程 | 3篇 |
能源动力 | 53篇 |
轻工业 | 125篇 |
水利工程 | 12篇 |
石油天然气 | 2篇 |
无线电 | 143篇 |
一般工业技术 | 268篇 |
冶金工业 | 188篇 |
原子能技术 | 18篇 |
自动化技术 | 252篇 |
出版年
2024年 | 12篇 |
2023年 | 40篇 |
2022年 | 59篇 |
2021年 | 70篇 |
2020年 | 53篇 |
2019年 | 51篇 |
2018年 | 60篇 |
2017年 | 50篇 |
2016年 | 55篇 |
2015年 | 45篇 |
2014年 | 76篇 |
2013年 | 100篇 |
2012年 | 108篇 |
2011年 | 90篇 |
2010年 | 81篇 |
2009年 | 72篇 |
2008年 | 57篇 |
2007年 | 52篇 |
2006年 | 41篇 |
2005年 | 41篇 |
2004年 | 27篇 |
2003年 | 20篇 |
2002年 | 20篇 |
2001年 | 16篇 |
2000年 | 9篇 |
1999年 | 19篇 |
1998年 | 49篇 |
1997年 | 47篇 |
1996年 | 31篇 |
1995年 | 20篇 |
1994年 | 18篇 |
1993年 | 12篇 |
1992年 | 10篇 |
1991年 | 9篇 |
1990年 | 8篇 |
1989年 | 7篇 |
1988年 | 4篇 |
1987年 | 3篇 |
1986年 | 3篇 |
1985年 | 6篇 |
1984年 | 4篇 |
1983年 | 3篇 |
1982年 | 4篇 |
1981年 | 6篇 |
1980年 | 4篇 |
1979年 | 2篇 |
1976年 | 4篇 |
1974年 | 2篇 |
1955年 | 2篇 |
1954年 | 1篇 |
排序方式: 共有1587条查询结果,搜索用时 0 毫秒
141.
142.
143.
We analyze generalization in XCSF and introduce three improvements. We begin by showing that the types of generalizations evolved by XCSF can be influenced by the input range. To explain these results we present a theoretical analysis of the convergence of classifier weights in XCSF which highlights a broader issue. In XCSF, because of the mathematical properties of the Widrow-Hoff update, the convergence of classifier weights in a given subspace can be slow when the spread of the eigenvalues of the autocorrelation matrix associated with each classifier is large. As a major consequence, the system's accuracy pressure may act before classifier weights are adequately updated, so that XCSF may evolve piecewise constant approximations, instead of the intended, and more efficient, piecewise linear ones. We propose three different ways to update classifier weights in XCSF so as to increase the generalization capabilities of XCSF: one based on a condition-based normalization of the inputs, one based on linear least squares, and one based on the recursive version of linear least squares. Through a series of experiments we show that while all three approaches significantly improve XCSF, least squares approaches appear to be best performing and most robust. Finally we show how XCSF can be extended to include polynomial approximations. 相似文献
144.
145.
Velappan N Sblattero D Chasteen L Pavlik P Bradbury AR 《Protein engineering, design & selection : PEDS》2007,20(7):309-313
It is generally accepted that plasmids containing the same origin of replication are incompatible. We have re-examined this concept in terms of the plasmid copy number, by introducing plasmids containing the same origin of replication and different antibiotic resistance genes into bacteria. By selecting for resistance to only one antibiotic, we were able to examine the persistence of plasmids carrying resistances to other antibiotics. We find that plasmids are not rapidly lost, but are able to persist in bacteria for multiple overnight growth cycles, with some dependence upon the nature of the antibiotic selected for. By carrying out the experiments with different origins of replication, we have been able to show that higher copy number leads to longer persistence, but even with low copy plasmids, persistence occurs to a significant degree. This observation holds significance for the field of protein engineering, as the presence of two or more plasmids within bacteria weakens, and confuses, the connection between screened phenotype and genotype, with the potential to wrongly assign specific phenotypes to incorrect genotypes. 相似文献
146.
147.
Very robust voltage-controlled spin transitions in few-electron quantum dots are demonstrated. Two lateral-gate electrodes patterned on opposite sides of an InAs/InP nanowire are used to apply a transverse electric field and tune orbital energy separation down to level-pair degeneracy. Transport measurements in this regime allow us to demonstrate the breakdown of the standard alternate up/down spin filling scheme and unambiguously show singlet-triplet spin transitions. The strong confinement of the present devices leads to a large energy gain for the observed anomalous spin configurations that exceeds 4 meV. As a consequence, this behavior is well visible even at temperatures exceeding T = 20 K. 相似文献
148.
Mauricio D. Gutierrez Vasileios Tenentes Daniele Rossi Tom J. Kazmierski 《Journal of Electronic Testing》2017,33(4):463-477
Low power fault tolerance design techniques trade reliability to reduce the area cost and the power overhead of integrated circuits by protecting only a subset of their workload or their most vulnerable parts. However, in the presence of faults not all workloads are equally susceptible to errors. In this paper, we present a low power fault tolerance design technique that selects and protects the most susceptible workload. We propose to rank the workload susceptibility as the likelihood of any error to bypass the logic masking of the circuit and propagate to its outputs. The susceptible workload is protected by a partial Triple Modular Redundancy (TMR) scheme. We evaluate the proposed technique on timing-independent and timing-dependent errors induced by permanent and transient faults. In comparison with unranked selective fault tolerance approach, we demonstrate a) a similar error coverage with a 39.7% average reduction of the area overhead or b) a 86.9% average error coverage improvement for a similar area overhead. For the same area overhead case, we observe an error coverage improvement of 53.1% and 53.5% against permanent stuck-at and transition faults, respectively, and an average error coverage improvement of 151.8% and 89.0% against timing-dependent and timing-independent transient faults, respectively. Compared to TMR, the proposed technique achieves an area and power overhead reduction of 145.8% to 182.0%. 相似文献
149.
Semantic annotation of sports videos 总被引:3,自引:0,他引:3
Taking into consideration the unique qualities of sports videos, we propose a system that semantically annotates them at different layers of semantic significance, using different elements of visual content. We decompose each shot into its visual and graphic content elements and, by combining several different low-level visual primitives, capture the semantic content at a higher level of significance 相似文献
150.
Ivan Damgård Sebastian Faust Pratyay Mukherjee Daniele Venturi 《Journal of Cryptology》2017,30(1):152-190
Related key attacks (RKAs) are powerful cryptanalytic attacks where an adversary can change the secret key and observe the effect of such changes at the output. The state of the art in RKA security protects against an a-priori unbounded number of certain algebraic induced key relations, e.g., affine functions or polynomials of bounded degree. In this work, we show that it is possible to go beyond the algebraic barrier and achieve security against arbitrary key relations, by restricting the number of tampering queries the adversary is allowed to ask for. The latter restriction is necessary in case of arbitrary key relations, as otherwise a generic attack of Gennaro et al. (TCC 2004) shows how to recover the key of almost any cryptographic primitive. We describe our contributions in more detail below. (1) We show that standard ID and signature schemes constructed from a large class of \(\Sigma \)-protocols (including the Okamoto scheme, for instance) are secure even if the adversary can arbitrarily tamper with the prover’s state a bounded number of times and obtain some bounded amount of leakage. Interestingly, for the Okamoto scheme we can allow also independent tampering with the public parameters. (2) We show a bounded tamper and leakage resilient CCA-secure public key cryptosystem based on the DDH assumption. We first define a weaker CCA-like security notion that we can instantiate based on DDH, and then we give a general compiler that yields CCA security with tamper and leakage resilience. This requires a public tamper-proof common reference string. (3) Finally, we explain how to boost bounded tampering and leakage resilience [as in (1) and (2) above] to continuous tampering and leakage resilience, in the so-called floppy model where each user has a personal hardware token (containing leak- and tamper-free information) which can be used to refresh the secret key. We believe that bounded tampering is a meaningful and interesting alternative to avoid known impossibility results and can provide important insights into the security of existing standard cryptographic schemes. 相似文献