首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1524篇
  免费   63篇
电工技术   18篇
综合类   1篇
化学工业   407篇
金属工艺   19篇
机械仪表   32篇
建筑科学   46篇
矿业工程   3篇
能源动力   53篇
轻工业   125篇
水利工程   12篇
石油天然气   2篇
无线电   143篇
一般工业技术   268篇
冶金工业   188篇
原子能技术   18篇
自动化技术   252篇
  2024年   12篇
  2023年   40篇
  2022年   59篇
  2021年   70篇
  2020年   53篇
  2019年   51篇
  2018年   60篇
  2017年   50篇
  2016年   55篇
  2015年   45篇
  2014年   76篇
  2013年   100篇
  2012年   108篇
  2011年   90篇
  2010年   81篇
  2009年   72篇
  2008年   57篇
  2007年   52篇
  2006年   41篇
  2005年   41篇
  2004年   27篇
  2003年   20篇
  2002年   20篇
  2001年   16篇
  2000年   9篇
  1999年   19篇
  1998年   49篇
  1997年   47篇
  1996年   31篇
  1995年   20篇
  1994年   18篇
  1993年   12篇
  1992年   10篇
  1991年   9篇
  1990年   8篇
  1989年   7篇
  1988年   4篇
  1987年   3篇
  1986年   3篇
  1985年   6篇
  1984年   4篇
  1983年   3篇
  1982年   4篇
  1981年   6篇
  1980年   4篇
  1979年   2篇
  1976年   4篇
  1974年   2篇
  1955年   2篇
  1954年   1篇
排序方式: 共有1587条查询结果,搜索用时 0 毫秒
141.
142.
143.
We analyze generalization in XCSF and introduce three improvements. We begin by showing that the types of generalizations evolved by XCSF can be influenced by the input range. To explain these results we present a theoretical analysis of the convergence of classifier weights in XCSF which highlights a broader issue. In XCSF, because of the mathematical properties of the Widrow-Hoff update, the convergence of classifier weights in a given subspace can be slow when the spread of the eigenvalues of the autocorrelation matrix associated with each classifier is large. As a major consequence, the system's accuracy pressure may act before classifier weights are adequately updated, so that XCSF may evolve piecewise constant approximations, instead of the intended, and more efficient, piecewise linear ones. We propose three different ways to update classifier weights in XCSF so as to increase the generalization capabilities of XCSF: one based on a condition-based normalization of the inputs, one based on linear least squares, and one based on the recursive version of linear least squares. Through a series of experiments we show that while all three approaches significantly improve XCSF, least squares approaches appear to be best performing and most robust. Finally we show how XCSF can be extended to include polynomial approximations.  相似文献   
144.
145.
It is generally accepted that plasmids containing the same origin of replication are incompatible. We have re-examined this concept in terms of the plasmid copy number, by introducing plasmids containing the same origin of replication and different antibiotic resistance genes into bacteria. By selecting for resistance to only one antibiotic, we were able to examine the persistence of plasmids carrying resistances to other antibiotics. We find that plasmids are not rapidly lost, but are able to persist in bacteria for multiple overnight growth cycles, with some dependence upon the nature of the antibiotic selected for. By carrying out the experiments with different origins of replication, we have been able to show that higher copy number leads to longer persistence, but even with low copy plasmids, persistence occurs to a significant degree. This observation holds significance for the field of protein engineering, as the presence of two or more plasmids within bacteria weakens, and confuses, the connection between screened phenotype and genotype, with the potential to wrongly assign specific phenotypes to incorrect genotypes.  相似文献   
146.
147.
Very robust voltage-controlled spin transitions in few-electron quantum dots are demonstrated. Two lateral-gate electrodes patterned on opposite sides of an InAs/InP nanowire are used to apply a transverse electric field and tune orbital energy separation down to level-pair degeneracy. Transport measurements in this regime allow us to demonstrate the breakdown of the standard alternate up/down spin filling scheme and unambiguously show singlet-triplet spin transitions. The strong confinement of the present devices leads to a large energy gain for the observed anomalous spin configurations that exceeds 4 meV. As a consequence, this behavior is well visible even at temperatures exceeding T = 20 K.  相似文献   
148.
Low power fault tolerance design techniques trade reliability to reduce the area cost and the power overhead of integrated circuits by protecting only a subset of their workload or their most vulnerable parts. However, in the presence of faults not all workloads are equally susceptible to errors. In this paper, we present a low power fault tolerance design technique that selects and protects the most susceptible workload. We propose to rank the workload susceptibility as the likelihood of any error to bypass the logic masking of the circuit and propagate to its outputs. The susceptible workload is protected by a partial Triple Modular Redundancy (TMR) scheme. We evaluate the proposed technique on timing-independent and timing-dependent errors induced by permanent and transient faults. In comparison with unranked selective fault tolerance approach, we demonstrate a) a similar error coverage with a 39.7% average reduction of the area overhead or b) a 86.9% average error coverage improvement for a similar area overhead. For the same area overhead case, we observe an error coverage improvement of 53.1% and 53.5% against permanent stuck-at and transition faults, respectively, and an average error coverage improvement of 151.8% and 89.0% against timing-dependent and timing-independent transient faults, respectively. Compared to TMR, the proposed technique achieves an area and power overhead reduction of 145.8% to 182.0%.  相似文献   
149.
Semantic annotation of sports videos   总被引:3,自引:0,他引:3  
Taking into consideration the unique qualities of sports videos, we propose a system that semantically annotates them at different layers of semantic significance, using different elements of visual content. We decompose each shot into its visual and graphic content elements and, by combining several different low-level visual primitives, capture the semantic content at a higher level of significance  相似文献   
150.
Related key attacks (RKAs) are powerful cryptanalytic attacks where an adversary can change the secret key and observe the effect of such changes at the output. The state of the art in RKA security protects against an a-priori unbounded number of certain algebraic induced key relations, e.g., affine functions or polynomials of bounded degree. In this work, we show that it is possible to go beyond the algebraic barrier and achieve security against arbitrary key relations, by restricting the number of tampering queries the adversary is allowed to ask for. The latter restriction is necessary in case of arbitrary key relations, as otherwise a generic attack of Gennaro et al. (TCC 2004) shows how to recover the key of almost any cryptographic primitive. We describe our contributions in more detail below. (1) We show that standard ID and signature schemes constructed from a large class of \(\Sigma \)-protocols (including the Okamoto scheme, for instance) are secure even if the adversary can arbitrarily tamper with the prover’s state a bounded number of times and obtain some bounded amount of leakage. Interestingly, for the Okamoto scheme we can allow also independent tampering with the public parameters. (2) We show a bounded tamper and leakage resilient CCA-secure public key cryptosystem based on the DDH assumption. We first define a weaker CCA-like security notion that we can instantiate based on DDH, and then we give a general compiler that yields CCA security with tamper and leakage resilience. This requires a public tamper-proof common reference string. (3) Finally, we explain how to boost bounded tampering and leakage resilience [as in (1) and (2) above] to continuous tampering and leakage resilience, in the so-called floppy model where each user has a personal hardware token (containing leak- and tamper-free information) which can be used to refresh the secret key. We believe that bounded tampering is a meaningful and interesting alternative to avoid known impossibility results and can provide important insights into the security of existing standard cryptographic schemes.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号