首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1471篇
  免费   52篇
  国内免费   4篇
电工技术   25篇
综合类   1篇
化学工业   411篇
金属工艺   16篇
机械仪表   26篇
建筑科学   34篇
矿业工程   7篇
能源动力   23篇
轻工业   69篇
水利工程   11篇
石油天然气   1篇
武器工业   1篇
无线电   116篇
一般工业技术   281篇
冶金工业   241篇
原子能技术   11篇
自动化技术   253篇
  2023年   11篇
  2022年   38篇
  2021年   29篇
  2020年   17篇
  2019年   18篇
  2018年   23篇
  2017年   25篇
  2016年   27篇
  2015年   19篇
  2014年   34篇
  2013年   100篇
  2012年   62篇
  2011年   72篇
  2010年   47篇
  2009年   53篇
  2008年   34篇
  2007年   33篇
  2006年   57篇
  2005年   54篇
  2004年   55篇
  2003年   53篇
  2002年   38篇
  2001年   20篇
  2000年   25篇
  1999年   17篇
  1998年   22篇
  1997年   21篇
  1996年   25篇
  1995年   17篇
  1994年   21篇
  1993年   17篇
  1992年   24篇
  1991年   13篇
  1990年   14篇
  1989年   19篇
  1988年   20篇
  1987年   12篇
  1986年   17篇
  1985年   15篇
  1982年   19篇
  1981年   13篇
  1980年   14篇
  1979年   16篇
  1978年   23篇
  1977年   16篇
  1976年   25篇
  1975年   16篇
  1974年   21篇
  1973年   14篇
  1970年   10篇
排序方式: 共有1527条查询结果,搜索用时 906 毫秒
51.
Knowledge-base V&V primarily addresses the question: “Does my knowledge-base contain the right answer and can I arrive at it?” One of the main goals of our work is to properly encapsulate the knowledge representation and allow the expert to work with manageable-sized chunks of the knowledge-base. This work develops a new methodology for the verification and validation of Bayesian knowledge-bases that assists in constructing and testing such knowledge-bases. Assistance takes the form of ensuring that the knowledge is syntactically correct, correcting “imperfect” knowledge, and also identifying when the current knowledge-base is insufficient as well as suggesting ways to resolve this insufficiency. The basis of our approach is the use of probabilistic network models of knowledge. This provides a framework for formally defining and working on the problems of uncertainty in the knowledge-base.

In this paper, we examine the project which is concerned with assisting a human expert to build knowledge-based systems under uncertainty. We focus on how verification and validation are currently achieved in .  相似文献   

52.
Stochastic neural networks   总被引:2,自引:0,他引:2  
Eugene Wong 《Algorithmica》1991,6(1):466-478
The first purpose of this paper is to present a class of algorithms for finding the global minimum of a continuous-variable function defined on a hypercube. These algorithms, based on both diffusion processes and simulated annealing, are implementable as analog integrated circuits. Such circuits can be viewed as generalizations of neural networks of the Hopfield type, and are called diffusion machines.Our second objective is to show that learning in these networks can be achieved by a set of three interconnected diffusion machines: one that learns, one to model the desired behavior, and one to compute the weight changes.This research was supported in part by U.S. Army Research Office Grant DAAL03-89-K-0128.  相似文献   
53.
Time is ubiquitous. Accounting for time and its interaction with change is crucial to modeling the dynamic world, especially in domains whose study of data is sensitive to time such as in medical diagnosis, financial investment, and natural language processing, to name a few. We present a framework that incorporates both uncertainty and time in its reasoning scheme. It is based on an existing knowledge representation called Bayesian Knowledge Bases. It provides a graphical representation of knowledge, time and uncertainty, and enables probabilistic and temporal inferencing. The reasoning scheme is probabilistically sound and the fusion of temporal fragments is well defined. We will discuss some properties of this framework and introduce algorithms to ensure groundedness during the construction of the model. The framework has been applied to both artificial and real world scenarios.  相似文献   
54.
An Analysis of Chorioretinal Thermal Response to Intense Light Exposure   总被引:1,自引:0,他引:1  
An analytical expression has been obtained for the transient temperature distribution produced when the retina is irradiated by a high-intensity light source. The following factors are included in the analysis: (1) structurally the fundus consists of layers of material which have different physical properties, (2) absorption of energy from the light beam follows the Beer-Lambert law, (3) energy is absorbed in the sclera as well as in the pigment epithelium and choroid, (4) heat is removed from the fundus by blood circulating through the capillaries of the choroid, and (5) intensity of the light source may vary with time. Computed values indicate that absorption of energy in the sclera and removal of heat by convection are both important for longer irradiation times, which agrees with recent experimental observations. The asymptotic response to a train of pulses is presented also.  相似文献   
55.
本设计实例介绍了对某种旧设计的增强措施(参考资料1)。图1中的电路使用常开型单刀单掷按钮开关S1,它代替了原始设计要求的单刀双掷开关。您可以使用膜片开关来大大简化该器件的工业设计并增强它的人机控制特性。另外,该电路消除了流过未动作开关的电流,由此略微减少了工作模式中的泄漏电流。  相似文献   
56.
In this paper we follow previous “pseudo-stochastic” approaches that solve stochastic control problems by using deterministic optimal control methods. In a similar manner to the certainty equivalence principle, the suggested model maximizes a given profit function of the expected system outcome. However, unlike the certainty equivalence principle, we model the expected influences of all future events (including those that are expected beyond the planning horizon), as encapsulated by their density functions and not only by their mean values. The model is applied to the optimal scheduling of multiple part-types on a single machine that is subject to random failures and repairs. The objective of the scheduler is to maximize the profit function of the produced multiple-part mix. A numerical study is performed to evaluate the suggested pseudo-stochastic solutions under various conditions. These solutions are compared to a profit upper bound of the stochastic optimal control solutions.  相似文献   
57.
Several classes of regular expressions for timed languages accepted by timed automata have been suggested in the literature. In this article we introduce balanced timed regular expressions with colored parentheses which are equivalent to timed automata, and, differently from existing definitions, do not refer to clock values, and do not use additional operations such as intersection and renaming.  相似文献   
58.
During the 1989 Loma Prieta earthquake the Pajaro River levees near Watsonville, Calif., spread laterally at multiple locations. Four of these locations are discussed in this paper. At one location, an industrial facility was also damaged and a dispute arose as to whether lateral spreading of the adjacent levee was the cause. Stability analyses were made of the industrial site for conditions before, during, and after the earthquake. To confirm the findings, analyses were also made of three other nearby locations where the actual deformation was documented and the subsurface conditions are well defined. The calculated levee deformations at the four locations are quite consistent with the observed movements (up to 60 cm). This experience provides increased confidence in the methods of analysis described, for the characterized subsurface conditions, and the range of ground motions experienced. Additional analyses made using the more recently developed multilinear regression lateral-spreading model (e.g., Youd et al. in 1999) yielded inconsistent results.  相似文献   
59.

Introduction

After initially releasing Windows 2000 (W2K) in February 2000, Microsoft touted it as a secure operating system, one that was far improved over its predecessor, Windows NT(WNT). Yet even before Microsoft released W2K the software giant announced that it would release Service Pack 1 (SP1) for this operating system. The information security community immediately wondered whether the claims about the much improved security in W2K were true; many events and findings since then have reinforced this doubt. After a reign of three years as Microsoft's flagship operating system, last year Microsoft rolled out its newest server operating system, Windows Server 2003 (WS2003), signaling the end of an era for the W2K operating system. Windows XP (WXP) had already supplanted W2K Professional as the newest workstation operating system several years before. This is not to say that nobody uses W2K any more—to the contrary. But as W2K continues to increasingly take a proverbial back seat to newer Microsoft operating systems, now is a good time to take a retroactive look at W2K from a security viewpoint. Was it a success from a security perspective? What were its major failings and why? This paper addresses these issues.  相似文献   
60.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号