首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3360篇
  免费   71篇
  国内免费   4篇
电工技术   33篇
综合类   10篇
化学工业   504篇
金属工艺   76篇
机械仪表   53篇
建筑科学   49篇
能源动力   90篇
轻工业   142篇
水利工程   4篇
石油天然气   4篇
无线电   438篇
一般工业技术   444篇
冶金工业   1182篇
原子能技术   16篇
自动化技术   390篇
  2023年   11篇
  2022年   35篇
  2021年   57篇
  2020年   21篇
  2019年   25篇
  2018年   33篇
  2017年   34篇
  2016年   49篇
  2015年   58篇
  2014年   81篇
  2013年   173篇
  2012年   116篇
  2011年   145篇
  2010年   140篇
  2009年   166篇
  2008年   137篇
  2007年   147篇
  2006年   103篇
  2005年   77篇
  2004年   84篇
  2003年   62篇
  2002年   71篇
  2001年   48篇
  2000年   45篇
  1999年   65篇
  1998年   394篇
  1997年   238篇
  1996年   168篇
  1995年   90篇
  1994年   81篇
  1993年   88篇
  1992年   30篇
  1991年   38篇
  1990年   35篇
  1989年   31篇
  1988年   22篇
  1987年   22篇
  1986年   16篇
  1985年   16篇
  1984年   16篇
  1983年   7篇
  1982年   14篇
  1981年   16篇
  1980年   16篇
  1979年   8篇
  1978年   6篇
  1977年   26篇
  1976年   49篇
  1973年   5篇
  1971年   4篇
排序方式: 共有3435条查询结果,搜索用时 31 毫秒
81.
A review of the methods for global optimization reveals that most methods have been developed for unconstrained problems. They need to be extended to general constrained problems because most of the engineering applications have constraints. Some of the methods can be easily extended while others need further work. It is also possible to transform a constrained problem to an unconstrained one by using penalty or augmented Lagrangian methods and solve the problem that way. Some of the global optimization methods find all the local minimum points while others find only a few of them. In any case, all the methods require a very large number of calculations. Therefore, the computational effort to obtain a global solution is generally substantial. The methods for global optimization can be divided into two broad categories: deterministic and stochastic. Some deterministic methods are based on certain assumptions on the cost function that are not easy to check. These methods are not very useful since they are not applicable to general problems. Other deterministic methods are based on certain heuristics which may not lead to the true global solution. Several stochastic methods have been developed as some variation of the pure random search. Some methods are useful for only discrete optimization problems while others can be used for both discrete and continuous problems. Main characteristics of each method are identified and discussed. The selection of a method for a particular application depends on several attributes, such as types of design variables, whether or not all local minima are desired, and availability of gradients of all the functions.Notation Number of equality constraints - () T A transpose of a vector - A A hypercubic cell in clustering methods - Distance between two adjacent mesh points - Probability that a uniform sample of sizeN contains at least one point in a subsetA ofS - A(v, x) Aspiration level function - A The set of points with cost function values less thanf(x G * ) +. Same asA f () - A f () A set of points at which the cost function value is within off(x G * ) - A () A set of points x with[f(x)] smaller than - A N The set ofN random points - A q The set of sample points with the cost function value f q - Q The contraction coefficient; –1 Q 0 - R The expansion coefficient; E > 1 - R The reflection coefficient; 0 < R 1 - A x () A set of points that are within the distance from x G * - D Diagonal form of the Hessian matrix - det() Determinant of a matrix - d j A monotonic function of the number of failed local minimizations - d t Infinitesimal change in time - d x Infinitesimal change in design - A small positive constant - (t) A real function called the noise coefficient - 0 Initial value for(t) - exp() The exponential function - f (c) The record; smallest cost function value over X(C) - [f(x)] Functional for calculating the volume fraction of a subset - Second-order approximation tof(x) - f(x) The cost function - An estimate of the upper bound of global minimum - f E The cost function value at xE - f L The cost function value at xL - f opt The current best minimum function value - f P The cost function value at x P - f Q The cost function value at x Q - f q A function value used to reduce the random sample - f R The cost function value at x R - f S The cost function value at xS - f T F min A common minimum cost function value for several trajectories - f TF opt The best current minimum value found so far forf TF min - f W The cost function value at x W - G Minimum number of points in a cell (A) to be considered full - The gamma function - A factor used to scale the global optimum cost in the zooming method - Minimum distance assumed to exist between two local minimum points - gi(x) Constraints of the optimization problem - H The size of the tabu list - H(x*) The Hessian matrix of the cost function at x* - h j Half side length of a hypercube - h m Minimum half side lengths of hypercubes in one row - I The unity matrix - ILIM A limit on the number of trials before the temperature is reduced - J The set of active constraints - K Estimate of total number of local minima - k Iteration counter - The number of times a clustering algorithm is executed - L Lipschitz constant, defined in Section 2 - L The number of local searches performed - i The corresponding pole strengths - log () The natural logarithm - LS Local search procedure - M Number of local minimum points found inL searches - m Total number of constraints - m(t) Mass of a particle as a function of time - m() TheLebesgue measure of thea set - Average cost value for a number of random sample of points inS - N The number of sample points taken from a uniform random distribution - n Number of design variables - n(t) Nonconservative resistance forces - n c Number of cells;S is divided inton c cells - NT Number of trajectories - Pi (3.1415926) - P i (j) Hypersphere approximating thej-th cluster at stagei - p(x (i)) Boltzmann-Gibbs distribution; the probability of finding the system in a particular configuration - pg A parameter corresponding to each reduced sample point, defined in (36) - Q An orthogonal matrix used to diagonalize the Hessian matrix - i (i = 1, K) The relative size of thei-th region of attraction - r i (j) Radius of thej-th hypersp here at stagei - R x * Region of attraction of a local minimum x* - r j Radius of a hypersphere - r A critical distance; determines whether a point is linked to a cluster - R n A set ofn tuples of real numbers - A hyper rectangle set used to approximateS - S The constraint set - A user supplied parameter used to determiner - s The number of failed local minimizations - T The tabu list - t Time - T(x) The tunneling function - T c (x) The constrained tunneling function - T i The temperature of a system at a configurationi - TLIMIT A lower limit for the temperature - TR A factor between 0 and 1 used to reduce the temperature - u(x) A unimodal function - V(x) The set of all feasible moves at the current design - v(x) An oscillating small perturbation. - V(y(i)) Voronoi cell of the code point y(i) - v–1 An inverse move - v k A move; the change from previous to current designs - w(t) Ann-dimensional standard. Wiener process - x Design variable vector of dimensionn - x# A movable pole used in the tunneling method - x(0) A starting point for a local search procedure - X(c) A sequence of feasible points {x(1), x(2),,x(c)} - x(t) Design vector as a function of time - X* The set of all local minimum points - x* A local minimum point forf(x) - x*(i) Poles used in the tunneling method - x G * A global minimum point forf(x) - Transformed design space - The velocity vector of the particle as a function of time - Acceleration vector of the particle as a function of time - x C Centroid of the simplex excluding x L - x c A pole point used in the tunneling method - x E An expansion point of x R along the direction x C x R - x L The best point of a simplex - x P A new trial point - x Q A contraction point - x R A reflection point; reflection of x W on x C - x S The second worst point of a simplex - x W The worst point of a simplex - The reduced sample point with the smallest function value of a full cell - Y The set of code points - y (i) A code point; a point that represents all the points of thei-th cell - z A random number uniformly distributed in (0,1) - Z (c) The set of points x where [f (c) ] is smaller thanf(x) - []+ Max (0,) - | | Absolute value - The Euclidean norm - f[x(t)] The gradient of the cost function  相似文献   
82.
Reducing the sampling rate to as low as possible is a high priority for many factories to reduce production cost. Automatic virtual metrology based intelligent sampling decision (ISD) scheme had been previously developed for reducing the sampling rate and sustaining the virtual metrology (VM) accuracy. However, the desired sampling rate of the ISD scheme is fixed and set manually. Hence, whenever the VM accuracy gets worse, it cannot adaptively increase the default sampling rate in the ISD scheme. As a consequence, it would take more time to collect enough samples for improving the VM accuracy. Moreover, when the VM accuracy performs well all the time, it cannot automatically decrease the default sampling rate in ISD, which may result in unnecessary waste. Accordingly, this paper proposes an automated sampling decision (ASD) scheme to adaptively and automatically modify the sampling rate online and in real time for continuous improvement. The ASD scheme can monitor the VM accuracy online as well as update the VM models in real time for maintaining the VM accuracy when the VM accuracy becomes poor. Also, the ASD scheme can automatically reduce the sampling rate while the VM accuracy performs well.  相似文献   
83.
Huang SL  Kao FJ  Hsieh HS  Hsu CS 《Applied optics》1998,37(12):2397-2401
We demonstrate that two cross-polarized longitudinal modes can have 50% higher conversion efficiency than two parallel-polarized longitudinal modes in a diode-laser-pumped and intracavity frequency-doubled Nd:YVO(4) laser when operated under periodic pulse oscillation. Through simulations of the rate equations for primary frequency intensities and gains, we also verify that this effect can be attributed to gain competition and complementary conversion coefficient between second-harmonic and sum-frequency generations.  相似文献   
84.
A new experimental model of a vascular carrier to prefabricate a "secondary" island flap, the popliteal musculovascular pedicle, was developed in the rat. Using quantitative skin-surface fluorometry 30 minutes after sodium fluorescein injection and a flap survival area in the prefabricated 8 x 2.5-cm abdominal composite island flap, we compared the revascularization ability of our muscular carrier to nonrevascularized controls: the skeletonized arteriovenous pedicle and the fasciovascular pedicle. The free composite graft with no vascular carrier exhibited near-total necrosis. The skeletonized vascular pedicle demonstrated 15.2% +/- 7.8% perfusion of normal skin on dye fluorescence index measurements and 50% flap survival. The fasciovascular pedicle exhibited better revascularization, with a dye fluorescence index of 36.2 +/- 15.5 (p < 0.01) and 90% +/- 10% flap survival (p < 0.001). India ink injection study and histological examination of our model provided visual evidence of revascularization from the musculovascular pedicle, along with preservation of the carrier's muscular architecture. The musculovascular pedicle is a reliable carrier for making new, vascularized composite flaps.  相似文献   
85.
Despite a general national decline in criminal activities in the 1990s, juvenile criminal offenses continue to increase, (including violent, property, and delinquency acts). In addition increased numbers of children are being held in juvenile jails. It is all but impossible for pediatric health providers to think that "their patients" and "their practices" are immune from the epidemic of crime that affects and is caused by "just kids."  相似文献   
86.
The immunity protein of colicin E7 (ImmE7) can bind specifically to the DNase-type colicin E7 and inhibit its bactericidal activity. Here we report the 1.8-angstrom crystal structure of the ImmE7 protein. This is the first x-ray structure determined in the superfamily of colicin immunity proteins. The ImmE7 protein consists of four antiparallel alpha-helices, folded in a topology similar to the architecture of a four-helix bundle structure. A region rich in acidic residues is identified. This negatively charged area has the greatest variability within the family of DNase-type immunity proteins; thus, it seems likely that this area is involved in specific binding to colicin. Based on structural, genetic, and kinetic data, we suggest that all the DNase-type immunity proteins, as well as colicins, share a "homologous-structural framework" and that specific interaction between a colicin and its cognate immunity protein relies upon how well these two proteins' charged residues match on the interaction surface, thus leading to specific immunity of the colicin.  相似文献   
87.
In the era of IP-based service, people expect a simple, cheap, and competent Voice over IP (VoIP) service as an alternative of the traditional voice over PSTN. The introduction of the SIP protocol realizes the expectation. Following the cost saving spirit of VoIP, we focus on studying inexpensive high availability solutions for the SIP-based VoIP Service. In this paper, Peer-to-Peer (P2P) based and DN-LB based schemes are mainly compared in the paper. A P2P-based scheme enables an inexpensive high availability solution to the VoIP service by the shared computation resources form P2P nodes. Such a P2P-based solution may be appropriate for an individual VoIP user. However, a caller may take a large volume of messages to find out a callee via the proxy nodes in the P2P network. This inherent property of a P2P network may induce the message overhead and long call setup delay. Based on above, another inexpensive scheme, which is a probing-based name resolution solution, is proposed to achieve high availability and load balancing for the VoIP service. We tag the probing mechanism onto the open source project Domain Name Relay Daemon (DNRD) to become a domain name resolution based load balancer (DN-LB). With DN-LB, all request messages from clients can be fairly distributed to all failure-proof proxy servers in the server farm without using any additional costly intermediate network device and changing the standard SIP architecture. Such a DN-LB based solution may be a good choice for a VoIP service provider.  相似文献   
88.
With the advancement of MEMS technologies, sensor networks have opened up broad application prospects. An important issue in wireless sensor networks is object detection and tracking, which typically involves two basic components, collaborative data processing and object location reporting. The former aims to have sensors collaborating in determining a concise digest of object location information, while the latter aims to transport a concise digest to sink in a timely manner. This issue has been intensively studied in individual objects, such as intruders. However, the characteristic of continuous objects has posed new challenges to this issue. Continuous objects can diffuse, increase in size, or split into multiple continuous objects, such as a noxious gas. In this paper, a scalable, topology-control-based approach for continuous object detection and tracking is proposed. Extensive simulations are conducted, which show a significant improvement over existing solutions.  相似文献   
89.
The Lucas–Kanade tracker (LKT) is a commonly used method to track target objects over 2D images. The key principle behind the object tracking of an LKT is to warp the object appearance so as to minimize the difference between the warped object’s appearance and a pre-stored template. Accordingly, the 2D pose of the tracked object in terms of translation, rotation, and scaling can be recovered from the warping. To extend the LKT for 3D pose estimation, a model-based 3D LKT assumes a 3D geometric model for the target object in the 3D space and tries to infer the 3D object motion by minimizing the difference between the projected 2D image of the 3D object and the pre-stored 2D image template. In this paper, we propose an extended model-based 3D LKT for estimating 3D head poses by tracking human heads on video sequences. In contrast to the original model-based 3D LKT, which uses a template with each pixel represented by a single intensity value, the proposed model-based 3D LKT exploits an adaptive template with each template pixel modeled by a continuously updated Gaussian distribution during head tracking. This probabilistic template modeling improves the tracker’s ability to handle temporal fluctuation of pixels caused by continuous environmental changes such as varying illumination and dynamic backgrounds. Due to the new probabilistic template modeling, we reformulate the head pose estimation as a maximum likelihood estimation problem, rather than the original difference minimization procedure. Based on the new formulation, an algorithm to estimate the best head pose is derived. The experimental results show that the proposed extended model-based 3D LKT achieves higher accuracy and reliability than the conventional one does. Particularly, the proposed LKT is very effective in handling varying illumination, which cannot be well handled in the original LKT.  相似文献   
90.
As one of the major steps toward a fully intelligent autonomous robotic weapon, we have made progress in three major areas, (1) design of the surveillance system by an AVR microcontroller, (2) implementation of the design mechanism, and (3) performance of the human- machine interface surveillance system via the LabVIEW graphical programming environment, so that the supervisor can control the vehicle with a keyboard or a specially adapted mouse. In order to accomplish all these achievements, there have been major additions and overhauls in both system software codes and system circuit board developments. All these developments, including a new algorithm and hardware implementation, are described in this article. The experimental results have shown the practicality of the AVR microcontroller, the LabVIEW graphical programming environment, and ZigBee wireless technology applied to a robotic weapon.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号