首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3220篇
  免费   96篇
  国内免费   4篇
电工技术   32篇
综合类   10篇
化学工业   656篇
金属工艺   83篇
机械仪表   59篇
建筑科学   75篇
矿业工程   1篇
能源动力   100篇
轻工业   237篇
水利工程   12篇
石油天然气   4篇
无线电   467篇
一般工业技术   558篇
冶金工业   577篇
原子能技术   16篇
自动化技术   433篇
  2023年   13篇
  2022年   32篇
  2021年   70篇
  2020年   27篇
  2019年   32篇
  2018年   50篇
  2017年   45篇
  2016年   58篇
  2015年   67篇
  2014年   97篇
  2013年   229篇
  2012年   155篇
  2011年   221篇
  2010年   183篇
  2009年   205篇
  2008年   189篇
  2007年   196篇
  2006年   135篇
  2005年   127篇
  2004年   110篇
  2003年   83篇
  2002年   98篇
  2001年   67篇
  2000年   58篇
  1999年   54篇
  1998年   139篇
  1997年   84篇
  1996年   77篇
  1995年   42篇
  1994年   46篇
  1993年   35篇
  1992年   32篇
  1991年   34篇
  1990年   26篇
  1989年   25篇
  1988年   14篇
  1987年   13篇
  1986年   16篇
  1985年   14篇
  1984年   18篇
  1983年   7篇
  1982年   13篇
  1981年   14篇
  1980年   13篇
  1979年   11篇
  1978年   5篇
  1977年   7篇
  1976年   6篇
  1973年   5篇
  1971年   4篇
排序方式: 共有3320条查询结果,搜索用时 250 毫秒
61.
A review of the methods for global optimization reveals that most methods have been developed for unconstrained problems. They need to be extended to general constrained problems because most of the engineering applications have constraints. Some of the methods can be easily extended while others need further work. It is also possible to transform a constrained problem to an unconstrained one by using penalty or augmented Lagrangian methods and solve the problem that way. Some of the global optimization methods find all the local minimum points while others find only a few of them. In any case, all the methods require a very large number of calculations. Therefore, the computational effort to obtain a global solution is generally substantial. The methods for global optimization can be divided into two broad categories: deterministic and stochastic. Some deterministic methods are based on certain assumptions on the cost function that are not easy to check. These methods are not very useful since they are not applicable to general problems. Other deterministic methods are based on certain heuristics which may not lead to the true global solution. Several stochastic methods have been developed as some variation of the pure random search. Some methods are useful for only discrete optimization problems while others can be used for both discrete and continuous problems. Main characteristics of each method are identified and discussed. The selection of a method for a particular application depends on several attributes, such as types of design variables, whether or not all local minima are desired, and availability of gradients of all the functions.Notation Number of equality constraints - () T A transpose of a vector - A A hypercubic cell in clustering methods - Distance between two adjacent mesh points - Probability that a uniform sample of sizeN contains at least one point in a subsetA ofS - A(v, x) Aspiration level function - A The set of points with cost function values less thanf(x G * ) +. Same asA f () - A f () A set of points at which the cost function value is within off(x G * ) - A () A set of points x with[f(x)] smaller than - A N The set ofN random points - A q The set of sample points with the cost function value f q - Q The contraction coefficient; –1 Q 0 - R The expansion coefficient; E > 1 - R The reflection coefficient; 0 < R 1 - A x () A set of points that are within the distance from x G * - D Diagonal form of the Hessian matrix - det() Determinant of a matrix - d j A monotonic function of the number of failed local minimizations - d t Infinitesimal change in time - d x Infinitesimal change in design - A small positive constant - (t) A real function called the noise coefficient - 0 Initial value for(t) - exp() The exponential function - f (c) The record; smallest cost function value over X(C) - [f(x)] Functional for calculating the volume fraction of a subset - Second-order approximation tof(x) - f(x) The cost function - An estimate of the upper bound of global minimum - f E The cost function value at xE - f L The cost function value at xL - f opt The current best minimum function value - f P The cost function value at x P - f Q The cost function value at x Q - f q A function value used to reduce the random sample - f R The cost function value at x R - f S The cost function value at xS - f T F min A common minimum cost function value for several trajectories - f TF opt The best current minimum value found so far forf TF min - f W The cost function value at x W - G Minimum number of points in a cell (A) to be considered full - The gamma function - A factor used to scale the global optimum cost in the zooming method - Minimum distance assumed to exist between two local minimum points - gi(x) Constraints of the optimization problem - H The size of the tabu list - H(x*) The Hessian matrix of the cost function at x* - h j Half side length of a hypercube - h m Minimum half side lengths of hypercubes in one row - I The unity matrix - ILIM A limit on the number of trials before the temperature is reduced - J The set of active constraints - K Estimate of total number of local minima - k Iteration counter - The number of times a clustering algorithm is executed - L Lipschitz constant, defined in Section 2 - L The number of local searches performed - i The corresponding pole strengths - log () The natural logarithm - LS Local search procedure - M Number of local minimum points found inL searches - m Total number of constraints - m(t) Mass of a particle as a function of time - m() TheLebesgue measure of thea set - Average cost value for a number of random sample of points inS - N The number of sample points taken from a uniform random distribution - n Number of design variables - n(t) Nonconservative resistance forces - n c Number of cells;S is divided inton c cells - NT Number of trajectories - Pi (3.1415926) - P i (j) Hypersphere approximating thej-th cluster at stagei - p(x (i)) Boltzmann-Gibbs distribution; the probability of finding the system in a particular configuration - pg A parameter corresponding to each reduced sample point, defined in (36) - Q An orthogonal matrix used to diagonalize the Hessian matrix - i (i = 1, K) The relative size of thei-th region of attraction - r i (j) Radius of thej-th hypersp here at stagei - R x * Region of attraction of a local minimum x* - r j Radius of a hypersphere - r A critical distance; determines whether a point is linked to a cluster - R n A set ofn tuples of real numbers - A hyper rectangle set used to approximateS - S The constraint set - A user supplied parameter used to determiner - s The number of failed local minimizations - T The tabu list - t Time - T(x) The tunneling function - T c (x) The constrained tunneling function - T i The temperature of a system at a configurationi - TLIMIT A lower limit for the temperature - TR A factor between 0 and 1 used to reduce the temperature - u(x) A unimodal function - V(x) The set of all feasible moves at the current design - v(x) An oscillating small perturbation. - V(y(i)) Voronoi cell of the code point y(i) - v–1 An inverse move - v k A move; the change from previous to current designs - w(t) Ann-dimensional standard. Wiener process - x Design variable vector of dimensionn - x# A movable pole used in the tunneling method - x(0) A starting point for a local search procedure - X(c) A sequence of feasible points {x(1), x(2),,x(c)} - x(t) Design vector as a function of time - X* The set of all local minimum points - x* A local minimum point forf(x) - x*(i) Poles used in the tunneling method - x G * A global minimum point forf(x) - Transformed design space - The velocity vector of the particle as a function of time - Acceleration vector of the particle as a function of time - x C Centroid of the simplex excluding x L - x c A pole point used in the tunneling method - x E An expansion point of x R along the direction x C x R - x L The best point of a simplex - x P A new trial point - x Q A contraction point - x R A reflection point; reflection of x W on x C - x S The second worst point of a simplex - x W The worst point of a simplex - The reduced sample point with the smallest function value of a full cell - Y The set of code points - y (i) A code point; a point that represents all the points of thei-th cell - z A random number uniformly distributed in (0,1) - Z (c) The set of points x where [f (c) ] is smaller thanf(x) - []+ Max (0,) - | | Absolute value - The Euclidean norm - f[x(t)] The gradient of the cost function  相似文献   
62.
Reducing the sampling rate to as low as possible is a high priority for many factories to reduce production cost. Automatic virtual metrology based intelligent sampling decision (ISD) scheme had been previously developed for reducing the sampling rate and sustaining the virtual metrology (VM) accuracy. However, the desired sampling rate of the ISD scheme is fixed and set manually. Hence, whenever the VM accuracy gets worse, it cannot adaptively increase the default sampling rate in the ISD scheme. As a consequence, it would take more time to collect enough samples for improving the VM accuracy. Moreover, when the VM accuracy performs well all the time, it cannot automatically decrease the default sampling rate in ISD, which may result in unnecessary waste. Accordingly, this paper proposes an automated sampling decision (ASD) scheme to adaptively and automatically modify the sampling rate online and in real time for continuous improvement. The ASD scheme can monitor the VM accuracy online as well as update the VM models in real time for maintaining the VM accuracy when the VM accuracy becomes poor. Also, the ASD scheme can automatically reduce the sampling rate while the VM accuracy performs well.  相似文献   
63.
Huang SL  Kao FJ  Hsieh HS  Hsu CS 《Applied optics》1998,37(12):2397-2401
We demonstrate that two cross-polarized longitudinal modes can have 50% higher conversion efficiency than two parallel-polarized longitudinal modes in a diode-laser-pumped and intracavity frequency-doubled Nd:YVO(4) laser when operated under periodic pulse oscillation. Through simulations of the rate equations for primary frequency intensities and gains, we also verify that this effect can be attributed to gain competition and complementary conversion coefficient between second-harmonic and sum-frequency generations.  相似文献   
64.
The immunity protein of colicin E7 (ImmE7) can bind specifically to the DNase-type colicin E7 and inhibit its bactericidal activity. Here we report the 1.8-angstrom crystal structure of the ImmE7 protein. This is the first x-ray structure determined in the superfamily of colicin immunity proteins. The ImmE7 protein consists of four antiparallel alpha-helices, folded in a topology similar to the architecture of a four-helix bundle structure. A region rich in acidic residues is identified. This negatively charged area has the greatest variability within the family of DNase-type immunity proteins; thus, it seems likely that this area is involved in specific binding to colicin. Based on structural, genetic, and kinetic data, we suggest that all the DNase-type immunity proteins, as well as colicins, share a "homologous-structural framework" and that specific interaction between a colicin and its cognate immunity protein relies upon how well these two proteins' charged residues match on the interaction surface, thus leading to specific immunity of the colicin.  相似文献   
65.
In the era of IP-based service, people expect a simple, cheap, and competent Voice over IP (VoIP) service as an alternative of the traditional voice over PSTN. The introduction of the SIP protocol realizes the expectation. Following the cost saving spirit of VoIP, we focus on studying inexpensive high availability solutions for the SIP-based VoIP Service. In this paper, Peer-to-Peer (P2P) based and DN-LB based schemes are mainly compared in the paper. A P2P-based scheme enables an inexpensive high availability solution to the VoIP service by the shared computation resources form P2P nodes. Such a P2P-based solution may be appropriate for an individual VoIP user. However, a caller may take a large volume of messages to find out a callee via the proxy nodes in the P2P network. This inherent property of a P2P network may induce the message overhead and long call setup delay. Based on above, another inexpensive scheme, which is a probing-based name resolution solution, is proposed to achieve high availability and load balancing for the VoIP service. We tag the probing mechanism onto the open source project Domain Name Relay Daemon (DNRD) to become a domain name resolution based load balancer (DN-LB). With DN-LB, all request messages from clients can be fairly distributed to all failure-proof proxy servers in the server farm without using any additional costly intermediate network device and changing the standard SIP architecture. Such a DN-LB based solution may be a good choice for a VoIP service provider.  相似文献   
66.
With the advancement of MEMS technologies, sensor networks have opened up broad application prospects. An important issue in wireless sensor networks is object detection and tracking, which typically involves two basic components, collaborative data processing and object location reporting. The former aims to have sensors collaborating in determining a concise digest of object location information, while the latter aims to transport a concise digest to sink in a timely manner. This issue has been intensively studied in individual objects, such as intruders. However, the characteristic of continuous objects has posed new challenges to this issue. Continuous objects can diffuse, increase in size, or split into multiple continuous objects, such as a noxious gas. In this paper, a scalable, topology-control-based approach for continuous object detection and tracking is proposed. Extensive simulations are conducted, which show a significant improvement over existing solutions.  相似文献   
67.
The Lucas–Kanade tracker (LKT) is a commonly used method to track target objects over 2D images. The key principle behind the object tracking of an LKT is to warp the object appearance so as to minimize the difference between the warped object’s appearance and a pre-stored template. Accordingly, the 2D pose of the tracked object in terms of translation, rotation, and scaling can be recovered from the warping. To extend the LKT for 3D pose estimation, a model-based 3D LKT assumes a 3D geometric model for the target object in the 3D space and tries to infer the 3D object motion by minimizing the difference between the projected 2D image of the 3D object and the pre-stored 2D image template. In this paper, we propose an extended model-based 3D LKT for estimating 3D head poses by tracking human heads on video sequences. In contrast to the original model-based 3D LKT, which uses a template with each pixel represented by a single intensity value, the proposed model-based 3D LKT exploits an adaptive template with each template pixel modeled by a continuously updated Gaussian distribution during head tracking. This probabilistic template modeling improves the tracker’s ability to handle temporal fluctuation of pixels caused by continuous environmental changes such as varying illumination and dynamic backgrounds. Due to the new probabilistic template modeling, we reformulate the head pose estimation as a maximum likelihood estimation problem, rather than the original difference minimization procedure. Based on the new formulation, an algorithm to estimate the best head pose is derived. The experimental results show that the proposed extended model-based 3D LKT achieves higher accuracy and reliability than the conventional one does. Particularly, the proposed LKT is very effective in handling varying illumination, which cannot be well handled in the original LKT.  相似文献   
68.
As one of the major steps toward a fully intelligent autonomous robotic weapon, we have made progress in three major areas, (1) design of the surveillance system by an AVR microcontroller, (2) implementation of the design mechanism, and (3) performance of the human- machine interface surveillance system via the LabVIEW graphical programming environment, so that the supervisor can control the vehicle with a keyboard or a specially adapted mouse. In order to accomplish all these achievements, there have been major additions and overhauls in both system software codes and system circuit board developments. All these developments, including a new algorithm and hardware implementation, are described in this article. The experimental results have shown the practicality of the AVR microcontroller, the LabVIEW graphical programming environment, and ZigBee wireless technology applied to a robotic weapon.  相似文献   
69.
e-Learning tools have profoundly transformed modern pedagogical approaches. Vendors provide different types of systems, such as self-paced (SP) and instructor–student interactive (ISI) e-Learning tools. Although both types of tools represent promising solutions to facilitate the learning process, it is important to theoretically identify a framework to evaluate the success of these tools and assess whether one type of tool is more effective than another. Toward this end, we (1) propose a model to evaluate e-Learning tools’ success by extending and contextualizing Seddon’s information systems (IS) success model for the e-Learning environment and (2) formulate four hypotheses to predict the differences in the success factors between SP and ISI tools. We test the model and hypotheses using data from 783 students across seven higher education institutions in Hong Kong. The results support the proposed e-Learning tool success model and three of the four hypotheses. ISI tools outperform SP tools in terms of system quality, perceived usefulness, satisfaction, and learning outcome.  相似文献   
70.
The purpose of this study was to examine social evaluations (i.e., perceptions of empathy and positivity) following peoples’ interactions with digital human representations. Female research participants engaged in a 3-min interaction while immersed in a 3-D immersive virtual environment with a “peer counselor.” Participants were led to believe that the peer counselor was either an embodied agent (i.e., computer algorithm) or an avatar (i.e., another person). During the interaction, the peer counselor either smiled or not. As predicted, a digitally-rendered smile was found to affect participants’ social evaluations. However, these effects were moderated by participants’ beliefs about their interaction partner. Specifically, smiles enhanced social evaluations of embodied agents but degraded them for avatars. Although these results are consistent with other findings concerning the communicative realism of embodied agents and avatars they uniquely demonstrate that people’s beliefs alone, rather than actual differences in virtual representations, can impact social evaluations.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号