首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4157篇
  免费   218篇
  国内免费   4篇
电工技术   42篇
综合类   5篇
化学工业   1178篇
金属工艺   70篇
机械仪表   113篇
建筑科学   194篇
矿业工程   8篇
能源动力   151篇
轻工业   508篇
水利工程   24篇
石油天然气   13篇
无线电   271篇
一般工业技术   704篇
冶金工业   146篇
原子能技术   45篇
自动化技术   907篇
  2024年   8篇
  2023年   40篇
  2022年   182篇
  2021年   216篇
  2020年   100篇
  2019年   113篇
  2018年   152篇
  2017年   136篇
  2016年   191篇
  2015年   111篇
  2014年   169篇
  2013年   303篇
  2012年   280篇
  2011年   330篇
  2010年   222篇
  2009年   244篇
  2008年   228篇
  2007年   185篇
  2006年   191篇
  2005年   150篇
  2004年   107篇
  2003年   95篇
  2002年   77篇
  2001年   59篇
  2000年   56篇
  1999年   53篇
  1998年   52篇
  1997年   35篇
  1996年   38篇
  1995年   41篇
  1994年   19篇
  1993年   23篇
  1992年   9篇
  1991年   15篇
  1990年   14篇
  1989年   11篇
  1988年   9篇
  1987年   7篇
  1986年   9篇
  1985年   11篇
  1984年   10篇
  1983年   6篇
  1982年   16篇
  1981年   12篇
  1980年   5篇
  1979年   8篇
  1978年   8篇
  1977年   6篇
  1976年   5篇
  1974年   4篇
排序方式: 共有4379条查询结果,搜索用时 15 毫秒
51.
Hub-and-spoke networks are widely studied in the area of location theory. They arise in several contexts, including passenger airlines, postal and parcel delivery, and computer and telecommunication networks. Hub location problems usually involve three simultaneous decisions to be made: the optimal number of hub nodes, their locations and the allocation of the non-hub nodes to the hubs. In the uncapacitated single allocation hub location problem (USAHLP) hub nodes have no capacity constraints and non-hub nodes must be assigned to only one hub. In this paper, we propose three variants of a simple and efficient multi-start tabu search heuristic as well as a two-stage integrated tabu search heuristic to solve this problem. With multi-start heuristics, several different initial solutions are constructed and then improved by tabu search, while in the two-stage integrated heuristic tabu search is applied to improve both the locational and allocational part of the problem. Computational experiments using typical benchmark problems (Civil Aeronautics Board (CAB) and Australian Post (AP) data sets) as well as new and modified instances show that our approaches consistently return the optimal or best-known results in very short CPU times, thus allowing the possibility of efficiently solving larger instances of the USAHLP than those found in the literature. We also report the integer optimal solutions for all 80 CAB data set instances and the 12 AP instances up to 100 nodes, as well as for the corresponding new generated AP instances with reduced fixed costs.  相似文献   
52.
Electromagnetic suspension systems are inherently nonlinear and often face hardware limitation when digitally controlled. The main contributions of this paper are: the design of a nonlinear H controller, including dynamic weighting functions, applied to a large gap electromagnetic suspension system and the presentation of a procedure to implement this controller on a fixed-point DSP, through a methodology able to translate a floating-point algorithm into a fixed-point algorithm by using l norm minimization due to conversion error. Experimental results are also presented, in which the performance of the nonlinear controller is evaluated specifically in the initial suspension phase.  相似文献   
53.
This work presents a strategy to minimise the network usage and the energy consumption of wireless battery-powered sensors in the observer problem over networks. The sensor nodes implement a periodic send-on-delta approach, sending new measurements when a measure deviates considerably from the previous sent one. The estimator node implements a jump observer whose gains are computed offline and depend on the combination of available new measurements. We bound the estimator performance as a function of the sending policies and then state the design procedure of the observer under fixed sending thresholds as a semidefinite programming problem. We address this problem first in a deterministic way and, to reduce conservativeness, in a stochastic one after obtaining bounds on the probabilities of having new measurements and applying robust optimisation problem over the possible probabilities using sum of squares decomposition. We relate the network usage with the sending thresholds and propose an iterative procedure for the design of those thresholds, minimising the network usage while guaranteeing a prescribed estimation performance. Simulation results and experimental analysis show the validity of the proposal and the reduction of network resources that can be achieved with the stochastic approach.  相似文献   
54.
Recommender systems usually suggest items by exploiting all the previous interactions of the users with a system (e.g., in order to decide the movies to recommend to a user, all the movies she previously purchased are considered). This canonical approach sometimes could lead to wrong results due to several factors, such as a change in user preferences over time, or the use of her account by third parties. This kind of incoherence in the user profiles defines a lower bound on the error the recommender systems may achieve when they generate suggestions for a user, an aspect known in literature as magic barrier. This paper proposes a novel dynamic coherence-based approach to define the user profile used in the recommendation process. The main aim is to identify and remove, from the previously evaluated items, those not semantically adherent to the others, in order to make a user profile as close as possible to the user’s real preferences, solving the aforementioned problems. Moreover, reshaping the user profile in such a way leads to great advantages in terms of computational complexity, since the number of items considered during the recommendation process is highly reduced. The performed experiments show the effectiveness of our approach to remove the incoherent items from a user profile, increasing the recommendation accuracy.  相似文献   
55.
The recent availability of reliable schemes for physically unclonable constants (PUC) opens interesting possibilities in the field of security. In this paper, we explore the possibility of using PUCs to embed in a chip random permutations to be used, for example, as building blocks in cryptographic constructions such as sponge functions, substitution–permutation networks, and so on. We show that the most difficult part is the generation of random integers using as the only randomness source the bit-string produced by the PUC. In order to solve the integer generation problem, we propose a partial rejection method that allows the designer to trade-off between entropy and efficiency. The results show that the proposed schemes can be implemented with reasonable complexity.  相似文献   
56.
This paper discusses methods for content-based image retrieval (CBIR) systems based on relevance feedback according to two active learning paradigms, named greedy and planned. In greedy methods, the system aims to return the most relevant images for a query at each iteration. In planned methods, the most informative images are returned during a few iterations and the most relevant ones are only presented afterward. In the past, we proposed a greedy approach based on optimum-path forest classification (OPF) and demonstrated its gain in effectiveness with respect to a planned method based on support-vector machines and another greedy approach based on multi-point query. In this work, we introduce a planned approach based on the OPF classifier and demonstrate its gain in effectiveness over all methods above using more image databases. In our tests, the most informative images are better obtained from images that are classified as relevant, which differs from the original definition. The results also indicate that both OPF-based methods require less user involvement (efficiency) to satisfy the user's expectation (effectiveness), and provide interactive response times.  相似文献   
57.
Suffix arrays are a key data structure for solving a run of problems on texts and sequences, from data compression and information retrieval to biological sequence analysis and pattern discovery. In their simplest version, they can just be seen as a permutation of the elements in {1,2,…,n}, encoding the sorted sequence of suffixes from a given text of length n, under the lexicographic order. Yet, they are on a par with ubiquitous and sophisticated suffix trees. Over the years, many interesting combinatorial properties have been devised for this special class of permutations: for instance, they can implicitly encode extra information, and they are a well characterized subset of the n! permutations. This paper gives a short tutorial on suffix arrays and their compressed version to explore and review some of their algorithmic features, discussing the space issues related to their usage in text indexing, combinatorial pattern matching, and data compression.  相似文献   
58.
Bioisosteric replacements have been widely and successfully applied to develop bioisosteric series of biologically active compounds in medicinal chemistry. In this work, the concept of bioisosterism is revisited using a novel approach based on charting the "other side" of biologically relevant chemical space. This space is composed by the ensemble of binding sites of protein structures. Explorations into the "other side" of biologically relevant chemical space are exploited to gain insight into the principles that rules molecular recognition and bioisosteric relationships of molecular fragments. We focused, in particular, on the construction of the "other side" of chemical space covered by binding sites of small molecules containing carboxylic, sulfonic, and phosphonic acidic groups. The analysis of differences in the occupation of that space by distinct types of binding sites unveils how evolution has worked in assessing principles that rule the selectivity of molecular recognition, and improves our knowledge on the molecular basis of bioisosteric relationships among carboxylic, sulfonic, and phosphonic acidic groups.  相似文献   
59.
This review essentially deals with positive ion/molecule reactions occurring in gas-phase organometallic systems, and encompasses a period of time of approximately 7 years, going from 1997 to early 2004. Following the example of the excellent review by Eller & Schwarz (1991; Chem Rev 91:1121-1177), in the first part, results of reaction of naked ions are presented by grouping them according to the neutral substrate, while in the second part, ligated ions are grouped according to the different ligands. Whenever possible, comparison among similar studies is attempted, and general trends of reactivities are evidenced.  相似文献   
60.
This paper presents a strategy for segmenting blood vessels based on the threshold, which combines statistics and scale space filter. By incorporating statistical information, the strategy is capable of reducing over-segmentation. We propose a two-stage strategy which involves: (1) optimal selection of window size and (2) optimal selection of scale. We compared our strategy to two commonly used thresholding techniques. Experimental results showed that our method is much more robust and accurate. Our strategy suggested a modification to Otsu's method. In this application the important information to be extracted from images is only the number of blood vessels present in the images. The proposed segmentation technique is tested on manual segmentation, where segmentation errors less than 3% were observed. The work presented in this paper is a part of a global image analysis process. Therefore, these images will be subject to a further morphometrical analysis in order to diagnose and predict automatically malign tumors.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号