首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4281篇
  免费   164篇
  国内免费   10篇
电工技术   47篇
综合类   5篇
化学工业   1037篇
金属工艺   79篇
机械仪表   89篇
建筑科学   305篇
矿业工程   6篇
能源动力   106篇
轻工业   406篇
水利工程   26篇
石油天然气   22篇
无线电   251篇
一般工业技术   703篇
冶金工业   784篇
原子能技术   58篇
自动化技术   531篇
  2022年   34篇
  2021年   49篇
  2020年   51篇
  2019年   56篇
  2018年   57篇
  2017年   76篇
  2016年   92篇
  2015年   58篇
  2014年   101篇
  2013年   298篇
  2012年   144篇
  2011年   223篇
  2010年   185篇
  2009年   161篇
  2008年   184篇
  2007年   188篇
  2006年   176篇
  2005年   145篇
  2004年   138篇
  2003年   126篇
  2002年   106篇
  2001年   87篇
  2000年   70篇
  1999年   66篇
  1998年   89篇
  1997年   78篇
  1996年   55篇
  1995年   59篇
  1994年   69篇
  1993年   57篇
  1992年   52篇
  1991年   50篇
  1990年   56篇
  1989年   65篇
  1988年   60篇
  1987年   36篇
  1986年   57篇
  1985年   58篇
  1984年   61篇
  1983年   51篇
  1982年   52篇
  1981年   55篇
  1980年   46篇
  1979年   57篇
  1978年   58篇
  1977年   46篇
  1976年   44篇
  1975年   32篇
  1974年   31篇
  1973年   37篇
排序方式: 共有4455条查询结果,搜索用时 15 毫秒
101.
In this letter, we examine the computational mechanisms of reinforce-ment-based decision making. We bridge the gap across multiple levels of analysis, from neural models of corticostriatal circuits-the basal ganglia (BG) model (Frank, 2005 , 2006 ) to simpler but mathematically tractable diffusion models of two-choice decision making. Specifically, we generated simulated data from the BG model and fit the diffusion model (Ratcliff, 1978 ) to it. The standard diffusion model fits underestimated response times under conditions of high response and reinforcement conflict. Follow-up fits showed good fits to the data both by increasing nondecision time and by raising decision thresholds as a function of conflict and by allowing this threshold to collapse with time. This profile captures the role and dynamics of the subthalamic nucleus in BG circuitry, and as such, parametric modulations of projection strengths from this nucleus were associated with parametric increases in decision boundary and its modulation by conflict. We then present data from a human reinforcement learning experiment involving decisions with low- and high-reinforcement conflict. Again, the standard model failed to fit the data, but we found that two variants similar to those that fit the BG model data fit the experimental data, thereby providing a convergence of theoretical accounts of complex interactive decision-making mechanisms consistent with available data. This work also demonstrates how to make modest modifications to diffusion models to summarize core computations of the BG model. The result is a better fit and understanding of reinforcement-based choice data than that which would have occurred with either model alone.  相似文献   
102.
It is increasingly common to see computer-based simulation being used as a vehicle to model and analyze business processes in relation to process management and improvement. While there are a number of business process management (BPM) and business process simulation (BPS) methodologies, approaches and tools available, it is more desirable to have a systemic BPS approach for operational decision support, from constructing process models based on historical data to simulating processes for typical and common problems. In this paper, we have proposed a generic approach of BPS for operational decision support which includes business processes modeling and workflow simulation with the models generated. Processes are modeled with event graphs through process mining from workflow logs that have integrated comprehensive information about the control-flow, data and resource aspects of a business process. A case study of a credit card application is presented to illustrate the steps involved in constructing an event graph. The evaluation detail is also given in terms of precision, generalization and robustness. Based on the event graph model constructed, we simulate the process under different scenarios and analyze the simulation logs for three generic problems in the case study: 1) suitable resource allocation plan for different case arrival rates; 2) teamwork performance under different case arrival rates; and 3) evaluation and prediction for personal performances. Our experimental results show that the proposed approach is able to model business processes using event graphs and simulate the processes for common operational decision support which collectively play an important role in process management and improvement.  相似文献   
103.
Perfect fit for people has always been a target for product design. Designers commonly use traditional anthropometric dimensions for 3D product design thus creating a lot of fitting problems when dealing with the complexities of human body shapes. The development of recent 3D anthropometric survey has created an opportunity for complex shape analysis on human model by collecting 3D scan data. Using 3D point cloud data from the SizeChina survey, a methodology of creating a homologous 3D head and face model was demonstrated in this study. Anatomical and virtual landmarks, and surface modeling algorithm based on point cloud data were applied in building the model. The head and face models for all scans had the same amount of vertices with consistent features. The average Chinese models showed obvious differences between male and female. The variations of head and face shapes were analyzed using Principal Component Analysis and the results showed that the largest variations among people were general size, especially for width and depth. However face height, forehead, back of the head, chin and jaw area were also important when describing the 3D shape. The results from this study may be useful in the design of head and facial products.  相似文献   
104.
One of the many complex problems that arise from the transmission and marketing of natural gas is when a shipper draws a contract with a pipeline company to deliver a certain amount of gas among several points. What is actually delivered is often different from the amount that had been originally agreed upon. This phenomenon is called an imbalance. When an imbalance occurs, the pipeline penalizes the shipper by imposing a cash-out penalty policy. Since this penalty is a function of the operating daily imbalances, an important decision-making problem for the shippers is how to carry out their daily imbalances so as to minimize their incurred penalty. In this paper, we introduce the problem of minimizing the cash-out penalty costs from the point of view of a natural gas shipping party. We present a mixed integer bilevel linear programming model and discuss its underlying assumptions. To solve it efficiently, we reformulate it as a standard mathematical program and describe a penalty-function algorithm functions for its solution. The algorithm is well-founded and its convergence is proved. Results of numerical experiments support the algorithm’s robustness providing a valuable solution technique for this very important and complex problem in the natural gas market.  相似文献   
105.
Fault and attack management in all-optical networks   总被引:2,自引:0,他引:2  
Network management for optical networks faces additional security challenges that arise by using transparent optical network components in communication systems. While some available management mechanisms are applicable to different types of network architectures, many of these are not adequate for all-optical networks. These have unique features and requirements in terms of security and quality of service, thus requiring a much more targeted approach in terms of network management. In this article we consider management issues with particular emphasis on complications that arise due to the unique characteristics and peculiar behaviors of transparent network components. In particular, signal quality monitoring is still a major complication in all-optical networks. Despite new methods for detection and localization of attacks having been proposed, no robust standards or techniques exist to date for guaranteeing the quality of service in these networks. Therefore, sophisticated mechanisms that assist in managing and assessing the proper function of transparent network components are highly desirable. Accordingly, we present an algorithm for multiple attack localization and identification that can participate in some tasks for fault management of all-optical networks  相似文献   
106.
在过去的几年中,国际放射防护委员会鼓励对其计划将于2005年发表的下一个建议书表述辐射防护理念的最佳方式开展讨论。现在的建议书是由1990年发表的第60号出版物提出的,而且得到过去12年里发表的其它出版物的补充。现在显然委员会有必要总结在大约10个报告中推荐的数值数量的完整性。本文将完成这项工作,并由此而表明前进方向,提出一个简明且比较一致的21世纪初防护理念的表述。当然并不意在进行根本的修改,而是建议对现行政策做出连贯一致的表述,对其应用进行简化。  相似文献   
107.
We consider an algorithmic problem that arises in the context of routing tables used by Internet routers. The Internet addressing scheme is hierarchical, where a group of hosts are identified by a prefix that is common to all the hosts in that group. Each host machine has a unique 32-bit address. Thus, all traffic between a source group s and a destination group d can be routed along a particular route c by maintaining a routing entry (s, d, c) at all intermediate routers, where s and d are binary bit strings. Many different routing tables can achieve the same routing behavior. In this paper we show how to compute the most compact routing table. In particular, we consider the following optimization problem: given a routing table D with N entries of the form (s, d, c) , determine a conflict-free routing table with fewest entries that has the same routing behavior as D. If the source and destination fields have up to w bits, and there are at most K different route values, then our algorithm runs in worst-case time O( NK w2) .  相似文献   
108.
 For small, portable devices, speech input has the advantages of low-cost and small hardware, can be used on the move or whilst the eyes & hands are busy, and is natural and quick. Rather than rely on imperfect speech recognition we propose that information entered as speech is kept as speech and suitable tools are provided to allow quick and easy access to the speech-as-data records. This paper summarises our work on the technologies needed for these tools – for organising, browsing, searching and compressing the stored speech. These technologies go a long way towards giving stored speech the characteristics of text without the associated input problems. Received: 5 March 2002 / Accepted: 1 September 2002 Nick Haddock Consultant Acknowledgements The authors would like to thank the whole HP Labs Gryphon team for their valuable contributions to this work - Mike Collins for the hierarchical chunking algorithm, Erik Geelhoed and David Frohlich for the users perspective, Richard Hull for starting off the compression work, Steve Loughran for productisation, and Dave Reynolds for his consistent advice and support. We would also like to thank our partners at Cambridge University, Steve Young and Tony Robinson, whose expertise and technology formed the foundation for this work, as well as the efforts of Kate Knill on wordspotting, Carl Seymour on compression, James Christie on recognition, and Robin Valenza whose brief excursion into the world of speech technology helped develop a simple and effective summarisation technique. Finally we would like to thank the reviewers for their many helpful comments.  相似文献   
109.
The advanced plasma electrochemical process of anodic spark deposition (ASD) was used to generate photoactive titanium dioxide films on titanium metal substrates. A shift to easier-to-machine substrates was demonstrated by the deposition of a titanium film with physical vapour deposition onto different materials such as glass, silicon, and stainless steel prior to ASD. Obtained films were characterised by scanning electron microscopy, surface area measurement (Brunnauer-Emmett-Teller method, BET), X-ray diffraction, electron-probe microanalysis, and glow discharge spectroscopy. Additionally, film thickness was determined by eddy current measurements. Standard ASD conditions were defined as 180 V applied voltage over a 180 s hold time, a voltage ramp of 20 V/s, a duty cycle of 0.5 and a frequency of 1500 Hz. Most prominent characteristics of the titanium films produced under these standard conditions are a film thickness of ≤80 μm, a surface area of approximately 51 m2/g (BET) and an anatase content of approximately 30% and rutile content of approximately 70%. Furthermore, the film formation process is elucidated and the dependence of film thickness on deposition time and the dependence of the anatase and rutile content on the deposited mass are shown for varying ASD conditions.  相似文献   
110.
The effects of aging on response time (RT) are examined in 2 lexical-decision experiments with young and older subjects (age 60-75). The results show that the older subjects were slower than the young subjects, but more accurate. R. Ratcliff s (1978) diffusion model provided a good account of RTs, their distributions, and response accuracy. The fits show an 80-100-ms slowing of the nondecision components of RT for older subjects relative to young subjects and more conservative decision criterion settings for older subjects than for young subjects. The rates of accumulation of evidence were not significantly different for older compared with young subjects (less than 2% and 5% higher for older subjects relative to young subjects in the 2 experiments). (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号