首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1528篇
  免费   59篇
  国内免费   20篇
电工技术   20篇
综合类   4篇
化学工业   267篇
金属工艺   43篇
机械仪表   58篇
建筑科学   83篇
矿业工程   7篇
能源动力   46篇
轻工业   108篇
水利工程   15篇
石油天然气   15篇
无线电   135篇
一般工业技术   314篇
冶金工业   183篇
原子能技术   14篇
自动化技术   295篇
  2024年   5篇
  2023年   9篇
  2022年   33篇
  2021年   46篇
  2020年   44篇
  2019年   48篇
  2018年   41篇
  2017年   25篇
  2016年   36篇
  2015年   49篇
  2014年   54篇
  2013年   118篇
  2012年   85篇
  2011年   97篇
  2010年   82篇
  2009年   65篇
  2008年   76篇
  2007年   66篇
  2006年   71篇
  2005年   65篇
  2004年   37篇
  2003年   55篇
  2002年   32篇
  2001年   27篇
  2000年   17篇
  1999年   21篇
  1998年   31篇
  1997年   25篇
  1996年   17篇
  1995年   24篇
  1994年   9篇
  1993年   13篇
  1992年   10篇
  1991年   10篇
  1990年   13篇
  1989年   12篇
  1988年   12篇
  1987年   7篇
  1986年   10篇
  1985年   12篇
  1984年   5篇
  1983年   6篇
  1982年   8篇
  1981年   7篇
  1980年   6篇
  1979年   5篇
  1976年   10篇
  1975年   4篇
  1973年   7篇
  1968年   4篇
排序方式: 共有1607条查询结果,搜索用时 265 毫秒
41.
Nowadays, dietary assessment becomes the emerging system for evaluating the person’s food intake. In this paper, the multiple hypothesis image segmentation and feed-forward neural network classifier are proposed for dietary assessment to enhance the performance. Initially, the segmentation is applied to input image which is used to determine the regions where a particular food item is located using salient region detection, multi-scale segmentation, and fast rejection. Then, the significant feature of food items is extracted by the global feature and local feature extraction method. After the features are obtained, the classification is performed for each segmented region using feed-forward neural network model. Finally, the calorie value is computed with the aid of (i) food area volume and (ii) calorie and nutrition measure based on mass value. The outcome of the proposed method attains 96% of accuracy value which provides the better classification performance.  相似文献   
42.
Infrastructure federation is becoming an increasingly important issue for modern Distributed Computing Infrastructures (DCIs): Dynamic elasticity of quasi-static Grid environments, incorporation of special-purpose resources into commoditized Cloud infrastructures, cross-community collaboration for increasingly diverging areas of modern e-Science, and Cloud Bursting pose major challenges on the technical level for many resource and middleware providers. Especially with respect to increasing costs of operating data centers, the intelligent yet automated and secure sharing of resources is a key factor for success. With the D-Grid Scheduler Interoperability (DGSI) project within the German D-Grid Initiative, we provide a strategic technology for the automatically negotiated, SLA-secured, dynamically provisioned federation of resources and services for Grid-and Cloud-type infrastructures. This goal is achieved by complementing current DCI schedulers with the ability to federate infrastructure for the temporary leasing of resources and rechanneling of workloads. In this work, we describe the overall architecture and SLA-secured negotiation protocols within DGSI and depict an advanced mechanism for resource delegation through means of dynamically provisioned, virtualized middleware. Through this methodology, we provide the technological foundation for intelligent capacity planning and workload management in a cross-infrastructure fashion.  相似文献   
43.
In this paper, we investigate the global convergence properties in probability of the Population-Based Incremental Learning (PBIL) algorithm when the initial configuration p(0) is fixed and the learning rate α is close to zero. The convergence in probability of PBIL is confirmed by the experimental results. This paper presents a meaningful discussion on how to establish a unified convergence theory of PBIL that is not affected by the population and the selected individuals.  相似文献   
44.
In this paper, we present control designs for single-input single-output (SISO) nonlinear systems in strict feedback form with an output constraint. To prevent constraint violation, we employ a Barrier Lyapunov Function, which grows to infinity when its arguments approach some limits. By ensuring boundedness of the Barrier Lyapunov Function in the closed loop, we ensure that those limits are not transgressed. Besides the nominal case where full knowledge of the plant is available, we also tackle scenarios wherein parametric uncertainties are present. Asymptotic tracking is achieved without violation of the constraint, and all closed loop signals remain bounded, under a mild condition on the initial output. Furthermore, we explore the use of an Asymmetric Barrier Lyapunov Function as a generalized approach that relaxes the requirements on the initial conditions. We also compare our control with one that is based on a Quadratic Lyapunov Function, and we show that our control requires less restrictive initial conditions. A numerical example is provided to illustrate the performance of the proposed control.  相似文献   
45.
46.
In this new version of ISICS, called ISICS2011, a few omissions and incorrect entries in the built-in file of electron binding energies have been corrected; operational situations leading to un-physical behavior have been identified and flagged.

New version program summary

Program title: ISICS2011Catalogue identifier: ADDS_v5_0Program summary URL:http://cpc.cs.qub.ac.uk/summaries/ADDS_v5_0.htmlProgram obtainable from: CPC Program Library, Queen?s University, Belfast, N. IrelandLicensing provisions: Standard CPC licence, http://cpc.cs.qub.ac.uk/licence/licence.htmlNo. of lines in distributed program, including test data, etc.: 6011No. of bytes in distributed program, including test data, etc.: 130 587Distribution format: tar.gzProgramming language: CComputer: 80486 or higher-level PCsOperating system: WINDOWS XP and all earlier operating systemsClassification: 16.7Catalogue identifier of previous version: ADDS_v4_0Journal reference of previous version: Comput. Phys. Commun. 180 (2009) 1716.Does the new version supersede the previous version?: YesNature of problem: Ionization and X-ray production cross section calculations for ion–atom collisions.Solution method: Numerical integration of form factor using a logarithmic transform and Gaussian quadrature, plus exact integration limits.Reasons for new version: General need for higher precision in output format for projectile energies; some built-in binding energies needed correcting; some anomalous results occur due to faulty read-in data or calculated parameters becoming un-physical; erroneous calculations could result for the L and M shells when restricted K-shell options are inadvertently chosen; to achieve general compatibility with ISICSoo, a companion C++ version that is portable to Linux and MacOS platforms, has been submitted for publication in the CPC Program Library approximately at the same time as this present new standalone version of ISICS [1].Summary of revisions: The format field for projectile energies in the output has been expanded from two to four decimal places in order to distinguish between closely spaced energy values. There were a few entries in the executable binding energy file that needed correcting; K shell of Eu, M shells of Zn, M1 shell of Kr. The corrected values were also entered in the ENERGY.DAT file. In addition, an alternate data file of binding energies is included, called ENERGY_GW.DAT, which is more up-to-date [2]. Likewise, an alternate atomic parameters data file is now included, called FLOURE_JC.DAT, which is more up-to-date [3] fluorescence yields for the K and L shells and Coster–Kronig parameters for the L shell. Both data files can be read in using the -f usage option. To do this, the original energy file should be renamed and saved (e.g., ENERGY_BB.DAT) and the new file (ENERGY_GW.DAT ) should be duplicated as ENERGY.DAT to be read in using the -f option. Similarly for reading in an alternate FLOURE.DAT file. As with previous versions, the user can also simply input different values of any input quantity by invoking the “specify your own parameters” option from the main menu. You can also use this option to simply check the values of the built-in values of the parameters. If it still happens that a zero binding energy for a particular sub-shell is read in, the program will not completely abort, but will calculate results for the other sub-shells while setting the affected sub-shell output to zero. In calculating the Coulomb deflection factor, if the quantity inside the radical sign of the parameter zs becomes zero or negative, to prevent the program from aborting, the PWBA cross sections are still calculated while the ECPSSR cross sections are set to zero. This situation can happen for very low energy collisions, such as were noticed for helium ions on copper at energies of E?11.2 keV. It was observed during the engineering of ISICSoo [1] that erroneous calculations could result for the L- and M-shell cases when restricted K-shell R or HSR scaling options were inappropriately chosen. The program has now been fixed so that these inappropriate options are ignored for the L and M shells. In the previous versions, the usage for inputting a batch data file was incorrectly stated in the Users Manual as -Bxxx; the correct designation is -Fxxx, or alternatively, -Ixxx, as indicated on the usage screen in running the program.A revised Users Manual is also available.Restrictions: The consumed CPU time increases with the atomic shell (K, L, M), but execution is still very fast.Running time: This depends on which shell and the number of different energies to be used in the calculation. The running time is not significantly changed from the previous version.References:
  • [1] 
    M. Batic, M.G. Pia, S. Cipolla, Comput. Phys. Commun. (2011), submitted for publication.
  • [2] 
    http://www.jlab.org/~gwyn/ebindene.html.
  • [3] 
    J. Campbell, At. Data Nucl. Data Tables 85 (2003) 291.
  相似文献   
47.
We first define the basic notions of local and non-local tasks for distributed systems. Intuitively, a task is local if, in a system with no failures, each process can compute its output value locally by applying some local function on its own input value (so the output value of each process depends only on the process’ own input value, not on the input values of the other processes); a task is nonlocal otherwise. All the interesting distributed tasks, including all those that have been investigated in the literature (e.g., consensus, set agreement, renaming, atomic commit, etc.) are non-local. In this paper we consider non-local tasks and determine the minimum information about failures that is necessary to solve such tasks in message-passing distributed systems. As part of this work, we also introduces weak set agreement—a natural weakening of set agreement—and show that, in some precise sense, it is the weakest nonlocal task in message-passing systems.  相似文献   
48.
Failure detection and consensus in the crash-recovery model   总被引:2,自引:0,他引:2  
Summary. We study the problems of failure detection and consensus in asynchronous systems in which processes may crash and recover, and links may lose messages. We first propose new failure detectors that are particularly suitable to the crash-recovery model. We next determine under what conditions stable storage is necessary to solve consensus in this model. Using the new failure detectors, we give two consensus algorithms that match these conditions: one requires stable storage and the other does not. Both algorithms tolerate link failures and are particularly efficient in the runs that are most likely in practice – those with no failures or failure detector mistakes. In such runs, consensus is achieved within time and with 4 n messages, where is the maximum message delay and n is the number of processes in the system. Received: May 1998 / Accepted: November 1999  相似文献   
49.
A method of computing a basis for the second Yang–Baxter cohomology of a finite biquandle with coefficients in QQ and ZpZp from a matrix presentation of the finite biquandle is described. We also describe a method for computing the Yang–Baxter cocycle invariants of an oriented knot or link represented as a signed Gauss code. We provide a URL for our Maple implementations of these algorithms.  相似文献   
50.
钓鱼冠军赛     
Sam 《大众硬件》2000,(6):49-49
钓鱼,是一项非常休闲的户外活动,大家对此一定不会陌生。笔者就是一个钓鱼迷,而且笔者相信绝大多数人也都有钓鱼的经历。但是你有没有试过在电脑中钓鱼呢?那些不曾钓过鱼的朋友也不用心急,先玩玩这个游戏体验一下钓鱼的感觉吧。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号