首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1960篇
  免费   16篇
电工技术   19篇
综合类   1篇
化学工业   179篇
金属工艺   11篇
机械仪表   17篇
建筑科学   60篇
矿业工程   1篇
能源动力   26篇
轻工业   202篇
水利工程   5篇
石油天然气   3篇
无线电   93篇
一般工业技术   179篇
冶金工业   962篇
原子能技术   10篇
自动化技术   208篇
  2022年   7篇
  2021年   10篇
  2020年   12篇
  2019年   26篇
  2018年   21篇
  2017年   25篇
  2016年   13篇
  2015年   14篇
  2014年   13篇
  2013年   82篇
  2012年   43篇
  2011年   58篇
  2010年   45篇
  2009年   41篇
  2008年   54篇
  2007年   55篇
  2006年   52篇
  2005年   45篇
  2004年   51篇
  2003年   42篇
  2002年   34篇
  2001年   32篇
  2000年   28篇
  1999年   54篇
  1998年   266篇
  1997年   163篇
  1996年   117篇
  1995年   67篇
  1994年   55篇
  1993年   68篇
  1992年   20篇
  1991年   15篇
  1990年   17篇
  1989年   20篇
  1988年   17篇
  1987年   24篇
  1986年   20篇
  1985年   24篇
  1984年   12篇
  1983年   8篇
  1982年   15篇
  1981年   18篇
  1980年   16篇
  1979年   19篇
  1978年   7篇
  1977年   29篇
  1976年   52篇
  1975年   13篇
  1974年   9篇
  1971年   7篇
排序方式: 共有1976条查询结果,搜索用时 15 毫秒
91.
Abstract

Lester Sanders Hill (1890–1961) is best known for the Hill cipher which he published in 1929. However, there seem to be four periods of Hill's career. First, in 1926 and 1927, Hill published a series of papers on mathematical error-detection. Hill's ideas for error-detection are similar to the ideas he used in his cipher. Next, in 1929 and 1931, Hill published two papers that describe the Hill cipher. The third period of Hill's career, from 1927 until 1960, was the time he served on the mathematics faculty of Hunter College. During his time at Hunter College, Hill seems to have had a relationship with the Navy in which he served during World War I. Finally, while teaching at Hunter College, in the 1950s, Hill wrote his “later papers” on cryptography, which were not published but were sent to Naval Communications.  相似文献   
92.
In this paper, a password authentication scheme based on a unit circle encoding is proposed. In our scheme, a one-way function and a cryptographic operation such as DES (data encryption standard) are adopted. Besides, in our scheme, the system only need to store a master secret key, and each user can select his own password freely. Instead of storing a password verification table inside the computer system, our method only has to store a corresponding table of identities, which is used by the computer system for validating the submitted passwords. Owing to this scheme the system can quickly and efficiently respond to any log-in attempt, and is suitable for real-time applications. Furthermore, in our scheme, the system does not need to reconstruct any term of the existing key table, when a new user is inserted into the system. Thus, our scheme is suitable for practical implementation.  相似文献   
93.
In this paper, we present a novel method for joint estimation of the fundamental frequency and order of a set of harmonically related sinusoids based on the multiple signal classification (MUSIC) estimation criterion. The presented method, termed HMUSIC, is shown to have an efficient implementation using fast Fourier transforms (FFTs). Furthermore, refined estimates can be obtained using a gradient-based method. Illustrative examples of the application of the algorithm to real-life speech and audio signals are given, and the statistical performance of the estimator is evaluated using synthetic signals, demonstrating its good statistical properties.  相似文献   
94.
IntroductionSeveral statistical methods of assessing seasonal variation are available. Brookhart and Rothman [3] proposed a second-order moment-based estimator based on the geometrical model derived by Edwards [1], and reported that this estimator is superior in estimating the peak-to-trough ratio of seasonal variation compared with Edwards’ estimator with respect to bias and mean squared error. Alternatively, seasonal variation may be modelled using a Poisson regression model, which provides flexibility in modelling the pattern of seasonal variation and adjustments for covariates.MethodBased on a Monte Carlo simulation study three estimators, one based on the geometrical model, and two based on log-linear Poisson regression models, were evaluated in regards to bias and standard deviation (SD). We evaluated the estimators on data simulated according to schemes varying in seasonal variation and presence of a secular trend. All methods and analyses in this paper are available in the R package Peak2Trough [13].ResultsApplying a Poisson regression model resulted in lower absolute bias and SD for data simulated according to the corresponding model assumptions. Poisson regression models had lower bias and SD for data simulated to deviate from the corresponding model assumptions than the geometrical model.ConclusionThis simulation study encourages the use of Poisson regression models in estimating the peak-to-trough ratio of seasonal variation as opposed to the geometrical model.  相似文献   
95.
96.
The present study offers new input to the discussion of how entrepreneurship education and training programmes can be tailored to suit design professionals. To a large extent, existing entrepreneurship teaching for creative people is based on a traditional administrative management logic that often results in a clash between entrepreneurial demands and creative identities. The paper is based on the following rationale: the better we understand designers' reasoning and their struggles concerning becoming entrepreneurs, the better we are able to design entrepreneurship learning experiences that meet their needs. Since designers' career‐making tends to be highly driven by their strong sense of identity, the paper takes an identity perspective. The empirical foundation of the research is based on observation studies and phenomenological interviews conducted during an eight‐week entrepreneurship training program. Twenty‐five nascent design entrepreneurs with a professional background as designers participated in the voluntary programme. The paper offers novel and critical insights into designers' experiences of the entrepreneurial identity and reasoning as they participate in entrepreneurship training.  相似文献   
97.
In an attempt to produce optical structures with a lower humidity sensitivity than that of structures deposited by conventional evaporation, we used r.f.-biased r.f. sputtering for the preparation of coatings. The sensitivity was effectively reduced owing to the high density of bias-sputtered films which are subjected to controlled ion bombardment during their growth. Our experiments suggest that neither rate monitoring nor optical monitoring is necessary, at least not in the preparation of simple structures with few layers, if glow discharge sputtering processes comprising r.f. substrate biasing in diode, triode or magnetron set-ups are used to deposit the coatings.  相似文献   
98.
A Bloom filter is a space-efficient data structure used for probabilistic set membership testing. When testing an object for set membership, a Bloom filter may give a false positive. The analysis of the false positive rate is a key to understanding the Bloom filter and applications that use it. We show experimentally that the classic analysis for false positive rate is wrong. We formally derive a correct formula using a balls-and-bins model and show how to numerically compute the new, correct formula in a stable manner. We also prove that the new formula always results in a predicted greater false positive rate than the classic formula. This correct formula is numerically compared to the classic formula for relative error - for a small Bloom filter the prediction of false positive rate will be in error when the classic formula is used.  相似文献   
99.
Architectural prototyping is the process of using executable code to investigate stakeholders’ software architecture concerns with respect to a system under development. Previous work has established this as a useful and cost-effective way of exploration and learning of the design space of a system and in addressing issues regarding quality attributes, architectural risks, and the problem of knowledge transfer and conformance. However, the actual industrial use of architectural prototyping has not been thoroughly researched so far. In this article, we report from three studies of architectural prototyping in practice. First, we report findings from an ethnographic study of practicing software architects. Secondly, we report from a focus group on architectural prototyping involving architects from four companies. And, thirdly, we report from a survey study of 20 practicing software architects and software developers. Our findings indicate that architectural prototyping plays an important and frequent role in resolving problems experimentally, but less so in exploring alternative solutions. Furthermore, architectural prototypes include end-user or business related functionality rather than purely architectural functionality. Based on these observations we provide recommendations for effective industrial architectural prototyping.  相似文献   
100.
Strategies for selecting informative data points for training prediction algorithms are important, particularly when data points are difficult and costly to obtain. A Query by Committee (QBC) training strategy for selecting new data points uses the disagreement between a committee of different algorithms to suggest new data points, which most rationally complement existing data, that is, they are the most informative data points. In order to evaluate this QBC approach on a real-world problem, we compared strategies for selecting new data points. We trained neural network algorithms to obtain methods to predict the binding affinity of peptides binding to the MHC class I molecule, HLA-A2. We show that the QBC strategy leads to a higher performance than a baseline strategy where new data points are selected at random from a pool of available data. Most peptides bind HLA-A2 with a low affinity, and as expected using a strategy of selecting peptides that are predicted to have high binding affinities also lead to more accurate predictors than the base line strategy. The QBC value is shown to correlate with the measured binding affinity. This demonstrates that the different predictors can easily learn if a peptide will fail to bind, but often conflict in predicting if a peptide binds. Using a carefully constructed computational setup, we demonstrate that selecting peptides with a high QBC performs better than low QBC peptides independently from binding affinity. When predictors are trained on a very limited set of data they cannot be expected to disagree in a meaningful way and we find a data limit below which the QBC strategy fails. Finally, it should be noted that data selection strategies similar to those used here might be of use in other settings in which generation of more data is a costly process.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号