首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2292篇
  免费   165篇
  国内免费   1篇
电工技术   14篇
综合类   1篇
化学工业   545篇
金属工艺   21篇
机械仪表   37篇
建筑科学   82篇
矿业工程   4篇
能源动力   98篇
轻工业   391篇
水利工程   19篇
石油天然气   10篇
无线电   188篇
一般工业技术   407篇
冶金工业   121篇
原子能技术   11篇
自动化技术   509篇
  2024年   6篇
  2023年   31篇
  2022年   112篇
  2021年   107篇
  2020年   57篇
  2019年   97篇
  2018年   113篇
  2017年   90篇
  2016年   102篇
  2015年   83篇
  2014年   127篇
  2013年   178篇
  2012年   164篇
  2011年   202篇
  2010年   131篇
  2009年   112篇
  2008年   116篇
  2007年   94篇
  2006年   96篇
  2005年   64篇
  2004年   69篇
  2003年   50篇
  2002年   45篇
  2001年   19篇
  2000年   22篇
  1999年   21篇
  1998年   40篇
  1997年   30篇
  1996年   10篇
  1995年   15篇
  1994年   12篇
  1993年   6篇
  1992年   2篇
  1991年   3篇
  1990年   4篇
  1989年   2篇
  1987年   2篇
  1985年   2篇
  1984年   2篇
  1983年   3篇
  1982年   1篇
  1981年   4篇
  1980年   1篇
  1979年   1篇
  1977年   1篇
  1976年   2篇
  1975年   1篇
  1974年   1篇
  1971年   2篇
  1970年   1篇
排序方式: 共有2458条查询结果,搜索用时 0 毫秒
991.
To revitalize the discussion on dominant logic our paper aims to establish the forgotten link between dominant logic and firm performance. To do so, the concept is enhanced conceptually and operationalized by developing a framework including firms’ conceptualization of the business (external environment) and of themselves (internal environment) and performance. The framework is applied to a longitudinal study of two consumer electronics firms. The empirical evidence shows that differences in dominant logic lead to different strategic reactions to developments in the industry, and thus result in performance differences.  相似文献   
992.
Spam has become a major issue in computer security because it is a channel for threats such as computer viruses, worms and phishing. More than 85% of received e-mails are spam. Historical approaches to combat these messages including simple techniques such as sender blacklisting or the use of e-mail signatures, are no longer completely reliable. Currently, many solutions feature machine-learning algorithms trained using statistical representations of the terms that usually appear in the e-mails. Still, these methods are merely syntactic and are unable to account for the underlying semantics of terms within the messages. In this paper, we explore the use of semantics in spam filtering by representing e-mails with a recently introduced Information Retrieval model: the enhanced Topic-based Vector Space Model (eTVSM). This model is capable of representing linguistic phenomena using a semantic ontology. Based upon this representation, we apply several well-known machine-learning models and show that the proposed method can detect the internal semantics of spam messages.  相似文献   
993.
Disjunctive minimal generators were proposed by Zhao, Zaki, and Ramakrishnan (2006). They defined disjunctive closed itemsets and disjunctive minimal generators through the disjunctive support function. We prove that the disjunctive support function is compatible with the closure operator presented by Zhao et al. (2006). Such compatibility allows us to adapt the original version of the Titanic algorithm, proposed by Stumme, Taouil, Bastide, Pasquier, and Lakhal (2002) to mine iceberg concept lattices and closed itemsets, to mine disjunctive minimal generators. We present TitanicOR, a new breadth-first algorithm for mining disjunctive minimal generators. We evaluate the performance of our method with both synthetic and real data sets and compare TitanicOR’s performance with the performance of BLOSOM (Zhao et al., 2006), the state of the art method and sole algorithm available prior to TitanicOR for mining disjunctive minimal generators. We show that TitanicOR’s breadth-first approach is up to two orders of magnitude faster than BLOSOM’s depth-first approach.  相似文献   
994.
The economic situation in the air transportation industry claims for new business models supported by accurate management processes, which need constant feedback of the real status of the environment. The objective of this work is to achieve an updated/real decision support systems (DSS) to allocate resources in an airport even when disturbances occur by combining artificial intelligent techniques with visibility technologies. This work proposes the combined use of Multi-agent systems (MAS) along with Wireless Sensor Networks (WSN) to provide the required information on the status of the resources and the environment. The MAS is based on a double layer of decision-taking levels and on a Markov reward function whereas the WSN is based on a Zigbee network of Radio Frequency Identification (RFID) readers with active tags as end nodes, which are carried by the physical resources. The proposed distributed DSS has been tested at Ciudad Real Central Airport in Spain.  相似文献   
995.
In this paper a multi-start iterated local search (MS-ILS) algorithm is presented as a new and effective approach to solve the multi-mode resource-constrained project scheduling problem (MRCPSP). The MRCPSP is a well-known project scheduling NP-Hard optimization problem, in which there is a trade-off between the duration of each project activity and the amount of resources they require to be completed. The proposed algorithm generates an initial solution, performs a local search to obtain a local optimum, subsequently, for a certain number of iterations, makes a perturbation to that local optimum and performs a new local search on the perturbed solution. This whole process then restarts with a different initial solution for a certain number of restarts. The algorithm was tested on benchmark instances of projects with 30, 50 and 100 activities from well-known libraries. The obtained results were compared to recent benchmark results from the literature. The proposed algorithm outperforms other solution methods found in related literature for the largest tested instances (100 activities), while for smaller instances it shows to be quite competitive, in terms of the average deviation against known lower bounds.  相似文献   
996.
997.
Currently, non-functional requirements (NFRs) consume a considerable part of the software development effort. The good news is that most of them appear time and again during system development and, luckily, their solutions can be often described as a pattern independently from any specific application or domain. A proof of this are the current application servers and middleware platforms that can provide configurable prebuilt services for managing some of these crosscutting concerns, or aspects. Nevertheless, these reusable pattern solutions presents two shortcomings, among others: (1) they need to be applied manually; and (2) most of these pattern solutions do not use aspect-orientation, and, since NFRs are often crosscutting concerns, this leads to scattered and tangled representations of these concerns. Our approach aims to overcome these limitations by: (1) using model-driven techniques to reduce the development effort associated to systematically apply reusable solutions for satisfying NFRs; and (2) using aspect-orientation to improve the modularization of these crosscutting concerns. Regarding the first contribution, since the portion of a system related to NFRs is usually significant, the reduction on the development effort associated to these NFRs is also significant. Regarding the second contribution, the use aspect-orientation improves maintenance and evolution of the non-functional requirements that are managed as aspects. An additional contribution of our work is to define a mapping and transition from aspectual requirements to aspect-oriented software architectures, which, in turn, contributes to improve the general issue of systematically relating requirements to architecture. Our approach is illustrated by applying it to a Toll Gate case study.  相似文献   
998.
The increasing data demands of applications from various domains and the decreasing relative power cost of CPU computation have gradually exposed data movement cost as the prominent factor of energy consumption in computing systems. The traditional organization of the computer system software into a layered stack, while providing a straightforward modularity, poses a significant challenge for the global optimization of data movement in particular and, thus, the energy efficiency in general. Optimizing the energy efficiency of data movement in large-scale systems is a difficult tasks because it depends on a complex interplay of various factors at different system layers. In this work, we address the challenge of optimizing the data movement of the storage I/O stack in a holistic manner. Our approach consists of a model-based system driver that obtains the current I/O power regime and adapts the CPU frequency level according to this information. On the one hand, for simplifying the understanding of the relation between data movement and energy efficiency, this paper proposes novel energy prediction models for data movement based on series of runtime metrics from several I/O stack layers. We provide an in-depth study of the energy consumption in the data path, including the identification and analysis of power and performance regimes that synthesize the energy consumption patterns in a cross-layer approach. On the other hand, we propose and prototype a kernel driver that exploits data movement awareness for improving the current CPU-centric energy management.  相似文献   
999.
Proxy-based sliding mode control, created by Ryo Kikuuwe and Hideo Fujimoto, combines the advantages of sliding mode control and proportional integral derivative controller. This paper implements this control algorithm on a platform of 3 degrees of freedom (3-DOF) driven by electropneumatic actuators with proportional flow valves. This paper presents an extension of proxy-based sliding mode control. This time it is implemented on a parallel robot. Despite the robot being a coupled system, is reached a perfect decoupled control. The simulations in MSC-ADAMS and experimental results demonstrate good tracking.  相似文献   
1000.
ABSTRACT

Ranking fuzzy numbers plays a very important role in decision-making problems. Existing centroid-index ranking methods have some drawbacks. In this article, a new centroid-index ranking method of fuzzy numbers is proposed. The proposed method is using the ideal of Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS). Some numerical examples show that the new method can overcome the drawbacks of the existing methods. Finally, a human selection problem is used to illustrate the efficiency of the proposed fuzzy ranking method.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号