首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   18791篇
  免费   440篇
  国内免费   17篇
电工技术   226篇
综合类   14篇
化学工业   2594篇
金属工艺   229篇
机械仪表   336篇
建筑科学   892篇
矿业工程   42篇
能源动力   452篇
轻工业   1942篇
水利工程   263篇
石油天然气   29篇
无线电   1704篇
一般工业技术   2375篇
冶金工业   5387篇
原子能技术   142篇
自动化技术   2621篇
  2023年   68篇
  2022年   152篇
  2021年   265篇
  2020年   136篇
  2019年   199篇
  2018年   266篇
  2017年   246篇
  2016年   271篇
  2015年   251篇
  2014年   387篇
  2013年   658篇
  2012年   676篇
  2011年   916篇
  2010年   634篇
  2009年   663篇
  2008年   698篇
  2007年   672篇
  2006年   567篇
  2005年   552篇
  2004年   505篇
  2003年   466篇
  2002年   427篇
  2001年   343篇
  2000年   319篇
  1999年   438篇
  1998年   1939篇
  1997年   1177篇
  1996年   795篇
  1995年   481篇
  1994年   465篇
  1993年   458篇
  1992年   201篇
  1991年   201篇
  1990年   192篇
  1989年   191篇
  1988年   195篇
  1987年   128篇
  1986年   129篇
  1985年   181篇
  1984年   139篇
  1983年   98篇
  1982年   106篇
  1981年   111篇
  1980年   84篇
  1979年   92篇
  1978年   79篇
  1977年   133篇
  1976年   147篇
  1975年   76篇
  1974年   71篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
991.
The Contractibility problem takes as input two graphs G and H, and the task is to decide whether H can be obtained from G by a sequence of edge contractions. The Induced Minor and Induced Topological Minor problems are similar, but the first allows both edge contractions and vertex deletions, whereas the latter allows only vertex deletions and vertex dissolutions. All three problems are NP-complete, even for certain fixed graphs H. We show that these problems can be solved in polynomial time for every fixed H when the input graph G is chordal. Our results can be considered tight, since these problems are known to be W[1]-hard on chordal graphs when parameterized by the size of H. To solve Contractibility and Induced Minor, we define and use a generalization of the classic Disjoint Paths problem, where we require the vertices of each of the k paths to be chosen from a specified set. We prove that this variant is NP-complete even when k=2, but that it is polynomial-time solvable on chordal graphs for every fixed k. Our algorithm for Induced Topological Minor is based on another generalization of Disjoint Paths called Induced Disjoint Paths, where the vertices from different paths may no longer be adjacent. We show that this problem, which is known to be NP-complete when k=2, can be solved in polynomial time on chordal graphs even when k is part of the input. Our results fit into the general framework of graph containment problems, where the aim is to decide whether a graph can be modified into another graph by a sequence of specified graph operations. Allowing combinations of the four well-known operations edge deletion, edge contraction, vertex deletion, and vertex dissolution results in the following ten containment relations: (induced) minor, (induced) topological minor, (induced) subgraph, (induced) spanning subgraph, dissolution, and contraction. Our results, combined with existing results, settle the complexity of each of the ten corresponding containment problems on chordal graphs.  相似文献   
992.
In engineering, it is computationally prohibitive to directly employ costly models in optimization. Therefore, surrogate-based optimization is developed to replace the accurate models with cheap surrogates during optimization for efficiency. The two key issues of surrogate-based optimization are how to improve the surrogate accuracy by making the most of the available training samples, and how to sequentially augment the training set with certain infill strategy so as to gradually improve the surrogate accuracy and guarantee the convergence to the real global optimum of the accurate model. To address these two issues, a radial basis function neural network (RBFNN) based optimization method is proposed in this paper. First, a linear interpolation (LI) based RBFNN modelling method, LI-RBFNN, is developed, which can enhance the RBFNN accuracy by enforcing the gradient match between the surrogate and the trend observed from the training samples. Second, a hybrid infill strategy is proposed, which uses the surrogate prediction error based surrogate lower bound as the optimization objective to locate the promising region and meanwhile employs a linear interpolation-based sequential sampling approach to improve the surrogate accuracy globally. Finally, extensive tests are investigated and the effectiveness and efficiency of the proposed methods are demonstrated.  相似文献   
993.
Knowledge about the relationship between morphology and the function of neurons is an important instrument in understanding the role that neurons play in information processing in the brain. In paricular, the diameter and length of segments in dendritic arborization are considered to be crucial morphological features. Consequently, accurate detection of morphological features such as centre line position and diameter is a prerequisite to establish this relationship. Accurate detection of neuron morphology from confocal microscope images is hampered by the low signal to noise ratio of the images and the properties of the microscope point spread function (PSF). The size and the anisotropy of the PSF causes feature detection to be biased and orientation dependent. We deal with these problems by utilizing Gaussian image derivatives for feature detection. Gaussian kernels provide for image derivative estimates with low noise sensitivity. Features of interest such as centre line positions and diameter in a tubular neuronal segment of a dendritic tree can be detected by calculating and subsequently utilizing Gaussian image derivatives. For diameter measurement the microscope PSF is incorporated into the derivative calculation. Results on real and simulated confocal images reveal that centre line position and diameter can be estimated accurately and are bias free even under realistic imaging conditions.  相似文献   
994.
Many attempts are underway for developing meeting support tools, but less attention is paid to the evaluation of meetingware. This article describes the development and testing of an instrument for evaluating meeting tools. First, we specified the object of evaluation—meetings—by means of a set of input, process, and outcome factors. Then, we designed the process of evaluation, consisting of, first, the generation of meeting behavior in the form of a controlled series of meetings within the context of a project and, second, the measurement of the identified meeting factors. To measure these factors, a rating scale, questionnaires, and information flow analysis were used. Next, the instrument was tested, and the factors for successful meetings were determined in 13 projects in which four participants had to meet four times. The evaluation instrument proved to be a reliable and useful aid for the development and improvement of meeting tools.  相似文献   
995.
The fundamental paradigm shift from traditional value chains to agile service value networks implies new economic and organizational challenges. As coordination mechanisms, auctions have proven to perform quite well in situations where intangible and heterogeneous goods are traded. Nevertheless, traditional approaches in the area of multidimensional combinatorial auctions are not quite suitable to enable the trade of composite services. A flawless service execution and therefore the requester’s valuation highly depends on the accurate sequence of the functional parts of the composition, meaning that in contrary to service bundles, composite services only generate value through a valid order of their components. The authors present an abstract model as a formalization of service value networks. The model comprehends a graph-based mechanism implementation to allocate multidimensional service offers within the network, to impose penalties for non-performance and to determine prices for complex services. The mechanism and the bidding language support various types of QoS attributes and their (semantic) aggregation. It is analytically shown that this variant is incentive compatible with respect to all dimensions of the service offer (quality and price). Based on these results, the authors numerically analyze strategic behavior of participating service providers regarding possible collusion strategies.  相似文献   
996.
Modern MRI measurements deliver volumetric and time‐varying blood‐flow data of unprecedented quality. Visual analysis of these data potentially leads to a better diagnosis and risk assessment of various cardiovascular diseases. Recent advances have improved the speed and quality of the imaging data considerably. Nevertheless, the data remains compromised by noise and a lack of spatiotemporal resolution. Besides imaging data, also numerical simulations are employed. These are based on mathematical models of specific features of physical reality. However, these models require realistic parameters and boundary conditions based on measurements. We propose to use data assimilation to bring measured data and physically‐based simulation together, and to harness the mutual benefits. The accuracy and noise robustness of the coupled approach is validated using an analytic flow field. Furthermore, we present a comparative visualization that conveys the differences between using conventional interpolation and our coupled approach.  相似文献   
997.
The rise of the ‘cheaper, faster, better’ mission paradigm increasingly challenges the industrial development of satellite systems. The novel paradigm will have a profound impact on the production of the real‐time software embedded on board new‐generation systems. This paper contends that a large proportion of the ensuing demands can be satisfied by an iterative and incremental development model revolving around two evolutionary enhancements to the present engineering approach, namely (1) static real‐time analysis as a key ingredient of the software verification process, and (2) an architectural paradigm centred on fixed priority preemptive scheduling. Copyright © 1999 John Wiley & Sons, Ltd.  相似文献   
998.
In this paper we introduce the database design tool EDO: an Evolutionary Database Optimizer. The term ‘evolutionary’ refers to a basic feature of the tool. After generating an initial pool of preliminary internal representations for a given conceptual data model, EDO allows a database designer to activate evolution strategies, modifying the preliminary internal representations into more desirable ones.

The quality of the internal representations found as yet is used to perform a guided walk through the solution space of alternative internal representations for the conceptual model under consideration. This quality (called fitness) takes into account the expected storage space and the expected average response time of a candidate internal representation.  相似文献   

999.
The focus of this paper is database design using automated database design tools or more general CASE tools. We present a genetic algorithm for the optimization of (internal) database structures, using a multi-criterion objective function. This function expresses conflicting objectives, reflecting the well-known time/space trade-off. This paper shows how the solution space of the algorithm can be set up in the form of tree structures (forests), and how these are encoded by a simple integer assignation. Genetic operators (database transformations) defined in terms of this encoding behave as if they manipulate tree structures. Some basic experimental results produced by a research prototype are presented.  相似文献   
1000.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号