首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   13951篇
  免费   871篇
  国内免费   117篇
电工技术   208篇
综合类   63篇
化学工业   3600篇
金属工艺   357篇
机械仪表   494篇
建筑科学   521篇
矿业工程   21篇
能源动力   988篇
轻工业   1314篇
水利工程   199篇
石油天然气   225篇
武器工业   4篇
无线电   1394篇
一般工业技术   2598篇
冶金工业   504篇
原子能技术   99篇
自动化技术   2350篇
  2024年   70篇
  2023年   271篇
  2022年   603篇
  2021年   903篇
  2020年   767篇
  2019年   834篇
  2018年   929篇
  2017年   847篇
  2016年   830篇
  2015年   484篇
  2014年   772篇
  2013年   1393篇
  2012年   917篇
  2011年   970篇
  2010年   674篇
  2009年   601篇
  2008年   426篇
  2007年   363篇
  2006年   307篇
  2005年   195篇
  2004年   178篇
  2003年   157篇
  2002年   120篇
  2001年   97篇
  2000年   91篇
  1999年   84篇
  1998年   143篇
  1997年   117篇
  1996年   97篇
  1995年   69篇
  1994年   54篇
  1993年   61篇
  1992年   46篇
  1991年   40篇
  1990年   43篇
  1989年   33篇
  1988年   25篇
  1987年   25篇
  1986年   34篇
  1985年   29篇
  1984年   29篇
  1983年   26篇
  1982年   22篇
  1981年   20篇
  1980年   19篇
  1979年   18篇
  1978年   19篇
  1977年   18篇
  1976年   24篇
  1975年   13篇
排序方式: 共有10000条查询结果,搜索用时 9 毫秒
121.
Dome structures provide cost-effective solutions for covering large areas without intermediate supports. In this article, simple procedures are developed to reach the configuration of the geodesic domes. A new definition of dome optimization problems is given which consists of finding optimal sections for elements (size optimization), optimal height for the crown (geometry optimization) and the optimum number of elements (topology optimization) under determined loading conditions. In order to find the optimum design, the recently developed meta-heuristic algorithm, known as the Charged System Search (CSS), is applied to the optimum design of geodesic domes. The CSS takes into account the nonlinear response of the domes. Using CSS, the optimum design of the geodesic domes is efficiently performed.  相似文献   
122.
Detection of rapidly evolving malware requires classification techniques that can effectively and efficiently detect zero-day attacks. Such detection is based on a robust model of benign behavior and deviations from that model are used to detect malicious behavior. In this paper we propose a low-complexity host-based technique that uses deviations in static file attributes to detect malicious executables. We first develop simple statistical models of static file attributes derived from the empirical data of thousands of benign executables. Deviations among the attribute models of benign and malware executables are then quantified using information-theoretic (Kullback-Leibler-based) divergence measures. This quantification reveals distinguishing attributes that are considerably divergent between benign and malware executables and therefore can be used for detection. We use the benign models of divergent attributes in cross-correlation and log-likelihood frameworks to classify malicious executables. Our results, using over 4,000 malicious file samples, indicate that the proposed detector provides reasonably high detection accuracy, while having significantly lower complexity than existing detectors.  相似文献   
123.
Determining the Ordered Weighted Averaging (OWA) operator weights is important in decision making applications. Several approaches have been proposed in the literature to obtain the associated weights. This paper provides an alternative disparity model to identify the OWA operator weights. The proposed mathematical model extends the existing disparity approaches by minimizing the sum of the deviation between two distinct OWA weights. The proposed disparity model can be used for a preference ranking aggregation. A numerical example in preference ranking and an application in search engines prove the usefulness of the generated OWA weights.  相似文献   
124.
While the demand for mobile broadband wireless services continues to increase, radio resources remain scarce. Even with the substantial increase in the supported bandwidth in the next generation broadband wireless access systems (BWASs), it is expected that these systems will severely suffer from congestion, due to the rapid increase in demand of bandwidth-intensive multimedia services. Without efficient bandwidth management and congestion control schemes, network operators may not be able to meet the increasing demand of users for multimedia services, and hence they may suffer an immense revenue loss. In this paper, we propose an admission-level bandwidth management scheme consisting of call admission control (CAC) and dynamic pricing. The main aim of our proposed scheme is to provide monetary incentives to users to use the wireless resources efficiently and rationally, hence, allowing efficient bandwidth management at the admission level. By dynamically determining the prices of units of bandwidth, the proposed scheme can guarantee that the number of connection requests to the system are less than or equal to certain optimal values computed dynamically, hence, ensuring a congestion-free system. The proposed scheme is general and can accommodate different objective functions for the admission control as well as different pricing functions. Comprehensive simulation results with accurate and inaccurate demand modeling are provided to show the effectiveness and strengths of our proposed approach.  相似文献   
125.
126.
Radio Frequency Identification (RFID) based systems have been used in different applications in the Architecture, Engineering, Construction, Owner and Operator (AECOO) industry. Applications are mainly designed for specific lifecycle stage of the facility and serve the needs of only one of the stakeholders. This would increase the cost and the labor for adding and removing tags and eliminate the chance of using shared resources. In this paper, the usage of tags permanently attached to components is proposed where the memory of the tags is used during the lifecycle by different stakeholders for data storage and handover. A Building Information Model (BIM) database is used for tackling the interoperability issues allowing different users to access and share the data. To securely and efficiently store data on RFID tags in ifcXML format, multi-level encryption together with role-based access control is applied on the data stored on RFID tags. Each user is assigned a certain role and can only access the part of data for which he has authorization according to a predefined role and the Access Control Policy. To explore the technical feasibility of the proposed approach, a case study considering both facilities management and emergency management has been implemented and tested at Concordia University.  相似文献   
127.
This paper introduces an analytical method for approximating the performance of a firm real-time system consisting of a number of parallel infinite-capacity single-server queues. The service discipline for the individual queues is earliest-deadline-first (EDF). Real-time jobs with exponentially distributed relative deadlines arrive according to a Poisson process. Jobs either all have deadlines until the beginning of service or deadlines until the end of service. Upon arrival, a job joins a queue according to a state-dependent stationary policy, where the state of the system is the number of jobs in each queue. Migration among the queues is not allowed. An important performance measure to consider is the overall loss probability of the system. The system is approximated by a Markovian model in the long run. The resulting model can then be solved analytically using standard Markovian solution techniques. Comparing numerical and simulation results for at least three different stationary policies, we find that the existing errors are relatively small.  相似文献   
128.
We propose a biologically-motivated computational model for learning task-driven and object-based visual attention control in interactive environments. In this model, top-down attention is learned interactively and is used to search for a desired object in the scene through biasing the bottom-up attention in order to form a need-based and object-driven state representation of the environment. Our model consists of three layers. First, in the early visual processing layer, most salient location of a scene is derived using the biased saliency-based bottom-up model of visual attention. Then a cognitive component in the higher visual processing layer performs an application specific operation like object recognition at the focus of attention. From this information, a state is derived in the decision making and learning layer. Top-down attention is learned by the U-TREE algorithm which successively grows an object-based binary tree. Internal nodes in this tree check the existence of a specific object in the scene by biasing the early vision and the object recognition parts. Its leaves point to states in the action value table. Motor actions are associated with the leaves. After performing a motor action, the agent receives a reinforcement signal from the critic. This signal is alternately used for modifying the tree or updating the action selection policy. The proposed model is evaluated on visual navigation tasks, where obtained results lend support to the applicability and usefulness of the developed method for robotics.  相似文献   
129.
Abstract: Data envelopment analysis (DEA) is a non‐parametric method for measuring the efficiency and productivity of decision‐making units (DMUs). On the other hand data mining techniques allow DMUs to explore and discover meaningful, previously hidden information from large databases. Classification and regression (C&R) is the commonly used decision tree in data mining. DEA determines the efficiency scores but cannot give details of factors related to inefficiency, especially if these factors are in the form of non‐numeric variables such as operational style in the banking sector. This paper proposes a framework to combine DEA with C&R for assessing the efficiency and productivity of DMUs. The result of the combined model is a set of rules that can be used by policy makers to discover reasons behind efficient and inefficient DMUs. As a case study, we use the proposed methodology to investigate factors associated with the efficiency of the banking sector in the Gulf Cooperation Council countries.  相似文献   
130.
Requirements engineering (RE) research often ignores or presumes a uniform nature of the context in which the system operates. This assumption is no longer valid in emerging computing paradigms, such as ambient, pervasive and ubiquitous computing, where it is essential to monitor and adapt to an inherently varying context. Besides influencing the software, context may influence stakeholders’ goals and their choices to meet them. In this paper, we propose a goal-oriented RE modeling and reasoning framework for systems operating in varying contexts. We introduce contextual goal models to relate goals and contexts; context analysis to refine contexts and identify ways to verify them; reasoning techniques to derive requirements reflecting the context and users priorities at runtime; and finally, design time reasoning techniques to derive requirements for a system to be developed at minimum cost and valid in all considered contexts. We illustrate and evaluate our approach through a case study about a museum-guide mobile information system.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号