首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1505篇
  免费   77篇
  国内免费   5篇
电工技术   13篇
综合类   4篇
化学工业   319篇
金属工艺   15篇
机械仪表   33篇
建筑科学   73篇
矿业工程   1篇
能源动力   38篇
轻工业   317篇
水利工程   9篇
石油天然气   7篇
无线电   76篇
一般工业技术   223篇
冶金工业   268篇
原子能技术   11篇
自动化技术   180篇
  2024年   5篇
  2023年   20篇
  2022年   38篇
  2021年   59篇
  2020年   35篇
  2019年   37篇
  2018年   40篇
  2017年   55篇
  2016年   54篇
  2015年   42篇
  2014年   55篇
  2013年   93篇
  2012年   81篇
  2011年   126篇
  2010年   69篇
  2009年   69篇
  2008年   86篇
  2007年   73篇
  2006年   61篇
  2005年   56篇
  2004年   47篇
  2003年   30篇
  2002年   47篇
  2001年   32篇
  2000年   22篇
  1999年   20篇
  1998年   35篇
  1997年   43篇
  1996年   25篇
  1995年   14篇
  1994年   16篇
  1993年   9篇
  1992年   12篇
  1991年   8篇
  1990年   10篇
  1989年   9篇
  1988年   8篇
  1987年   4篇
  1985年   6篇
  1984年   3篇
  1983年   3篇
  1981年   4篇
  1980年   3篇
  1979年   2篇
  1978年   4篇
  1977年   3篇
  1976年   2篇
  1975年   2篇
  1974年   3篇
  1973年   2篇
排序方式: 共有1587条查询结果,搜索用时 15 毫秒
11.
Topic models are a useful and ubiquitous tool for understanding large corpora. However, topic models are not perfect, and for many users in computational social science, digital humanities, and information studies—who are not machine learning experts—existing models and frameworks are often a “take it or leave it” proposition. This paper presents a mechanism for giving users a voice by encoding users’ feedback to topic models as correlations between words into a topic model. This framework, interactive topic modeling (itm), allows untrained users to encode their feedback easily and iteratively into the topic models. Because latency in interactive systems is crucial, we develop more efficient inference algorithms for tree-based topic models. We validate the framework both with simulated and real users.  相似文献   
12.
Career visual searchers such as radiologists and airport security screeners strive to conduct accurate visual searches, but despite extensive training, errors still occur. A key difference between searches in radiology and airport security is the structure of the search task: Radiologists typically scan a certain number of medical images (fixed objective), and airport security screeners typically search X-rays for a specified time period (fixed duration). Might these structural differences affect accuracy? We compared performance on a search task administered either under constraints that approximated radiology or airport security. Some displays contained more than one target because the presence of multiple targets is an established source of errors for career searchers, and accuracy for additional targets tends to be especially sensitive to contextual conditions. Results indicate that participants searching within the fixed objective framework produced more multiple-target search errors; thus, adopting a fixed duration framework could improve accuracy for career searchers.  相似文献   
13.
This study uses a hostage negotiation setting to demonstrate how a team of strategic police officers can utilize specific coping strategies to minimize uncertainty at different stages of their decision-making in order to foster resilient decision-making to effectively manage a high-risk critical incident. The presented model extends the existing research on coping with uncertainty by (1) applying the RAWFS heuristic (Lipshitz and Strauss in Organ Behav Human Decis Process 69:149–163, 1997) of individual decision-making under uncertainty to a team critical incident decision-making domain; (2) testing the use of various coping strategies during “in situ” team decision-making by using a live simulated hostage negotiation exercise; and (3) including an additional coping strategy (“reflection-in-action”; Schön in The reflective practitioner: how professionals think in action. Temple Smith, London, 1983) that aids naturalistic team decision-making. The data for this study were derived from a videoed strategic command meeting held within a simulated live hostage training event; these video data were coded along three themes: (1) decision phase; (2) uncertainty management strategy; and (3) decision implemented or omitted. Results illustrate that, when assessing dynamic and high-risk situations, teams of police officers cope with uncertainty by relying on “reduction” strategies to seek additional information and iteratively update these assessments using “reflection-in-action” (Schön 1983) based on previous experience. They subsequently progress to a plan formulation phase and use “assumption-based reasoning” techniques in order to mentally simulate their intended courses of action (Klein et al. 2007), and identify a preferred formulated strategy through “weighing the pros and cons” of each option. In the unlikely event that uncertainty persists to the plan execution phase, it is managed by “reduction” in the form of relying on plans and standard operating procedures or by “forestalling” and intentionally deferring the decision while contingency planning for worst-case scenarios.  相似文献   
14.
15.
This paper reports results of research into the definition of requirements for new consumer products––specifically, electro-mechanical products. The research dealt with the derivation of design requirements that are demonstrably aligned with stakeholder needs. The paper describes a comprehensive process that can enable product development teams to deal with statements of product requirements, as originally collected through market research activities, in a systematic and traceable manner from the early, fuzzy front end, stages of the design process. The process described has been based on principles of systems engineering. A case study from its application and evaluation drawn from the power sector is described in this paper. The case study demonstrates how the process can significantly improve product quality planning practices through revision of captured product requirements, analysis of stakeholder requirements and derivation of design requirements. The paper discusses benefits and issues from the use of the process by product development teams, and identifies areas for further research. Finally, the conclusions drawn from the reported research are presented.
Vassilis AgouridasEmail:
  相似文献   
16.
The recent trend to reduce the thickness of metallic sheets used in forming processes strongly increases the likelihood of the occurrence of wrinkling. Thus, in order to obtain defect-free components, the prediction of this kind of defect becomes extremely important in the tool design and selection of process parameters. In this study, the sheet metal forming process proposed as a benchmark in the Numisheet 2014 conference is selected to analyse the influence of the tool geometry on wrinkling behaviour, as well as the reliability of the developed numerical model. The side-wall wrinkling during the deep drawing process of a cylindrical cup in AA5042 aluminium alloy is investigated through finite element simulation and experimental measurements. The material plastic anisotropy is modelled with an advanced yield criterion beyond the isotropic (von Mises) material behaviour. The results show that the shape of the wrinkles predicted by the numerical model is strongly affected by the finite element mesh used in the blank discretization. The accurate modelling of the plastic anisotropy of the aluminium alloy yields numerical results that are in good agreement with the experiments, particularly the shape and location of the wrinkles. The predicted punch force evolution is strongly influenced by the friction coefficient used in the model. Moreover, the two punch geometries provide drawn cups with different wrinkle waves, mainly differing in amplitude.  相似文献   
17.
18.
The Birnbaum-Saunders (BS) model is a positively skewed statistical distribution that has received great attention in recent decades. A generalized version of this model was derived based on symmetrical distributions in the real line named the generalized BS (GBS) distribution. The R package named gbs was developed to analyze data from GBS models. This package contains probabilistic and reliability indicators and random number generators from GBS distributions. Parameter estimates for censored and uncensored data can also be obtained by means of likelihood methods from the gbs package. Goodness-of-fit and diagnostic methods were also implemented in this package in order to check the suitability of the GBS models. In this article, the capabilities and features of the gbs package are illustrated by using simulated and real data sets. Shape and reliability analyses for GBS models are presented. A simulation study for evaluating the quality and sensitivity of the estimation method developed in the package is provided and discussed.  相似文献   
19.
A new approach is introduced for turbidite modeling, leveraging the potential of computational fluid dynamics methods to simulate the flow processes that led to turbidite formation. The practical use of numerical flow simulation for the purpose of turbidite modeling so far is hindered by the need to specify parameters and initial flow conditions that are a priori unknown. The present study proposes a method to determine optimal simulation parameters via an automated optimization process. An iterative procedure matches deposit predictions from successive flow simulations against available localized reference data, as in practice may be obtained from well logs, and aims at convergence towards the best-fit scenario. The final result is a prediction of the entire deposit thickness and local grain size distribution. The optimization strategy is based on a derivative-free, surrogate-based technique. Direct numerical simulations are performed to compute the flow dynamics. A proof of concept is successfully conducted for the simple test case of a two-dimensional lock-exchange turbidity current. The optimization approach is demonstrated to accurately retrieve the initial conditions used in a reference calculation.  相似文献   
20.
A Web server is a wonderful business communication channel — it relays information cheaply, conveniently and, in theory, to almost everyone. Traditionally, in my experience at least, the Web is not an area auditors have taken particularly seriously: until recently, it has not been used to transact business, but simply to publicize the organization. Most companies run their Web applications on a firewall interface or interfaces outside the internal network, so the audit, more concerned with the core business applications, could rely on the firewall to protect against hackers, and treat the Web server as, at worst, a bastion host.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号