首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5285篇
  免费   413篇
  国内免费   5篇
电工技术   65篇
综合类   7篇
化学工业   1608篇
金属工艺   60篇
机械仪表   105篇
建筑科学   211篇
矿业工程   10篇
能源动力   203篇
轻工业   697篇
水利工程   44篇
石油天然气   7篇
无线电   343篇
一般工业技术   1007篇
冶金工业   369篇
原子能技术   29篇
自动化技术   938篇
  2024年   12篇
  2023年   80篇
  2022年   315篇
  2021年   398篇
  2020年   183篇
  2019年   187篇
  2018年   218篇
  2017年   190篇
  2016年   265篇
  2015年   194篇
  2014年   283篇
  2013年   363篇
  2012年   354篇
  2011年   457篇
  2010年   293篇
  2009年   252篇
  2008年   301篇
  2007年   243篇
  2006年   168篇
  2005年   151篇
  2004年   129篇
  2003年   118篇
  2002年   84篇
  2001年   59篇
  2000年   46篇
  1999年   50篇
  1998年   38篇
  1997年   30篇
  1996年   39篇
  1995年   22篇
  1994年   21篇
  1993年   22篇
  1992年   25篇
  1991年   13篇
  1990年   7篇
  1989年   11篇
  1988年   9篇
  1987年   9篇
  1986年   5篇
  1985年   6篇
  1984年   10篇
  1983年   10篇
  1982年   11篇
  1981年   6篇
  1980年   2篇
  1979年   8篇
  1972年   1篇
  1971年   1篇
  1967年   2篇
  1948年   1篇
排序方式: 共有5703条查询结果,搜索用时 15 毫秒
111.
In this paper we propose a heuristic approach for the problem of packing equal rectangles within a convex region. The approach is based on an Iterated Local Search scheme, in which the key step is the perturbation move. Different perturbation moves, both combinatorial and continuous ones, are proposed and compared through extensive computational experiments on a set of test instances. The overall results are quite encouraging.  相似文献   
112.
The paper addresses the problem of locating sensors with a circular field of view so that a given line segment is under full surveillance, which is termed as the disc covering problem on a line. The cost of each sensor includes a fixed component f, and a variable component that is a convex function of the diameter of the field-of-view area. When only one type of sensor or, in general, one type of disc, is available, then a simple polynomial algorithm solves the problem. When there are different types of sensors, the problem becomes hard. A branch-and-bound algorithm as well as an efficient heuristic are developed for the special case in which the variable cost component of each sensor is proportional to the square of the measure of the field-of-view area. The heuristic very often obtains the optimal solution as shown in extensive computational testing.  相似文献   
113.
114.
115.
116.
Our research aim is to develop interactions and algorithms for learning from naïve human teachers through demonstration. We introduce a novel approach to leverage the goal-oriented nature of human teachers by learning an action model and a goal model simultaneously from the same set of demonstrations. We use robot motion data to learn an action model for executing the skill. We use a generic set of perceptual features to learn a goal model and use it to monitor the executed action model. We evaluate our approach with data from 8 naïve teachers demonstrating two skills to the robot. We show that the goal models in the perceptual feature space are consistent across users and correctly recognize demonstrations in cross-validation tests. We additionally observe that a subset of users were not able to teach a successful action model whereas all of them were able to teach a mostly successful goal model. When the learned action models are executed on the robot, the success was on average 66.25 %. Whereas the goal models were on average 90 % correct at deciding on success/failure of the executed action, which we call monitoring.  相似文献   
117.
This paper provides an overview of the current state-of-the-art on using constraints in knowledge discovery and data mining. The use of constraints in a data mining task requires specific definition and satisfaction tools during knowledge extraction. This survey proposes three groups of studies based on classification, clustering and pattern mining, whether the constraints are on the data, the models or the measures, respectively. We consider the distinctions between hard and soft constraint satisfaction, and between the knowledge extraction phases where constraints are considered. In addition to discussing how constraints can be used in data mining, we show how constraint-based languages can be used throughout the data mining process.  相似文献   
118.
This work describes a system for acoustic‐based navigation that relies on the addition of localization services to underwater networks. The localization capability has been added on top of an existing network, without imposing constraints on its structure/operation. The approach is based on the inclusion of timing information within acoustic messages through which it is possible to know the time of an acoustic transmission in relation to its reception. Exploiting such information at the network application level makes it possible to create an interrogation scheme similar to that of a long baseline. The advantage is that the nodes/autonomous underwater vehicles (AUVs) themselves become the transponders of a network baseline, and hence there is no need for dedicated instrumentation. The paper reports at sea results obtained from the COLLAB–NGAS14 experimental campaign. During the sea trial, the approach was implemented within an operational network in different configurations to support the navigation of the two Centre for Maritime Research and Experimentation Ocean Explorer (CMRE OEX) vehicles. The obtained results demonstrate that it is possible to support AUV navigation without constraining the network design and with a minimum communication overhead. Alternative solutions (e.g., synchronized clocks or two‐way‐travel‐time interrogations) might provide higher precision or accuracy, but they come at the cost of impacting on the network design and/or on the interrogation strategies. Results are discussed, and the performance achieved at sea demonstrates the viability to use the system in real, large‐scale operations involving multiple AUVs. These results represent a step toward location‐aware underwater networks that are able to provide node localization as a service.  相似文献   
119.
The aim of this paper is to deal with the problem of fault tolerant control in the framework of discrete event systems modeled as automata. A fault tolerant controller is a controller able to satisfy control specifications both in nominal operation and after the occurrence of a fault. This task is solved by means of a parameterized controller that is suitably updated on the basis of the information provided by online diagnostics: the supervisor actively reacts to the detection of a malfunctioning component in order to eventually meet degraded control specifications. Starting from an appropriate model of the system, we recall the notion of safe diagnosability as a necessary step in order to achieve fault tolerant control. We then introduce two new notions: (i) “safe controllability”, which represents the capability, after the occurrence of a fault, of steering the system away from forbidden zones and (ii) “active fault tolerant system”, which is the property of safely continuing operation after faults. Finally, we show how the problem can be solved using a general control architecture based on the use of special kind of diagnoser, called “diagnosing controller”, which is used to safely detect faults and to switch between the nominal control policy and a bank of reconfigured control policies. A simple example is used to illustrate the new notions and the control architecture introduced in the paper.  相似文献   
120.
An effective solution to automate information extraction from Web pages is represented by wrappers. A wrapper associates a Web page with an XML document that represents part of the information in that page in a machine-readable format. Most existing wrapping approaches have traditionally focused on how to generate extraction rules, while they have ignored potential benefits deriving from the use of the schema of the information being extracted in the wrapper evaluation. In this paper, we investigate how the schema of extracted information can be effectively used in both the design and evaluation of a Web wrapper. We define a clean declarative semantics for schema-based wrappers by introducing the notion of (preferred) extraction model, which is essential to compute a valid XML document containing the information extracted from a Web page. We developed the SCRAP (SChema-based wRAPper for web data) system for the proposed schema-based wrapping approach, which also provides visual support tools to the wrapper designer. Moreover, we present a wrapper generalization framework to profitably speed up the design of schema-based wrappers. Experimental evaluation has shown that SCRAP wrappers are not only able to successfully extract the required data, but also they are robust to changes that may occur in the source Web pages.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号