首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1443篇
  免费   54篇
  国内免费   3篇
电工技术   25篇
综合类   1篇
化学工业   397篇
金属工艺   20篇
机械仪表   25篇
建筑科学   35篇
矿业工程   7篇
能源动力   22篇
轻工业   70篇
水利工程   12篇
石油天然气   1篇
武器工业   1篇
无线电   111篇
一般工业技术   253篇
冶金工业   247篇
原子能技术   11篇
自动化技术   262篇
  2022年   24篇
  2021年   28篇
  2020年   18篇
  2019年   19篇
  2018年   25篇
  2017年   26篇
  2016年   27篇
  2015年   19篇
  2014年   37篇
  2013年   103篇
  2012年   61篇
  2011年   71篇
  2010年   48篇
  2009年   50篇
  2008年   35篇
  2007年   30篇
  2006年   55篇
  2005年   48篇
  2004年   51篇
  2003年   50篇
  2002年   35篇
  2001年   17篇
  2000年   22篇
  1999年   19篇
  1998年   23篇
  1997年   22篇
  1996年   24篇
  1995年   16篇
  1994年   21篇
  1993年   18篇
  1992年   24篇
  1991年   11篇
  1990年   15篇
  1989年   20篇
  1988年   20篇
  1987年   14篇
  1986年   17篇
  1985年   15篇
  1982年   20篇
  1981年   14篇
  1980年   14篇
  1979年   16篇
  1978年   23篇
  1977年   17篇
  1976年   26篇
  1975年   16篇
  1974年   21篇
  1973年   14篇
  1971年   10篇
  1970年   10篇
排序方式: 共有1500条查询结果,搜索用时 515 毫秒
51.
Polychronization: computation with spikes   总被引:10,自引:0,他引:10  
We present a minimal spiking network that can polychronize, that is, exhibit reproducible time-locked but not synchronous firing patterns with millisecond precision, as in synfire braids. The network consists of cortical spiking neurons with axonal conduction delays and spike-timing-dependent plasticity (STDP); a ready-to-use MATLAB code is included. It exhibits sleeplike oscillations, gamma (40 Hz) rhythms, conversion of firing rates to spike timings, and other interesting regimes. Due to the interplay between the delays and STDP, the spiking neurons spontaneously self-organize into groups and generate patterns of stereotypical polychronous activity. To our surprise, the number of coexisting polychronous groups far exceeds the number of neurons in the network, resulting in an unprecedented memory capacity of the system. We speculate on the significance of polychrony to the theory of neuronal group selection (TNGS, neural Darwinism), cognitive neural computations, binding and gamma rhythm, mechanisms of attention, and consciousness as "attention to memories."  相似文献   
52.
Knowledge-base V&V primarily addresses the question: “Does my knowledge-base contain the right answer and can I arrive at it?” One of the main goals of our work is to properly encapsulate the knowledge representation and allow the expert to work with manageable-sized chunks of the knowledge-base. This work develops a new methodology for the verification and validation of Bayesian knowledge-bases that assists in constructing and testing such knowledge-bases. Assistance takes the form of ensuring that the knowledge is syntactically correct, correcting “imperfect” knowledge, and also identifying when the current knowledge-base is insufficient as well as suggesting ways to resolve this insufficiency. The basis of our approach is the use of probabilistic network models of knowledge. This provides a framework for formally defining and working on the problems of uncertainty in the knowledge-base.

In this paper, we examine the project which is concerned with assisting a human expert to build knowledge-based systems under uncertainty. We focus on how verification and validation are currently achieved in .  相似文献   

53.
Stochastic neural networks   总被引:2,自引:0,他引:2  
Eugene Wong 《Algorithmica》1991,6(1):466-478
The first purpose of this paper is to present a class of algorithms for finding the global minimum of a continuous-variable function defined on a hypercube. These algorithms, based on both diffusion processes and simulated annealing, are implementable as analog integrated circuits. Such circuits can be viewed as generalizations of neural networks of the Hopfield type, and are called diffusion machines.Our second objective is to show that learning in these networks can be achieved by a set of three interconnected diffusion machines: one that learns, one to model the desired behavior, and one to compute the weight changes.This research was supported in part by U.S. Army Research Office Grant DAAL03-89-K-0128.  相似文献   
54.
Time is ubiquitous. Accounting for time and its interaction with change is crucial to modeling the dynamic world, especially in domains whose study of data is sensitive to time such as in medical diagnosis, financial investment, and natural language processing, to name a few. We present a framework that incorporates both uncertainty and time in its reasoning scheme. It is based on an existing knowledge representation called Bayesian Knowledge Bases. It provides a graphical representation of knowledge, time and uncertainty, and enables probabilistic and temporal inferencing. The reasoning scheme is probabilistically sound and the fusion of temporal fragments is well defined. We will discuss some properties of this framework and introduce algorithms to ensure groundedness during the construction of the model. The framework has been applied to both artificial and real world scenarios.  相似文献   
55.
An Analysis of Chorioretinal Thermal Response to Intense Light Exposure   总被引:1,自引:0,他引:1  
An analytical expression has been obtained for the transient temperature distribution produced when the retina is irradiated by a high-intensity light source. The following factors are included in the analysis: (1) structurally the fundus consists of layers of material which have different physical properties, (2) absorption of energy from the light beam follows the Beer-Lambert law, (3) energy is absorbed in the sclera as well as in the pigment epithelium and choroid, (4) heat is removed from the fundus by blood circulating through the capillaries of the choroid, and (5) intensity of the light source may vary with time. Computed values indicate that absorption of energy in the sclera and removal of heat by convection are both important for longer irradiation times, which agrees with recent experimental observations. The asymptotic response to a train of pulses is presented also.  相似文献   
56.
本设计实例介绍了对某种旧设计的增强措施(参考资料1)。图1中的电路使用常开型单刀单掷按钮开关S1,它代替了原始设计要求的单刀双掷开关。您可以使用膜片开关来大大简化该器件的工业设计并增强它的人机控制特性。另外,该电路消除了流过未动作开关的电流,由此略微减少了工作模式中的泄漏电流。  相似文献   
57.
In this paper we follow previous “pseudo-stochastic” approaches that solve stochastic control problems by using deterministic optimal control methods. In a similar manner to the certainty equivalence principle, the suggested model maximizes a given profit function of the expected system outcome. However, unlike the certainty equivalence principle, we model the expected influences of all future events (including those that are expected beyond the planning horizon), as encapsulated by their density functions and not only by their mean values. The model is applied to the optimal scheduling of multiple part-types on a single machine that is subject to random failures and repairs. The objective of the scheduler is to maximize the profit function of the produced multiple-part mix. A numerical study is performed to evaluate the suggested pseudo-stochastic solutions under various conditions. These solutions are compared to a profit upper bound of the stochastic optimal control solutions.  相似文献   
58.
Several classes of regular expressions for timed languages accepted by timed automata have been suggested in the literature. In this article we introduce balanced timed regular expressions with colored parentheses which are equivalent to timed automata, and, differently from existing definitions, do not refer to clock values, and do not use additional operations such as intersection and renaming.  相似文献   
59.
During the 1989 Loma Prieta earthquake the Pajaro River levees near Watsonville, Calif., spread laterally at multiple locations. Four of these locations are discussed in this paper. At one location, an industrial facility was also damaged and a dispute arose as to whether lateral spreading of the adjacent levee was the cause. Stability analyses were made of the industrial site for conditions before, during, and after the earthquake. To confirm the findings, analyses were also made of three other nearby locations where the actual deformation was documented and the subsurface conditions are well defined. The calculated levee deformations at the four locations are quite consistent with the observed movements (up to 60 cm). This experience provides increased confidence in the methods of analysis described, for the characterized subsurface conditions, and the range of ground motions experienced. Additional analyses made using the more recently developed multilinear regression lateral-spreading model (e.g., Youd et al. in 1999) yielded inconsistent results.  相似文献   
60.

Introduction

After initially releasing Windows 2000 (W2K) in February 2000, Microsoft touted it as a secure operating system, one that was far improved over its predecessor, Windows NT(WNT). Yet even before Microsoft released W2K the software giant announced that it would release Service Pack 1 (SP1) for this operating system. The information security community immediately wondered whether the claims about the much improved security in W2K were true; many events and findings since then have reinforced this doubt. After a reign of three years as Microsoft's flagship operating system, last year Microsoft rolled out its newest server operating system, Windows Server 2003 (WS2003), signaling the end of an era for the W2K operating system. Windows XP (WXP) had already supplanted W2K Professional as the newest workstation operating system several years before. This is not to say that nobody uses W2K any more—to the contrary. But as W2K continues to increasingly take a proverbial back seat to newer Microsoft operating systems, now is a good time to take a retroactive look at W2K from a security viewpoint. Was it a success from a security perspective? What were its major failings and why? This paper addresses these issues.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号