首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2293篇
  免费   145篇
  国内免费   2篇
电工技术   47篇
综合类   6篇
化学工业   672篇
金属工艺   60篇
机械仪表   61篇
建筑科学   147篇
矿业工程   2篇
能源动力   50篇
轻工业   164篇
水利工程   6篇
石油天然气   2篇
无线电   186篇
一般工业技术   487篇
冶金工业   151篇
原子能技术   10篇
自动化技术   389篇
  2022年   29篇
  2021年   48篇
  2020年   32篇
  2019年   44篇
  2018年   50篇
  2017年   66篇
  2016年   67篇
  2015年   76篇
  2014年   88篇
  2013年   131篇
  2012年   110篇
  2011年   165篇
  2010年   103篇
  2009年   105篇
  2008年   123篇
  2007年   111篇
  2006年   103篇
  2005年   79篇
  2004年   59篇
  2003年   63篇
  2002年   42篇
  2001年   41篇
  2000年   43篇
  1999年   40篇
  1998年   50篇
  1997年   41篇
  1996年   42篇
  1995年   33篇
  1994年   21篇
  1993年   30篇
  1992年   23篇
  1991年   21篇
  1990年   17篇
  1989年   22篇
  1988年   18篇
  1987年   12篇
  1986年   25篇
  1985年   20篇
  1984年   20篇
  1983年   15篇
  1982年   13篇
  1981年   18篇
  1980年   13篇
  1979年   19篇
  1978年   20篇
  1977年   17篇
  1976年   15篇
  1974年   12篇
  1973年   11篇
  1970年   10篇
排序方式: 共有2440条查询结果,搜索用时 15 毫秒
181.
Stability-based validation of clustering solutions   总被引:1,自引:0,他引:1  
Data clustering describes a set of frequently employed techniques in exploratory data analysis to extract "natural" group structure in data. Such groupings need to be validated to separate the signal in the data from spurious structure. In this context, finding an appropriate number of clusters is a particularly important model selection question. We introduce a measure of cluster stability to assess the validity of a cluster model. This stability measure quantifies the reproducibility of clustering solutions on a second sample, and it can be interpreted as a classification risk with regard to class labels produced by a clustering algorithm. The preferred number of clusters is determined by minimizing this classification risk as a function of the number of clusters. Convincing results are achieved on simulated as well as gene expression data sets. Comparisons to other methods demonstrate the competitive performance of our method and its suitability as a general validation tool for clustering solutions in real-world problems.  相似文献   
182.
Meyer J 《Human factors》2004,46(2):196-204
This paper presents a conceptual analysis of dynamic hazard warning systems. The normative aspects of responses to warnings are analyzed, and a distinction is made between two forms of responses to a warning system, referred to as compliance and reliance. Determinants of the responses to warnings are identified, and they are broadly classified into normative, task, and operator factors. Existing research on warnings and automation is assessed in view of this conceptual framework, and directions for future research are discussed. Some implications of this analysis for practitioners, designers, and researchers are indicated. Actual or potential applications of this research include recommendations for the analysis, design, and study of dynamic warning systems.  相似文献   
183.
Traumatic brain injury (TBI) is a major cause of morbidity and mortality among children and adolescents. To gain insight into developmental events influenced by TBI, we analyzed subacute mouse brain proteome changes in a percussion head trauma model at P7 ipsi- and contralateral to the site of injury. The comparison of brain proteomes of trauma mice and controls revealed reproducible changes in the intensity of 28 proteins (30 protein spots) in response to trauma. The changes detected suggest that TBI leads to apoptosis, inflammation, and oxidative stress. These changes were consistent with our results of histological and biochemical evaluation of the brains which revealed widespread apoptotic neurodegeneration, microglia activation, and increased levels of protein carbonyls. Furthermore, we detected changes in proteins involved in neuronal migration as well as axonal and dendritic growth and guidance, suggesting interference of trauma with these developmental events.  相似文献   
184.
This article describes an evaluation of six different methods for prioritizing software requirements. Based on the quality requirements for a telephony system, the authors individually used all six methods on separate occasions to prioritize the requirements. The methods were then characterized according to a number of criteria from a user's perspective. We found the analytic hierarchy process to be the most promising method, although it may be problematic to scale-up. In an industrial follow-up study we used the analytic hierarchy process to further investigate its applicability. We found that the process is demanding but worth the effort because of its ability to provide reliable results, promote knowledge transfer and create consensus among project members.  相似文献   
185.
We present a deterministic kinetic data structure for the facility location problem that maintains a subset of the moving points as facilities such that, at any point of time, the accumulated cost for the whole point set is at most a constant factor larger than the optimal cost. In our scenario, each point can change its status between client and facility and moves continuously along a known trajectory in a d-dimensional Euclidean space, where d is a constant.  相似文献   
186.
187.
Maps should be designed so that users can comprehend and use the information. Display decisions, such as choosing the scale at which an area is shown, depend on properties of the displayed information such as the perceived density (PD) of the information. Taking a psychophysical approach we suggest that the PD of information in a road map is related to the scale and properties of the mapped area. 54 participants rated the PD of 60 maps from different regions. We provide a simple model that predicts the PD of electronic road map displays, using the logarithm of the number of roads, the logarithm of the number of junctions and the length of the shown roads. The PD model was cross-validated using a different set of 60 maps (n = 44). The model can be used for automatically adjusting display scales and for evaluating map designs, considering the required PD to perform a map-related task.  相似文献   
188.
Metaphors are often used to provide the user with a mental model to ease the use of computers. An example of such a metaphor is the commonly used “Desktop Metaphor”. Metaphors also can be used to ease context-aware information access for the users of mobile information systems. In this paper we present a taxonomy that allows the categorisation of such metaphors. Furthermore, we give an overview of existing metaphors and their implementations. After introducing some new metaphors we conclude our considerations with a classification of new and existing metaphors using our taxonomy.  相似文献   
189.
190.
It is well-known that there are striking analogies between linear shift-invariant systems and morphological systems for image analysis. So far, however, the relations between both system theories are mainly understood on a pure convolution / erosion level. A formal connection on the level of differential or pseudodifferential equations and their induced scale-spaces is still missing. The goal of our paper is to close this gap. We present a simple and fairly general dictionary that allows to translate any linear shift-invariant evolution equation into its morphological counterpart and vice versa. It is based on a scale-space representation by means of the symbol of its (pseudo)differential operator. Introducing a novel transformation, the Cramér–Fourier transform, puts us in a position to relate the symbol to the structuring function of a morphological scale-space of Hamilton–Jacobi type. As an application of our general theory, we derive the morphological counterparts of many linear shift-invariant scale-spaces, such as the Poisson scale-space, \(\alpha \)-scale-spaces, summed \(\alpha \)-scale-spaces, relativistic scale-spaces, and their anisotropic variants. Our findings are illustrated by experiments.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号