首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   30194篇
  免费   2642篇
  国内免费   953篇
电工技术   1261篇
综合类   1608篇
化学工业   6375篇
金属工艺   1148篇
机械仪表   1252篇
建筑科学   1680篇
矿业工程   450篇
能源动力   844篇
轻工业   4557篇
水利工程   563篇
石油天然气   759篇
武器工业   136篇
无线电   2537篇
一般工业技术   3671篇
冶金工业   1351篇
原子能技术   257篇
自动化技术   5340篇
  2024年   123篇
  2023年   416篇
  2022年   1107篇
  2021年   1328篇
  2020年   1020篇
  2019年   906篇
  2018年   1007篇
  2017年   1101篇
  2016年   1031篇
  2015年   1340篇
  2014年   1772篇
  2013年   2328篇
  2012年   2461篇
  2011年   2707篇
  2010年   2211篇
  2009年   2163篇
  2008年   1975篇
  2007年   1862篇
  2006年   1488篇
  2005年   1109篇
  2004年   757篇
  2003年   613篇
  2002年   507篇
  2001年   350篇
  2000年   290篇
  1999年   236篇
  1998年   278篇
  1997年   210篇
  1996年   169篇
  1995年   128篇
  1994年   98篇
  1993年   91篇
  1992年   66篇
  1991年   51篇
  1990年   47篇
  1989年   50篇
  1988年   35篇
  1987年   37篇
  1986年   33篇
  1985年   34篇
  1984年   21篇
  1983年   20篇
  1982年   24篇
  1981年   27篇
  1980年   19篇
  1979年   19篇
  1978年   25篇
  1977年   15篇
  1976年   25篇
  1973年   12篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
111.
In this paper, we study the sensitivity of centrality metrics as a key metric of social networks to support visual reasoning. As centrality represents the prestige or importance of a node in a network, its sensitivity represents the importance of the relationship between this and all other nodes in the network. We have derived an analytical solution that extracts the sensitivity as the derivative of centrality with respect to degree for two centrality metrics based on feedback and random walks. We show that these sensitivities are good indicators of the distribution of centrality in the network, and how changes are expected to be propagated if we introduce changes to the network. These metrics also help us simplify a complex network in a way that retains the main structural properties and that results in trustworthy, readable diagrams. Sensitivity is also a key concept for uncertainty analysis of social networks, and we show how our approach may help analysts gain insight on the robustness of key network metrics. Through a number of examples, we illustrate the need for measuring sensitivity, and the impact it has on the visualization of and interaction with social and other scale-free networks.  相似文献   
112.
Since wavelet transform uses the multi-scale (or multi-resolution) techniques for time series, wavelet transform is suitable for modeling complex signals. Haar wavelet transform is the most commonly used and the simplest one. The Haar wavelet neural network (HWNN) applies the Harr wavelet transform as active functions. It is easy for HWNN to model a nonlinear system at multiple time scales and sudden transitions. In this paper, two types of HWNN, feedforward and recurrent wavelet neural networks, are used to model discrete-time nonlinear systems, which are in the forms of the NARMAX model and state-space model. We first propose an optimal method to determine the structure of HWNN. Then two stable learning algorithms are given for the shifting and broadening coefficients of the wavelet functions. The stability of the identification procedures is proven.  相似文献   
113.
In this paper, a new approximation to off-line signature verification is proposed based on two-class classifiers using an expert decisions ensemble. Different methods to extract sets of local and a global features from the target sample are detailed. Also a normalization by confidence voting method is used in order to decrease the final equal error rate (EER). Each set of features is processed by a single expert, and on the other approach proposed, the decisions of the individual classifiers are combined using weighted votes. Experimental results are given using a subcorpus of the large MCYT signature database for random and skilled forgeries. The results show that the weighted combination outperforms the individual classifiers significantly. The best EER obtained were 6.3 % in the case of skilled forgeries and 2.31 % in the case of random forgeries.  相似文献   
114.
Model-based testing is focused on testing techniques which rely on the use of models. The diversity of systems and software to be tested implies the need for research on a variety of models and methods for test automation. We briefly review this research area and introduce several papers selected from the 22nd International Conference on Testing Software and Systems (ICTSS).  相似文献   
115.
This paper is concerned with the neutral‐delay‐dependent and discrete‐delay‐dependent stability for uncertain neutral systems with mixed delays and norm‐bounded uncertainties. Through constructing a new augmented Lyapunov‐Krasovskii functional and proving its positive definiteness, introducing some slack matrices and using integral inequality, the improved delay‐dependent stability criteria are derived in terms of linear matrix inequalities. Numerical examples are given to illustrate the significant improvement on the conservatism of the delay bound over some existing results. Copyright © 2010 John Wiley and Sons Asia Pte Ltd and Chinese Automatic Control Society  相似文献   
116.
Spam has become a major issue in computer security because it is a channel for threats such as computer viruses, worms, and phishing. More than 86% of received e-mails are spam. Historical approaches to combating these messages, including simple techniques such as sender blacklisting or the use of e-mail signatures, are no longer completely reliable. Many current solutions feature machine-learning algorithms trained using statistical representations of the terms that most commonly appear in such e-mails. However, these methods are merely syntactic and are unable to account for the underlying semantics of terms within messages. In this paper, we explore the use of semantics in spam filtering by introducing a pre-processing step of Word Sense Disambiguation (WSD). Based upon this disambiguated representation, we apply several well-known machine-learning models and show that the proposed method can detect the internal semantics of spam messages.  相似文献   
117.
In this paper, the topology optimization design of the free vibrating continuum structures is formulated based on the element free Galerkin (EFG) method. Considering the relative density of nodes as design variable, and the maximization of the fundamental eigenvalue as an objective function, the mathematical formulation of the topology optimization model is developed using the solid isotropic microstructures with penalization (SIMP) interpolation scheme. The topology optimization problem is solved by the optimality criteria method. Finally, the feasibility and efficiency of the proposed method are illustrated with several 2D examples that are widely used in the topology optimization design.  相似文献   
118.
针对城市环境中车载自组网信息发送面临的问题,本文提出一种可靠的车载自组网广播算法。首先,结合节点间的位置信息与移动方向将节点分类,基于距离机制选择中继节点,实现多跳广播;在十字路口处,为解决消息在各个路口进行广播,结合道路拓扑,将节点分为前向节点与后向节点两类;最后,针对车辆密度稀疏状况而出现通信空洞的问题,采用携带转发策略解决,节点主动探测空洞的发生,并验证消息发送方向上有节点进入通信范围,再次进行消息广播。仿真实验表明,算法在数据包延时、数据包成功发送率以及发送单一数据包平均负荷等方面具有较好的性能。  相似文献   
119.
针对一类具有未知扰动的线性系统的故障检测(FD)问题,通过对系统进行重构,设计出了系统的H2/H-优化FD观测器。利用构造的Lyapunov函数和线性矩阵不等式,证明并给出了FD观测器有解的充分条件和优化设计方法。所设计的观测器使系统具有渐近稳定性,抑制干扰能力强,满足所给的范数指标。仿真结果验证了所设计方法的有效性。  相似文献   
120.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号