首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   20565篇
  免费   287篇
  国内免费   11篇
电工技术   238篇
综合类   19篇
化学工业   4001篇
金属工艺   395篇
机械仪表   430篇
建筑科学   1165篇
矿业工程   49篇
能源动力   610篇
轻工业   1856篇
水利工程   136篇
石油天然气   78篇
武器工业   1篇
无线电   1836篇
一般工业技术   3412篇
冶金工业   3370篇
原子能技术   218篇
自动化技术   3049篇
  2024年   173篇
  2023年   200篇
  2022年   311篇
  2021年   530篇
  2020年   452篇
  2019年   471篇
  2018年   439篇
  2017年   412篇
  2016年   541篇
  2015年   471篇
  2014年   560篇
  2013年   1132篇
  2012年   899篇
  2011年   1184篇
  2010年   825篇
  2009年   876篇
  2008年   920篇
  2007年   818篇
  2006年   745篇
  2005年   638篇
  2004年   530篇
  2003年   481篇
  2002年   467篇
  2001年   326篇
  2000年   348篇
  1999年   397篇
  1998年   837篇
  1997年   542篇
  1996年   453篇
  1995年   341篇
  1994年   327篇
  1993年   307篇
  1992年   200篇
  1991年   170篇
  1990年   159篇
  1989年   151篇
  1988年   134篇
  1987年   125篇
  1986年   119篇
  1985年   150篇
  1984年   143篇
  1983年   120篇
  1982年   95篇
  1981年   109篇
  1980年   92篇
  1979年   105篇
  1978年   92篇
  1977年   122篇
  1976年   156篇
  1975年   84篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
In this article we present a new class of particle methods which aim at being accurate in the uniform norm with a minimal amount of smoothing. The crux of our approach is to compute local polynomial expansions of the characteristic flow to transport the particle shapes with improved accuracy. In the first order case the method consists of representing the transported density with linearly-transformed particles, the second order version transports quadratically-transformed particles, and so on. For practical purposes we provide discrete versions of the resulting LTP and QTP schemes that only involve pointwise evaluations of the forward characteristic flow, and we propose local indicators for the associated transport error. On a theoretical level we extend these particle schemes up to arbitrary polynomial orders and show by a rigorous analysis that for smooth flows the resulting methods converge in \(L^\infty \) without requiring remappings, extended overlapping or vanishing moments for the particles. Numerical tests using different passive transport problems demonstrate the accuracy of the proposed methods compared to basic particle schemes, and they establish their robustness with respect to the remapping period. In particular, it is shown that QTP particles can be transported without remappings on very long periods of time, without hampering the accuracy of the numerical solutions. Finally, a dynamic criterion is proposed to automatically select the time steps where the particles should be remapped. The strategy is a by-product of our error analysis, and it is validated by numerical experiments.  相似文献   
992.
Systematic temporal relations between single neuronal activities or population activities are ubiquitous in the brain. No experimental evidence, however, exists for a direct modification of neuronal delays during Hebbian-type stimulation protocols. We show that in fact an explicit delay adaptation is not needed if one assumes that the synaptic strengths are modified according to the recently observed temporally asymmetric learning rule with the downregulating branch dominating the upregulating branch. During development, slow, unbiased fluctuations in the transmission time, together with temporally correlated network activity, may control neural growth and implicitly induce drifts in the axonal delays and dendritic latencies. These delays and latencies become optimally tuned in the sense that the synaptic response tends to peak in the soma of the postsynaptic cell if this is most likely to fire. The nature of the selection process requires unreliable synapses in order to give successful synapses an evolutionary advantage over the others. The width of the learning function also determines the preferred dendritic delay and the preferred width of the postsynaptic response. Hence, it may implicitly determine whether a synaptic connection provides a precisely timed or a broadly tuned "contextual" signal.  相似文献   
993.
2004年10月19日至20日,中国工业以太网发展论坛暨全国第一届工业以太网技术发展与应用研讨会(IEHF2004)在京召开.借此机会,本刊记者采访了西门子自动化与驱动集团工业通信全球地区总经理贺日安和德国菲尼克斯电气集团自动化总裁Martin Muller,畅谈工业以太网的过去、现在与未来.  相似文献   
994.
With respect to the specific requirements of advanced OODB applications, index data structures for type hierarchies in OODBMS have to provide efficient support for multiattribute queries and have to allow index optimization for a particular query profile. We describe the multikey type index and an efficient implementation of this indexing scheme. It meets both requirements: in addition to its multiattribute query capabilities it is designed as a mediator between two standard design alternatives, key-grouping and type-grouping. A prerequisite for the multikey type index is a linearization algorithm which maps type hierarchies to linearly ordered attribute domains in such a way that each subhierarchy is represented by an interval of this domain. The algorithm extends previous results with respect to multiple inheritance. The subsequent evaluation of our proposal focuses on storage space overhead as well as on the number of disk I/O operations needed for query execution. The analytical results for the multikey type index are compared to previously published figures for well-known single-key search structures. The comparison clearly shows the superiority of the multikey type index for a large class of query profiles. Edited by E. Bertino. Received October 7, 1996 / Accepted March 28, 1997  相似文献   
995.
The labeling of data sets is a time‐consuming task, which is, however, an important prerequisite for machine learning and visual analytics. Visual‐interactive labeling (VIAL) provides users an active role in the process of labeling, with the goal to combine the potentials of humans and machines to make labeling more efficient. Recent experiments showed that users apply different strategies when selecting instances for labeling with visual‐interactive interfaces. In this paper, we contribute a systematic quantitative analysis of such user strategies. We identify computational building blocks of user strategies, formalize them, and investigate their potentials for different machine learning tasks in systematic experiments. The core insights of our experiments are as follows. First, we identified that particular user strategies can be used to considerably mitigate the bootstrap (cold start) problem in early labeling phases. Second, we observed that they have the potential to outperform existing active learning strategies in later phases. Third, we analyzed the identified core building blocks, which can serve as the basis for novel selection strategies. Overall, we observed that data‐based user strategies (clusters, dense areas) work considerably well in early phases, while model‐based user strategies (e.g., class separation) perform better during later phases. The insights gained from this work can be applied to develop novel active learning approaches as well as to better guide users in visual interactive labeling.  相似文献   
996.
Recently, food recommender systems have received increasing attention due to their relevance for healthy living. Most existing studies on the food domain focus on recommendations that suggest proper food items for individual users on the basis of considering their preferences or health problems. These systems also provide functionalities to keep track of nutritional consumption as well as to persuade users to change their eating behavior in positive ways. Also, group recommendation functionalities are very useful in the food domain, especially when a group of users wants to have a dinner together at home or have a birthday party in a restaurant. Such scenarios create many challenges for food recommender systems since the preferences of all group members have to be taken into account in an adequate fashion. In this paper, we present an overview of recommendation techniques for individuals and groups in the healthy food domain. In addition, we analyze the existing state-of-the-art in food recommender systems and discuss research challenges related to the development of future food recommendation technologies.  相似文献   
997.
We study in this paper a posteriori error estimates for H 1-conforming numerical approximations of diffusion problems with a diffusion coefficient piecewise constant on the mesh cells but arbitrarily discontinuous across the interfaces between the cells. Our estimates give a global upper bound on the error measured either as the energy norm of the difference between the exact and approximate solutions, or as a dual norm of the residual. They are guaranteed, meaning that they feature no undetermined constants. (Local) lower bounds for the error are also derived. Herein, only generic constants independent of the diffusion coefficient appear, whence our estimates are fully robust with respect to the jumps in the diffusion coefficient. In particular, no condition on the diffusion coefficient like its monotonous increasing along paths around mesh vertices is imposed, whence the present results also include the cases with singular solutions. For the energy error setting, the key requirement turns out to be that the diffusion coefficient is piecewise constant on dual cells associated with the vertices of an original simplicial mesh and that harmonic averaging is used in the scheme. This is the usual case, e.g., for the cell-centered finite volume method, included in our analysis as well as the vertex-centered finite volume, finite difference, and continuous piecewise affine finite element ones. For the dual norm setting, no such a requirement is necessary. Our estimates are based on H(div)-conforming flux reconstruction obtained thanks to the local conservativity of all the studied methods on the dual grids, which we recall in the paper; mutual relations between the different methods are also recalled. Numerical experiments are presented in confirmation of the guaranteed upper bound, full robustness, and excellent efficiency of the derived estimators.  相似文献   
998.
This paper presents two experimental studies investigating the effects of presenting cues that provide information about the interactors – called cues to identity – in computer mediated communications (CMCs). Study 1 shows that even though cues to identity affected interpersonal evaluations, in making them more positive, the presence of these cues were associated with less certainty and less medium satisfaction for users with experience in online communication. Study 2 shows that when performing an online communication task, participants felt more certain, were more satisfied with the medium, and thought they had performed better in the absence of cues to identity. Thus, this study supports the widespread assumption that rich interactions (i.e., interactions that allow the transmission of cues to identity such as face-to-face) are superior in that they make the interaction more personal, but that these outcomes are not mirrored by the evaluation of the interaction. It is suggested that the presence of cues to identity positively affects interpersonal perceptions, but at the same time decreases perceptions of solidarity or entitativity.  相似文献   
999.
This is a review of Integrated System-Level Modeling of Network-on-Chip Enabled Multi-processor Platforms (by Tim Kogel, Rainer Leupers, and Heinrich Meyr).This book offers an education in the wide range of areas involved in embedded-systems design, as well as a brief exploration of solutions on the horizon. It should resonate with students, researchers, and practical designers interested in the state of electronic systems-level (ESL) design in 2007.  相似文献   
1000.
Software written in one language often needs to construct sentences in another language, such as SQL queries, XML output, or shell command invocations. This is almost always done using unhygienic string manipulation, the concatenation of constants and client-supplied strings. A client can then supply specially crafted input that causes the constructed sentence to be interpreted in an unintended way, leading to an injection attack. We describe a more natural style of programming that yields code that is impervious to injections by construction. Our approach embeds the grammars of the guest languages (e.g. SQL) into that of the host language (e.g. Java) and automatically generates code that maps the embedded language to constructs in the host language that reconstruct the embedded sentences, adding escaping functions where appropriate. This approach is generic, meaning that it can be applied with relative ease to any combination of context-free host and guest languages.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号