首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1534篇
  免费   22篇
  国内免费   3篇
电工技术   15篇
综合类   9篇
化学工业   202篇
金属工艺   118篇
机械仪表   28篇
建筑科学   85篇
矿业工程   9篇
能源动力   21篇
轻工业   167篇
水利工程   5篇
石油天然气   8篇
无线电   177篇
一般工业技术   210篇
冶金工业   213篇
原子能技术   6篇
自动化技术   286篇
  2024年   4篇
  2022年   11篇
  2021年   18篇
  2020年   19篇
  2019年   20篇
  2018年   23篇
  2017年   31篇
  2016年   24篇
  2015年   22篇
  2014年   37篇
  2013年   82篇
  2012年   60篇
  2011年   75篇
  2010年   72篇
  2009年   79篇
  2008年   94篇
  2007年   82篇
  2006年   85篇
  2005年   78篇
  2004年   56篇
  2003年   67篇
  2002年   56篇
  2001年   25篇
  2000年   24篇
  1999年   29篇
  1998年   38篇
  1997年   29篇
  1996年   37篇
  1995年   41篇
  1994年   22篇
  1993年   22篇
  1992年   17篇
  1991年   14篇
  1990年   16篇
  1989年   17篇
  1988年   9篇
  1987年   10篇
  1986年   14篇
  1985年   9篇
  1984年   7篇
  1983年   10篇
  1982年   6篇
  1980年   6篇
  1979年   3篇
  1978年   6篇
  1977年   10篇
  1976年   14篇
  1975年   5篇
  1974年   4篇
  1973年   6篇
排序方式: 共有1559条查询结果,搜索用时 140 毫秒
61.
A procedure is presented for the computation of bounds to eigenvalues of the generalized hermitian eigenvalue problem and to the standard hermitian eigenvalue problem. This procedure is applicable to iterative subspace eigenvalue methods and to both outer and inner eigenvalues. The Ritz values and their corresponding residual norms, all of which are computable quantities, are needed by the procedure. Knowledge of the exact eigenvalues is not needed by the procedure, but it must be known that the computed Ritz values are isolated from exact eigenvalues outside of the Ritz spectrum and that there are no skipped eigenvalues within the Ritz spectrum range. A multipass refinement procedure is described to compute the bounds for each Ritz value. This procedure requires O(m) effort where m is the subspace dimension for each pass.  相似文献   
62.
We present two efficient algorithms for the minimum-cost flow problem in which arc costs are piecewise-linear and convex. Our algorithms are based on novel algorithms of Orlin, which were developed for the case of linear arc costs. Our first algorithm uses the Edmonds-Karp scaling technique. Its complexity isO(M logU(m+n logM)) for a network withn vertices,m arcs, M linear cost segments, and an upper boundU on the supplies and the capacities. The second algorithm is a strongly polynomial version of the first, and it uses Tardos's idea of contraction. Its complexity isO(M logM(m+n logM)). Both algorithms improve by a factor of at leastM/m the complexity of directly applying existing algorithms to a transformed network in which arc costs are linear.The final stage of this work was performed while Ron Shamir was a visitor at DIMACS (Center for Discrete Mathematics and Theoretical Computer Science), Rutgers University. Supported in part by National Science Foundation Grant NSF-STC88-09648, and by Air Force Grants AFOSR-89-0512 and AFOSR-90-0008.  相似文献   
63.
M Kearns  D Ron 《Neural computation》1999,11(6):1427-1453
In this article we prove sanity-check bounds for the error of the leave-one-out cross-validation estimate of the generalization error: that is, bounds showing that the worst-case error of this estimate is not much worse than that of the training error estimate. The name sanity check refers to the fact that although we often expect the leave-one-out estimate to perform considerably better than the training error estimate, we are here only seeking assurance that its performance will not be considerably worse. Perhaps surprisingly, such assurance has been given only for limited cases in the prior literature on cross-validation. Any nontrivial bound on the error of leave-one-out must rely on some notion of algorithmic stability. Previous bounds relied on the rather strong notion of hypothesis stability, whose application was primarily limited to nearest-neighbor and other local algorithms. Here we introduce the new and weaker notion of error stability and apply it to obtain sanity-check bounds for leave-one-out for other classes of learning algorithms, including training error minimization procedures and Bayesian algorithms. We also provide lower bounds demonstrating the necessity of some form of error stability for proving bounds on the error of the leave-one-out estimate, and the fact that for training error minimization algorithms, in the worst case such bounds must still depend on the Vapnik-Chervonenkis dimension of the hypothesis class.  相似文献   
64.
A new parametric observer-based approach for robust fault detection in multivariable linear systems with unknown disturbances is proposed. The residual is generated through utilizing a Luenberger function observer. By using a parametric solution to a class of generalized Sylvester matrix equations, a parametrization is proposed for the residual generator on the basis of a Luenberger function observer. By further properly constraining the design parameters provided in the Luenberger observer design, the effect of the unknown disturbance is decoupled from the residual signal. The proposed approach provides all the degrees of freedom and is demonstrated to be simple and effective.  相似文献   
65.
Logics of knowledge have been shown to provide a useful approach to the high level specification and analysis of distributed systems. It has been proposed that such systems can be developed using knowledge- based protocols, in which agents' actions have preconditions that test their state of knowledge. Both computer-assisted analysis of the knowledge properties of systems and automated compilation of knowledge-based protocols require the development of algorithms for the computation of states of knowledge. This paper studies one of the computational problems of interest, the model checking problem for knowledge formulae in the S5nKripke structures generated by finite state environments in which states determine an observation for each agent. Agents are assumed to have perfect recall and may operate synchronously or asynchronously. It is shown that, in this setting, model checking of common knowledge formulae is intractable, but efficient incremental algorithms are developed for formulae containing only knowledge operators. Connections to knowledge updates and compilation of knowledge-based protocols are discussed.  相似文献   
66.
利用电场感应器件MC33794测定液体高度   总被引:1,自引:0,他引:1  
电场成像器件IC(MC33794)如今,设计工程师在需要非接触探测和三维(3D)电场成像的嵌入式系统中使用MC33794,可减少系统所需器件和成本。这款IC支持微控制器及多达9个简单的电极。这些电极均可独立使用,以提供在微弱电场中的物体尺寸和位置等信息。下文描述了利用此技术如何无干扰地测定液体高度。水的检测电场成像技术非常适合于非导电容器内液体高度的测定。测定工作可以在容器外完成,而且测量时无需内部或接地结构。这种方法可以测量任何介电常数的导电液体,或者介电常数比一般值大很多的非导电液体。水的测定可以通过放置于容器外的电…  相似文献   
67.
This paper explores the problem of similarity criteria between nonrigid shapes. Broadly speaking, such criteria are divided into intrinsic and extrinsic, the first referring to the metric structure of the object and the latter to how it is laid out in the Euclidean space. Both criteria have their advantages and disadvantages: extrinsic similarity is sensitive to nonrigid deformations, while intrinsic similarity is sensitive to topological noise. In this paper, we approach the problem from the perspective of metric geometry. We show that by unifying the extrinsic and intrinsic similarity criteria, it is possible to obtain a stronger topology-invariant similarity, suitable for comparing deformed shapes with different topology. We construct this new joint criterion as a tradeoff between the extrinsic and intrinsic similarity and use it as a set-valued distance. Numerical results demonstrate the efficiency of our approach in cases where using either extrinsic or intrinsic criteria alone would fail.  相似文献   
68.
We raise the question of approximating the compressibility of a string with respect to a fixed compression scheme, in sublinear time. We study this question in detail for two popular lossless compression schemes: run-length encoding (RLE) and a variant of Lempel-Ziv (LZ77), and present sublinear algorithms for approximating compressibility with respect to both schemes. We also give several lower bounds that show that our algorithms for both schemes cannot be improved significantly. Our investigation of LZ77 yields results whose interest goes beyond the initial questions we set out to study. In particular, we prove combinatorial structural lemmas that relate the compressibility of a string with respect to LZ77 to the number of distinct short substrings contained in it (its ?th subword complexity , for small ?). In addition, we show that approximating the compressibility with respect to LZ77 is related to approximating the support size of a distribution.  相似文献   
69.
This paper proposes a transformation method that serves the trade‐off between the modelling complexity and accuracy of multi‐variable Takagi‐Sugeno fuzzy inference operator‐based modelling (TS fuzzy modelling). The relation between the number of fuzzy rules and the modelling accuracy is defined in the paper. The proposed transformation method is capable of finding the minimal number of fuzzy rules for a given accuracy of a given TS fuzzy model. A case study, focusing on a benchmark problem of fault diagnosis, developed in the framework of EC‐founded Research Training Network DAMADICS, of an actuator in a sugar factory, is presented to provide feasibility of the proposed method.  相似文献   
70.
Diffusion Tensor Imaging (DTI) has made feasible the visualization of the fibrous structure of the brain white matter. In the last decades, several fiber‐tracking methods have been developed to reconstruct the fiber tracts from DTI data. Usually these fiber tracts are shown individually based on some selection criteria like region of interest. However, if the white matter as a whole is being visualized clutter is generated by directly rendering the individual fiber tracts. Often users are actually interested in fiber bundles, anatomically meaningful entities that abstract from the fibers they contain. Several clustering techniques have been developed that try to group the fiber tracts in fiber bundles. However, even if clustering succeeds, the complex nature of white matter still makes it difficult to investigate. In this paper, we propose the use of illustration techniques to ease the exploration of white matter clusters. We create a technique to visualize an individual cluster as a whole. The amount of fibers visualized for the cluster is reduced to just a few hint lines, and silhouette and contours are used to improve the definition of the cluster borders. Multiple clusters can be easily visualized by a combination of the single cluster visualizations. Focus+context concepts are used to extend the multiple‐cluster renderings. Exploded views ease the exploration of the focus cluster while keeping the context clusters in an abstract form. Real‐time results are achieved by the GPU implementation of the presented techniques.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号