首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   11343篇
  免费   64篇
  国内免费   141篇
电工技术   156篇
综合类   1篇
化学工业   543篇
金属工艺   470篇
机械仪表   78篇
建筑科学   80篇
矿业工程   3篇
能源动力   138篇
轻工业   51篇
水利工程   20篇
石油天然气   16篇
无线电   435篇
一般工业技术   379篇
冶金工业   211篇
原子能技术   102篇
自动化技术   8865篇
  2023年   14篇
  2022年   14篇
  2021年   30篇
  2020年   18篇
  2019年   37篇
  2018年   35篇
  2017年   39篇
  2016年   39篇
  2015年   25篇
  2014年   240篇
  2013年   264篇
  2012年   817篇
  2011年   3129篇
  2010年   1187篇
  2009年   1071篇
  2008年   722篇
  2007年   631篇
  2006年   477篇
  2005年   601篇
  2004年   555篇
  2003年   594篇
  2002年   306篇
  2001年   26篇
  2000年   22篇
  1999年   37篇
  1998年   133篇
  1997年   49篇
  1996年   43篇
  1995年   29篇
  1994年   22篇
  1993年   18篇
  1992年   22篇
  1991年   24篇
  1990年   22篇
  1989年   14篇
  1988年   22篇
  1987年   20篇
  1986年   22篇
  1985年   17篇
  1984年   34篇
  1983年   21篇
  1982年   15篇
  1981年   10篇
  1980年   7篇
  1979年   14篇
  1978年   12篇
  1977年   9篇
  1976年   8篇
  1975年   7篇
  1960年   4篇
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
991.
A classification problem is a decision-making task that many researchers have studied. A number of techniques have been proposed to perform binary classification. Neural networks are one of the artificial intelligence techniques that has had the most successful results when applied to this problem. Our proposal is the use of q-Gaussian Radial Basis Function Neural Networks (q-Gaussian RBFNNs). This basis function includes a supplementary degree of freedom in order to adapt the model to the distribution of data. A Hybrid Algorithm (HA) is used to search for a suitable architecture for the q-Gaussian RBFNN. The use of this type of more flexible kernel could greatly improve the discriminative power of RBFNNs. In order to test performance, the RBFNN with the q-Gaussian basis functions is compared to RBFNNs with Gaussian, Cauchy and Inverse Multiquadratic RBFs, and to other recent neural networks approaches. An experimental study is presented on 11 binary-classification datasets taken from the UCI repository. Moreover, aerial imagery taken in mid-May, mid-June and mid-July was used to evaluate the potential of the methodology proposed for discriminating Ridolfia segetum patches (one of the most dominant and harmful weeds in sunflower crops) in two naturally infested fields in southern Spain.  相似文献   
992.
A supervised learning algorithm for quantum neural networks (QNN) based on a novel quantum neuron node implemented as a very simple quantum circuit is proposed and investigated. In contrast to the QNN published in the literature, the proposed model can perform both quantum learning and simulate the classical models. This is partly due to the neural model used elsewhere which has weights and non-linear activations functions. Here a quantum weightless neural network model is proposed as a quantisation of the classical weightless neural networks (WNN). The theoretical and practical results on WNN can be inherited by these quantum weightless neural networks (qWNN). In the quantum learning algorithm proposed here patterns of the training set are presented concurrently in superposition. This superposition-based learning algorithm (SLA) has computational cost polynomial on the number of patterns in the training set.  相似文献   
993.
On optimization of expertise matching with various constraints   总被引:1,自引:0,他引:1  
This paper studies the problem of expertise matching with various constraints. Expertise matching, which aims to find the alignment between experts and queries, is a common problem in many applications such as conference paper-reviewer assignment, product-reviewer alignment, and product-endorser matching. Most existing methods formalize this problem as an information-retrieval problem and focus on finding a set of experts for each query independently. However, in real-world systems, various constraints are often needed to be considered. For example, in order to review a paper, it is desirable that there is at least one senior reviewer to guide the reviewing process. An important question is: “Can we design a framework to efficiently find the optimal solution for expertise matching under various constraints?” This paper explores such an approach by formulating the expertise matching problem in a constraint-based optimization framework. In the proposed framework, the problem of expertise matching is linked to a convex cost flow problem, which guarantees an optimal solution under various constraints. We also present an online matching algorithm to support incorporating user feedbacks in real time. The proposed approach has been evaluated on two different genres of expertise matching problems, namely conference paper-reviewer assignment and teacher-course assignment. Experimental results validate the effectiveness of the proposed approach. Based on the proposed method, we have also developed an online system for paper-reviewer suggestions, which has been used for paper-reviewer assignment in a top conference and feedbacks from the conference organizers are very positive.  相似文献   
994.
We study the problem of maximizing spectral efficiency of cognitive radio network deployments subject to an interference constraint and under specific quality of service (QoS) guarantees. The interference constraint corresponds to the upper limit of the received power that can be tolerated at the licensed users’ due to transmissions from unlicensed users. The QoS guarantees stem from the requirements imposed by the applications running at the users’ terminals. A cross-layer design is adopted that maps the user’s requirements into delay related QoS guarantees at the data link layer and error probability QoS guarantees at the physical layer. The obtained numerical results provide important insights regarding the impact of the considered constraint and guarantees on the achievable spectral efficiency of cognitive radio networks.  相似文献   
995.
Recently there is a trend to broaden the usage of lower-power embedded media processor core to build the future high-end computing machine or the supercomputer. However the embedded solution also faces the operating system (OS) design challenge which the thread invoking overhead is higher for fine-grained scientific workload, the message passing among threads is not managed efficiently enough and the OS does not provide convenient enough service for parallel programming. This paper presents a scheduler of master-slave real-time operating system (RTOS) to manage the thread running for the distributed multi/many-core system without shared memories. The proposed scheduler exploits the data-driven feature of scientific workloads to reduce the thread invoking overhead. And it also defines two protocols: (1) one is between the RTOS and application program, which is used to reduce the burden of parallel programming for the programmer; (2) another one is between the RTOS and networks-on-chip, which is used to manage the message passing among threads efficiently. The experimental results show that the proposed scheduler can manage the thread running with lower overhead and less storage requirement, thereby, improving the multi/many-core system performance.  相似文献   
996.
This paper proposes two algorithms for multi-video-source in a new mobile P2P architecture for streaming media systems. One is serial, and the other is parallel. When the service peer set providing expected QoS is not empty, the former is called, otherwise the latter is called. The former triggers the video source change event, re-selects a video source, and synchronizes the multi-video-source by the time model of the streaming sequence when QoS is degraded. The latter allows the multiple video sources to concurrently send the data to the receiving peer according to the assigned transmission. Compared to the existing papers, the contribution of this paper is fourfold: (1) the serial and parallel scheduling algorithms, correctly switched according to the actual situation, are firstly proposed; (2) the mobile feature of peers are firstly considered and validated; (3) the client nodes have better and smoother video quality; (4) our algorithms have shorter run time, which is a crucial factor for an on-line system.  相似文献   
997.
To deal with the file pollution problem in structured P2P networks, this paper proposes an anti-pollution strategy based on the immune approach and the file propagation-chain tracing technique. With the characteristics of the structured P2P networks, we establish a biological immune model and a file propagation tracing mechanism, based on which the mechanisms for alarms collection, propagation-chain tracing, immune response and antibody memorizing are designed. The proposed immune strategy can not only eliminate the polluted clusters and indices effectively but also prevent the reviving of the old pollution. In addition, the node permission is employed to control the ability to request files. The experimental results show that our strategy can curb the propagations of the polluted files effectively and efficiently even in the severely polluted structured P2P networks.  相似文献   
998.
This paper presents an effective weighted least square formulation for the solution of the state estimation problem, considering conventional as well as synchronized phasor measurements. The proposed algorithm is based on a reference-free formulation, using both rectangular and polar coordinates for branch current phasor measurements, and alleviates any numerical problems encountered during initialization stage of the state estimation algorithm. Analytical equations are provided for the conventional and the phasor measurements and their corresponding partial derivatives with respect to state variables. The proposed algorithm is tested with a seven bus system and is compared with the traditional state estimator. Simulation results show that the proposed algorithm improves the precision greatly and gets better behavior as compared with the traditional state estimator.  相似文献   
999.
1000.
In this paper, we introduce an efficient and multi-level conditional privacy preservation authentication protocol in vehicular ad hoc networks (VANETs) based on ring signature. The proposed protocol has three appealing characteristics: First, it offers conditional privacy preservation authentication: while every receiver can verify that a message issuer is an authorized participant in the system only a trusted authority can reveal the true identity of a message sender. Second, it is equipped with multi-level countermeasure: each vehicle can select the degree of privacy according to its own requirements. Third, it is efficient: our system outperforms previous proposals in message authentication and verification, cost-effective identity tracking in case of a dispute, and low storage requirements. We demonstrate the merits gained by the proposed protocol through extensive analysis.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号