首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4519篇
  免费   217篇
  国内免费   22篇
电工技术   60篇
综合类   8篇
化学工业   1013篇
金属工艺   84篇
机械仪表   101篇
建筑科学   85篇
矿业工程   8篇
能源动力   263篇
轻工业   300篇
水利工程   39篇
石油天然气   51篇
无线电   377篇
一般工业技术   631篇
冶金工业   1115篇
原子能技术   39篇
自动化技术   584篇
  2024年   7篇
  2023年   57篇
  2022年   167篇
  2021年   190篇
  2020年   154篇
  2019年   180篇
  2018年   229篇
  2017年   176篇
  2016年   205篇
  2015年   133篇
  2014年   179篇
  2013年   368篇
  2012年   199篇
  2011年   228篇
  2010年   170篇
  2009年   153篇
  2008年   122篇
  2007年   81篇
  2006年   97篇
  2005年   58篇
  2004年   57篇
  2003年   48篇
  2002年   53篇
  2001年   28篇
  2000年   28篇
  1999年   47篇
  1998年   345篇
  1997年   207篇
  1996年   160篇
  1995年   88篇
  1994年   66篇
  1993年   78篇
  1992年   35篇
  1991年   29篇
  1990年   22篇
  1989年   27篇
  1988年   23篇
  1987年   25篇
  1986年   14篇
  1985年   22篇
  1984年   10篇
  1983年   10篇
  1982年   11篇
  1981年   13篇
  1980年   22篇
  1979年   8篇
  1978年   13篇
  1977年   23篇
  1976年   71篇
  1971年   4篇
排序方式: 共有4758条查询结果,搜索用时 15 毫秒
91.
The position control system of an electro-hydraulic actuator system (EHAS) is investigated in this paper. The EHAS is developed by taking into consideration the nonlinearities of the system: the friction and the internal leakage. A variable load that simulates a realistic load in robotic excavator is taken as the trajectory reference. A method of control strategy that is implemented by employing a fuzzy logic controller (FLC) whose parameters are optimized using particle swarm optimization (PSO) is proposed. The scaling factors of the fuzzy inference system are tuned to obtain the optimal values which yield the best system performance. The simulation results show that the FLC is able to track the trajectory reference accurately for a range of values of orifice opening. Beyond that range, the orifice opening may introduce chattering, which the FLC alone is not sufficient to overcome. The PSO optimized FLC can reduce the chattering significantly. This result justifies the implementation of the proposed method in position control of EHAS.  相似文献   
92.
In smart environments, pervasive computing contributes in improving daily life activities for dependent people by providing personalized services. Nevertheless, those environments do not guarantee a satisfactory level for protecting the user privacy and ensuring the trust between communicating entities. In this study, we propose a trust evaluation model based on user past and present behavior. This model is associated with a lightweight authentication key agreement protocol (Elliptic Curve-based Simple Authentication Key Agreement). The aim is to enable the communicating entities to establish a level of trust and then succeed in a mutual authentication using a scheme suitable for low-resource devices in smart environments. An innovation in our trust model is that it uses an accurate approach to calculate trust in different situations and includes a human-based feature for trust feedback, which is user rating. Finally, we tested and implemented our scheme on Android mobile phones in a smart environment dedicated for handicapped people.  相似文献   
93.
The aim of this paper is to deal with an output controllability problem. It consists in driving the state of a distributed parabolic system toward a state between two prescribed functions on a boundary subregion of the system evolution domain with minimum energy control. Two necessary conditions are derived. The first one is formulated in terms of subdifferential associated with a minimized functional. The second one is formulated as a system of equations for arguments of the Lagrange systems. Numerical illustrations show the efficiency of the second approach and lead to some conjectures. Recommended by Editorial Board member Fumitoshi Matsuno under the direction of Editor Jae Weon Choi. Zerrik El Hassan is a Professor at the university Moulay Ismail of Meknes in Morocco. He was an Assistant Professor in the faculty of sciences of Meknes and researcher at the university of Perpignan (France). He got his doctorat d etat in system regional analysis (1993) at the University Mohammed V of Rabat, Morocco. Professor Zerrik wrote many papers and books in the area of systems analysis and control. Now he is the Head of the research team MACS (Modeling Analysis and Control of Systems) at the university Moulay Ismail of Meknes in Morocco. Ghafrani Fatima is a Researcher at team MACS at the University Moulay Ismail of Meknes in Morocco. She wrote many papers in the area of systems analysis and control.  相似文献   
94.
Eight anticonvulsant drugs-including clonazepam, diazepam and phenobarbital-were tested for their effects on GABA-stimulated chloride uptake in rat cerebral cortical microsacs (unfiltered synaptoneurosomes). "Mid" and "high" therapeutic concentrations were screened, and, if significant enhancement was found, full concentration-response tests were done. In the initial screens, enhancement of GABA-stimulated uptake was found only with phenobarbital, clonazepam and diazepam. In subsequent concentration-response tests, the effects of phenobarbital were found to occur throughout the range of normal, anticonvulsant concentrations, whereas the effects of clonazepam and diazepam were observed only above the concentrations normally used for the chronic control of seizures or anxiety. These data suggest that phenobarbital's anticonvulsant effects are mediated via the GABAA receptor complex, but that the low-dose effects of the benzodiazepines may be mediated via some other mechanism.  相似文献   
95.

Background

The use of crowdsourcing in a pedagogically supported form to partner with learners in developing novel content is emerging as a viable approach for engaging students in higher-order learning at scale. However, how students behave in this form of crowdsourcing, referred to as learnersourcing, is still insufficiently explored.

Objectives

To contribute to filling this gap, this study explores how students engage with learnersourcing tasks across a range of course and assessment designs.

Methods

We conducted an exploratory study on trace data of 1279 students across three courses, originating from the use of a learnersourcing environment under different assessment designs. We employed a new methodology from the learning analytics (LA) field that aims to represent students' behaviour through two theoretically-derived latent constructs: learning tactics and the learning strategies built upon them.

Results

The study's results demonstrate students use different tactics and strategies, highlight the association of learnersourcing contexts with the identified learning tactics and strategies, indicate a significant association between the strategies and performance and contribute to the employed method's generalisability by applying it to a new context.

Implications

This study provides an example of how learning analytics methods can be employed towards the development of effective learnersourcing systems and, more broadly, technological educational solutions that support learner-centred and data-driven learning at scale. Findings should inform best practices for integrating learnersourcing activities into course design and shed light on the relevance of tactics and strategies to support teachers in making informed pedagogical decisions.  相似文献   
96.

In this article, we will present a new set of hybrid polynomials and their corresponding moments, with a view to using them for the localization, compression and reconstruction of 2D and 3D images. These polynomials are formed from the Hahn and Krawtchouk polynomials. The process of calculating these is successfully stabilized using the modified recurrence relations with respect to the n order, the variable x and the symmetry property. The hybrid polynomial generation process is carried out in two forms: the first form contains the separable discrete orthogonal polynomials of Krawtchouk–Hahn (DKHP) and Hahn–Krawtchouk (DHKP). The latter are generated as the product of the discrete orthogonal Hahn and Krawtchouk polynomials, while the second form is the square equivalent of the first form, it consists of discrete squared Krawtchouk–Hahn polynomials (SKHP) and discrete polynomials of Hahn–Krawtchouk squared (SHKP). The experimental results clearly show the efficiency of hybrid moments based on hybrid polynomials in terms of localization property and computation time of 2D and 3D images compared to other types of moments; on the other hand, encouraging results have also been shown in terms of reconstruction quality and compression despite the superiority of classical polynomials.

  相似文献   
97.

The edge computing model offers an ultimate platform to support scientific and real-time workflow-based applications over the edge of the network. However, scientific workflow scheduling and execution still facing challenges such as response time management and latency time. This leads to deal with the acquisition delay of servers, deployed at the edge of a network and reduces the overall completion time of workflow. Previous studies show that existing scheduling methods consider the static performance of the server and ignore the impact of resource acquisition delay when scheduling workflow tasks. Our proposed method presented a meta-heuristic algorithm to schedule the scientific workflow and minimize the overall completion time by properly managing the acquisition and transmission delays. We carry out extensive experiments and evaluations based on commercial clouds and various scientific workflow templates. The proposed method has approximately 7.7% better performance than the baseline algorithms, particularly in overall deadline constraint that gives a success rate.

  相似文献   
98.
The Journal of Supercomputing - This paper designs and develops a computational intelligence-based framework using convolutional neural network (CNN) and genetic algorithm (GA) to detect COVID-19...  相似文献   
99.
Data available in software engineering for many applications contains variability and it is not possible to say which variable helps in the process of the prediction. Most of the work present in software defect prediction is focused on the selection of best prediction techniques. For this purpose, deep learning and ensemble models have shown promising results. In contrast, there are very few researches that deals with cleaning the training data and selection of best parameter values from the data. Sometimes data available for training the models have high variability and this variability may cause a decrease in model accuracy. To deal with this problem we used the Akaike information criterion (AIC) and the Bayesian information criterion (BIC) for selection of the best variables to train the model. A simple ANN model with one input, one output and two hidden layers was used for the training instead of a very deep and complex model. AIC and BIC values are calculated and combination for minimum AIC and BIC values to be selected for the best model. At first, variables were narrowed down to a smaller number using correlation values. Then subsets for all the possible variable combinations were formed. In the end, an artificial neural network (ANN) model was trained for each subset and the best model was selected on the basis of the smallest AIC and BIC value. It was found that combination of only two variables’ ns and entropy are best for software defect prediction as it gives minimum AIC and BIC values. While, nm and npt is the worst combination and gives maximum AIC and BIC values.  相似文献   
100.

With the development of online social networking applications, microblogs have become a necessary online communication network in daily life. Users are interested in obtaining personalized recommendations related to their tastes and needs. In some microblog systems, tags are not available, or the use of tags is rare. In addition, user-specified social relations are extremely rare. Hence, sparsity is a problem in microblog systems. To address this problem, we propose a new framework called Pblog to alleviate sparsity. Pblog identifies users’ interests via their microblogs and social relations and computes implicit similarity among users using a new algorithm. The experimental results indicated that the use of this algorithm can improve the results. In online social networks, such as Twitter, the number of microblogs in the system is high, and it is constantly increasing. Therefore, providing personalized recommendations to target users requires considerable time. To address this problem, the Pblog framework groups similar users using the analytic hierarchy process (AHP) method. Then, Pblog prunes microblogs of the target user group and recommends microblogs with higher ratings to the target user. In the experimental results section, the Pblog framework was compared with several other frameworks. All of these frameworks were run on two datasets: Twitter and Tumblr. Based on the results of these comparisons, the Pblog framework provides more appropriate recommendations to the target user than previous frameworks.

  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号