首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5874篇
  免费   356篇
  国内免费   24篇
电工技术   90篇
综合类   18篇
化学工业   1252篇
金属工艺   136篇
机械仪表   138篇
建筑科学   207篇
矿业工程   15篇
能源动力   232篇
轻工业   346篇
水利工程   34篇
石油天然气   25篇
无线电   1074篇
一般工业技术   1112篇
冶金工业   537篇
原子能技术   32篇
自动化技术   1006篇
  2023年   103篇
  2022年   150篇
  2021年   284篇
  2020年   229篇
  2019年   202篇
  2018年   247篇
  2017年   200篇
  2016年   304篇
  2015年   189篇
  2014年   248篇
  2013年   432篇
  2012年   306篇
  2011年   344篇
  2010年   243篇
  2009年   238篇
  2008年   247篇
  2007年   213篇
  2006年   159篇
  2005年   148篇
  2004年   120篇
  2003年   99篇
  2002年   89篇
  2001年   95篇
  2000年   67篇
  1999年   69篇
  1998年   216篇
  1997年   111篇
  1996年   90篇
  1995年   88篇
  1994年   57篇
  1993年   87篇
  1992年   51篇
  1991年   46篇
  1990年   30篇
  1989年   39篇
  1988年   30篇
  1987年   28篇
  1986年   37篇
  1985年   40篇
  1984年   45篇
  1983年   24篇
  1982年   27篇
  1981年   21篇
  1980年   20篇
  1979年   16篇
  1978年   20篇
  1977年   19篇
  1976年   14篇
  1973年   15篇
  1971年   12篇
排序方式: 共有6254条查询结果,搜索用时 791 毫秒
171.
The existence of a representative volume element (RVE) for a class of quasi-brittle materials having a random heterogeneous microstructure in tensile, shear and mixed mode loading is demonstrated by deriving traction–separation relations, which are objective with respect to RVE size. A computational homogenization based multiscale crack modelling framework, implemented in an FE2 setting, for quasi-brittle solids with complex random microstructure is presented. The objectivity of the macroscopic response to the micro-sample size is shown by numerical simulations. Therefore, a homogenization scheme, which is objective with respect to macroscopic discretization and microscopic sample size, is devised. Numerical examples including a comparison with direct numerical simulation are given to demonstrate the performance of the proposed method.  相似文献   
172.
In this paper, we consider a queueing model extension for a manufacturing cell composed of a machining center and several parallel downstream production stations under a rotation rule. A queueing model is extended with the arrival processes of negative customers to capture failures of production stations, reorganization of works and disasters in the manufacturing cell. We present an exact solution for the steady-state probabilities of the proposed queueing model. The solution does not require the approximation of the infinite sum. In addition, it provides an alternative way to compute the rate matrix for the matrix-geometric method as well.  相似文献   
173.
This paper deals with the stability radii of implicit dynamic equations on time scales when the structured perturbations act on both the coefficient of derivative and the right-hand side. Formulas of the stability radii are derived as a unification and generalization of some previous results. A special case where the real stability radius and the complex stability radius are equal is studied. Examples are derived to illustrate results.  相似文献   
174.
In the modern age of Internet connectivity, advanced information systems have accumulated huge volumes of data. Such fast growing, tremendous amount of data, collected and stored in large databases has far exceeded our human ability to comprehend without proper tools. There has been a great deal of research conducted to explore the potential applications of Machine Learning technologies in Security Informatics. This article studies the Network Security Detection problems in which predictive models are constructed to detect network security breaches such as spamming. Due to overwhelming volume of data, complexity and dynamics of computer networks and evolving cyber threats, current security systems suffer limited performance with low detection accuracy and high number of false alarms. To address such performance issues, a novel Machine Learning algorithm, namely Boosted Subspace Probabilistic Neural Network (BSPNN), has been proposed which combines a Radial Basis Function Neural Network with an innovative diversity-based ensemble learning framework. Extensive empirical analyses suggested that BSPNN achieved high detection accuracy with relatively small computational complexity compared with other conventional detection methods.  相似文献   
175.
The automatic recognition of natural or close to natural speech is linked to the problem of detection of “new” or “unknown” words. These are the words or the nonverbal acoustical events that do not belong to the speech recognition system’s vocabulary. In this paper we consider a new method for the estimation of confidence score for words at the output of the recognition system based on a likelihood score of the signal frame. The method and confidence measure could be used, for example, for out-of-vocabulary (OOV) word detection and rejection. The text was submitted by the authors in English. Minh T. Nguyen received the MS degree in computer sciences from Moscow State University in 2004. In 2004 he began postgraduate studies at the Computing Centre, Russian Academy of Sciences. He is working on development and evaluation of confidence measures for speech recognition. Vladimir J. Chuchupal received the MS degree in mathematics from Moscow State Pedagogical Institute in 1976. He received his Candidate of Sciences degree from the Computing Centre, USSR Academy of Sciences, in 1984 completing his dissertation work in noisy speech enhancement methods. Since 1984 he has been with the Speech Recognition subdivision of the Computing Centre, Russian Academy of Sciences, where he works on speech recognition problems. Currently he is the head of the subdivision.  相似文献   
176.
Y.C.  Dinh Nguyen  Eric Yi  Wei Tsang  Robert 《Computer Networks》2008,52(18):3405-3420
Internet complexity makes reasoning about traffic equilibrium difficult, partly because users react to congestion. This difficulty calls for an analytic technique that is simple, yet have enough details to capture user behavior and flexibly address a broad range of issues.This paper presents such a technique. It treats traffic equilibrium as a balance between an inflow controlled by users, and an outflow controlled by the network (link capacity, congestion avoidance, etc.). This decomposition is demonstrated with a surfing session model, and validated with a traffic trace and NS2 simulations.The technique’s accessibility and breadth are illustrated through an analysis of several issues concerning the location, stability, robustness and dynamics of traffic equilibrium.  相似文献   
177.
This paper proposes an adaptive robust fuzzy control scheme for path tracking of a wheeled mobile robot with uncertainties. The robot dynamics including the actuator dynamics is considered in this work. The presented controller is composed of a fuzzy basis function network (FBFN) to approximate an unknown nonlinear function of the robot complete dynamics, an adaptive robust input to overcome the uncertainties, and a stabilizing control input. The stability and the convergence of the tracking errors are guaranteed using the Lyapunov stability theory. When the controller is designed, the different parameters for two actuator models in the dynamic equation are taken into account. The proposed control scheme does not require the accurate parameter values for the actuator parameters as well as the robot parameters. The validity and robustness of the proposed control scheme are demonstrated through computer simulations. This work was presented in part at the 13th International Symposium on Artificial Life and Robotics, Oita, Japan, January 31–February 2, 2008  相似文献   
178.
In recent years, the number of peer-to-peer (P2P) applications has increased significantly. One important problem in many P2P applications is how to efficiently disseminate data from a single source to multiple receivers on the Internet. A successful model used for analyzing this problem is a graph consisting of nodes and edges, with a capacity assigned to each edge. In some situations however, it is inconvenient to use this model. To that end, we propose to study the problem of efficient data dissemination in a source constraint network. A source constraint network is modeled as a graph in which, the capacity is associated with a node, rather than an edge. The contributions of this paper include (a) a quantitative data dissemination in any source constraint network, (b) a set of topologies suitable for data dissemination in P2P networks, and (c) an architecture and implementation of a P2P system based on the proposed optimal topologies. We will present the experimental results of our P2P system deployed on PlanetLab nodes demonstrating that our approach achieves near optimal throughput while providing scalability, low delay and bandwidth fairness among peers.  相似文献   
179.
Primary torsion dystonia is an autosomal-dominantly inherited, neurodevelopmental movement disorder caused by a GAG deletion (ΔGAG) in the DYT1 gene, encoding torsinA. This mutation is responsible for approximately 70% of cases of early-onset primary torsion dystonia. The function of wildtype torsinA is still unknown, and it is unsolved how the deletion in the DYT1 gene contributes to the development of the disease. To better understand the molecular processes involved in torsinA pathology, we used genome-wide oligonucleotide microarrays to characterize gene expression patterns in the striatum of mouse models overexpressing the human wildtype and mutant torsinA. By this approach we were able to detect gene expression changes that seem to be specific for torsinA pathology. We found an impact of torsinA, independent from genotype, on vesicle trafficking, exocytosis, and neurotransmitter release in our mouse model. In addition, we were able to identify several new pathways and processes involved in the development of the nervous system that are affected by wildtype and mutant torsinA. Furthermore, we have striking evidence from our gene expression data that glutamate receptor mediated synaptic plasticity in the striatum is the affected underlying cellular process for impaired motor learning in human ΔGAG torsinA transgenic mice.  相似文献   
180.
In many real-life situations, we only have partial information about probabilities. This information is usually described by bounds on moments, on probabilities of certain events, etc. –i.e., by characteristics c(p) which are linear in terms of the unknown probabilities p j. If we know interval bounds on some such characteristics , and we are interested in a characteristic c(p), then we can find the bounds on c(p) by solving a linear programming problem. In some situations, we also have additional conditions on the probability distribution –e.g., we may know that the two variables x 1 and x 2 are independent, or that the joint distribution of x 1 and x 2 is unimodal. We show that adding each of these conditions makes the corresponding interval probability problem NP-hard.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号