首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   10183篇
  免费   201篇
  国内免费   33篇
电工技术   123篇
综合类   59篇
化学工业   1029篇
金属工艺   299篇
机械仪表   217篇
建筑科学   243篇
矿业工程   72篇
能源动力   1090篇
轻工业   149篇
水利工程   94篇
石油天然气   76篇
武器工业   2篇
无线电   717篇
一般工业技术   1360篇
冶金工业   150篇
原子能技术   98篇
自动化技术   4639篇
  2024年   15篇
  2023年   369篇
  2022年   220篇
  2021年   338篇
  2020年   381篇
  2019年   306篇
  2018年   284篇
  2017年   796篇
  2016年   835篇
  2015年   690篇
  2014年   889篇
  2013年   606篇
  2012年   457篇
  2011年   342篇
  2010年   351篇
  2009年   443篇
  2008年   166篇
  2007年   310篇
  2006年   269篇
  2005年   281篇
  2004年   128篇
  2003年   175篇
  2002年   200篇
  2001年   227篇
  2000年   140篇
  1999年   172篇
  1998年   75篇
  1997年   51篇
  1996年   55篇
  1995年   59篇
  1994年   65篇
  1993年   39篇
  1992年   32篇
  1991年   49篇
  1990年   38篇
  1989年   32篇
  1988年   84篇
  1987年   205篇
  1986年   184篇
  1985年   48篇
  1984年   2篇
  1983年   3篇
  1982年   1篇
  1981年   1篇
  1980年   2篇
  1979年   1篇
  1971年   1篇
排序方式: 共有10000条查询结果,搜索用时 62 毫秒
111.
The rapidly growing field of nature-inspired computing concerns the development and application of algorithms and methods based on biological or physical principles. This approach is particularly compelling for practitioners in high-performance computing, as natural algorithms are often inherently parallel in nature (for example, they may be based on a “swarm”-like model that uses a population of agents to optimize a function). Coupled with rising interest in nature-based algorithms is the growth in heterogenous computing; systems that use more than one kind of processor. We are therefore interested in the performance characteristics of nature-inspired algorithms on a number of different platforms. To this end, we present a new OpenCL-based implementation of the Ant Colony Optimization algorithm, and use it as the basis of extensive experimental tests. We benchmark the algorithm against existing implementations, on a wide variety of hardware platforms, and offer extensive analysis. This work provides rigorous foundations for future investigations of Ant Colony Optimization on high-performance platforms.  相似文献   
112.
Biogeography-based optimization (BBO) is a new emerging population-based algorithm that has been shown to be competitive with other evolutionary algorithms. However, there are some insufficiencies in solving complex problems, such as poor population diversity and slow convergence speed in the later stage. To overcome these shortcomings, we propose an improved BBO (IBBO) algorithm integrating a new improved migration operator, Gaussian mutation operator, and self-adaptive clear duplicate operator. The improved migration operator simultaneously adopts more information from other habitats, maintains population diversity, and preserves exploitation ability. The self-adaptive clear duplicate operator can clear duplicate or almost identical habitats, while also preserving population diversity through a self-adaptation threshold within the evolution process. Simulation results and comparisons from the experimental tests conducted on 23 benchmark functions show that IBBO achieves excellent performance in solving complex problems compared with other variants of the BBO algorithm and other evolutionary algorithms. The performance of the improved migration operator is also discussed.  相似文献   
113.
Decentralized control of self-reconfiguring modular robots requires reliable inter-module communication. Communication links must tolerate module misalignment and implement the neighbor-to-neighbor communication model. In this paper, we propose a wireless system based on multiple radios per module that addresses these challenges. Although the capacity of general wireless mesh networks is known to rapidly decrease with network size, we show that a multi-radio single-channel system has constant capacity in square and cubic lattices of infinite size. We validate the performance of such a system in a testbed with 15 unactuated modules using synthetic data and a benchmark decentralized algorithm. We also demonstrate automatic neighbor detection. The main benefits of radio communication in modular robots are tolerance to module misalignment and to eliminate the tight coupling between communication and mechanical design necessitated by typical existing infrared and wired systems. Our results are the first to establish the feasibility of radio as the primary means of inter-module communication in modular robots.  相似文献   
114.
Traditional models of bendable surfaces are based on the exact or approximate invariance to deformations that do not tear or stretch the shape, leaving intact an intrinsic geometry associated with it. These geometries are typically defined using either the shortest path length (geodesic distance), or properties of heat diffusion (diffusion distance) on the surface. Both measures are implicitly derived from the metric induced by the ambient Euclidean space. In this paper, we depart from this restrictive assumption by observing that a different choice of the metric results in a richer set of geometric invariants. We apply equi-affine geometry for analyzing arbitrary shapes with positive Gaussian curvature. The potential of the proposed framework is explored in a range of applications such as shape matching and retrieval, symmetry detection, and computation of Voroni tessellation. We show that in some shape analysis tasks, equi-affine-invariant intrinsic geometries often outperform their Euclidean-based counterparts. We further explore the potential of this metric in facial anthropometry of newborns. We show that intrinsic properties of this homogeneous group are better captured using the equi-affine metric.  相似文献   
115.
The study of criminal networks using traces from heterogeneous communication media is acquiring increasing importance in nowadays society. The usage of communication media such as mobile phones and online social networks leaves digital traces in the form of metadata that can be used for this type of analysis. The goal of this work is twofold: first we provide a theoretical framework for the problem of detecting and characterizing criminal organizations in networks reconstructed from phone call records. Then, we introduce an expert system to support law enforcement agencies in the task of unveiling the underlying structure of criminal networks hidden in communication data. This platform allows for statistical network analysis, community detection and visual exploration of mobile phone network data. It enables forensic investigators to deeply understand hierarchies within criminal organizations, discovering members who play central role and provide connection among sub-groups. Our work concludes illustrating the adoption of our computational framework for a real-word criminal investigation.  相似文献   
116.
In social tagging system, a user annotates a tag to an item. The tagging information is utilized in recommendation process. In this paper, we propose a hybrid item recommendation method to mitigate limitations of existing approaches and propose a recommendation framework for social tagging systems. The proposed framework consists of tag and item recommendations. Tag recommendation helps users annotate tags and enriches the dataset of a social tagging system. Item recommendation utilizes tags to recommend relevant items to users. We investigate association rule, bigram, tag expansion, and implicit trust relationship for providing tag and item recommendations on the framework. The experimental results show that the proposed hybrid item recommendation method generates more appropriate items than existing research studies on a real-world social tagging dataset.  相似文献   
117.
Defining appropriate pricing strategy for smart environment is important and complex task at the same time. It holds the primal fraction in Demand Response (DR) program. In our work, we devise an incentive based smart dynamic pricing scheme for consumers facilitating a multi-layered scoring rule. The proposed strategy characterizes both incentive based DR and price based DR programs facilities. This mechanism is applied between consumer agents (CA) to electricity provider agent (EP) and EP to Generation Company (GENCO). Based on the Continuous Ranked Probability Score (CRPS), a hierarchical scoring system is formed among these entities, CA–EP–GENCO. As CA receives the dynamic day-ahead pricing signal from EP, it will schedule the household appliances to lower price period and report the prediction in a form of a probability distribution function to EP. EP, in similar way reports the aggregated demand prediction to GENCO. Finally, GENCO computes the base discount after running a cost-optimization problem. GENCO will reward EP with a fraction of discount based on their prediction accuracy. EP will do the same to CA based on how truthful they were reporting their intentions on device scheduling. The method is tested on real data provided by Ontario Power Company and we show that this scheme is capable to reduce energy consumption and consumers’ payment.  相似文献   
118.
For many practical industrial spatially distributed processes (SDPs), their dynamics are usually described by highly dissipative nonlinear partial differential equations (PDEs). In this paper, we address the L2 disturbance attenuation problem of nonlinear SDPs using the Hamilton–Jacobi–Isaacs (HJI) approach. Firstly, by collecting an ensemble of PDE states, Karhunen–Loève decomposition (KLD) is employed to compute empirical eigenfunctions (EEFs) of the SDP based on the method of snapshots. Subsequently, these EEFs together with singular perturbation (SP) technique are used to obtain a finite-dimensional slow subsystem of ordinary differential equation (ODE) that accurately describes the dominant dynamics of the PDE system. Secondly, based on the slow subsystem, the L2 disturbance attenuation problem is reformulated and a finite-dimensional H controller is synthesized in terms of the HJI equation. Moreover, the stability and L2-gain performance of the closed-loop PDE system are analyzed. Thirdly, since the HJI equation is a nonlinear PDE that has proven to be impossible to solve analytically, we combine the method of weighted residuals (MWR) and simultaneous policy update algorithm (SPUA) to obtain its approximate solution. Finally, the simulation studies are conducted on a nonlinear diffusion-reaction process and a temperature cooling fin of high-speed aerospace vehicle, and the achieved results demonstrate the effectiveness of the developed control method.  相似文献   
119.
Functional, macroporous, beaded copolymers containing epoxy groups were synthesized for immobilization of polyphenol oxidase (PPO) from edible mushroom (Agaricus bisporus). The effect of incorporation of two different sets of monomers such as glycidyl methacrylate (GMA) and allyl glycidyl ether (AGE) and the effect of cross-linking agent ethylene glycol dimethacrylate (EGDM) with varying cross-link densities on binding and expression of mushroom PPO activity were studied. The effect of porogen viz. cyclohexanol and hexanol on PPO immobilization was studied. AGE copolymers with hexanol as a porogen were found to give higher binding and expression of PPO activity than GE polymers. Cross-linking of amino groups of enzyme with 5% glutaraldehyde for 6 h gave a stable binding of PPO on AGE-75(Hex) polymer with storage half-life of approximately 25 days. Under optimum conditions, AGE-75(Hex) polymer gave 70.3% of activity yield while percent retention of PPO activity was found to be 83.5%. Immobilized PPO showed a broader pH, higher temperature and excellent storage stability.  相似文献   
120.
A wireless sensor network (WSN) commonly whilst a body sensor network (BSN) must be secured with requires lower level security for public information gathering, strong authenticity to protect personal health information. In this paper, some practical problems with the message authentication codes (MACs), which were proposed in the popular security architectures for WSNs, are reconsidered. The analysis shows that the recommended MACs for WSNs, e.g., CBC- MAC (TinySec), OCB-MAC (MiniSec), and XCBC-MAC (SenSee), might not be exactly suitable for BSNs. Particularly an existential forgery attack is elaborated on XCBC-MAC. Considering the hardware limitations of BSNs, we propose a new family of tunable lightweight MAC based on the PRESENT block cipher. The first scheme, which is named TukP, is a new lightweight MAC with 64-bit output range. The second scheme, which is named TuLP-128, is a 128-bit variant which provides a higher resistance against internal collisions. Compared with the existing schemes, our lightweight MACs are both time and resource efficient on hardware-constrained devices.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号