首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   14412篇
  免费   2107篇
  国内免费   2073篇
电工技术   547篇
技术理论   19篇
综合类   317篇
化学工业   2682篇
金属工艺   639篇
机械仪表   383篇
建筑科学   108篇
矿业工程   139篇
能源动力   1520篇
轻工业   137篇
水利工程   57篇
石油天然气   105篇
武器工业   56篇
无线电   2716篇
一般工业技术   2801篇
冶金工业   291篇
原子能技术   157篇
自动化技术   5918篇
  2024年   116篇
  2023年   600篇
  2022年   705篇
  2021年   896篇
  2020年   923篇
  2019年   756篇
  2018年   616篇
  2017年   732篇
  2016年   881篇
  2015年   850篇
  2014年   1334篇
  2013年   1502篇
  2012年   2118篇
  2011年   1680篇
  2010年   1382篇
  2009年   1371篇
  2008年   429篇
  2007年   148篇
  2006年   190篇
  2005年   121篇
  2004年   69篇
  2003年   100篇
  2002年   109篇
  2001年   146篇
  2000年   68篇
  1999年   81篇
  1998年   35篇
  1997年   20篇
  1996年   36篇
  1995年   38篇
  1994年   22篇
  1993年   26篇
  1992年   21篇
  1991年   22篇
  1990年   25篇
  1989年   21篇
  1988年   49篇
  1987年   139篇
  1986年   119篇
  1985年   26篇
  1984年   19篇
  1983年   7篇
  1982年   12篇
  1981年   10篇
  1980年   4篇
  1979年   5篇
  1978年   3篇
  1977年   2篇
  1976年   3篇
  1951年   5篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
51.
In C2C communication, all necessary information must be collected promptly when a buyer and a seller communicate. That is, an intelligent C2C agent is needed to provide information to buyers and sellers. Along with the evolution of computing technology, C2C agents can exploit the efficient delivery capabilities of peer-to-peer (P2P) technology. However, P2P also increases traffic between agents, but communication faults are a fatal problem for C2C business. This study proposes a robust communication architecture based on current P2P content-delivery standards and its efficiency and robustness have been verified from an experiment.  相似文献   
52.
The abundance of mobile software applications (apps) has created a security challenge. These apps are widely available across all platforms for little to no cost and are often created by small companies and less-experienced programmers. The lack of development standards and best practices exposes the mobile device to potential attacks. This article explores not only the practices that should be adopted by developers of all apps, but also those practices the enterprise user should demand of any app that resides on a mobile device that is employed for both business and private uses.  相似文献   
53.
The paper is to introduce a new systematic method that can produce lower bounds for eigenvalues. The main idea is to use nonconforming finite element methods. The conclusion is that if local approximation properties of nonconforming finite element spaces are better than total errors (sums of global approximation errors and consistency errors) of nonconforming finite element methods, corresponding methods will produce lower bounds for eigenvalues. More precisely, under three conditions on continuity and approximation properties of nonconforming finite element spaces we analyze abstract error estimates of approximate eigenvalues and eigenfunctions. Subsequently, we propose one more condition and prove that it is sufficient to guarantee nonconforming finite element methods to produce lower bounds for eigenvalues of symmetric elliptic operators. We show that this condition hold for most low-order nonconforming finite elements in literature. In addition, this condition provides a guidance to modify known nonconforming elements in literature and to propose new nonconforming elements. In fact, we enrich locally the Crouzeix-Raviart element such that the new element satisfies the condition; we also propose a new nonconforming element for second order elliptic operators and prove that it will yield lower bounds for eigenvalues. Finally, we prove the saturation condition for most nonconforming elements.  相似文献   
54.
In this paper, the dynamical behaviors of a two-dimensional simplified Hodgkin–Huxley (H–H) model exposed to external electric fields are investigated through qualitative analysis and numerical simulation. A necessary and sufficient condition is proposed for the existence of the Hopf bifurcation. Saddle-node bifurcations and canards of the simplified model with the coefficients of different linear forms are also discussed. Finally, the bifurcation curves with the coefficients of different linear forms are shown. The numerical results demonstrate that some linear forms can retain the bifurcation characteristics of the original model, which is of great use to simplify the H–H model for the real-world applications.  相似文献   
55.
In this paper, a novel self-adaptive extreme learning machine (ELM) based on affinity propagation (AP) is proposed to optimize the radial basis function neural network (RBFNN). As is well known, the parameters of original ELM which developed by G.-B. Huang are randomly determined. However, that cannot objectively obtain a set of optimal parameters of RBFNN trained by ELM algorithm for different realistic datasets. The AP algorithm can automatically produce a set of clustering centers for the different datasets. According to the results of AP, we can, respectively, get the cluster number and the radius value of each cluster. In that case, the above cluster number and radius value can be used to initialize the number and widths of hidden layer neurons in RBFNN and that is also the parameters of coefficient matrix H of ELM. This may successfully avoid the subjectivity prior knowledge and randomness of training RBFNN. Experimental results show that the method proposed in this thesis has a more powerful generalization capability than conventional ELM for an RBFNN.  相似文献   
56.
Twin support vector machine (TWSVM) is a research hot spot in the field of machine learning in recent years. Although its performance is better than traditional support vector machine (SVM), the kernel selection problem still affects the performance of TWSVM directly. Wavelet analysis has the characteristics of multivariate interpolation and sparse change, and it is suitable for the analysis of local signals and the detection of transient signals. The wavelet kernel function based on wavelet analysis can approximate any nonlinear functions. Based on the wavelet kernel features and the kernel function selection problem, wavelet twin support vector machine (WTWSVM) is proposed by this paper. It introduces the wavelet kernel function into TWSVM to make the combination of wavelet analysis techniques and TWSVM come true. The experimental results indicate that WTWSVM is feasible, and it improves the classification accuracy and generalization ability of TWSVM significantly.  相似文献   
57.
58.
With the fast explosive rate of the amount of image data on the Internet, how to efficiently utilize them in the cross-media scenario becomes an urgent problem. Images are usually accompanied with contextual textual information. These two heterogeneous modalities are mutually reinforcing to make the Internet content more informative. In most cases, visual information can be regarded as an enhanced content of the textual document. To make image-to-image similarity being more consistent with document-to-document similarity, this paper proposes a method to learn image similarities according to the relations of the accompanied textual documents. More specifically, instead of using the static quantitative relations, rank-based learning procedure by employing structural SVM is adopted in this paper, and the ranking structure is established by comparing the relative relations of textual information. The learning results are in more accordance with the human’s recognition. The proposed method in this paper can be used not only for the image-to-image retrieval, but also for cross-modality multimedia, where a query expansion framework is proposed to get more satisfactory results. Extensive experimental evaluations on large scale Internet dataset validate the performance of the proposed methods.  相似文献   
59.
The massive quantity of data available today in the Internet has reached such a huge volume that it has become humanly unfeasible to efficiently sieve useful information from it. One solution to this problem is offered by using text summarization techniques. Text summarization, the process of automatically creating a shorter version of one or more text documents, is an important way of finding relevant information in large text libraries or in the Internet. This paper presents a multi-document summarization system that concisely extracts the main aspects of a set of documents, trying to avoid the typical problems of this type of summarization: information redundancy and diversity. Such a purpose is achieved through a new sentence clustering algorithm based on a graph model that makes use of statistic similarities and linguistic treatment. The DUC 2002 dataset was used to assess the performance of the proposed system, surpassing DUC competitors by a 50% margin of f-measure, in the best case.  相似文献   
60.
The study of criminal networks using traces from heterogeneous communication media is acquiring increasing importance in nowadays society. The usage of communication media such as mobile phones and online social networks leaves digital traces in the form of metadata that can be used for this type of analysis. The goal of this work is twofold: first we provide a theoretical framework for the problem of detecting and characterizing criminal organizations in networks reconstructed from phone call records. Then, we introduce an expert system to support law enforcement agencies in the task of unveiling the underlying structure of criminal networks hidden in communication data. This platform allows for statistical network analysis, community detection and visual exploration of mobile phone network data. It enables forensic investigators to deeply understand hierarchies within criminal organizations, discovering members who play central role and provide connection among sub-groups. Our work concludes illustrating the adoption of our computational framework for a real-word criminal investigation.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号