首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5598篇
  免费   38篇
  国内免费   7篇
电工技术   78篇
综合类   24篇
化学工业   1236篇
金属工艺   141篇
机械仪表   240篇
建筑科学   169篇
矿业工程   21篇
能源动力   853篇
轻工业   307篇
水利工程   42篇
石油天然气   88篇
无线电   441篇
一般工业技术   864篇
冶金工业   131篇
原子能技术   44篇
自动化技术   964篇
  2024年   29篇
  2023年   103篇
  2022年   79篇
  2021年   143篇
  2020年   169篇
  2019年   220篇
  2018年   191篇
  2017年   342篇
  2016年   449篇
  2015年   356篇
  2014年   494篇
  2013年   501篇
  2012年   315篇
  2011年   282篇
  2010年   213篇
  2009年   238篇
  2008年   93篇
  2007年   130篇
  2006年   138篇
  2005年   90篇
  2004年   63篇
  2003年   58篇
  2002年   82篇
  2001年   79篇
  2000年   52篇
  1999年   121篇
  1998年   43篇
  1997年   42篇
  1996年   41篇
  1995年   42篇
  1994年   35篇
  1993年   30篇
  1992年   15篇
  1991年   11篇
  1990年   15篇
  1989年   12篇
  1988年   30篇
  1987年   40篇
  1986年   54篇
  1985年   33篇
  1984年   22篇
  1983年   16篇
  1982年   12篇
  1981年   8篇
  1979年   9篇
  1977年   7篇
  1974年   8篇
  1970年   8篇
  1965年   8篇
  1961年   8篇
排序方式: 共有5643条查询结果,搜索用时 15 毫秒
991.
The study of criminal networks using traces from heterogeneous communication media is acquiring increasing importance in nowadays society. The usage of communication media such as mobile phones and online social networks leaves digital traces in the form of metadata that can be used for this type of analysis. The goal of this work is twofold: first we provide a theoretical framework for the problem of detecting and characterizing criminal organizations in networks reconstructed from phone call records. Then, we introduce an expert system to support law enforcement agencies in the task of unveiling the underlying structure of criminal networks hidden in communication data. This platform allows for statistical network analysis, community detection and visual exploration of mobile phone network data. It enables forensic investigators to deeply understand hierarchies within criminal organizations, discovering members who play central role and provide connection among sub-groups. Our work concludes illustrating the adoption of our computational framework for a real-word criminal investigation.  相似文献   
992.
A new architecture of intelligent audio emotion recognition is proposed in this paper. It fully utilizes both prosodic and spectral features in its design. It has two main paths in parallel and can recognize 6 emotions. Path 1 is designed based on intensive analysis of different prosodic features. Significant prosodic features are identified to differentiate emotions. Path 2 is designed based on research analysis on spectral features. Extraction of Mel-Frequency Cepstral Coefficient (MFCC) feature is then followed by Bi-directional Principle Component Analysis (BDPCA), Linear Discriminant Analysis (LDA) and Radial Basis Function (RBF) neural classification. This path has 3 parallel BDPCA + LDA + RBF sub-paths structure and each handles two emotions. Fusion modules are also proposed for weights assignment and decision making. The performance of the proposed architecture is evaluated on eNTERFACE’05 and RML databases. Simulation results and comparison have revealed good performance of the proposed recognizer.  相似文献   
993.
Cloud computing aims to provide dynamic leasing of server capabilities as scalable virtualized services to end users. However, data centers hosting cloud applications consume vast amounts of electrical energy, thereby contributing to high operational costs and carbon footprints. Green cloud computing solutions that can not only minimize the operational costs but also reduce the environmental impact are necessary. This study focuses on the Infrastructure as a Service model, where custom virtual machines (VMs) are launched in appropriate servers available in a data center. A complete data center resource management scheme is presented in this paper. The scheme can not only ensure user quality of service (through service level agreements) but can also achieve maximum energy saving and green computing goals. Considering that the data center host is usually tens of thousands in size and that using an exact algorithm to solve the resource allocation problem is difficult, the modified shuffled frog leaping algorithm and improved extremal optimization are employed in this study to solve the dynamic allocation problem of VMs. Experimental results demonstrate that the proposed resource management scheme exhibits excellent performance in green cloud computing.  相似文献   
994.
In this paper, we investigate the problem of time series forecasting using single hidden layer feedforward neural networks (SLFNs), which is optimized via multiobjective evolutionary algorithms. By utilizing the adaptive differential evolution (JADE) and the knee point strategy, a nondominated sorting adaptive differential evolution (NSJADE) and its improved version knee point-based NSJADE (KP-NSJADE) are developed for optimizing SLFNs. JADE aiming at refining the search area is introduced in nondominated sorting genetic algorithm II (NSGA-II). The presented NSJADE shows superiority on multimodal problems when compared with NSGA-II. Then NSJADE is applied to train SLFNs for time series forecasting. It is revealed that individuals with better forecasting performance in the whole population gather around the knee point. Therefore, KP-NSJADE is proposed to explore the neighborhood of the knee point in the objective space. And the simulation results of eight popular time series databases illustrate the effectiveness of our proposed algorithm in comparison with several popular algorithms.  相似文献   
995.
The current web IR system retrieves relevant information only based on the keywords which is inadequate for that vast amount of data. It provides limited capabilities to capture the concepts of the user needs and the relation between the keywords. These limitations lead to the idea of the user conceptual search which includes concepts and meanings. This study deals with the Semantic Based Information Retrieval System for a semantic web search and presented with an improved algorithm to retrieve the information in a more efficient way.This architecture takes as input a list of plain keywords provided by the user and the query is converted into semantic query. This conversion is carried out with the help of the domain concepts of the pre-existing domain ontologies and a third party thesaurus and discover semantic relationship between them in runtime. The relevant information for the semantic query is retrieved and ranked according to the relevancy with the help of an improved algorithm. The performance analysis shows that the proposed system can improve the accuracy and effectiveness for retrieving relevant web documents compared to the existing systems.  相似文献   
996.
Amiri  I. S.  Bunruangses  M.  Chaiwong  K.  Udaiyakumar  R.  Maheswar  R.  Hindia  M. N.  Dimyati  K. B.  Yupapin  P. 《Microsystem Technologies》2019,25(4):1185-1193
Microsystem Technologies - To meet the 5G requirements for higher bandwidth, the focus has been shifted to millimeter waves paving the way to radio over fiber (RoF) in order to minimize radio...  相似文献   
997.

An infrastructure development in landscape and clearing of more vegetated areas have provided huge changes in Malaysia gradually leading to slope instabilities accompanied by enormous environmental effects such as properties and destructions. Thus, prudent practices through vegetation incorporating to use slope stability is an option to the general stabilized technique. Few researches have investigated the effectiveness of vegetative coverings related to slope and soil parameters. The main goal of this study is to provide an intelligent soft computing model to predict the safety factor (FOS) of a slope using support vector regression (SVR). In the other words, SVR has investigated the surface eco-protection techniques for cohesive soil slopes in Guthrie Corridor Expressway stretch through the probabilistic models analysis to highlight the main parameters. The aforementioned analysis has been performed to predict the FOS of a slope, also the estimator’s function has been confirmed by the simulative outcome compared to artificial neural network and genetic programing resulting in a drastic accurate estimation by SVR. Using new analyzing methods like SVR are more purposeful than achieving a starting point by trial and error embedding multiple factors into one in ordinary low-technique software.

  相似文献   
998.
999.
The subject of power quality embraces a very wide and diverse field of both system and customer problems. There are many requirements for appropriate solutions, from simple power factor corrections of a load to sophisticated load flow control in a high-voltage transmission system. It can be simply defined as the quality of power supplied to the end user. The evaluation of power quality improvement alternatives is an exercise in economics. Utility engineers must evaluate the economic impacts of the power quality variations against the costs of improving performance for the different available alternatives. The best choice will depend on the costs of the solution and its total operating costs. Improving facility performance during power quality variations can result in significant savings and can be a competitive advantage. Therefore, it is important for customers and suppliers to work together in identifying the best alternative for achieving the required level of performance  相似文献   
1000.
    
Traditional multivariate statistics-based process monitoring (MSPM) methods are static algorithms, and the “time lag shift” method (TLSM) is the most commonly used approach to handle the dynamic issue. This paper proves in theory that two drawbacks exist in TLSM-based dynamic approaches: information unrelated to the real-time data is also analyzed, and information that can be predicted by historical data is counted repeatedly in both real-time and historical data. This paper adopts orthonormal subspace analysis (OSA) to handle these issues. OSA can successfully separate real-time data into information that can be predicted by historical data (the dynamic component) and cannot be predicted for process monitoring (the static component), so the detection result is not influenced by redundant information and is more sensitive to process faults than TLSM-based dynamic methods.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号