首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9767篇
  免费   652篇
  国内免费   518篇
电工技术   444篇
综合类   792篇
化学工业   145篇
金属工艺   106篇
机械仪表   508篇
建筑科学   171篇
矿业工程   57篇
能源动力   151篇
轻工业   50篇
水利工程   68篇
石油天然气   41篇
武器工业   48篇
无线电   846篇
一般工业技术   742篇
冶金工业   96篇
原子能技术   26篇
自动化技术   6646篇
  2024年   40篇
  2023年   60篇
  2022年   94篇
  2021年   92篇
  2020年   159篇
  2019年   144篇
  2018年   117篇
  2017年   220篇
  2016年   234篇
  2015年   314篇
  2014年   438篇
  2013年   649篇
  2012年   556篇
  2011年   656篇
  2010年   433篇
  2009年   667篇
  2008年   714篇
  2007年   745篇
  2006年   672篇
  2005年   538篇
  2004年   500篇
  2003年   458篇
  2002年   390篇
  2001年   308篇
  2000年   268篇
  1999年   202篇
  1998年   203篇
  1997年   190篇
  1996年   125篇
  1995年   99篇
  1994年   93篇
  1993年   70篇
  1992年   71篇
  1991年   42篇
  1990年   34篇
  1989年   39篇
  1988年   44篇
  1987年   25篇
  1986年   22篇
  1985年   32篇
  1984年   47篇
  1983年   27篇
  1982年   21篇
  1981年   20篇
  1980年   18篇
  1979年   12篇
  1978年   7篇
  1977年   11篇
  1976年   9篇
  1975年   4篇
排序方式: 共有10000条查询结果,搜索用时 17 毫秒
21.
In this paper, we present a hybrid multi-criteria decision-making (MCDM) model to evaluate the competence of the firms. According to the competence-based theory reveals that firm competencies are recognized from exclusive and unique capabilities that each firm enjoy in marketplace and are tightly intertwined within different business functions throughout the company. Therefore, competence in the firm is a composite of various attributes. Among them many intangible and tangible attributes are difficult to measure. In order to overcome the issue, we invite fuzzy set theory into the measurement of performance. In this paper first we calculate the weight of each criterion through adaptive analytic hierarchy process (AHP) approach (A3) method, and then we appraise the performance of firms via linguistic variables which are expressed as trapezoidal fuzzy numbers. In the next step we transform these fuzzy numbers into interval data by means of α-cut. Then considering different values for α we rank the firms through TOPSIS method with interval data. Since there are different ranks for different α values, we apply linear assignment method to obtain final rank for alternatives.  相似文献   
22.
Block sorting in the Burrows-Wheeler transformation is to sort all of the n circular shifts of a string of length n lexicographically. We introduce a notion called the width of a sequence of n strings of length n and show that the values of widths are very different between the two types of sequences of strings; (1) a sequence of n randomly generated strings of length n, and (2) the sequence of n circular shifts of a randomly generated string of length n.  相似文献   
23.
In this paper, we introduce a mathematical model for analyzing the dynamics of the univariate marginal distribution algorithm (UMDA) for a class of parametric functions with isolated global optima. We prove a number of results that are used to model the evolution of UMDA probability distributions for this class of functions. We show that a theoretical analysis can assess the effect of the function parameters on the convergence and rate of convergence of UMDA. We also introduce for the first time a long string limit analysis of UMDA. Finally, we relate the results to ongoing research on the application of the estimation of distribution algorithms for problems with unitation constraints.  相似文献   
24.
Flash memory efficient LTL model checking   总被引:1,自引:0,他引:1  
As the capacity and speed of flash memories in form of solid state disks grow, they are becoming a practical alternative for standard magnetic drives. Currently, most solid-state disks are based on NAND technology and much faster than magnetic disks in random reads, while in random writes they are generally not.So far, large-scale LTL model checking algorithms have been designed to employ external memory optimized for magnetic disks. We propose algorithms optimized for flash memory access. In contrast to approaches relying on the delayed detection of duplicate states, in this work, we design and exploit appropriate hash functions to re-invent immediate duplicate detection.For flash memory efficient on-the-fly LTL model checking, which aims at finding any counter-example to the specified LTL property, we study hash functions adapted to the two-level hierarchy of RAM and flash memory. For flash memory efficient off-line LTL model checking, which aims at generating a minimal counterexample and scans the entire state space at least once, we analyze the effect of outsourcing a memory-based perfect hash function from RAM to flash memory.Since the characteristics of flash memories are different to magnetic hard disks, the existing I/O complexity model is no longer sufficient. Therefore, we provide an extended model for the computation of the I/O complexity adapted to flash memories that has a better fit to the observed behavior of our algorithms.  相似文献   
25.
Security countermeasures help ensure the confidentiality, availability, and integrity of information systems by preventing or mitigating asset losses from Cybersecurity attacks. Due to uncertainty, the financial impact of threats attacking assets is often difficult to measure quantitatively, and thus it is difficult to prescribe which countermeasures to employ. In this research, we describe a decision support system for calculating the uncertain risk faced by an organization under cyber attack as a function of uncertain threat rates, countermeasure costs, and impacts on its assets. The system uses a genetic algorithm to search for the best combination of countermeasures, allowing the user to determine the preferred tradeoff between the cost of the portfolio and resulting risk. Data collected from manufacturing firms provide an example of results under realistic input conditions.  相似文献   
26.
There are several numerical methods for calculation of electric fields but they need some sort of experience and trial and error to get the correct solution. A genetic algorithm (GA) based approach is used to eliminate the need for the experience and to save time and effort spent in the trial and error. Two enhancement techniques, namely, Refreshment Method and No-Twins Method, are used with the GA operators to improve the performance of the GA in assessment of high voltage fields. The performance of these two enhancement techniques has been studied for computing the electrostatic field in high voltage applications.  相似文献   
27.
Genetic adaptive state estimation   总被引:1,自引:0,他引:1  
A genetic algorithm (GA) uses the principles of evolution, natural selection, and genetics to offer a method for parallel search of complex spaces. This paper describes a GA that can perform on-line adaptive state estimation for linear and nonlinear systems. First, it shows how to construct a genetic adaptive state estimator where a GA evolves the model in a state estimator in real time so that the state estimation error is driven to zero. Next, several examples are used to illustrate the operation and performance of the genetic adaptive state estimator. Its performance is compared to that of the conventional adaptive Luenberger observer for two linear system examples. Next, a genetic adaptive state estimator is used to predict when surge and stall occur in a nonlinear jet engine. Our main conclusion is that the genetic adaptive state estimator has the potential to offer higher performance estimators for nonlinear systems over current methods.  相似文献   
28.
研究语音参数线性预测的并行处理问题。通过把语音源序列的相邻样本分组能够构成一个均方差平稳的语音向量自回归序列,在Hilbert空间中运用正交投影原理导出具有高度并行处理能力的一预测编码策略,由此可推出参数线性预测的并行处理自适应算法。同传统格型算法相比,这种算法的计算复杂度及存贮量有明显改善。最后通过仿真运算检测了算法的性能。  相似文献   
29.
We consider the sequencing of a series of jobs that arrive at a single processor over time. At each job’s arrival time, a due date must be quoted for the job, and the job must complete processing before its quoted due date. The objective is to minimize the sum (or average) of quoted due dates, or equivalently, the average quoted lead time. In this paper, we propose on-line heuristics for this problem and characterize the conditions under which these heuristics are asymptotically optimal. Computational testing further demonstrates the relative effectiveness of these heuristics under various conditions. Both authors made equal contributions to this paper and are listed in alphabetical order.  相似文献   
30.
The purpose of this paper is to stimulate interest within the civil engineering research community for developing the next generation of applied artificial neural networks. In particular, it identifies what the next generation of these devices needs to achieve, and provides direction in terms of how their development may proceed. An analysis of the current situation indicates that progress in the development of artificial neural network applications has largely stagnated. Suggestions are made for advancing the field to the next level of sophistication and application, using genetic algorithms and related techniques. It is shown that this approach will require the design of some very sophisticated genetic coding mechanisms in order to develop the required higher-order network structures, and will utilize development mechanisms observed in nature such as growth, self-organization, and multi-stage objective functions. The capabilities of such an approach and the way in which they can be achieved are explored with reference to the problems of: (a) determining truck attributes from the strain envelopes they induce in structural members when crossing a bridge, and; (b) developing a decision support system for dynamic control of industrialized manufacturing of houses.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号