首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2966篇
  免费   270篇
  国内免费   75篇
电工技术   153篇
综合类   164篇
化学工业   350篇
金属工艺   52篇
机械仪表   109篇
建筑科学   239篇
矿业工程   16篇
能源动力   60篇
轻工业   99篇
水利工程   69篇
石油天然气   37篇
武器工业   8篇
无线电   383篇
一般工业技术   254篇
冶金工业   54篇
原子能技术   80篇
自动化技术   1184篇
  2023年   9篇
  2022年   23篇
  2021年   37篇
  2020年   61篇
  2019年   62篇
  2018年   71篇
  2017年   60篇
  2016年   86篇
  2015年   114篇
  2014年   116篇
  2013年   125篇
  2012年   131篇
  2011年   222篇
  2010年   142篇
  2009年   188篇
  2008年   198篇
  2007年   194篇
  2006年   136篇
  2005年   148篇
  2004年   163篇
  2003年   224篇
  2002年   149篇
  2001年   139篇
  2000年   79篇
  1999年   50篇
  1998年   33篇
  1997年   33篇
  1996年   47篇
  1995年   33篇
  1994年   40篇
  1993年   17篇
  1992年   21篇
  1991年   24篇
  1990年   16篇
  1989年   8篇
  1988年   12篇
  1987年   7篇
  1986年   8篇
  1985年   18篇
  1984年   17篇
  1983年   9篇
  1982年   8篇
  1981年   5篇
  1979年   2篇
  1978年   8篇
  1977年   3篇
  1976年   4篇
  1975年   3篇
  1974年   4篇
  1965年   1篇
排序方式: 共有3311条查询结果,搜索用时 31 毫秒
91.
黄景廉 《计算机应用》2008,28(11):2759-2762
针对IEEE 802.11e无线局域网参考调度算法分配定长的发送机会(TXOP)的缺陷,提出了一种支持实时业务的自适应调度机制。该机制通过终端反馈业务流发送队列的缓存数据量,动态分配变长TXOP以满足不同负载、不同业务的要求;当有新业务请求加入系统时,调度机制在保障现有业务最低时延的前提下,采用按比例减少现有业务的请求TXOP时间的长度的方式,并采用线性规划的优化方法,尽可能为新业务安排时间允许接入。详细的仿真实验及与IEEE 802.11e参考调度机制的比较表明,提出的调度机制提高了系统的吞吐量,有效地降低了实时业务的时延。  相似文献   
92.
针对目前手指静脉识别由于训练样本不足引起图像识别率低的问题,提出基于线性回归分类(linear regression classification,LRC)与多样本扩充的指静脉识别方法。首先,利用矩阵变换生成原始图像的镜像,训练原始图像与镜像,增加指静脉图像中包含的有用信息;然后,基于LRC对测试和训练样本进行分类;最后,通过计算偏差得到最终分类结果,求出识别率。此外,设计了一种指静脉采集装置收集得到自建指静脉数据库。实验结果表明:所提算法在自建指静脉数据库、山东大学指静脉数据库、马来西亚理工大学指静脉数据库上的识别率分别达到98.93%、98.89%、99.67%,最低等误率为2.3888%。实验结果与其他传统和流行算法相比具有明显优势,拥有良好的实际应用价值。  相似文献   
93.
The ability to harness the optical or electrical properties of nanoscale particles depends on their assembly in terms of size and spatial characteristics which remains challenging due to lack of size focusing. Electrons provide a clean and focusing agent to initiate the assembly of nanoclusters or nanoparticles. Here an intriguing route is demonstrated to lace gold nanoclusters and nanoparticles in string assembly through electron‐initiated nucleation and aggregative growth of Au(I)‐thiolate motifs on a thin film substrate. This size‐focused assembly is demonstrated by controlling the electron dose under transmission electron microscopic imaging conditions. The Au(I)‐thiolate motifs, in combination with the molecularly mediated alignment, facilitate the interstring electrostatic and intrastring aurophilic interactions, which functions as a molecular template to aid electron‐initiated 1D lacing. The findings demonstrate a hierarchical route for the 1D assemblies with size and spatial tunable catalytic, optical, sensing, and diagnostic properties.  相似文献   
94.
Elections are a central model in a variety of areas. This paper studies parameterized computational complexity of five control problems in the Maximin election. We obtain the following results: constructive control by adding candidates is W[2]-hard with respect to the parameter “number of added candidates”; both constructive and destructive control by adding/deleting voters are W[1]-hard with respect to the parameter “number of added/deleted voters”.  相似文献   
95.
In this paper we prove that, under suitable conditions, Atanassov’s Kα operators, which act on intervals, provide the same numerical results as OWA operators of dimension two. On one hand, this allows us to recover OWA operators from Kα operators. On the other hand, by analyzing the properties of Atanassov’s operators, we can generalize them. In this way, we introduce a class of aggregation functions - the generalized Atanassov operators - that, in particular, include two-dimensional OWA operators. We investigate under which conditions these generalized Atanassov operators satisfy some properties usually required for aggregation functions, such as bisymmetry, strictness, monotonicity, etc. We also show that if we apply these aggregation functions to interval-valued fuzzy sets, we obtain an ordered family of fuzzy sets.  相似文献   
96.
Current extensions of hidden Markov models such as structural, hierarchical, coupled, and others have the power to classify complex and highly organized patterns. However, one of their major limitations is the inability to cope with topology: When applied to a visible observation (VO) sequence, the traditional HMM-based techniques have difficulty predicting the n-dimensional shape formed by the symbols of the VO sequence. To fulfill this need, we propose a novel paradigm named “topological hidden Markov models” (THMMs) that classifies VO sequences by embedding the nodes of an HMM state transition graph in a Euclidean space. This is achieved by modeling the noise embedded in the shape generated by the VO sequence. We cover the first and second level topological HMMs. We describe five basic problems that are assigned to a second level topological hidden Markov model: (1) sequence probability evaluation, (2) statistical decoding, (3) structural decoding, (4) topological decoding, and (5) learning. To show the significance of this research, we have applied the concept of THMMs to: (i) predict the ASCII class assigned to a handwritten numeral, and (ii) map protein primary structures to their 3D folds. The results show that the second level THMMs outperform the SHMMs and the multi-class SVM classifiers significantly.  相似文献   
97.
Relying on SIDE theory, this 2 × 2 experimental design tested the effects of adherence to organizational norms and interpersonal familiarity in e‐mail messages from both superior and subordinate perspectives. Results reveal that using norm‐congruent e‐mail messages account for over 50% of the variance in both superior and subordinate attitudes toward the message and between 30% and 56% of the variance in perceptions of source credibility. Data from the superiors indicate that norm congruent e‐mail messages account for 14.4% of the variance in message compliance. Results from subordinates reveal an interaction effect that is consistent with SIDE‐based predictions. Subordinates believe superiors are most likely to comply with e‐mail requests from unfamiliar subordinates that are crafted in a manner congruent with organizational norms.  相似文献   
98.
This study presents two extensions to the two‐stage expectation‐confirmation theory of information systems (IS) continuance. First, we expand the belief set from perceived usefulness in the original IS continuance model to include three additional predictors identified in the unified theory of acceptance and use of technology, namely effort expectancy, social influence and facilitating conditions. Second, we ground the IS continuance model in the context of transactional systems that involve transmission of personal and sensitive information and include trust as a key contextual belief in the model. To test the expanded IS continuance model, we conducted a longitudinal field study of 3159 Hong Kong citizens across two electronic government (e‐government) technologies that enable citizens' access to government services. In general, the results support the expanded model that provides a rich understanding of the changes in the pre‐usage beliefs and attitudes through the emergent constructs of disconfirmation and satisfaction, ultimately influencing IS continuance intention. Finally, we discuss the theoretical and practical implications of the expanded model.  相似文献   
99.
This paper deals with the problem of designing delayed feedback controllers of master‐slave synchronization for Lur'e systems with time‐variant delay (0≤τ0≤τ(t)≤τm). Through partitioning the intervals [0, τ0] and [τ0, τm], respectively, and choosing two augmented Lyapunov‐Krasovskii functionals(LKFs), two delay‐dependent synchronization criteria are formulated in the form of linear matrix inequalities (LMIs), in which the conservatism can be greatly reduced by thinning the partitioning of delay intervals and employing convex combination. Thus the sufficient conditions can be derived for the existence of delayed feedback controllers, and the controller gain matrices can be achieved by solving the established LMIs. Finally, three numerical examples are given to illustrate the presented synchronization schemes. Copyright © 2010 John Wiley and Sons Asia Pte Ltd and Chinese Automatic Control Society  相似文献   
100.
A goodness-of-fit testing procedure for Archimedean copula (AC) models is developed based on right-censored data. The proposed approach extends an existing method, which is suitable for the Clayton model, to general AC models. Asymptotic properties of the proposed test statistics under the true model assumption are derived. Simulation analysis shows that the proposed test has reasonable performance. Finally, two real data examples are analyzed for illustrative purposes.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号