首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   676篇
  免费   45篇
  国内免费   19篇
电工技术   10篇
综合类   27篇
化学工业   22篇
金属工艺   15篇
机械仪表   49篇
建筑科学   7篇
矿业工程   2篇
能源动力   11篇
轻工业   4篇
水利工程   3篇
石油天然气   4篇
武器工业   2篇
无线电   62篇
一般工业技术   38篇
冶金工业   2篇
原子能技术   4篇
自动化技术   478篇
  2025年   1篇
  2024年   4篇
  2023年   10篇
  2022年   7篇
  2021年   17篇
  2020年   14篇
  2019年   17篇
  2018年   12篇
  2017年   21篇
  2016年   19篇
  2015年   31篇
  2014年   27篇
  2013年   44篇
  2012年   36篇
  2011年   53篇
  2010年   15篇
  2009年   38篇
  2008年   53篇
  2007年   47篇
  2006年   39篇
  2005年   27篇
  2004年   28篇
  2003年   22篇
  2002年   18篇
  2001年   22篇
  2000年   15篇
  1999年   12篇
  1998年   8篇
  1997年   9篇
  1996年   14篇
  1995年   6篇
  1994年   13篇
  1993年   8篇
  1992年   4篇
  1991年   2篇
  1990年   4篇
  1989年   6篇
  1988年   4篇
  1987年   2篇
  1986年   3篇
  1985年   4篇
  1984年   1篇
  1983年   2篇
  1981年   1篇
排序方式: 共有740条查询结果,搜索用时 15 毫秒
81.
在神经网络基础理论中,有一个这样的问题:怎样用三层网络实现对任意连续函数的映射,本文利用Kohonen提出的Self-OrganizingFeatureMap竞争型网络以及区域的2M-分割概念,解决了用具有有限个隐层单元的三层网络以任意精度逼近一个连续函数的问题,具体的网络结构和学习算法已给出.  相似文献   
82.
Identifying the dispersal pathways of an invasive species is useful for adopting the appropriate strategies to prevent and control its spread. However, these processes are exceedingly complex. So, it is necessary to apply new technology and collect representative samples for analysis. This study used Approximate Bayesian Computation (ABC) in combination with traditional genetic tools to examine extensive sample data and historical records to infer the invasion history of the red swamp crayfish, Procambarus clarkii, in China. The sequences of the mitochondrial control region and the proPOx intron in the nuclear genome of samples from 37 sites (35 in China and one each in Japan and the USA) were analyzed. The results of combined scenarios testing and historical records revealed a much more complex invasion history in China than previously believed. P. clarkii was most likely originally introduced into China from Japan from an unsampled source, and the species then expanded its range primarily into the middle and lower reaches and, to a lesser extent, into the upper reaches of the Changjiang River in China. No transfer was observed from the upper reaches to the middle and lower reaches of the Changjiang River. Human-mediated jump dispersal was an important dispersal pathway for P. clarkii. The results provide a better understanding of the evolutionary scenarios involved in the rapid invasion of P. clarkii in China.  相似文献   
83.
用于综合评判的一种权重计算方法   总被引:2,自引:0,他引:2  
在综合评判和决策过程中,属性权重的确定是其中一个重要环节。由于常用方法存在诸多缺点,为此根据信息具有粒度的思想,基于粗糙集两个近似精度来科学定义属性的重要性,并将之作为综合评判中的客观权重。此外考虑到客观经验因素,将客观扭值和主观权重相结合,最后得到有利于正确评价和决策的综合权重。流型识别仿真试验结果表明:文章提出的权重计算方法较为完备,其应用效果优于其它权重计算方法。  相似文献   
84.
钱卫香 《机械传动》2012,36(2):63-66
以“λ”形机构为研究对象,在建立机构综合模型基础上,提出取实际机构输出的连杆曲线直线近似度与理想直线近似度之间的偏差作为质量特性指标的稳健性能评价模型,结合示例计算并绘制满足输出精度要求的概率曲线图和机构稳健性能图,得到了满足约束条件的局部最优和全局最优稳健机构解,设计者可以很容易选取稳健性能优越的“λ”形机构.  相似文献   
85.
当前网络技术迅猛发展,网络安全问题日益突出,尤其是访问控制安全性。为了解决目前网络系统中存在的威胁检测精度和安全访问控制问题,引入SPEA-II算法,提出一种新的网络多层次安全访问控制方法。深入分析网络多层次访问控制机制原理,明确安全访问控制目标。结合网络边界区域、传输信道区域、移动终端设备区域,建立边界访问控制目标函数、安全威胁检测目标函数、用户身份认证目标函数,提高网络系统安全威胁检测精度。利用SPEA-Ⅱ算法对联合目标函数进行求解,获取网络多层次安全访问控制机制最佳方案。通过迭代逐渐接近近似最优解集,建立最优安全策略组合,计算攻击流量因子完成网络多层次安全访问控制。实验结果表明,所提方法的网络多层次威胁检测精度为94%,安全评估为0.96。由此证明,所提方法的网络多层次安全访问控制效果较好,具有较强的安全性和适应性,能够为中移互联网领域的网络安全策略提供技术支持。  相似文献   
86.
Process accuracy index Ca has been proposed in the manufacturing industry to provide numerical measures on process centering (the ability to cluster around the specification mid-point). Investigations on process accuracy in existing engineering statistics and quality assurance literature are all focused on small samples with a normality assumption. In this paper, a natural estimator of process accuracy index is considered. The limiting distribution and related large sample properties of the considered estimator are studied under general populations having fourth central moment exists. A decision-making procedure based on an approximate 100(1-α)% lower bound of the process accuracy index is also constructed. A practical example is demonstrated to illustrate how the proposed procedure may be applied for in-plant applications to judge whether the process runs under the desirable accuracy requirement.  相似文献   
87.
Syntactic pattern recognition is introduced and it is suggested that a research engineer will probably be less familiar with the language theory underlying syntactic pattern recognition than with the statistical ideas connected with decision theoretic methods. For this reason application of syntactic pattern recognition will only develop if software support is provided. The steps of grammatical inference, recogniser construction and recogniser optimisation are outlined. They are included in a scheme by which, working interactively and iteratively, a syntactic pattern recogniser can be produced. Some comments on an implementation are given.  相似文献   
88.
89.
The control process of Proton Exchange Membrane Fuel Cells (PEMFCs) is a difficult task due to the non-linearities and uncertainties associated with the electrochemical processes governing it. Designing of a non-linear controller based on model predictive control for PEMFCs is presented in some previous works to regulate the cell voltage or power output based on just one of the input variables like hydrogen pressure or operating temperature respectively, but they use a constant signal for other important control variables due to computational limitations in on-line optimization of multivariable highly non-linear system. In this paper, by use of Approximate Predictive Control (APC) method based on neural network model, the whole control process is designed with three input variables. Operating temperature and hydrogen pressure are assumed as control design variables and current density as measured disturbance to manage the cell voltage. Moreover, multi-objective optimization based on multi-objective uniform-diversity genetic algorithm (MUGA) is used for optimal selection of the parameters of controller. The comparison of the obtained results with those in literature demonstrates the superiority of the results of this work.  相似文献   
90.
    
With the increasing number of available XML documents, numerous approaches for retrieval have been proposed in the literature. They usually use the tree representation of documents and queries to process them, whether in an implicit or explicit way. Although retrieving XML documents can be considered as a tree matching problem between the query tree and the document trees, only a few approaches take advantage of the algorithms and methods proposed by the graph theory. In this paper, we aim at studying the theoretical approaches proposed in the literature for tree matching and at seeing how these approaches have been adapted to XML querying and retrieval, from both an exact and an approximate matching perspective. This study will allow us to highlight theoretical aspects of graph theory that have not been yet explored in XML retrieval.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号