首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   41233篇
  免费   4671篇
  国内免费   3669篇
电工技术   3438篇
技术理论   2篇
综合类   7239篇
化学工业   1967篇
金属工艺   949篇
机械仪表   2825篇
建筑科学   3152篇
矿业工程   1059篇
能源动力   840篇
轻工业   2524篇
水利工程   1129篇
石油天然气   939篇
武器工业   513篇
无线电   5315篇
一般工业技术   3854篇
冶金工业   999篇
原子能技术   491篇
自动化技术   12338篇
  2024年   144篇
  2023年   493篇
  2022年   924篇
  2021年   986篇
  2020年   1026篇
  2019年   987篇
  2018年   1007篇
  2017年   1219篇
  2016年   1347篇
  2015年   1424篇
  2014年   2198篇
  2013年   2422篇
  2012年   2842篇
  2011年   3082篇
  2010年   2464篇
  2009年   2635篇
  2008年   2717篇
  2007年   3175篇
  2006年   2842篇
  2005年   2539篇
  2004年   2123篇
  2003年   1818篇
  2002年   1498篇
  2001年   1246篇
  2000年   1087篇
  1999年   927篇
  1998年   743篇
  1997年   616篇
  1996年   563篇
  1995年   495篇
  1994年   421篇
  1993年   302篇
  1992年   265篇
  1991年   219篇
  1990年   193篇
  1989年   175篇
  1988年   114篇
  1987年   68篇
  1986年   32篇
  1985年   35篇
  1984年   26篇
  1983年   33篇
  1982年   23篇
  1981年   12篇
  1980年   14篇
  1979年   9篇
  1978年   6篇
  1977年   6篇
  1976年   7篇
  1963年   3篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
数字图像LS(BLeast Significant Bits)在统计上与二项分布相似,结构上与原宿主图像仍然具有一定的相关性,从而导致经典LSB替换算法产生直方图"阶梯效应"。本文主要从图像像素以及像素间关系的特征函数出发,观察其常见统计模型的变化,为设计有效的图像隐写算法及隐写分析算法提供参考依据。  相似文献   
992.
In this paper, optimum positioning of the conical cutter for five-axis flank milling of slender surfaces is addressed from the perspective of approximating the tool envelope surface to the data points on the design surface following the minimum zone criterion recommended by ANSI and ISO standards for tolerance evaluation. Based on the observation that a conical surface can be treated as a canal surface, i.e. envelope surface of one-parameter family of spheres, the swept envelope of a conical cutter is represented as a sphere-swept surface. Then, an approach is presented to efficiently compute the signed distance between a point in space and the swept surface without constructing the swept surface itself. The first order differential increment of the signed point-to-surface distance with respect to the differential deformation of the tool axis trajectory surface is derived. By using the distance function, tool path optimizations for semi-finish and finish millings are formulated as two constrained optimization problems in a unified framework, and a sequential approximation algorithm along with a hierarchical algorithmic structure is developed for the optimization. Numerical examples are given to confirm the validity and efficiency of the proposed approach. Comparing with the existing approaches, the present one improves the machining accuracy greatly. The rationale developed applies to general rotary cutters.  相似文献   
993.
The objective of the paper is to describe a novel finite element computational method based on a strain energy density function and to implement it in the object-oriented environment. The original energy-based finite element was put into the known standard framework of classes and handled in a different manner. The nonlinear properties of material are defined with a modified strain energy density function. The local relaxation procedure proposed as a method used to resolve a nonlinear problem is implemented in C++ language. The hexahedral element with eight nodes as well as the adaptation of the nonlinear finite element is introduced. The chosen numerical model is made of nearly incompressible hyperelastic material. The application of the proposed element is shown on the example of a rectangular parallelepiped with a hollow port.  相似文献   
994.
Two numerical techniques are presented for solving the solution of Riccati differential equation. These methods use the cubic B-spline scaling functions and Chebyshev cardinal functions. The methods consist of expanding the required approximate solution as the elements of cubic B-spline scaling function or Chebyshev cardinal functions. Using the operational matrix of derivative, we reduce the problem to a set of algebraic equations. Some numerical examples are included to demonstrate the validity and applicability of the new techniques. The methods are easy to implement and produce very accurate results.  相似文献   
995.
To study the communication between information systems, Wang et al. [C. Wang, C. Wu, D. Chen, Q. Hu, C. Wu, Communicating between information systems, Information Sciences 178 (2008) 3228-3239] proposed two concepts of type-1 and type-2 consistent functions. Some properties of such functions and induced relation mappings have been investigated there. In this paper, we provide an improvement of the aforementioned work by disclosing the symmetric relationship between type-1 and type-2 consistent functions. We present more properties of consistent functions and induced relation mappings and improve upon several deficient assertions in the original work. In particular, we unify and extend type-1 and type-2 consistent functions into the so-called neighborhood-consistent functions. This provides a convenient means for studying the communication between information systems based on various neighborhoods.  相似文献   
996.
Classifiers based on radial basis function neural networks have a number of useful properties that can be exploited in many practical applications. Using sample data, it is possible to adjust their parameters (weights), to optimize their structure, and to select appropriate input features (attributes). Moreover, interpretable rules can be extracted from a trained classifier and input samples can be identified that cannot be classified with a sufficient degree of “certainty”. These properties support an analysis of radial basis function classifiers and allow for an adaption to “novel” kinds of input samples in a real-world application. In this article, we outline these properties and show how they can be exploited in the field of intrusion detection (detection of network-based misuse). Intrusion detection plays an increasingly important role in securing computer networks. In this case study, we first compare the classification abilities of radial basis function classifiers, multilayer perceptrons, the neuro-fuzzy system NEFCLASS, decision trees, classifying fuzzy-k-means, support vector machines, Bayesian networks, and nearest neighbor classifiers. Then, we investigate the interpretability and understandability of the best paradigms found in the previous step. We show how structure optimization and feature selection for radial basis function classifiers can be done by means of evolutionary algorithms and compare this approach to decision trees optimized using certain pruning techniques. Finally, we demonstrate that radial basis function classifiers are basically able to detect novel attack types. The many advantageous properties of radial basis function classifiers could certainly be exploited in other application fields in a similar way.  相似文献   
997.
Mass function derivation and combination in multivariate data spaces   总被引:1,自引:0,他引:1  
In this paper, we consider the problem of how to derive mass functions systematically from data samples. We also consider the ensuing problem of how to combine different mass functions derived in this way. We show that a mass function can be efficiently and systematically derived from multivariate data. We also demonstrate that combining mass functions obtained in this manner can be done easily. The way of deriving and combining mass functions is illustrated with a simple example.  相似文献   
998.
用户建模是从用户偏好数据中建立用户偏好模型的过程,用户偏好数据具有系统运行初期的稀疏性和非线形的特点。支持向量机(Support Vector Machine,简称SVM)具有小样本学习、非线形处理的能力,是合适的用户建模工具。SVM的非线形处理能力主要依赖于核函数,采用不同的核函数进行建模对模型的预测效果有重大影响。本文重点研究核函数的选择对基于SVM建模方法的影响,从中选取了表现较优的小波核函数,构建性能突出的SVM进行用户建模。实验证明该建模方法可以有效地从小样本数据中学习用户偏好信息,建立反映用户真实偏好的用户模型。  相似文献   
999.
针对高速运动条件下交通实时监测图像的失真和去噪问题,介绍小波阈值图像去噪过程和传统GCV阈值的原理,引入整数小波变换和合并递推运算的思想,提出一种快速递推GCV阈值的小波图像去噪方法。仿真实验分析了传统GCV阈值和快速递推GCV阈值去噪的效果,并比较了两种算法的复杂度。结果表明,快速递推GCV阈值算法不仅保留了传统GCV阈值算法去噪效果明显的特点,而且很好地解决了算法复杂度较高的问题,具有良好的应用前景。  相似文献   
1000.
Excel软件在当今社会中已经成为一种必备工具。它除了可以用来制作各种表格与图表、进行简单的运算之外,还可以管理数据,并以此为基础进行数据分析。但是大部分人在使用Excel时,只是简单使用了软件菜单提供的排序、自动筛选等常用功能,以及求和等数学计算函数,在处理最简单的数据表格时相当方便快捷,然而当实际工作对数据的处理提出更复杂的要求时就束手无策了,转而求助于他人或其他软件工具。该文将结合自己在工作中的实践,探讨通过灵活应用函数在Excel中实现数据库应用,解决复杂数据处理问题的一些方法和技巧。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号