首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   13775篇
  免费   767篇
  国内免费   892篇
电工技术   339篇
综合类   757篇
化学工业   1092篇
金属工艺   350篇
机械仪表   1370篇
建筑科学   957篇
矿业工程   194篇
能源动力   509篇
轻工业   258篇
水利工程   262篇
石油天然气   350篇
武器工业   93篇
无线电   1171篇
一般工业技术   683篇
冶金工业   339篇
原子能技术   118篇
自动化技术   6592篇
  2024年   27篇
  2023年   126篇
  2022年   175篇
  2021年   274篇
  2020年   236篇
  2019年   245篇
  2018年   278篇
  2017年   336篇
  2016年   462篇
  2015年   466篇
  2014年   829篇
  2013年   826篇
  2012年   849篇
  2011年   1163篇
  2010年   770篇
  2009年   804篇
  2008年   830篇
  2007年   951篇
  2006年   866篇
  2005年   737篇
  2004年   677篇
  2003年   687篇
  2002年   504篇
  2001年   411篇
  2000年   297篇
  1999年   295篇
  1998年   263篇
  1997年   213篇
  1996年   164篇
  1995年   153篇
  1994年   106篇
  1993年   70篇
  1992年   76篇
  1991年   48篇
  1990年   41篇
  1989年   50篇
  1988年   31篇
  1987年   11篇
  1986年   17篇
  1985年   20篇
  1984年   13篇
  1983年   11篇
  1982年   9篇
  1981年   6篇
  1980年   4篇
  1979年   2篇
  1978年   1篇
  1976年   3篇
  1973年   1篇
排序方式: 共有10000条查询结果,搜索用时 9 毫秒
191.
Entering information on a computer keyboard is a ubiquitous mode of expression and communication. We investigate whether typing behavior is connected to two factors: the cognitive demands of a given task and the demographic features of the typist. We utilize features based on keystroke dynamics, stylometry, and “language production”, which are novel hybrid features that capture the dynamics of a typists linguistic choices. Our study takes advantage of a large data set (~350 subjects) made up of relatively short samples (~450 characters) of free text. Experiments show that these features can recognize the cognitive demands of task that an unseen typist is engaged in, and can classify his or her demographics with better than chance accuracy. We correctly distinguish High vs. Low cognitively demanding tasks with accuracy up to 72.39%. Detection of non-native speakers of English is achieved with F1=0.462 over a baseline of 0.166, while detection of female typists reaches F1=0.524 over a baseline of 0.442. Recognition of left-handed typists achieves F1=0.223 over a baseline of 0.100. Further analyses reveal that novel relationships exist between language production as manifested through typing behavior, and both cognitive and demographic factors.  相似文献   
192.
In this article, two field experiments, conducted in an automotive assembly plant, evaluate how computer‐based training of operational sequences and related quality information can support the assembly performance of the operators. The experiments were performed during the launch of a new vehicle. A comparison was made of learning progress and quality performance between a reference group of operators that only had regular training and a test group for which some of the regular training was replaced with individual computer‐based training. Both quantitative measures of the quality output and questionnaires and observations were used to evaluate the effects of computer‐based training. The results show a clear positive difference in learning progress and improvements in quality output for the test group compared with the reference group. This combined with positive attitudes expressed by the operators and their team leaders shows that this type of training is an effective way to train operators during launches of new vehicles in automotive production.  相似文献   
193.
In this paper, a non-cooperative distributed MPC algorithm based on reduced order model is proposed to stabilize large-scale systems. The large-scale system consists of a group of interconnected subsystems. Each subsystem can be partitioned into two parts: measurable part, whose states can be directly measured by sensors, and the unmeasurable part. In the online computation phase, only the measurable dynamics of the corresponding subsystem and neighbour-to-neighbour communication are necessary for the local controller design. Satisfaction of the state constraints and the practical stability are guaranteed while the complexity of the optimization problem is reduced. Numerical examples are given to show the effectiveness of this algorithm.  相似文献   
194.
This paper presents a methodology for comparing the performance of model-reduction strategies to be used with a diagnostic methodology for leak detection in water distribution networks. The goal is to find reduction strategies that are suitable for error-domain model falsification, a model based data interpretation methodology. Twelve reduction strategies are derived from five strategy categories. Categories differ according to the manner in which nodes are selected for deletion. A node is selected for deletion according to: (1) the diameter of the pipes; (2) the number of pipes linked to a node; (3) the angle of the pipes in the case of two-pipe nodes; (4) the distribution of the water demand; and, (5) a pair-wise combination of some categories.The methodology is illustrated using part of a real network. Performance is evaluated first by judging the equivalency of the reduced network with the initial network (before the application of any reduction procedure) and secondly, by assessing the compatibility with the diagnostic methodology. The results show that for each reduction strategy the equivalency of networks is verified. Computational time can be reduced to less than 20% of the non-reduced network in the best case. Results of diagnostic performance show that the performance decreases when using reduced networks. The reduction strategy with the best diagnostic performance is that based on the angle of two-pipe nodes, with an angle threshold of 165°. In addition, the sensitivity of the performance of the reduced networks to variation in leak intensity is evaluated. Results show that the reduction strategies where the number of nodes is significantly reduced are the most sensitive.Finally this paper describes a Pareto analysis that is used to select the reduction strategy that is a good compromise between reduction of computational time and performance of the diagnosis. In this context, the extension strategy is the most attractive.  相似文献   
195.
196.
陶皖  杨磊 《数字社区&智能家居》2013,(10):6340-6342,6347
大数据具有数据量巨大、数据形式多样化等特点,大数据时代为教育和学习提供了丰富的信息资源,但也给教育模式和人才培养带来挑战。首先具体说明大数据时代的特点及对高校人才培养的影响,分析大数据时代对信息系统及相应人才的要求,结合教学实践研究大数据背景下信息系统专业的人才培养模式。  相似文献   
197.
Voltage stability is one of the most challenging concerns that power utilities are confronted with, and this paper proposes a voltage control scheme based on Model Predictive Control (MPC) to overcome this kind of instability. Voltage instability has a close relation with the adequacy of reactive power and the response of Under Load Tap Changers (ULTCs) to the voltage drop after the occurrence of a contingency. Therefore, the proposed method utilizes reactive power injection and tap changing to avoid voltage collapse. Considering discrete nature of the changes in the tap ratio and also in the reactive power injected by capacitor banks, the search area for the optimizer of MPC will be an integer area; consequently, a modified discrete multi-valued Particle Swarm Optimization (PSO) is considered to perform this optimization. Simulation results of applying the proposed control scheme to a 4-bus system confirm its capability to prevent voltage collapse.  相似文献   
198.
We propose a generic online multi-target track-before-detect (MT-TBD) that is applicable on confidence maps used as observations. The proposed tracker is based on particle filtering and automatically initializes tracks. The main novelty is the inclusion of the target ID in the particle state, enabling the algorithm to deal with unknown and large number of targets. To overcome the problem of mixing IDs of targets close to each other, we propose a probabilistic model of target birth and death based on a Markov Random Field (MRF) applied to the particle IDs. Each particle ID is managed using the information carried by neighboring particles. The assignment of the IDs to the targets is performed using Mean-Shift clustering and supported by a Gaussian Mixture Model. We also show that the computational complexity of MT-TBD is proportional only to the number of particles. To compare our method with recent state-of-the-art works, we include a postprocessing stage suited for multi-person tracking. We validate the method on real-world and crowded scenarios, and demonstrate its robustness in scenes presenting different perspective views and targets very close to each other.  相似文献   
199.
Yelp, a social media site, undeniably has an influence on consumers' food choice in spite of its ability to reflect consumers' real voice being criticized. Since unhealthy food choices contribute to health problems, such as obesity and malnourishment, we attempted to examine these problems by better understanding consumers through health-related cues to action—a construct from the Health Belief Model (HBM)— on Yelp Honolulu's restaurant reviews. Our research revealed 13 main categories: Ingredient, Type of food, Taste, Lifestyle, Cooking, Option, Price, Portion, Well-being, Nutrition, Hygiene, Emotional attachment and indulgence, and Feeling. We argue that these categories may ultimately lead consumers to make healthier food choices. In search of the most appealing way to communicate with the target group, underlying concepts that derived from these categories can be tested. Marketers in food industry (or public health policy-makers) can craft their strategies for healthy food brands/products (or healthy eating scheme) based on the concept test research. Moreover, Yelp can apply these insights in the development of their algorithm and filter system in order to help consumers find healthy food if they wish to do so. Restaurants can also improve their strategy, menu, and communication execution to meet the growing demands of health conscious consumers.  相似文献   
200.
In this paper, we tackle the problem of opportunistic spectrum access in large-scale cognitive radio networks, where the unlicensed Secondary Users (SUs) access the frequency channels partially occupied by the licensed Primary Users (PUs). Each channel is characterized by an availability probability unknown to the SUs. We apply population game theory to model the spectrum access problem and develop distributed spectrum access policies based on imitation, a behavior rule widely applied in human societies consisting of imitating successful behaviors. We develop two imitation-based spectrum access policies based on the basic Proportional Imitation (PI) rule and the more advanced Double Imitation (DI) rule given that a SU can only imitate the other SUs operating on the same channel. A systematic theoretical analysis is presented for both policies on the induced imitation dynamics and the convergence properties of the proposed policies to the Nash equilibrium. Simple and natural, the proposed imitation-based spectrum access policies can be implemented distributedly based on solely local interactions and thus is especially suited in decentralized adaptive learning environments as cognitive radio networks.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号