首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2090篇
  免费   126篇
  国内免费   104篇
电工技术   89篇
综合类   360篇
化学工业   93篇
金属工艺   18篇
机械仪表   43篇
建筑科学   265篇
矿业工程   101篇
能源动力   67篇
轻工业   75篇
水利工程   90篇
石油天然气   44篇
武器工业   3篇
无线电   83篇
一般工业技术   145篇
冶金工业   343篇
原子能技术   44篇
自动化技术   457篇
  2024年   7篇
  2023年   42篇
  2022年   37篇
  2021年   60篇
  2020年   57篇
  2019年   61篇
  2018年   34篇
  2017年   53篇
  2016年   58篇
  2015年   61篇
  2014年   106篇
  2013年   113篇
  2012年   123篇
  2011年   178篇
  2010年   200篇
  2009年   253篇
  2008年   102篇
  2007年   104篇
  2006年   122篇
  2005年   112篇
  2004年   99篇
  2003年   63篇
  2002年   52篇
  2001年   57篇
  2000年   28篇
  1999年   30篇
  1998年   19篇
  1997年   13篇
  1996年   4篇
  1995年   5篇
  1994年   4篇
  1993年   6篇
  1991年   6篇
  1990年   4篇
  1989年   3篇
  1988年   6篇
  1986年   2篇
  1984年   4篇
  1982年   2篇
  1981年   2篇
  1979年   2篇
  1978年   4篇
  1977年   2篇
  1965年   3篇
  1964年   4篇
  1961年   1篇
  1959年   1篇
  1955年   1篇
  1954年   1篇
  1951年   1篇
排序方式: 共有2320条查询结果,搜索用时 0 毫秒
81.
数据库系统作为信息系统中的基础软件,其安全性问题十分重要,尤其是对于并发事件的控制和处理。该文通过对于MySQL数据库系统的详细作用功能阐述,对其性能功能进行详细的研究后,利用ODBC API和MySQL自带的C API函数来实现MySQL数据库功能调用,使得其能够出现并发事件时,能快速有效的进行数据库的数据控制和处理。  相似文献   
82.
We consider the problem of estimating the parameters of a distribution when the underlying events are themselves unobservable. The aim of the exercise is to perform a task (for example, search a web-site or query a distributed database) based on a distribution involving the state of nature, except that we are not allowed to observe the various “states of nature” involved in this phenomenon. In particular, we concentrate on the task of searching for an object in a set of N locations (or bins) {C 1, C 2,…, C N }, in which the probability of the object being in the location C i is p i , where P = [p 1, p 2,…, p N ] T is called the Target Distribution. Also, the probability of locating the object in the bin within a specified time, given that it is in the bin, is given by a function called the Detection function, which, in its most common instantiation, is typically, specified by an exponential function. The intention is to allocate the available resources so as to maximize the probability of locating the object. The handicap, however, is that the time allowed is limited, and thus the fact that the object is not located in bin C i within a specified time does not necessarily imply that the object is not in C i . This problem has applications in searching large databases, distributed databases, and the world-wide web, where the location of the files sought for are unknown, and in developing various military and strategic policies. All of the research done in this area has assumed the knowledge of the {p i }. In this paper we consider the problem of obtaining error bounds, estimating the Target Distribution, and allocating the search times when the {p i } are unknown. To the best of our knowledge, these results are of a pioneering sort - they are the first available results in this area, and are particularly interesting because, as mentioned earlier, the events concerning the Target Distribution, in themselves, are unobservable.
B. John Oommen (Corresponding author)Email:

Qingxin Zhu   Qingxin Zhu got his Bachelor’s degree in Mathematics in 1981 from Sichuan Normal University, China. He got the Master’s degree in Applied Mathematics from Beijing Institute of Technology in 1984. From 1984 to 1988 he was employed by the Southwest Technical Physics Institute. In 1988, he continued his higher education with the Department of Mathematics, University of Ottawa, Canada and got a PhD degree in 1993. From 1993 to 1996, he did postgraduate research and got a second Master’s degree in Computer Science from Carleton University, Canada. He is currently a Professor with the University of Electronics Science and Technology of China (UESTC). His research interests are Optimal Search Theory, Computer Applications, and Bioinformatics. B. John Oommen   Dr. John Oommen was born in Coonoor, India on 9 September 1953. He obtained his B.Tech. degree from the Indian Institute of Technology, Madras, India in 1975. He obtained his M.E. from the Indian Institute of Science in Bangalore, India in 1977. He then went on for his MS and PhD which he obtained from Purdue University, in West Lafayettte, Indiana in 1979 and 1982, respectively. He joined the School of Computer Science at Carleton University in Ottawa, Canada, in the 1981–1982 academic year. He is still at Carleton and holds the rank of a Full Professor. Since July 2006, he has been awarded the honorary rank of Chancellor's Professor, which is a lifetime award from Carleton University. His research interests include Automata Learning, Adaptive Data Structures, Statistical and Syntactic Pattern Recognition, Stochastic Algorithms and Partitioning Algorithms. He is the author of more than 280 refereed journal and conference publications, and is a Fellow of the IEEE and a Fellow of the IAPR. Dr. Oommen is on the Editorial Board of the IEEE Transactions on Systems, Man and Cybernetics, and Pattern Recognition.   相似文献   
83.
人居环境伦理观与建筑材料的绿色化   总被引:6,自引:2,他引:6       下载免费PDF全文
环境伦理观研究的是人与自然之间的伦理关系,人居环境伦理观则是在具体对象上对环境伦理观的细化,研究的对象是人与人居环境的伦理关系。人居环境伦理观赋予人关心和保护人居环境,从而其实也是关心与保护人类自己的特殊职责。人居环境目前正面临着诸多危机,如城市环境污染,室内空气污染等,这意味着人居环境伦理观出现的危机,而这些危机与建筑材料密切相关。针对由于建筑材料引起的人居环境危机,提出了改善人居环境质量的途径之一,就是建筑材料的绿色化。  相似文献   
84.
金融危机影响全球钼加工业经济,通过对中国钼加工业面临的挑战与机遇分析,指出金融危机下中国钼加工业的发展应拓宽钼的应用领域,突破加工瓶颈,促进产业升级,提出了理念创新、人才战略和有序发展等建议。  相似文献   
85.
为了提高网络热点事件的预测精度,提出一种基于遗传优化加权相关向量机的网络热点事件预测模型(GA-WRVM)。首先对每个样本数据的噪声方差加上一个权值系数得到加权相关向量机,然后用组合核函数代替相关向量机的单一核函数,并采用遗传算法对核参数进行优化建立预测模型,最后利用网络热点数据进行仿真实验分析。结果表明,相对于神经网络和支持向量机,GA-WRVM降低了网络热点事件的预测误差,获得了更高的网络热点预测精度,具有更强的泛化能力。  相似文献   
86.
弱点状多运动目标实时跟踪技术研究   总被引:2,自引:0,他引:2       下载免费PDF全文
根据确认的众多量测和众多目标跟踪窗之间的几何关系,引入确认矩阵并计算所有联合事件及其对应的参数,不论量测是否落入跟踪窗相交区域,根据JPDA算法计算每一个量测与其可能的各个源目标之间互联的概率。将互联的概率与Kalman滤波器相结合从而完成对每一个目标的预测和更新。理论及实验结果表明,该算法适用于序列图像密集杂波环境下的全程跟踪,并取得了一定的理论和仿真结果。  相似文献   
87.
吴俊  管鲁阳  鲍明  许耀华  叶炜 《光电工程》2019,46(5):180493-1-180493-8
针对相位敏感光时域反射(Φ-OTDR)分布式光纤振动传感系统如何对振动事件进行高效准确识别的问题,本文提出了一种基于多尺度一维卷积神经网络(MS 1-D CNN)的振动事件识别方法。该方法将原始振动信号经过预加重、归一化和谱减降噪的预处理操作后得到的一维信号,直接通过MS 1-D CNN实现端到端的振动信号特征的提取和识别。MS 1-D CNN在提取入侵振动信号特征时可兼顾信号时间和频率尺度,利用全连接层(FC layer)和Softmax层完成最终的识别过程,与二维卷积神经网络(2-D CNN)和一维卷积神经网络(1-D CNN)相比减少了待定参数数量。对破坏、敲击和干扰三类目标振动事件的光纤振动传感信号识别结果表明,MS 1-D CNN的识别正确率与2-D CNN相近,达到了96%以上,而处理速度提升一倍,在保持识别性能的前提下,有利于提高振动事件识别的实时性。  相似文献   
88.
Gelsemium elegans (G. elegans) is a Chinese medicinal plant with substantial economic and feeding values. There is a lack of detailed studies on the mitochondrial genome of G. elegans. In this study, the mitochondrial genome of G. elegans was sequenced and assembled, and its substructure was investigated. The mitochondrial genome of G. elegans is represented by two circular chromosomes of 406,009 bp in length with 33 annotated protein-coding genes, 15 tRNA genes, and three rRNA genes. We detected 145 pairs of repeats and found that four pairs of repeats could mediate the homologous recombination into one major conformation and five minor conformations, and the presence of conformations was verified by PCR amplification and Sanger sequencing. A total of 124 SSRs were identified in the G. elegans mitochondrial genome. The homologous segments between the chloroplast and mitochondrial genomes accounted for 5.85% of the mitochondrial genome. We also predicted 477 RNA potential editing sites and found that the nad4 gene was edited 38 times, which was the most frequent occurrence. Taken together, the mitochondrial genome of G. elegans was assembled and annotated. We gained a more comprehensive understanding on the genome of this medicinal plant, which is vital for its effective utilization and genetic improvement, especially for cytoplasmic male sterility breeding and evolution analysis in G. elegans.  相似文献   
89.
参考人体行走电压的测试标准IEC 61340-4-5, 搭建了电缆由线轴上绕下并在地板上拖拽积累的电压的测试系统, 测量了六类非屏蔽网线的电压波形.基于实测电缆电压波形, 提出了电缆电压的RC等效电路模型, 并分析了模型参数对电缆电压时域波形的影响.进行了电缆充电后对金属靶的放电实验, 测量了电缆放电事件的电流波形、瞬态电场和瞬态磁场波形, 分析了电缆放电事件对电子设备的影响.根据测量的电缆放电事件的电流波形, 对比了GJB 151B中CS 115电缆束注入脉冲激励传导敏感度的电流波形, 二者电流波形有一定的相似性, 但是对于较长电缆在电流的强度和宽度方面都会大于CS 115规定的限值.因此, 提出了电缆放电事件的防护方法, 并对相关标准的改进方面提出了初步建议.  相似文献   
90.
随着计算机的发展,互联网的共享性,开放性以及互联程度的不断扩大。其中lnternet的广泛普及,商业数字货币,网络银行等一部分网络新业务的迅速兴起,使得计算机网络的安全问题越来越显得重要,本文归纳总结,提出网络信息中的一些安全防护策略。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号