首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   57398篇
  免费   10451篇
  国内免费   3699篇
电工技术   5523篇
技术理论   3篇
综合类   6185篇
化学工业   2940篇
金属工艺   1617篇
机械仪表   3635篇
建筑科学   1770篇
矿业工程   1158篇
能源动力   1587篇
轻工业   1109篇
水利工程   968篇
石油天然气   990篇
武器工业   564篇
无线电   9701篇
一般工业技术   3662篇
冶金工业   1234篇
原子能技术   222篇
自动化技术   28680篇
  2025年   124篇
  2024年   2038篇
  2023年   1975篇
  2022年   2560篇
  2021年   2885篇
  2020年   2925篇
  2019年   2182篇
  2018年   1699篇
  2017年   1864篇
  2016年   1969篇
  2015年   2137篇
  2014年   2917篇
  2013年   3280篇
  2012年   3521篇
  2011年   3863篇
  2010年   3006篇
  2009年   3469篇
  2008年   3768篇
  2007年   3995篇
  2006年   3367篇
  2005年   3050篇
  2004年   2516篇
  2003年   2105篇
  2002年   1801篇
  2001年   1574篇
  2000年   1375篇
  1999年   1187篇
  1998年   981篇
  1997年   808篇
  1996年   648篇
  1995年   504篇
  1994年   374篇
  1993年   288篇
  1992年   199篇
  1991年   114篇
  1990年   88篇
  1989年   59篇
  1988年   36篇
  1987年   30篇
  1986年   40篇
  1985年   54篇
  1984年   41篇
  1983年   41篇
  1982年   42篇
  1981年   4篇
  1980年   5篇
  1979年   10篇
  1978年   4篇
  1959年   4篇
  1951年   3篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
31.
Web proxy caches are used to reduce the strain of contemporary web traffic on web servers and network bandwidth providers. In this research, a novel approach to web proxy cache replacement which utilizes neural networks for replacement decisions is developed and analyzed. Neural networks are trained to classify cacheable objects from real world data sets using information known to be important in web proxy caching, such as frequency and recency. Correct classification ratios between 0.85 and 0.88 are obtained both for data used for training and data not used for training. Our approach is compared with Least Recently Used (LRU), Least Frequently Used (LFU) and the optimal case which always rates an object with the number of future requests. Performance is evaluated in simulation for various neural network structures and cache conditions. The final neural networks achieve hit rates that are 86.60% of the optimal in the worst case and 100% of the optimal in the best case. Byte-hit rates are 93.36% of the optimal in the worst case and 99.92% of the optimal in the best case. We examine the input-to-output mappings of individual neural networks and analyze the resulting caching strategy with respect to specific cache conditions.  相似文献   
32.
基于内容的图像检索已经成为图像检索的一个重要研究方向。其中利用形状特征可以实现形状较为明显的各类图像库的检索。该文对图像形状特征的提取和描述方法进行了较深入地研究,选取其中一部分特征值,分别利用BP神经网络和支持向量机进行形状识别,取得令人满意的实验效果。  相似文献   
33.
A variety of computational tasks in early vision can be formulated through lattice networks. The cooperative action of these networks depends upon the topology of interconnections, both feedforward and recurrent ones. The Gabor-like impulse response of a 2nd-order lattice network (i.e. with nearest and next-to-nearest interconnections) is analysed in detail, pointing out how a near-optimal filtering behaviour in space and frequency domains can be achieved through excitatory/inhibitory interactions without impairing the stability of the system. These architectures can be mapped, very efficiently at transistor level, on VLSI structures operating as analogue perceptual engines. The hardware implementation of early vision tasks can, indeed, be tackled by combining these perceptual agents through suitable weighted sums. Various implementation strategies have been pursued with reference to: (i) the algorithm-circuit mapping (current-mode and transconductor approaches); (ii) the degree of programmability (fixed, selectable and tunable); and (iii) the implementation technology (2 and 0.8 gate lengths). Applications of the perceptual engine to machine vision algorithms are discussed.  相似文献   
34.
The twisted cube is an important variant of the most popular hypercube network for parallel processing. In this paper, we consider the problem of embedding multi-dimensional meshes into twisted cubes in a systematic way. We present a recursive method for embedding a family of disjoint multi-dimensional meshes into a twisted cube with dilation 1 and expansion 1. We also prove that a single multi-dimensional mesh can be embedded into a twisted cube with dilation 2 and expansion 1. Our work extends some previously known results.  相似文献   
35.
A scanning electron microscope (SEM) is a sophisticated equipment employed for fine imaging of a variety of surfaces. In this study, prediction models of SEM were constructed by using a generalized regression neural network (GRNN) and genetic algorithm (GA). The SEM components examined include condenser lens 1 and 2 and objective lens (coarse and fine) referred to as CL1, CL2, OL-Coarse, and OL-Fine. For a systematic modeling of SEM resolution (R), a face-centered Box–Wilson experiment was conducted. Two sets of data were collected with or without the adjustment of magnification. Root-mean-squared prediction error of optimized GRNN models are GA 0.481 and 1.96×10-12 for non-adjusted and adjusted data, respectively. The optimized models demonstrated a much improved prediction over statistical regression models. The optimized models were used to optimize parameters particularly under best tuned SEM environment. For the variations in CL2 and OL-Coarse, the highest R could be achieved at all conditions except a larger CL2 either at smaller or larger OL-Coarse. For the variations in CL1 and CL2, the highest R was obtained at all conditions but larger CL2 and smaller CL1.  相似文献   
36.
Determination of deformation modulus and coefficient of subgrade reaction of soils have major importance, whether the projects are in design, and construction or compaction assessment stage of earth filling structures. Plate load test is one of the frequently used method to directly determine the parameters but the method is both costly and time consuming. For this reason, this paper is concerned with the applications of artificial neural networks (ANN) and simple-multiple regression analysis to predict deformation modulus and coefficient of subgrade reaction of compacted soils from compaction parameters (such as maximum dry density (MDD) and optimum moisture content (OMC), field dry density (FDD), and field moisture content (FMC)). Regression analysis and artificial neural network estimation indicated that there are acceptable correlations between deformation modulus and coefficient of subgrade reaction and these parameters. Artificial neural networks model exhibits higher performance than traditional statistical model for predicting deformation modulus and coefficient of subgrade reaction.  相似文献   
37.
This paper addresses the problems of stability and synchronization for a class of Markovian jump neural networks with partly unknown transition probabilities. We first study the stability analysis problem for a single neural network and present a sufficient condition guaranteeing the mean square asymptotic stability. Then based on the Lyapunov functional method and the Kronecker product technique, the chaos synchronization problem of an array of coupled networks is considered. Both the stability and the synchronization conditions are delay-dependent, which are expressed in terms of linear matrix inequalities. The effectiveness of the developed methods is shown by simulation examples.  相似文献   
38.
为满足非接触化、小型化、集成化、数字化、智能化等现代检测技术的发展要求,从成本、工作原理、灵敏度等方面综合考虑,现采用以光电定位模块为核心的光电定位技术,以无线传感器网络作为数据传输与管理的技术手段,构建了无线光电定位网络,并进行了实验分析.可实现多点实时监测、异地显示测量数据、数据网络化管理等特殊需求;涵盖了多学科领...  相似文献   
39.
In sensor networks, a compromised node can either generate fabricated reports with false votes or inject false votes into real reports, which causes severe damage such as false alarms, energy drain and information loss. An interleaved hop-by-hop authentication (IHA) scheme addresses the former attack by detecting and filtering false reports in a deterministic and hop-by-hop fashion. Unfortunately, in IHA, all en-route nodes must join to verify reports while only a few are necessary to the authentication procedure. In this paper, we propose a fuzzy-based interleaved multi-hop authentication scheme based on IHA. In our scheme, the fuzzy logic system only selects some nodes for verification based on the network characteristics. Moreover, we apply a voting method and a hash-based key assignment mechanism to improve network security. Through performance evaluation, the proposed scheme is found to save up to 13% of the energy consumption and to provide more network protection compared to IHA.  相似文献   
40.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号