首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   29470篇
  免费   3280篇
  国内免费   2602篇
电工技术   1684篇
技术理论   1篇
综合类   2545篇
化学工业   1681篇
金属工艺   363篇
机械仪表   989篇
建筑科学   781篇
矿业工程   219篇
能源动力   492篇
轻工业   296篇
水利工程   319篇
石油天然气   227篇
武器工业   204篇
无线电   6191篇
一般工业技术   2234篇
冶金工业   488篇
原子能技术   80篇
自动化技术   16558篇
  2024年   137篇
  2023年   552篇
  2022年   670篇
  2021年   800篇
  2020年   922篇
  2019年   845篇
  2018年   736篇
  2017年   970篇
  2016年   1171篇
  2015年   1314篇
  2014年   1784篇
  2013年   2091篇
  2012年   1947篇
  2011年   2289篇
  2010年   1755篇
  2009年   2125篇
  2008年   2198篇
  2007年   2119篇
  2006年   1693篇
  2005年   1430篇
  2004年   1190篇
  2003年   1047篇
  2002年   924篇
  2001年   788篇
  2000年   718篇
  1999年   573篇
  1998年   512篇
  1997年   437篇
  1996年   356篇
  1995年   281篇
  1994年   214篇
  1993年   177篇
  1992年   130篇
  1991年   78篇
  1990年   60篇
  1989年   45篇
  1988年   37篇
  1987年   21篇
  1986年   20篇
  1985年   46篇
  1984年   40篇
  1983年   37篇
  1982年   41篇
  1981年   4篇
  1980年   9篇
  1979年   8篇
  1978年   3篇
  1977年   3篇
  1976年   2篇
  1951年   1篇
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
81.
Agglomeration and networks in spatial economies   总被引:1,自引:0,他引:1  
We consider the parallel developments in the economics of agglomeration and the economics of networks. We explore the complementarities between the productivity benefits of agglomeration and those of network linkages, arguing that networks of actors dispersed over space may substitute for agglomerations of actors at a single point.JEL Classification: D20, L14, R30  相似文献   
82.
The use of neural networks as global approximation tool in crashworthiness problems is here investigated. Neural networks are not only asked to return some meaningful indices of the structural behavior but also to reproduce load-time curves during crash phenomena. To contain the number of examples required for the training process, parallel subsystems of small neural networks are designed. Design points for the training process are obtained by explicit finite element analyses performed by PAMCRASH. The settlement of the points in the design domain is defined using a maximum distance concept. The procedure is applied to different typical absorption structures made of aluminum alloy: riveted tubes, honeycomb structures, longitudinal keel beam and intersection elements of helicopter subfloors.  相似文献   
83.
TCP/IP网络的动态模型描述   总被引:2,自引:0,他引:2  
拥塞现象成为TCP/IP网络发展面临的一个重要问题。因此,拥塞控制对TCP/IP网络的鲁棒性和稳定性具有重要作用。目前,网络拥塞控制策略主要包括两类:端到端的控制机制,如TCP拥塞控制算法;网络内部的主动队列管理(AQM)策略。但由于缺乏对网络系统动态特性的了解,这些拥塞控制策略大都基于专家经验,并没有建立完整的理论分析框架。为此,本文从数据流的角度出发,通过建立网络基本单元状态方程模型来实现IP网络系统的数学解析模型,然后用混杂系统来描述TCP带有拥塞控制策略的数据传输过程,建立了TCP/IP网络的动态模型,为网络系统中动态性能的分析、拥塞控制策略的设计奠定了基础。实验结果表明,该数学模型与NS仿真实验的结果相一致。  相似文献   
84.
Mathematical models are developed and used to study the properties of complex systems in just about every area of applied science and engineering. Information on the system being modeled is, in general, incomplete, so that there may be two or more models consistent with the available information. The collection of these models is called the class of candidate models. A decision-theoretic method is developed for selecting the optimal member from the collection. The optimal model depends on the available information, the class of candidate models, and the model use. The candidate models may be deterministic or random. Classical methods for model selection, including the method of maximum likelihood and Bayesian methods, are briefly reviewed. These methods ignore model use and require data to be available. In addition, examples are used to show that classical methods for model selection can be unreliable in the sense that they can deliver unsatisfactory models when data is limited. The proposed decision-theoretic method for model selection does not have these limitations. The method accounts for model use via a utility function. This feature is especially important when modeling high-risk systems where the consequences of using an inappropriate model for the system can be disastrous.  相似文献   
85.
Fingerprints are the oldest and most widely used biometrics for personal identification. Unfortunately, it is usually possible to deceive automatic fingerprint identification systems by presenting a well-duplicated synthetic or dismembered finger. This paper introduces one method to provide fingerprint vitality authentication in order to solve this problem. Detection of a perspiration pattern over the fingertip skin identifies the vitality of a fingerprint. Mapping the two-dimensional fingerprint images into one-dimensional signals, two ensembles of measures, namely static and dynamic measures, are derived for classification. Static patterns as well as temporal changes in dielectric mosaic structure of the skin, caused by perspiration, demonstrate themselves in these signals. Using these measures, this algorithm quantifies the sweating pattern and makes a final decision about vitality of the fingerprint by a neural network trained by examples.  相似文献   
86.
87.
This paper presents a mechanism which infers a user's plans from his/her utterances by directing the inference process towards the more likely interpretations of a speaker's statements among many possible interpretations. Our mechanism uses Bayesian theory of probability to assess the likelihood of an interpretation, and it complements this assessment by taking into consideration two aspects of an interpretation: its coherence and its information content. The coherence of an interpretation is determined by the relationships between the different statements in the discourse. The information content of an interpretation is a measure of how well defined the interpretation is in terms of the actions to be performed on the basis of this interpretation. This measure is used to guide the inference process towards interpretations with higher information content. The information content of an interpretation depends on the specificity and the certainty of the inferences in it, where the certainty of an inference depends on the knowledge on which the inference is based. Our mechanism has been developed for use in task-oriented consultation systems. The particular domain that we have chosen for exploration is that of travel booking.  相似文献   
88.
This paper presents a critical evaluation of existing FMS architectures and the academic and industrial design and development strategies used during their formulation. The paper seeks to address the need for, and value of, existing architectures within the industrial arena. More importantly however, this paper puts forward a new two-tier distributed control architecture for FMS based upon new (real-time) networkable DSP servo control methodologies developed by one of the authors for Softronics in Australia. The ramifications of these methodologies are substantial, not only in terms of FMS control, but in the overall simplification of such systems and the development of flexible fixturing devices over the coming decade. This paper also postulates on how new FMS architectures can be developed from such technologies and details why such architectures could be more appropriate to industry needs than those that are currently in existence.  相似文献   
89.
This paper discusses the feasibility of using neural networks as a tool in the fault detection process. A neural network is integrated with a state language programmable logic controller, an important device in an automatic control system. Time series data related to time spent in a state is gathered and used as input into a neural network, for the purpose of identifying when a fault has occurred. A feedforward neural network is used to identify which (if any) of three types of faults may have occurred. Experimental results related to sensitivity and accuracy measures are presented. A brief review of related applications and research is also presented.  相似文献   
90.
The problem of parametrizing single hidden layer scalar neural networks with continuous activation functions is investigated. A connection is drawn between realization theory for linear dynamical systems, rational functions, and neural networks that appears to be new. A result of this connection is a general parametrization of such neural networks in terms of strictly proper rational functions. Some existence and uniqueness results are derived. Jordan decompositions are developed, which show how the general form can be expressed in terms of a sum of canonical second order sections. The parametrization may be useful for studying learning algorithms.This work was supported by the Australian Research Council, the Australian Telecommunications and Electronics Research Board, and the Boeing Commencai Aircraft Company (thanks to John Moore).  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号