首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9388篇
  免费   1517篇
  国内免费   1234篇
电工技术   758篇
综合类   908篇
化学工业   144篇
金属工艺   92篇
机械仪表   394篇
建筑科学   116篇
矿业工程   76篇
能源动力   114篇
轻工业   60篇
水利工程   79篇
石油天然气   56篇
武器工业   116篇
无线电   1172篇
一般工业技术   746篇
冶金工业   315篇
原子能技术   17篇
自动化技术   6976篇
  2024年   77篇
  2023年   184篇
  2022年   302篇
  2021年   300篇
  2020年   340篇
  2019年   328篇
  2018年   305篇
  2017年   442篇
  2016年   467篇
  2015年   572篇
  2014年   675篇
  2013年   801篇
  2012年   773篇
  2011年   825篇
  2010年   618篇
  2009年   681篇
  2008年   761篇
  2007年   697篇
  2006年   555篇
  2005年   472篇
  2004年   363篇
  2003年   280篇
  2002年   254篇
  2001年   213篇
  2000年   171篇
  1999年   97篇
  1998年   84篇
  1997年   82篇
  1996年   58篇
  1995年   56篇
  1994年   42篇
  1993年   40篇
  1992年   29篇
  1991年   25篇
  1990年   17篇
  1989年   24篇
  1988年   14篇
  1987年   8篇
  1986年   9篇
  1985年   9篇
  1984年   4篇
  1983年   11篇
  1982年   14篇
  1981年   11篇
  1980年   11篇
  1979年   6篇
  1978年   6篇
  1977年   4篇
  1976年   5篇
  1975年   7篇
排序方式: 共有10000条查询结果,搜索用时 46 毫秒
11.
Lévy flights have gained prominence for analysis of animal movement. In a Lévy flight, step-lengths are drawn from a heavy-tailed distribution such as a power law (PL), and a large number of empirical demonstrations have been published. Others, however, have suggested that animal movement is ill fit by PL distributions or contend a state-switching process better explains apparent Lévy flight movement patterns. We used a mix of direct behavioural observations and GPS tracking to understand step-length patterns in females of two related butterflies. We initially found movement in one species (Euphydryas editha taylori) was best fit by a bounded PL, evidence of a Lévy flight, while the other (Euphydryas phaeton) was best fit by an exponential distribution. Subsequent analyses introduced additional candidate models and used behavioural observations to sort steps based on intraspecific interactions (interactions were rare in E. phaeton but common in E. e. taylori). These analyses showed a mixed-exponential is favoured over the bounded PL for E. e. taylori and that when step-lengths were sorted into states based on the influence of harassing conspecific males, both states were best fit by simple exponential distributions. The direct behavioural observations allowed us to infer the underlying behavioural mechanism is a state-switching process driven by intraspecific interactions rather than a Lévy flight.  相似文献   
12.
Neural Machine Translation (NMT) is an end-to-end learning approach for automated translation, overcoming the weaknesses of conventional phrase-based translation systems. Although NMT based systems have gained their popularity in commercial translation applications, there is still plenty of room for improvement. Being the most popular search algorithm in NMT, beam search is vital to the translation result. However, traditional beam search can produce duplicate or missing translation due to its target sequence selection strategy. Aiming to alleviate this problem, this paper proposed neural machine translation improvements based on a novel beam search evaluation function. And we use reinforcement learning to train a translation evaluation system to select better candidate words for generating translations. In the experiments, we conducted extensive experiments to evaluate our methods. CASIA corpus and the 1,000,000 pairs of bilingual corpora of NiuTrans are used in our experiments. The experiment results prove that the proposed methods can effectively improve the English to Chinese translation quality.  相似文献   
13.
在对三步法工作原理进行研究的基础上提出了新三步搜索算法(NITSS)。该方法充分利用视频序列运动矢量概率分布上的中心偏置特性.在三步搜索算法的基础上引入了十字型分布的4个点构成搜索点群。实验结果表明。新三步搜索算法解决了三步法的小运动估计效果较差问题.提高了搜索精度,保持了三步法的高效率。  相似文献   
14.
Efficient multicast search under delay and bandwidth constraints   总被引:1,自引:0,他引:1  
The issue of a multicast search for a group of users is discussed in this study. Given the condition that the search is over only after all the users in the group are found, this problem is called the Conference Call Search (CCS) problem. The goal is to design efficient CCS strategies under delay and bandwidth constraints. While the problem of tracking a single user has been addressed by many studies, to the best of our knowledge, this study is one of the first attempts to reduce the search cost for multiple users. Moreover, as oppose to the single user tracking, for which one can always reduce the expected search delay by increasing the expected search cost, for a multicast search the dependency between the delay and the search cost is more complicated, as demonstrated in this study. We identify the key factors affecting the search efficiency, and the dependency between them and the search delay. Our analysis shows that under tight bandwidth constraints, the CCS problem is NP-hard. We therefore propose a search method that is not optimal, but has a low computational complexity. In addition, the proposed strategy yields a low search delay as well as a low search cost. The performance of the proposed search strategy is superior to the implementation of an optimal single user search on a group of users. Amotz Bar-Noy received the B.Sc. degree in 1981 in Mathematics and Computer Science and the Ph.D. degree in 1987 in Computer Science, both from the Hebrew University, Israel. From October 1987 to September 1989 he was a post-doc fellow in Stanford University, California. From October 1989 to August 1996 he was a Research Staff Member with IBM T. J. Watson Research Center, New York. From February 1995 to September 2001 he was an associate Professor with the Electrical Engineering-Systems department of Tel Aviv University, Israel. From September 1999 to December 2001 he was with AT research labs in New Jersey. Since February 2002 he is a Professor with the Computer and Information Science Department of Brooklyn College - CUNY, Brooklyn New York. Zohar Naor received the Ph.D. degree in Computer Science from Tel Aviv University, Tel Aviv, Israel, in 2000. Since 2003 he is with the University of Haifa, Israel. His areas of interests include wireless networks, resource management of computer networks, mobility, search strategies, and multiple access protocols.  相似文献   
15.
可验证秘密分享在实用密码学领域内是一个非常重要的工具,它在密钥管理协议、门限或分布式签名协议、电子商务、多方安全计算及团体式密码系统等许多方面都有极为广泛的应用。针对一类突发事务须及时、安全解决的特点, 利用离散对数问题的难解性,在假设初始化阶段和秘密恢复阶段始终有一位值得信赖的分发者参与的情况下,提出了一个可公开验证的门限秘密分享方案。  相似文献   
16.
17.
BIDPS^*是一种把IDA算法和PS法相结合而产生的人工智能搜索算法。该文研究了不考虑启发式计算最小化技术的搜索效率问题,提出了一些新的算法效率的度量,用8数码难题检验了BIDPS算法并与IDA算法进行了比较分析,实验结果表明尽管BIDPS启发式计算量较大,但较IDA算法在效率上还有所提高的。  相似文献   
18.
本文介绍了一种在微机上实现的印制板自动布线方法──多级线探索法及其编程方法。这种方法是基于完备布线算法的概念,通过分析李氏算法和传统线探索法的不足之处而得到的。虽然它也是一种线探索法,但有较传统线探索法更强的探索能力,不需要结合李氏算法而能单独完成布线任务,是一种较理想的算法,通过实验获得了较为满意的效果。  相似文献   
19.
We consider the problem of rescheduling trains in the case where one track of a railway section consisting of two tracks in opposing directions is closed due to construction activities. After presenting an appropriate model for this situation we derive a polynomial algorithm for the subproblem of finding an optimal schedule with minimal latenesss if the subsequences of trains for both directions outside the construction site are fixed. Based on this algorithm we propose a local search procedure for the general problem of finding good schedules and report test results for some real world instances. Received: December 8, 1999 / Accepted: May 2, 2001  相似文献   
20.
中国学术期刊网燕化镜像站点建设   总被引:1,自引:0,他引:1  
王宓琳 《石化技术》2002,9(3):184-187
通过中国学术期刊网燕化镜像站点的建设,介绍了燕山石化镜像站点的配置及主要管理功能和对全文数据库的检索,浏览功能,同时介绍了新形势下,信息化建设的新观念,新思路,以及强化信息意识,加强信息服务产业化发展的重要性和迫切性。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号