首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   92542篇
  免费   17700篇
  国内免费   13075篇
电工技术   9877篇
技术理论   3篇
综合类   11634篇
化学工业   2357篇
金属工艺   1800篇
机械仪表   6403篇
建筑科学   1975篇
矿业工程   1289篇
能源动力   1806篇
轻工业   1103篇
水利工程   1456篇
石油天然气   1039篇
武器工业   1366篇
无线电   14625篇
一般工业技术   5712篇
冶金工业   2443篇
原子能技术   324篇
自动化技术   58105篇
  2024年   1055篇
  2023年   3054篇
  2022年   5399篇
  2021年   5466篇
  2020年   5101篇
  2019年   3873篇
  2018年   3428篇
  2017年   3717篇
  2016年   4182篇
  2015年   4785篇
  2014年   6348篇
  2013年   5963篇
  2012年   7257篇
  2011年   7848篇
  2010年   6363篇
  2009年   6466篇
  2008年   6749篇
  2007年   7158篇
  2006年   5739篇
  2005年   4781篇
  2004年   3799篇
  2003年   3042篇
  2002年   2334篇
  2001年   1759篇
  2000年   1528篇
  1999年   1182篇
  1998年   974篇
  1997年   792篇
  1996年   620篇
  1995年   445篇
  1994年   368篇
  1993年   298篇
  1992年   276篇
  1991年   133篇
  1990年   167篇
  1989年   126篇
  1988年   86篇
  1987年   47篇
  1986年   73篇
  1985年   38篇
  1984年   32篇
  1983年   32篇
  1982年   30篇
  1980年   28篇
  1965年   24篇
  1964年   25篇
  1963年   23篇
  1959年   24篇
  1957年   22篇
  1955年   23篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
161.
In recent years, constructing a virtual backbone by nodes in a connected dominating set (CDS) has been proposed to improve the performance of ad hoc wireless networks. In general, a dominating set satisfies that every vertex in the graph is either in the set or adjacent to a vertex in the set. A CDS is a dominating set that also induces a connected sub‐graph. However, finding the minimum connected dominating set (MCDS) is a well‐known NP‐hard problem in graph theory. Approximation algorithms for MCDS have been proposed in the literature. Most of these algorithms suffer from a poor approximation ratio, and from high time complexity and message complexity. In this paper, we present a new distributed approximation algorithm that constructs a MCDS for wireless ad hoc networks based on a maximal independent set (MIS). Our algorithm, which is fully localized, has a constant approximation ratio, and O(n) time and O(n) message complexity. In this algorithm, each node only requires the knowledge of its one‐hop neighbours and there is only one shortest path connecting two dominators that are at most three hops away. We not only give theoretical performance analysis for our algorithm, but also conduct extensive simulation to compare our algorithm with other algorithms in the literature. Simulation results and theoretical analysis show that our algorithm has better efficiency and performance than others. Copyright © 2005 John Wiley & Sons, Ltd.  相似文献   
162.
We propose three methods for extending the Boosting family of classifiers motivated by the real-life problems we have encountered. First, we propose a semisupervised learning method for exploiting the unlabeled data in Boosting. We then present a novel classification model adaptation method. The goal of adaptation is optimizing an existing model for a new target application, which is similar to the previous one but may have different classes or class distributions. Finally, we present an efficient and effective cost-sensitive classification method that extends Boosting to allow for weighted classes. We evaluated these methods for call classification in the AT&;T VoiceTone® spoken language understanding system. Our results indicate that it is possible to obtain the same classification performance by using 30% less labeled data when the unlabeled data is utilized through semisupervised learning. Using model adaptation we can achieve the same classification accuracy using less than half of the labeled data from the new application. Finally, we present significant improvements in the “important” (i.e., higher weighted) classes without a significant loss in overall performance using the proposed cost-sensitive classification method.  相似文献   
163.
The acquisition of new skills over a life span is a remarkable human ability. This ability, however, is constrained by age of acquisition (AoA); that is, the age at which learning occurs significantly affects the outcome. This is most clearly reflected in domains such as language, music, and athletics. This article provides a perspective on the neural and computational mechanisms underlying AoA in language acquisition. The authors show how AoA modulates both monolingual lexical processing and bilingual language acquisition. They consider the conditions under which syntactic processing and semantic processing may be differentially sensitive to AoA effects in second-language acquisition. The authors conclude that AoA effects are pervasive and that the neural and computational mechanisms underlying learning and sensorimotor integration provide a general account of these effects. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
164.
朱正礼 《信息技术》2006,30(12):163-166
介绍了一个计算机远程控制系统的设计与实现,该系统采用客户机/服务器模式,实现远程屏幕的实时传输,采用LZW压缩算法对图像进行压缩传输,在接受方进行解码并且实现了远程文件创建和删除、显示被控制端的主机信息、发送实时消息等功能。采用鼠标,键盘的模拟方式对计算机进行实时控制。  相似文献   
165.
Provides the biography of David W. Johnson and announces that he has won the Award for Distinguished Contributions of Applications of Psychology to Education and Training for programmatic research, comprehensive research reviews, and revision of theory over four decades of persistence that have provided the knowledge foundation for cooperative learning, constructive controversy, conflict resolution, and peer mediation training. A selected bibliography is also provided. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
166.
天然气管网输配气量优化研究   总被引:2,自引:0,他引:2  
天然气管网系统管理部门为了明确天然气管网的输气能力和提高天然气管网的利用率,需要对天然气管网系统的输配气量进行优化。为此,以天然气管网系统的最大流量为目标函数,同时考虑了管道强度、节点压力和流量限制等约束条件,建立了天然气管网输配气量优化的数学模型。在研究遗传算法和模拟退火算法的基础上,提出了一种由二者结合构成的具有全域搜索、快速收敛和鲁棒性强等特点的混合遗传算法。结合实例,采用这一新算法求解了天然气管网输配气量优化的数学模型。实例优化结果表明,所建立的数学模型和采用的混合遗传算法是可行和有效的,能够对天然气管网系统输配气量的调度运行起到指导作用。  相似文献   
167.
He and Grigoryan (Quality and Reliability Engineering International 2002; 18 :343–355) formulated the design of a double‐sampling (DS) s control chart as an optimization problem and solved it with a genetic algorithm. They concluded that the DS s control charts can be a more economically preferable alternative in detecting small shifts than traditional s control charts. We explain that, since they only considered the average sample size when the process is in control, their conclusion is questionable. Copyright © 2006 John Wiley & Sons, Ltd.  相似文献   
168.
It is hard to implement the ADI method in an efficient way on distributed-memory parallel computers. We propose “P-scheme” which parallelizes a tridiagonal linear system of equations for the ADI method, but its effectiveness is limited to the cases where the problem size is large enough mainly because of the communication cost of the propagation phase of the scheme.

In order to overcome this difficulty, we propose an improved version of the P-scheme with “message vectorization” which aggregates several communication messages into one and alleviates the communication cost. Also we evaluate the effectiveness of message vectorization for the ADI method and show that the improved version of the P-scheme works well even for smaller problems and linear and super-linear speedups can be achieved for 8194 × 8194 and 16,386 × 16,386 problems, respectively.  相似文献   

169.
The main difficulty with EM algorithm for mixture model concerns the number of components, say g. This is the question of model selection, and the EM algorithm itself could not estimate g. On the contrary, the algorithm requires g to be specified before the remaining parameters can be estimated. To solve this problem, a new algorithm, which is called stepwise split-and-merge EM (SSMEM) algorithm, is proposed. The SSMEM algorithm alternately splits and merges components, estimating g and other parameters of components simultaneously. Also, two novel criteria are introduced to efficiently select the components for split or merge. Experimental results on simulated and real data demonstrate the effectivity of the proposed algorithm.  相似文献   
170.
Automated currency validation requires a decision to be made regarding the authenticity of a banknote presented to the validation system. This decision often has to be made with little or no information regarding the characteristics of possible counterfeits as is the case for issues of new currency. A method for automated currency validation is presented which segments the whole banknote into different regions, builds individual classifiers on each region and then combines a small subset of the region specific classifiers to provide an overall decision. The segmentation and combination of region specific classifiers to provide optimized false positive and false negative rates is achieved by employing a genetic algorithm. Experiments based on high value notes of Sterling currency were carried out to assess the effectiveness of the proposed solution.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号