首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   18081篇
  免费   1444篇
  国内免费   1151篇
电工技术   1662篇
综合类   2225篇
化学工业   735篇
金属工艺   464篇
机械仪表   1242篇
建筑科学   513篇
矿业工程   296篇
能源动力   448篇
轻工业   173篇
水利工程   389篇
石油天然气   212篇
武器工业   139篇
无线电   1230篇
一般工业技术   1477篇
冶金工业   256篇
原子能技术   52篇
自动化技术   9163篇
  2024年   54篇
  2023年   152篇
  2022年   252篇
  2021年   297篇
  2020年   391篇
  2019年   441篇
  2018年   356篇
  2017年   529篇
  2016年   569篇
  2015年   660篇
  2014年   977篇
  2013年   1381篇
  2012年   1050篇
  2011年   1165篇
  2010年   900篇
  2009年   1021篇
  2008年   1088篇
  2007年   1170篇
  2006年   1048篇
  2005年   909篇
  2004年   765篇
  2003年   691篇
  2002年   637篇
  2001年   537篇
  2000年   468篇
  1999年   420篇
  1998年   340篇
  1997年   349篇
  1996年   305篇
  1995年   253篇
  1994年   264篇
  1993年   193篇
  1992年   182篇
  1991年   144篇
  1990年   110篇
  1989年   101篇
  1988年   92篇
  1987年   54篇
  1986年   53篇
  1985年   37篇
  1984年   51篇
  1983年   34篇
  1982年   36篇
  1981年   23篇
  1980年   23篇
  1979年   30篇
  1978年   11篇
  1977年   21篇
  1976年   14篇
  1975年   12篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
61.
Fault detection and isolation in rotating machinery is very important from an industrial viewpoint as it can help in maintenance activities and significantly reduce the down-time of the machine, resulting in major cost savings. Traditional methods have been found to be not very accurate. Soft computing based methods are now being increasingly employed for the purpose. The proposed method is based on a genetic programming technique which is known as gene expression programming (GEP). GEP is somewhat a new member of the genetic programming family. The main objective of this paper is to compare the classification accuracy of the proposed evolutionary computing based method with other pattern classification approaches such as support vector machine (SVM), Wavelet-GEP, and proximal support vector machine (PSVM). For this purpose, six states viz., normal, bearing fault, impeller fault, seal fault, impeller and bearing fault together, cavitation are simulated on centrifugal pump. Decision tree algorithm is used to select the features. The results obtained using GEP is compared with the performance of Wavelet-GEP, support vector machine (SVM) and proximal support vector machine (PSVM) based classifiers. It is observed that both GEP and SVM equally outperform the other two classifiers (PSVM and Wavelet-GEP) considered in the present study.  相似文献   
62.
该文引入speedup作为并行程序的性能评测指标,分析了并行程序在不同类型和不同数量的客户虚拟机中运行的性能差异,实验表明,MPI并行程序在xVM虚拟化环境中的运行性能接近非虚拟化本地主机的性能,在半虚拟化环境中的并行程序性能超过全虚拟化环境中的并行程序性能。  相似文献   
63.
64.
The Constraint Logic Programming Scheme defines a class of languages designed for programming with constraints using a logic programming approach. These languages are soundly based on a unified framework of formal semantics. In particular, as an instance of this scheme with real arithmetic constraints, the CLP() language facilitates and encourages a concise and declarative style of programming for problems involving a mix of numeric and non-numeric computation.In this paper we illustrate the practical applicability of CLP() with examples of programs to solve electrical engineering problems. This field is particularly rich in problems that are complex and largely numeric, enabling us to demonstrate a number of the unique features of CLP(). A detailed look at some of the more important programming techniques highlights the ability of CLP() to support well-known, powerful techniques from constraint programming. Our thesis is that CLP() is an embodiment of these techniques in a language that is more general, elegant and versatile than the earlier languages, and yet is practical.An earlier version of this paper appeared in the proceedings of the 4th International Conference on Logic Programming, Melbourne, May 1987. Much of this work was carried out while the authors were at Monash University, Melbourne, Australia.  相似文献   
65.
Certain tasks, such as formal program development and theorem proving, fundamentally rely upon the manipulation of higher-order objects such as functions and predicates. Computing tools intended to assist in performing these tasks are at present inadequate in both the amount of knowledge they contain (i.e., the level of support they provide) and in their ability to learn (i.e., their capacity to enhance that support over time). The application of a relevant machine learning technique—explanation-based generalization (EBG)—has thus far been limited to first-order problem representations. We extend EBG to generalize higher-order values, thereby enabling its application to higher-order problem encodings.Logic programming provides a uniform framework in which all aspects of explanation-based generalization and learning may be defined and carried out. First-order Horn logics (e.g., Prolog) are not, however, well suited to higher-order applications. Instead, we employ Prolog, a higher-order logic programming language, as our basic framework for realizing higher-order EBG. In order to capture the distinction between domain theory and training instance upon which EBG relies, we extend Prolog with the necessity operator of modal logic. We develop a meta-interpreter realizing EBG for the extended language, Prolog, and provide examples of higher-order EBG.  相似文献   
66.
研究中医冠心病医案,高效挖掘有益信息规则问题,由于中医医案数据量大、关联性强,针对传统的关联规则挖掘算法处理中医医案数据时存在效率低、收敛速度慢及漏报规则等问题,提出一种小生境技术和基因表达式编程相结合的挖掘关联规则的方法。通过惩罚函数设置支持度阈值,利用小生境技术执行小生境演化、融合算法,结合基因表达式编程算法操作简单、鲁棒性强的优势搜索强关联规则,有效避免了算法早熟,解决了规则冗余。针对治疗冠心病的中医医案进行了验证性实验,实验结果表明,改进算法在提取有效信息的效率上有较大的提高,挖掘结果对冠心病中医临床诊治具有一定的参考价值。  相似文献   
67.
袁锋 《计算机仿真》2012,29(2):204-207,352
研究原发性高血压病靶器官损害准确预测问题,由于原发性高血压病靶器官损害的影响因子之间存在着高度冗余和非线性,导致传统方法预测准确率低,为提高预测精度,构建了一种改进的基因表达式编程算法的原发性高血压病靶器官损害预测模型,首先设计了适合靶器官损害预测的适应度函数,然后为克服早熟现象提出了以平均适应度形式自适应的改变重组算子概率和变异算子概率,通过数据训练得到靶器官损害的2年预测模型。采用对山东中医药大学第二附属医院原发性高血压病历史数据进行验证性仿真,结果表明,方法的预测精度更高,在原发性高血压病靶器官损害的预测中有着广泛的应用前景。  相似文献   
68.
MYGCC是一个编程规则检查工具,其目前的检查算法存在局限性,不能完整地展示违反编程规则的程序路径。本文提出并实现了一种改进的编程规则检查算法,可以弥补上述的局限性。实验表明改进算法是有效的,此改进有助于用户更准确地定位错误位置,方便对编程错误的修正。  相似文献   
69.
In this paper, we consider interactive fuzzy programming for multi-level 0–1 programming problems involving random variable coefficients both in objective functions and constraints. Following the probability maximization model together with the concept of chance constraints, the formulated stochastic multi-level 0–1 programming problems are transformed into deterministic ones. Taking into account vagueness of judgments of the decision makers, we present interactive fuzzy programming. In the proposed interactive method, after determining the fuzzy goals of the decision makers at all levels, a satisfactory solution is derived efficiently by updating satisfactory levels of the decision makers with considerations of overall satisfactory balance among all levels. For solving the transformed deterministic problems efficiently, we also introduce novel tabu search for general 0–1 programming problems. A numerical example for a three-level 0–1 programming problem is provided to illustrate the proposed method.  相似文献   
70.
Radio frequency identification (RFID) is a powerful technology that enables wireless information storage and control in an economical way. These properties have generated a wide range of applications in different areas. Due to economic and technological constrains, RFID devices are seriously limited, having small or even tiny computational capabilities. This issue is particularly challenging from the security point of view. Security protocols in RFID environments have to deal with strong computational limitations, and classical protocols cannot be used in this context. There have been several attempts to overcome these limitations in the form of new lightweight security protocols designed to be used in very constrained (sometimes called ultra‐lightweight) RFID environments. One of these proposals is the David–Prasad ultra‐lightweight authentication protocol. This protocol was successfully attacked using a cryptanalysis technique named Tango attack. The capacity of the attack depends on a set of boolean approximations. In this paper, we present an enhanced version of the Tango attack, named Genetic Tango attack, that uses Genetic Programming to design those approximations, easing the generation of automatic cryptanalysis and improving its power compared to a manually designed attack. Experimental results are given to illustrate the effectiveness of this new attack.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号