首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   852篇
  免费   67篇
  国内免费   13篇
电工技术   24篇
综合类   9篇
化学工业   199篇
金属工艺   45篇
机械仪表   60篇
建筑科学   33篇
矿业工程   2篇
能源动力   28篇
轻工业   92篇
水利工程   29篇
石油天然气   34篇
武器工业   2篇
无线电   79篇
一般工业技术   143篇
冶金工业   27篇
原子能技术   2篇
自动化技术   124篇
  2024年   4篇
  2023年   6篇
  2022年   34篇
  2021年   35篇
  2020年   34篇
  2019年   49篇
  2018年   48篇
  2017年   61篇
  2016年   54篇
  2015年   37篇
  2014年   53篇
  2013年   61篇
  2012年   54篇
  2011年   60篇
  2010年   43篇
  2009年   35篇
  2008年   44篇
  2007年   31篇
  2006年   14篇
  2005年   15篇
  2004年   9篇
  2003年   5篇
  2002年   9篇
  2001年   8篇
  2000年   12篇
  1999年   6篇
  1998年   17篇
  1997年   10篇
  1996年   12篇
  1995年   4篇
  1994年   7篇
  1993年   13篇
  1992年   5篇
  1991年   3篇
  1990年   6篇
  1989年   4篇
  1988年   6篇
  1987年   3篇
  1986年   2篇
  1985年   2篇
  1984年   3篇
  1983年   2篇
  1975年   1篇
  1967年   1篇
  1963年   1篇
  1962年   1篇
  1961年   1篇
  1960年   2篇
  1959年   2篇
  1958年   1篇
排序方式: 共有932条查询结果,搜索用时 15 毫秒
1.
A technology for increasing both the two-terminal gate-drain breakdown and subsequently the three-terminal-off-state breakdown of AlInAs/GaInAs high-electron-mobility transistors (HEMTs) to record values without substantial impact on other parameters is presented. The breakdown in these structures is dependent on the multiplication of electrons injected from the source (channel current) and the gate (gate leakage) into the channel. In addition, holes are generated by high fields at the drain and are injected back into the gate and source electrodes. These phenomena can be suppressed by increasing the gate barrier height and alleviating the fields at the drain. Both have been achieved by incorporating a p+-2DEG junction as the gate that modulates the 2DEG gas and by utilizing selective regrowth of the source and drain regions by MOCVD. The 1-μm-gate-length devices fabricated have two-terminal gate-drain and three-terminal-off-state breakdown voltages of 31 V and 28 V, respectively  相似文献   
2.
Vicious codes, especially viruses, as a kind of impressive malware have caused many disasters and continue to exploit more vulnerabilities. These codes are injected inside benign programs in order to abuse their hosts and ease their propagation. The offsets of injected virus codes are unknown and their targets usually are latent until they are executed and activated, what in turn makes viruses very hard to detect. In this paper enriched control flow graph miner, ECFGM in short, is presented to detect infected files corrupted by unknown viruses. ECFGM uses enriched control flow graph model to represent the benign and vicious codes. This model has more information than traditional control flow graph (CFG) by utilizing statistical information of dependent assembly instructions and API calls. To the best of our knowledge, the presented approach in this paper, for the first time, can recognize the offset of infected code of unknown viruses in the victim files. The main contributions of this paper are two folds: first, the presented model is able to detect unknown vicious code using ECFG model with reasonable complexity and desirable accuracy. Second, our approach is resistant against metamorphic viruses which utilize dead code insertion, variable renaming and instruction reordering methods.  相似文献   
3.
The widespread availability of broadband internet access and the growth in server-based processing have provided an opportunity to run games away from the player into the cloud and offer a new promising service known as cloud gaming. The concept of cloud gaming is to render a game in the cloud and stream the resulting game scenes to the player as a video sequence over a broadband connection. To meet the stringent network bandwidth requirements of cloud gaming and support more players, efficient bit rate reduction techniques are needed. In this paper, we introduce the concept of game attention model (GAM), which is basically a game context-based visual attention model, as a means for reducing the bit rate of the streaming video more efficiently. GAM estimates the importance of each macro-block in a game frame from the player’s perspective and allows encoding the less important macro-blocks with lower bit rate. We have evaluated nine game video sequences, covering a wide range of game genre and a spectrum of scene content in terms of details, motion and brightness. Our subjective assessment shows that by integrating this model into the cloud gaming framework, it is possible to decrease the required bit rate by nearly 25 % on average, while maintaining a relatively high user quality of experience. This clearly enables players with limited communication resources to benefit from cloud gaming with acceptable quality.  相似文献   
4.
Duality properties have been investigated by many researchers in the recent literature. They are introduced in this paper for a fully fuzzified version of the minimal cost flow problem, which is a basic model in network flow theory. This model illustrates the least cost of the shipment of a commodity through a capacitated network in terms of the imprecisely known available supplies at certain nodes which should be transmitted to fulfil uncertain demands at other nodes. First, we review on the most valuable results on fuzzy duality concepts to facilitate the discussion of this paper. By applying Hukuhara’s difference, approximated and exact multiplication and Wu’s scalar production, we exhibit the flow in network models. Then, we use combinatorial algorithms on a reduced problem which is derived from fully fuzzified MCFP to acquire fuzzy optimal flows. To give duality theorems, we utilize a total order on fuzzy numbers due to the level of risk and realize optimality conditions for providing some efficient combinatorial algorithms. Finally, we compare our results with the previous worthwhile works to demonstrate the efficiency and power of our scheme and the reasonability of our solutions in actual decision-making problems.  相似文献   
5.
6.
In recent years, classification learning for data streams has become an important and active research topic. A major challenge posed by data streams is that their underlying concepts can change over time, which requires current classifiers to be revised accordingly and timely. To detect concept change, a common methodology is to observe the online classification accuracy. If accuracy drops below some threshold value, a concept change is deemed to have taken place. An implicit assumption behind this methodology is that any drop in classification accuracy can be interpreted as a symptom of concept change. Unfortunately however, this assumption is often violated in the real world where data streams carry noise that can also introduce a significant reduction in classification accuracy. To compound this problem, traditional noise cleansing methods are incompetent for data streams. Those methods normally need to scan data multiple times whereas learning for data streams can only afford one-pass scan because of data’s high speed and huge volume. Another open problem in data stream classification is how to deal with missing values. When new instances containing missing values arrive, how a learning model classifies them and how the learning model updates itself according to them is an issue whose solution is far from being explored. To solve these problems, this paper proposes a novel classification algorithm, flexible decision tree (FlexDT), which extends fuzzy logic to data stream classification. The advantages are three-fold. First, FlexDT offers a flexible structure to effectively and efficiently handle concept change. Second, FlexDT is robust to noise. Hence it can prevent noise from interfering with classification accuracy, and accuracy drop can be safely attributed to concept change. Third, it deals with missing values in an elegant way. Extensive evaluations are conducted to compare FlexDT with representative existing data stream classification algorithms using a large suite of data streams and various statistical tests. Experimental results suggest that FlexDT offers a significant benefit to data stream classification in real-world scenarios where concept change, noise and missing values coexist.  相似文献   
7.
提出了一种频率特性测试方法,该方法以Multitone信号作为激励信号来减少测试时间,并运用相关分析法作为数据处理方法来提高测试精度;以某型舵机系统为例,对该方法进行了实验验证;实验结果表明,其测试精度与传统的测试方法基本相同,测试时间减少一半;该方法能有效减少噪声对测量结果的影响,适合频率特性的快速高精度测试。  相似文献   
8.
PSO, like many stochastic search methods, is very sensitive to efficient parameter setting such that modifying a single parameter may cause a considerable change in the result. In this paper, we study the ability of learning automata for adaptive PSO parameter selection. We introduced two classes of learning automata based algorithms for adaptive selection of value for inertia weight and acceleration coefficients. In the first class, particles of a swarm use the same parameter values adjusted by learning automata. In the second class, each particle has its own characteristics and sets its parameter values individually. In addition, for both classed of proposed algorithms, two approaches for changing value of the parameters has been applied. In first approach, named adventurous, value of a parameter is selected from a finite set while in the second approach, named conservative, value of a parameter either changes by a fixed amount or remains unchanged. Experimental results show that proposed learning automata based algorithms compared to other schemes such as SPSO, PSOIW, PSO-TVAC, PSOLP, DAPSO, GPSO, and DCPSO have the same or even higher ability to find better solutions. In addition, proposed algorithms converge to stopping criteria for some of the highly multi modal functions significantly faster.  相似文献   
9.
An approach for moving object recognition based on BPR and CI   总被引:1,自引:0,他引:1  
A recognition and classification method of multiple moving objects in traffic based on the combination of the Biomimetic Pattern Recognition (BPR) and Choquet Integral (CI) is proposed. The recognition process consists of three stages. At the first stage, vehicles and pedestrians are detected in video images and the area, the shape and the velocity features are obtained by classical methods. At the second stage, BPR is used to classify the Zernike moments extracted at the first stage. At the last stage, CI is then adopted for multi-features fusion based on the output of BPR, and the area and the velocity features obtained at the first stage to improve the recognition accuracy. Experiment results show that this approach is efficient.  相似文献   
10.
本文应用量子化学密度泛函理论(DFT)研究了2-(4-甲氧基苯基)亚肼基乙酸与乙醛酸的反应机理及动力学行为,并研究了不同取代基对反应的影响.在RB3LYP/6-31G*水平上,优化了各反应通道的反应物、中间体、过渡态及产物的几何构型,计算了各驻点的振动频率、零点能和电荷分布.计算结果表明,该反应有2条反应通道,分别生成(2Z)和(2E)-3(4-甲氧基苯基二氮烯基)丙烯酸.产物发生了键长的平均化和电荷的重新分布.两反应通道具有相同的反应入口,Z式产物为主要产物,2-(4-甲氧基苯基)亚肼基乙酸中苯环对位被给电子基团取代,有利于反应进行.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号