首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   403篇
  免费   12篇
电工技术   6篇
化学工业   83篇
金属工艺   10篇
机械仪表   10篇
建筑科学   17篇
矿业工程   1篇
能源动力   17篇
轻工业   20篇
水利工程   1篇
无线电   60篇
一般工业技术   78篇
冶金工业   16篇
原子能技术   9篇
自动化技术   87篇
  2024年   1篇
  2023年   5篇
  2022年   7篇
  2021年   10篇
  2020年   6篇
  2019年   7篇
  2018年   10篇
  2017年   15篇
  2016年   12篇
  2015年   11篇
  2014年   21篇
  2013年   28篇
  2012年   31篇
  2011年   33篇
  2010年   23篇
  2009年   30篇
  2008年   37篇
  2007年   23篇
  2006年   18篇
  2005年   12篇
  2004年   13篇
  2003年   10篇
  2002年   8篇
  2001年   7篇
  2000年   3篇
  1999年   5篇
  1998年   7篇
  1997年   2篇
  1996年   3篇
  1995年   3篇
  1994年   5篇
  1993年   3篇
  1992年   1篇
  1985年   1篇
  1982年   2篇
  1979年   1篇
  1977年   1篇
排序方式: 共有415条查询结果,搜索用时 13 毫秒
1.
2.
Traditional approach to clustering is to fit a model (partition or prototypes) for the given data. We propose a completely opposite approach by fitting the data into a given clustering model that is optimal for similar pathological data of equal size and dimensions. We then perform inverse transform from this pathological data back to the original data while refining the optimal clustering structure during the process. The key idea is that we do not need to find optimal global allocation of the prototypes. Instead, we only need to perform local fine-tuning of the clustering prototypes during the transformation in order to preserve the already optimal clustering structure.  相似文献   
3.
Human movement in virtual environments (VEs) is a largely unstudied area, and there are no well-established methods of measuring it in VEs. Consequently, it is unclear how movement affects the experiential side of VEs. We introduce a novel method of measuring and modelling human movement. A specific information entropy-based modelling method enabled us to identify different movement patterns and analyse the experiential components related to them. The data was collected by registering the movement patterns of 68 participants who were in a virtual house doing a search task. The experiential side of the VE was measured with the Experimental Virtual Environment Questionnaire (EVEQ). Four movement patterns were identified. In addition, fluent movement in VEs was related to a high sense of presence. Moreover, the participants who moved fluently in the environment assessed their skills high. The results show how movement is related the way in which people experience the VE. The movement analysis method introduced here is applicable to other related research areas as well.  相似文献   
4.
It is widely agreed that employee non-adherence to information security policies poses a major problem for organizations. Previous research has pointed to the potential of theories of moral reasoning to better understand this problem. However, we find no empirical studies that examine the influence of moral reasoning on compliance with information security policies. We address this research gap by proposing a theoretical model that explains non-compliance in terms of moral reasoning and values. The model integrates two well-known psychological theories: the Theory of Cognitive Moral Development by Kohlberg and the Theory of Motivational Types of Values by Schwartz. Our empirical findings largely support the proposed model and suggest implications for practice and research on how to improve information security policy compliance.  相似文献   
5.
A quantum multimeter is a programmable device that can implement measurements of different observables depending on the programming quantum state inserted into it. The advantage of this arrangement over a single-purpose device is in its versatility: one can realize various measurements simply by changing the programming state. The classical manipulation of measurement output data is known as post-processing. In this work we study the post-processing assisted quantum programming, which is a protocol where quantum programming and classical post-processing are combined. We provide examples showing that these two processes combined can be more efficient than either of them used separately. Furthermore, we derive an inequality relating the programming resources to their corresponding programmed observables, thereby enabling us to study the limitations on post-processing assisted quantum programming.  相似文献   
6.
7.
Calcium oxide and calcium hafnium oxide thin films were grown by atomic layer deposition on borosilicate glass and silicon substrates in the temperature range of 205–300 °C. The calcium oxide films were grown from novel calcium cyclopentadienyl precursor and water. Calcium oxide films possessed refractive index 1.75–1.80. Calcium oxide films grown without Al2O3 capping layer occurred hygroscopic and converted to Ca(OH)2 after exposure to air. As-deposited CaO films were (200)-oriented. CaO covered with Al2O3 capping layers contained relatively low amounts of hydrogen and re-oriented into (111) direction upon annealing at 900 °C. In order to examine the application of CaO in high-permittivity dielectric layers, mixtures of Ca and Hf oxides were grown by alternate CaO and HfO2 growth cycles at 230 and 300 °C. HfCl4 was used as a hafnium precursor. When grown at 230 °C, the films were amorphous with equal amounts of Ca and Hf constituents (15 at.%). These films crystallized upon annealing at 750 °C, showing X-ray diffraction peaks characteristic of hafnium-rich phases such as Ca2Hf7O16 or Ca6Hf19O44. At 300 °C, the relative Ca content remained below 8 at.%. The crystallized phase well matched with rhombohedral Ca2Hf7O16. The dielectric films grown on Si(100) substrates possessed effective permittivity values in the range of 12.8–14.2.  相似文献   
8.
We report a study where software project risk factors were solicited in Nigeria. The study repeats a research design, which has been used in a Delphi study in the U.S., Finland, and Hong Kong to rank software development risks. The study produces a rank-order list of software risk factors and compares results with the earlier study, showing significant differences. Obtained rankings signal the importance of the infrastructure related and socio-economic software risks in developing countries like Nigeria. This demonstrates the importance of understanding the broader socio-economic context in identifying and managing software risks. The study also shows that some risks in Nigeria are located on a different scale. The choice of contingent mitigation strategies of project managers play a less important role, because the risks are so deeply engrained with the poor quality of basic infrastructure services.  相似文献   
9.
The problem of weight initialization in multilayer perceptron networks is considered. A new computationally simple weight initialization method based on the usage of reference patterns is presented. A reference pattern is a vector which is used to represent data points that fall in its vicinity in the data space. On one hand, the proposed method aims to set the initial weight values to be such that inputs to network nodes are within the active region (in other words, nodes are not saturated). On the other hand, the goal is to distribute the discriminant functions formed by the hidden units evenly into the input space area where training data is located. The proposed method is tested with the widely used two-spirals classification benchmark problem and channel equalization problem where several alternatives for obtaining suitable reference patterns are investigated. Also, the effect of the initialization is studied when two commonly used cost functions are used in the training phase. These are the mean square error and relative entropy cost functions. A comparison with the conventional random initialization shows that significant improvement in convergence can be achieved with the proposed method. In addition, the computational cost of the initialization was found to be negligible compared with the cost of training.  相似文献   
10.
The dynamics of a “peeling front” or an elastic line is studied under creep (constant load) conditions. Our experiments show in most cases an exponential dependence of the creep velocity on the inverse force (mass) applied. In particular, the dynamical correlations of the avalanche activity are discussed here. We compare various avalanche statistics to those of a line with non-local elasticity, and study various measures of the experimental avalanche-avalanche and temporal correlations such as the autocorrelation function of the released energy and aftershock activity. From all these we conclude, that internal avalanche dynamics seems to follow “line depinning”-like behavior, in rough agreement with the depinning model. Meanwhile, the correlations reveal subtle complications not implied by depinning theory. Moreover, we also show how these results can be understood from a geophysical point of view.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号