首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   254篇
  免费   0篇
电工技术   4篇
化学工业   28篇
金属工艺   2篇
机械仪表   9篇
建筑科学   10篇
能源动力   3篇
轻工业   6篇
水利工程   3篇
无线电   46篇
一般工业技术   33篇
冶金工业   78篇
原子能技术   6篇
自动化技术   26篇
  2020年   1篇
  2019年   1篇
  2017年   2篇
  2016年   1篇
  2015年   1篇
  2014年   1篇
  2013年   5篇
  2012年   6篇
  2011年   6篇
  2010年   4篇
  2009年   6篇
  2008年   5篇
  2007年   10篇
  2006年   4篇
  2005年   8篇
  2004年   7篇
  2003年   4篇
  2002年   9篇
  2001年   6篇
  2000年   8篇
  1999年   7篇
  1998年   34篇
  1997年   18篇
  1996年   10篇
  1995年   11篇
  1994年   9篇
  1993年   5篇
  1991年   5篇
  1990年   3篇
  1989年   7篇
  1987年   2篇
  1985年   2篇
  1984年   1篇
  1982年   4篇
  1981年   4篇
  1980年   1篇
  1979年   2篇
  1978年   1篇
  1977年   1篇
  1976年   4篇
  1975年   2篇
  1974年   6篇
  1973年   3篇
  1969年   2篇
  1968年   2篇
  1967年   2篇
  1966年   4篇
  1965年   2篇
  1964年   1篇
  1940年   1篇
排序方式: 共有254条查询结果,搜索用时 31 毫秒
1.
2.
Editorial     
  相似文献   
3.
A problem in frequency-tuning of external-cavity lasers is mode-hopping between neighbouring external-cavity modes. We demonstrate a new interferometric method for monitoring mode-hoping and an automatic control circuit for a 1.3 ?m grating external-cavity laser that maintains single-mode operation when the lasing frequency is tuned.  相似文献   
4.
This article describes the operation of two new tests of authorshipand offers some results. Both tests rely on controlled contrastsof word-frequency and both exclude the very common words, whichhave been put to such good use in recent years. One test treatsof words used with some consistency by a target-author but moresporadically by others. The second treats of words used sporadicallyby the target-author but not by most others. (The inclusionof words that some other authors use avoids the strict constraintthat has impoverished this form of evidence.) In suitable cases,both tests prove very accurate. The fact that evidence of authorshipcan be detected in these three distinct frequency-strata helpsto explain why such tests should work at all and so encouragesthe development of even better ones.  相似文献   
5.
6.
7.
Tapasin is a resident ER protein believed to be critical for antigen presentation by HLA class I molecules. We demonstrate that allelic variation in MHC class I molecules influences their dependence on tapasin for peptide loading and antigen presentation. HLA-B*2705 molecules achieve high levels of surface expression and present specific viral peptides in the absence of tapasin. In contrast, HLA-B*4402 molecules are highly dependent upon human tapasin for these functions, while HLA-B8 molecules are intermediate in this regard. Significantly, HLA-B*2705 like HLA-B*4402, requires tapasin to associate efficiently with TAP (transporters associated with antigen processing). The unusual ability of HLA-B*2705 to form peptide complexes without associating with TAP or tapasin confers flexibility in the repertoire of peptides presented by this molecule. We speculate that these properties might contribute to the role of HLA-B27 in conferring susceptibility to inflammatory spondyloarthropathies.  相似文献   
8.
9.
Attributing authorship of documents with unknown creators has been studied extensively for natural language text such as essays and literature, but less so for non‐natural languages such as computer source code. Previous attempts at attributing authorship of source code can be categorised by two attributes: the software features used for the classification, either strings of n tokens/bytes (n‐grams) or software metrics; and the classification technique that exploits those features, either information retrieval ranking or machine learning. The results of existing studies, however, are not directly comparable as all use different test beds and evaluation methodologies, making it difficult to assess which approach is superior. This paper summarises all previous techniques to source code authorship attribution, implements feature sets that are motivated by the literature, and applies information retrieval ranking methods or machine classifiers for each approach. Importantly, all approaches are tested on identical collections from varying programming languages and author types. Our conclusions are as follows: (i) ranking and machine classifier approaches are around 90% and 85% accurate, respectively, for a one‐in‐10 classification problem; (ii) the byte‐level n‐gram approach is best used with different parameters to those previously published; (iii) neural networks and support vector machines were found to be the most accurate machine classifiers of the eight evaluated; (iv) use of n‐gram features in combination with machine classifiers shows promise, but there are scalability problems that still must be overcome; and (v) approaches based on information retrieval techniques are currently more accurate than approaches based on machine learning. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号