首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   21599篇
  免费   1244篇
  国内免费   1161篇
电工技术   803篇
技术理论   1篇
综合类   1137篇
化学工业   1331篇
金属工艺   661篇
机械仪表   2041篇
建筑科学   1414篇
矿业工程   397篇
能源动力   581篇
轻工业   338篇
水利工程   296篇
石油天然气   386篇
武器工业   195篇
无线电   2897篇
一般工业技术   1203篇
冶金工业   395篇
原子能技术   227篇
自动化技术   9701篇
  2024年   43篇
  2023年   257篇
  2022年   303篇
  2021年   493篇
  2020年   395篇
  2019年   315篇
  2018年   320篇
  2017年   421篇
  2016年   568篇
  2015年   580篇
  2014年   1119篇
  2013年   1065篇
  2012年   1171篇
  2011年   1685篇
  2010年   1129篇
  2009年   1218篇
  2008年   1284篇
  2007年   1612篇
  2006年   1441篇
  2005年   1366篇
  2004年   1232篇
  2003年   1166篇
  2002年   916篇
  2001年   691篇
  2000年   507篇
  1999年   493篇
  1998年   435篇
  1997年   340篇
  1996年   261篇
  1995年   241篇
  1994年   187篇
  1993年   135篇
  1992年   148篇
  1991年   96篇
  1990年   72篇
  1989年   70篇
  1988年   56篇
  1987年   24篇
  1986年   21篇
  1985年   40篇
  1984年   18篇
  1983年   21篇
  1982年   15篇
  1981年   12篇
  1980年   8篇
  1979年   6篇
  1978年   2篇
  1977年   1篇
  1976年   3篇
  1973年   2篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
1.
2.
This paper presents an innovative solution to model distributed adaptive systems in biomedical environments. We present an original TCBR-HMM (Text Case Based Reasoning-Hidden Markov Model) for biomedical text classification based on document content. The main goal is to propose a more effective classifier than current methods in this environment where the model needs to be adapted to new documents in an iterative learning frame. To demonstrate its achievement, we include a set of experiments, which have been performed on OSHUMED corpus. Our classifier is compared with Naive Bayes and SVM techniques, commonly used in text classification tasks. The results suggest that the TCBR-HMM Model is indeed more suitable for document classification. The model is empirically and statistically comparable to the SVM classifier and outperforms it in terms of time efficiency.  相似文献   
3.
Though modeling and verifying Multi-Agent Systems (MASs) have long been under study, there are still challenges when many different aspects need to be considered simultaneously. In fact, various frameworks have been carried out for modeling and verifying MASs with respect to knowledge and social commitments independently. However, considering them under the same framework still needs further investigation, particularly from the verification perspective. In this article, we present a new technique for model checking the logic of knowledge and commitments (CTLKC+). The proposed technique is fully-automatic and reduction-based in which we transform the problem of model checking CTLKC+ into the problem of model checking an existing logic of action called ARCTL. Concretely, we construct a set of transformation rules to formally reduce the CTLKC+ model into an ARCTL model and CTLKC+ formulae into ARCTL formulae to get benefit from the extended version of NuSMV symbolic model checker of ARCTL. Compared to a recent approach that reduces the problem of model checking CTLKC+ to another logic of action called GCTL1, our technique has better scalability and efficiency. We also analyze the complexity of the proposed model checking technique. The results of this analysis reveal that the complexity of our reduction-based procedure is PSPACE-complete for local concurrent programs with respect to the size of these programs and the length of the formula being checked. From the time perspective, we prove that the complexity of the proposed approach is P-complete with regard to the size of the model and length of the formula, which makes it efficient. Finally, we implement our model checking approach on top of extended NuSMV and report verification results for the verification of the NetBill protocol, taken from business domain, against some desirable properties. The obtained results show the effectiveness of our model checking approach when the system scales up.  相似文献   
4.
Process mining techniques relate observed behavior (i.e., event logs) to modeled behavior (e.g., a BPMN model or a Petri net). Process models can be discovered from event logs and conformance checking techniques can be used to detect and diagnose differences between observed and modeled behavior. Existing process mining techniques can only uncover these differences, but the actual repair of the model is left to the user and is not supported. In this paper we investigate the problem of repairing a process model w.r.t. a log such that the resulting model can replay the log (i.e., conforms to it) and is as similar as possible to the original model. To solve the problem, we use an existing conformance checker that aligns the runs of the given process model to the traces in the log. Based on this information, we decompose the log into several sublogs of non-fitting subtraces. For each sublog, either a loop is discovered that can replay the sublog or a subprocess is derived that is then added to the original model at the appropriate location. The approach is implemented in the process mining toolkit ProM and has been validated on logs and models from several Dutch municipalities.  相似文献   
5.
《Planning》2015,(3)
为了培养青年医师运用医学科普语言传播医学知识的能力,向社会提供更优质、可及的健康知识,改善医患关系,促进社会和谐;同时出于向社区、媒体推送一批优秀青年医学科普人才的考虑,本文在总结北京协和医院培养青年医务人员医学科普能力经验的基础上,尝试构建一套适合大型公立医院(尤其是教学医院)培养青年医务人员医学科普能力的新模式——“科普训练营”。本文旨在系统介绍该模式的产生背景、实践经验及初期效果,阐释实施后的重要意义,及实施过程中的挑战与应对策略。  相似文献   
6.
This study proposes an analytical and flexible terrain risk assessment method for military surveillance applications for mobile assets. Considering the risk as the degree of possibility of insurgent presence, the assessment method offers an efficient evaluation of risk in the surrounding terrain for military combat operating posts or observation posts. The method is designed for unmanned aerial vehicles as the surveillance assets of choice to improve the effectiveness of their use. Starting with the area map and geographical data, the target terrain is first digitized for space representation. Then the data of nine geographical parameters are used to formulate five contributing risk factors. These factors are incorporated in an analytical framework to generate a composite map with risk scores that reveal the potential high-risk spots in the terrain. The proposed method is also applied to a real-life case study of COP Kahler in Afghanistan, which was a target for insurgent attacks in 2008. The results confirm that when evaluated with the developed method, the region that the insurgents used to approach COP Kahler has high concentration of high-risk cells.  相似文献   
7.
关于我省数字化城市建设的几点思考   总被引:3,自引:0,他引:3  
李研  李明山 《信息技术》2003,27(1):77-80
通过对国内外数字化城市建设现状的分析 ,结合我省实际情况 ,提出我省建设数字化城市的对策及建设内容和原则 ,强调政府的组织行为 ,发挥社会各界的积极性 ,充分利用现有资源 ,以建设数字化城市门户网站为先导 ,快速启动全省数字化城市建设。  相似文献   
8.
孙暐  吴镇扬 《信号处理》2006,22(4):559-563
根据Flether等人的研究,基于感知独立性假设的子带识别方法被用于抗噪声鲁棒语音识别。本文拓展子带方法,采用基于噪声污染假定的多带框架来减少噪声影响。论文不仅从理论上分析了噪声污染假定多带框架在识别性能上的潜在优势,而且提出了多带环境下的鲁棒语音识别算法。研究表明:多带框架不仅回避了独立感知假设要求,而且与子带方法相比,多带方法能更好的减少噪声影响,提高系统识别性能。  相似文献   
9.
光电对抗仿真试验系统综述   总被引:2,自引:0,他引:2  
论述了研制光电对抗仿真试验系统建设的目的和意义,光电武器系统的现状和发展趋势,介绍了光电对抗仿真试验系统的一般组成,给出了光电武器系统的常规试验内容和试验流程,并论述了可能采用的试验方法。  相似文献   
10.
This article, the first of three articles on the synthesis of rice processing plants, focuses on the development of simplified mathematical models necessary for use in optimizing rice processing plants. The second concentrates on the optimal synthesis of a rice plant and the third on the sensitivity of the optimization to uncertainty in model parameters. Existing models for rice processing unit operations are not suitable for flowsheet optimization and new models need to be developed to overcome numerical difficulties that occur in optimization applications, specifically in mixed integer nonlinear programming (MINLP) applications. Simplified models of the drying, cooling, and tempering units are developed. In addition head rice yield models, used as a quality indicator, energy consumption, and economic models were also developed. Naturally, the new models exhibit some mismatch with respect to the existing models from which they were developed. However, a sensitivity analysis, presented in Part III, has shown that the optimal flowsheet structure was not sensitive to a lack of fit between the simplified and complex models. The simplified models were found adequate to be appropriate for use at the synthesis stage.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号