首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   810篇
  免费   41篇
  国内免费   12篇
工业技术   863篇
  2023年   11篇
  2022年   18篇
  2021年   37篇
  2020年   28篇
  2019年   20篇
  2018年   56篇
  2017年   33篇
  2016年   48篇
  2015年   33篇
  2014年   41篇
  2013年   89篇
  2012年   54篇
  2011年   63篇
  2010年   44篇
  2009年   45篇
  2008年   25篇
  2007年   27篇
  2006年   22篇
  2005年   11篇
  2004年   17篇
  2003年   16篇
  2002年   14篇
  2001年   10篇
  2000年   4篇
  1999年   9篇
  1998年   15篇
  1997年   8篇
  1996年   5篇
  1995年   5篇
  1994年   2篇
  1993年   2篇
  1992年   2篇
  1991年   5篇
  1990年   3篇
  1989年   5篇
  1988年   3篇
  1987年   6篇
  1986年   3篇
  1984年   4篇
  1983年   3篇
  1981年   2篇
  1979年   1篇
  1976年   1篇
  1975年   2篇
  1974年   2篇
  1972年   3篇
  1970年   1篇
  1968年   1篇
  1960年   1篇
  1959年   2篇
排序方式: 共有863条查询结果,搜索用时 609 毫秒
11.
This paper deals with the presentation of polynomial time (approximation) algorithms for a variant of open‐shop scheduling, where the processing times are only machine‐dependent. This variant of scheduling is called proportionate scheduling and its applications are used in many real‐world environments. This paper develops three polynomial time algorithms for the problem. First, we present a polynomial time algorithm that solves the problem optimally if , where n and m denote the numbers of jobs and machines, respectively. If, on the other hand, , we develop a polynomial time approximation algorithm with a worst‐case performance ratio of that improves the bound existing for general open‐shops. Next, in the case of , we take into account the problem under consideration as a master problem and convert it into a simpler secondary approximation problem. Furthermore, we formulate both the master and secondary problems, and compare their complexity sizes. We finally present another polynomial time algorithm that provides optimal solution for a special case of the problem where .  相似文献   
12.
To investigate whether the alternative text entry system, Dasher, is useful to physically and intellectually disabled students when controlled by a brain–computer interface (BCI) a new software tool was developed to allow subjects to type words onto a computer screen via Dasher using their thoughts. A case study approach was adopted. Subjects were selected based on their suitability for the experiment, and the potential benefit to them of this system, by their head teacher. Subjects entered literacy level-matched phrases onto a computer using QWERTY keyboard, Dasher-mouse and Dasher-BCI. A researcher recorded qualitative and quantitative data, including characters entered per minute and their system preferences. Informed written consent was given for seven subjects to participate (aged 14–19 years, five male, with a range of physical and intellectual disabilities). After a short training period, all subjects had some degree of control over the Dasher-BCI system. With regard to typing speed, Dasher-BCI performed relatively poorly (3.9 ± 1.5 characters per minute), and QWERTY keyboard performed the best (31.9 ± 21.9 characters per minute). Dasher-BCI was the most preferred method. Areas of weakness in Dasher and the BCI hardware were highlighted and suggestions for improvement given. BCI-based text entry is not yet ready to compete with more established methods for students with combined cognitive and physical disabilities. Although underpowered, this study suggests that for people whose predominant disability is physical (cerebral palsy), BCI technology shows great potential as a viable text entry alternative. Suggestions for further research are discussed.  相似文献   
13.
14.
Neural Computing and Applications - This paper proposes a novel extreme learning machine (ELM)-based fixed time adaptive trajectory control for electronic throttle valve system with uncertain...  相似文献   
15.
Medical image fusion is considered the best method for obtaining one image with rich details for efficient medical diagnosis and therapy. Deep learning provides a high performance for several medical image analysis applications. This paper proposes a deep learning model for the medical image fusion process. This model depends on Convolutional Neural Network (CNN). The basic idea of the proposed model is to extract features from both CT and MR images. Then, an additional process is executed on the extracted features. After that, the fused feature map is reconstructed to obtain the resulting fused image. Finally, the quality of the resulting fused image is enhanced by various enhancement techniques such as Histogram Matching (HM), Histogram Equalization (HE), fuzzy technique, fuzzy type Π, and Contrast Limited Histogram Equalization (CLAHE). The performance of the proposed fusion-based CNN model is measured by various metrics of the fusion and enhancement quality. Different realistic datasets of different modalities and diseases are tested and implemented. Also, real datasets are tested in the simulation analysis.  相似文献   
16.
17.
While the demand for mobile broadband wireless services continues to increase, radio resources remain scarce. Even with the substantial increase in the supported bandwidth in the next generation broadband wireless access systems (BWASs), it is expected that these systems will severely suffer from congestion, due to the rapid increase in demand of bandwidth-intensive multimedia services. Without efficient bandwidth management and congestion control schemes, network operators may not be able to meet the increasing demand of users for multimedia services, and hence they may suffer an immense revenue loss. In this paper, we propose an admission-level bandwidth management scheme consisting of call admission control (CAC) and dynamic pricing. The main aim of our proposed scheme is to provide monetary incentives to users to use the wireless resources efficiently and rationally, hence, allowing efficient bandwidth management at the admission level. By dynamically determining the prices of units of bandwidth, the proposed scheme can guarantee that the number of connection requests to the system are less than or equal to certain optimal values computed dynamically, hence, ensuring a congestion-free system. The proposed scheme is general and can accommodate different objective functions for the admission control as well as different pricing functions. Comprehensive simulation results with accurate and inaccurate demand modeling are provided to show the effectiveness and strengths of our proposed approach.  相似文献   
18.
This paper reports on an aspect of the EC funded Argunaut project which researched and developed awareness tools for moderators of online dialogues. In this study we report on an investigation into the nature of creative thinking in online dialogues and whether or not this creative thinking can be coded for and recognized automatically such that moderators can be alerted when creative thinking is occurring or when it has not occurred after a period of time. We outline a dialogic theory of creativity, as the emergence of new perspectives from the interplay of voices, and the testing of this theory using a range of methods including a coding scheme which combined coding for creative thinking with more established codes for critical thinking, artificial intelligence pattern-matching techniques to see if our codes could be read automatically from maps and ‘key event recall’ interviews to explore the experience of participants. Our findings are that: (1) the emergence of new perspectives in a graphical dialogue map can be recognized by our coding scheme supported by a machine pattern-matching algorithm in a way that can be used to provide awareness indicators for moderators; (2) that the trigger events leading to the emergence of new perspectives in the online dialogues studied were most commonly disagreements and (3) the spatial representation of messages in a graphically mediated synchronous dialogue environment such as Digalo may offer more affordance for creativity than the much more common scrolling text chat environments. All these findings support the usefulness of our new account of creativity in online dialogues based on dialogic theory and demonstrate that this account can be operationalised through machine coding in a way that can be turned into alerts for moderators.  相似文献   
19.
In problem of portfolio selection, financial Decision Makers (DMs) explain objectives and investment purposes in the frame of multi-objective mathematic problems which are more consistent with decision making realities. At present, various methods have introduced to optimize such problems. One of the optimization methods is the Compromise Programming (CP) method. Considering increasing importance of investment in financial portfolios, we propose a new method, called Nadir Compromising Programming (NCP) by expanding a CP-based method for optimization of multi-objective problems. In order to illustrate NCP performance and operational capability, we implement a case study by selecting a portfolio with 35 stock indices of Iran stock market. Results of comparing the CP method and proposed method under the same conditions indicate that NCP method results are more consistent with DM purposes.  相似文献   
20.
With the advent of multi-core processors, desktop application developers must finally face parallel computing and its challenges. A large portion of the computational load in a program rests within iterative computations. In object-oriented languages these are commonly handled using iterators which are inadequate for parallel programming. This paper presents a powerful Parallel Iterator concept to be used in object-oriented programs for the parallel traversal of a collection of elements. The Parallel Iterator may be used with any collection type (even those inherently sequential) and it supports several scheduling schemes which may even be decided dynamically at run-time. Some additional features are provided to allow early termination of parallel loops, exception handling and a solution for performing reductions. With a slight contract modification, the Parallel Iterator interface imitates that of the Java-style sequential iterator. All these features combine together to promote minimal, if any, code restructuring. Along with the ease of use, the results reveal negligible overhead and the expected inherent speedup.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号