首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2362篇
  免费   165篇
  国内免费   4篇
工业技术   2531篇
  2024年   7篇
  2023年   25篇
  2022年   53篇
  2021年   102篇
  2020年   92篇
  2019年   102篇
  2018年   111篇
  2017年   103篇
  2016年   129篇
  2015年   76篇
  2014年   103篇
  2013年   218篇
  2012年   144篇
  2011年   191篇
  2010年   130篇
  2009年   168篇
  2008年   144篇
  2007年   118篇
  2006年   87篇
  2005年   73篇
  2004年   60篇
  2003年   42篇
  2002年   44篇
  2001年   23篇
  2000年   16篇
  1999年   25篇
  1998年   33篇
  1997年   18篇
  1996年   13篇
  1995年   9篇
  1994年   6篇
  1993年   6篇
  1992年   12篇
  1991年   10篇
  1990年   5篇
  1989年   3篇
  1988年   4篇
  1987年   5篇
  1986年   4篇
  1985年   3篇
  1984年   4篇
  1982年   1篇
  1981年   2篇
  1979年   1篇
  1978年   1篇
  1976年   1篇
  1974年   1篇
  1973年   1篇
  1972年   1篇
  1970年   1篇
排序方式: 共有2531条查询结果,搜索用时 46 毫秒
11.
Predictions of the discharge and the associated sediment concentration are very useful ingredients in any water resources reservoir design, planning, maintenance, and operation. Although there are many empirical relationships between the discharge and sediment concentration amounts, they need estimation of model parameters. Generally, parameter estimations are achieved through the regression method (RM), which has several restrictive assumptions. Such models are locally valid and their structures and parameter values are questionable from region to others. This paper proposes a new approach for sediment concentration prediction provided that there are measurements of discharge and sediment concentration. The basis of the methodology is a dynamic transitional model between successive time instances based on two variables, namely, discharge and sediment concentration measurements. The transition matrix elements are estimated from the measurements through a special form of the artificial neural networks as perceptrons. The sediment concentration predictions from discharge measurements are achieved through a perceptron Kalman filtering (PKF) technique. In the meantime, this technique also provides temporal predictions. A certain portion of the measurement sequence is employed for the model parameter estimations through training and the remaining part is used for the model verification. Detailed comparisons between RM and PKF approaches are presented and, finally, it is shown that the latter model works dynamically by simulating the observation scatter diagram in the best possible manner with smaller prediction errors. The application of the methodology is performed for the discharge and sediment concentration measurements obtained from the Mississippi River basin at St. Louis, Missouri. It is found that the PKF methodology has smaller average relative, root-mean-square, and absolute errors than RM. Furthermore, graphical representation, such as the scatter and frequency diagrams, indicated that the PKF approach has superiority over the RM.  相似文献   
12.
Censored data resulting from life-test of durable products, coupled with complicated structures of screening experiments, makes process characterization very difficult. Existing methods can be inadequate for modeling such data because important effects and factor levels might be identified wrongly. This article presents an expectation-modeling-maximization (EMM) algorithm, where censored data are imputed as pseudo-complete samples and a forward regression is used to compare all main effects and 2-factor interactions for process characterization. Then, the best combination of controllable variables is determined in order to optimize predictions from the final model. A sensitivity study of the selected models, with changes of imputation and parameter estimation methods, shows the importance of using appropriate models and estimation methods in EMM. The author's analysis of the Specht (1985) heat-exchanger life-test data indicates that E, EG, EH in the wall data and A, K, D, DJ in the corner data are the dominating factors. However, in finding the best process recipe, one might use a model with a few additional terms, which leads to more accurate predictions for better process optimization  相似文献   
13.
The back repulsion of low density particles, sticking of particles in feeder valve and interlocking and cohesive archs of particles in feeder hopper have been widely observed problems of a conventional rotary valve feeder used for feeding of granular particles into an airflow line. In this study, these problems of the rotary valve feeders were isolated by means of novel modifications to its conventional design. Results of the modifications showed that the modified feeder can be sensitively used to feed granular particles with mass feeding rates ranging between 5±0.15 and 85±0.85 g/s without encountering problems experienced with conventional rotary valves.  相似文献   
14.
Since the introduction of warranty provisions in federal highway jobs, more and more state departments of transportation (DOTs) have considered the use of such provisions to protect their initial investment. This paper describes the pros and cons of warranty contracting in highway construction based on a survey of warranty practices in the United States. In particular, the need for state DOTs to buy a warranty for a well-built project is questioned. As an alternative, this paper introduces the warranty option, which gives the DOT the right to buy a warranty only if it becomes necessary at the end of construction. This option is exercised if the performance on site warrants it. This paper describes the mechanics of the warranty option and its advantages over the conventional warranty. A bid evaluation model is also developed for the warranty option approach.  相似文献   
15.
BATCH SEQUENCING   总被引:1,自引:0,他引:1  
Consider the single machine scheduling problem where there are a number of part types to be processed. A part type is defined as follows: Two parts are of the same part type if the machine does not require a setup in between the processing of these parts. The problem investigated in this paper is to find a sequence of batches of parts (if there are any) where all the requirements for parts are met. A heuristic and an exact algorithm are developed, and computational analysis is performed to measure the performance of the heuristic. The time complexity function of the heuristic is O(n2), and the exact algorithm runs in polynomial time given a fixed upper bound on the number of setups.  相似文献   
16.
17.
This paper presents the results of urease immobilization onto methacrylic acid–acrylamide grafted poly(ethyleneterephthalate) fibres. The graft yield strongly affected the maximum activity of the immobilized enzyme up to a value of 70·2%. Higher grafting caused a decline in urease activity and led to the degradation of the fibres. The minor changes observed in Km and Vmax demonstrated that the conformational changes existed during immobilization were not extensive. However, 70·2% methacrylic acid–acrylamide-g-fibres containing urease were more stable towards acidic and alkaline pH, high temperature and storage conditions compared with free enzyme. Apart from the increase in stability to heat inactivation, the initial enzymatic activity of the urease–fibre system remained almost unchanged even after 40 repeated assays corresponding to 10 h of operation in 4 months, indicating the excellent durability of the system.  相似文献   
18.
19.
Hardware implementation of artificial neural networks has been attracting great attention recently. In this work, the analog VLSI implementation of artificial neural networks by using only transconductors is presented. The signal flow graph approach is used in synthesis. The neural flow graph is defined. Synthesis of various neural network configurations by means of neural flow graph is described. The approach presented in this work is technology independent. This approach can be applied to new neural network topologies to be proposed or used with transconductors designed in future technologies.  相似文献   
20.
The issue of trust is a research problem in emerging open environments, such as ubiquitous networks. Such environments are highly dynamic and they contain diverse number of services and autonomous entities. Entities in open environments have different security needs from services. Trust computations related to the security systems of services necessitate information that meets needs of each entity. Obtaining such information is a challenging issue for entities. In this paper, we propose a model for extracting trust information from the security system of a service based on the needs of an entity. We formally represent security policies and security systems to extract trust information according to needs of an entity. The formal representation ensures an entity to extract trust information about a security property of a service and trust information about whole security system of the service. The proposed model is applied to Dental Clinic Patient Service as a case study with two scenarios. The scenarios are analyzed experimentally with simulations. The experimental evaluation shows that the proposed model provides trust information related to the security system of a service based on the needs of an entity and it is applicable in emerging open environments.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号