首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2643篇
  免费   82篇
  国内免费   3篇
工业技术   2728篇
  2023年   11篇
  2021年   41篇
  2020年   29篇
  2019年   35篇
  2018年   47篇
  2017年   44篇
  2016年   55篇
  2015年   43篇
  2014年   69篇
  2013年   165篇
  2012年   112篇
  2011年   128篇
  2010年   120篇
  2009年   104篇
  2008年   107篇
  2007年   88篇
  2006年   88篇
  2005年   79篇
  2004年   54篇
  2003年   70篇
  2002年   67篇
  2001年   42篇
  2000年   33篇
  1999年   44篇
  1998年   104篇
  1997年   70篇
  1996年   67篇
  1995年   56篇
  1994年   44篇
  1993年   60篇
  1992年   36篇
  1991年   22篇
  1990年   21篇
  1989年   28篇
  1988年   27篇
  1987年   33篇
  1986年   26篇
  1985年   25篇
  1984年   33篇
  1983年   24篇
  1982年   23篇
  1981年   40篇
  1980年   35篇
  1979年   24篇
  1978年   25篇
  1977年   29篇
  1976年   29篇
  1975年   26篇
  1973年   16篇
  1972年   14篇
排序方式: 共有2728条查询结果,搜索用时 15 毫秒
61.
A crucial step in the modeling of a system is to determine the values of the parameters to use in the model. In this paper we assume that we have a set of measurements collected from an operational system, and that an appropriate model of the system (e.g., based on queueing theory) has been developed. Not infrequently proper values for certain parameters of this model may be difficult to estimate from available data (because the corresponding parameters have unclear physical meaning or because they cannot be directly obtained from available measurements, etc.). Hence, we need a technique to determine the missing parameter values, i.e., to calibrate the model.As an alternative to unscalable “brute force” technique, we propose to view model calibration as a non-linear optimization problem with constraints. The resulting method is conceptually simple and easy to implement. Our contribution is twofold. First, we propose improved definitions of the “objective function” to quantify the “distance” between performance indices produced by the model and the values obtained from measurements. Second, we develop a customized derivative-free optimization (DFO) technique whose original feature is the ability to allow temporary constraint violations. This technique allows us to solve this optimization problem accurately, thereby providing the “right” parameter values. We illustrate our method using two simple real-life case studies.  相似文献   
62.
In the frequency allocation problem, we are given a mobile telephone network, whose geographical coverage area is divided into cells, wherein phone calls are serviced by assigning frequencies to them so that no two calls emanating from the same or neighboring cells are assigned the same frequency. The problem is to use the frequencies efficiently, i.e., minimize the span of frequencies used. The frequency allocation problem can be regarded as a multicoloring problem on a weighted hexagonal graph. In this paper, we give a 1-local asymptotic 4/3-competitive distributed algorithm for multicoloring a triangle-free hexagonal graph, which is a special case of hexagonal graph. Based on this result, we then propose a 1-local asymptotic13/9-competitive algorithm for multicoloring the (general-case) hexagonal graph, thereby improving the previous 1-local 3/2-competitive algorithm. A preliminary version of this paper appeared in the Proceedings of the 13th Annual International Computing and Combinatorics Conference (COCOON 2007), LNCS 4598, pp. 526–536. Y. Zhang research was supported by European Regional Development Fund (ERDF). F.Y.L. Chin research was supported by Hong Kong RGC Grant HKU-7113/07E. H. Zhu research was supported by National Natural Science Fund (grant #60496321).  相似文献   
63.
We propose a visualization based approach for digital signature authentication. Using our method, the speed and pressure aspects of a digital signature process can be clearly and intuitively conveyed to the user for digital signature authentication. Our design takes into account both the expressiveness and aesthetics of the derived visual patterns. With the visual aid provided by our method, digital signatures can be authenticated with better accuracy than using existing methods—even novices can examine the authenticity of a digital signature in most situations using our method. To validate the effectiveness of our method, we conducted a comprehensive user study which confirms positively the advantages of our approach. Our method can be employed as a new security enhancement measure for a range of business and legal applications in reality which involve digital signature authorization and authentication.  相似文献   
64.
This article deals with a local improvement of domain decomposition methods for 2-dimensional elliptic problems for which either the geometry or the domain decomposition presents conical singularities. After explaining the main results of the theoretical analysis carried out in Chniti et al. (Calcolo 45, 2008), the numerical experiments presented in this article confirm the optimality properties of the new interface conditions.  相似文献   
65.
A two level control strategy that stabilizes and optimizes the production of an industrial copper solvent extraction process is presented. The stabilizing layer consists of a multi-input–multi-output controller or two single-input–single-output controllers with additional four feedforward compensators that regulate the flow rates in the copper solvent extraction process. The optimization layer consists of an optimizer that maximizes the production of the copper solvent extraction process and gives setpoints to the controllers at the stabilizing level. The mechanistic plant models, verified with industrial data, are linearized by identifying first and higher order transfer function models from simulated PRBS data. On the basis of the linear models, the interactions of the controlled variables, and the pairing of the controlled and manipulated variables are studied and the optimizer and the controllers designed. The control strategy employing two PI-control loops or a model predictive controller and additionally four feedforward control loops is successfully tested against simulated disturbances and setpoint changes. The control strategy is also compared to the data collected from the industrial plant under manual control. With this two level control strategy the production of the copper solvent extraction process is increased by 3–5% and the process variation is decreased by 70–90% compared to the manual operation of the case industrial plant. The results gained in simulation environment are successful and encouraging for further testing in an industrial plant.  相似文献   
66.
This paper addresses the one-machine scheduling problem with earliness-tardiness penalties. We propose a new branch-and-bound algorithm that can solve instances with up to 50 jobs and that can solve problems with even more general non-convex cost functions. The algorithm is based on the combination of a Lagrangean relaxation of resource constraints and new dominance rules.  相似文献   
67.
The volatiles released from several aphid and host plant species, alone or associated, were studied for their infochemical role in prey location. Using a four-arm olfactometer, the attraction of several combinations of three aphid (Myzus persicae, Acyrthosiphon pisum, and Brevicoryne brassicae) and three plant (Vicia faba, Brassica napus, and Sinapis alba) species toward Adalia bipunctata larvae and adults was observed. Both predatory larvae and adults were attracted only by A. pisum and M. persicae when they were crushed, whatever the host plant. (E)-beta-farnesene, the aphid alarm pheromone, was the effective kairomone for the ladybird. Plant leaves alone (V. faba, B. napus, and S. alba) or in association with nonstressed whole aphids (the three species) did not have any attraction for the predator. The B. brassicae specialist aphid is the only prey that was not attracted to A. bipunctata larvae and adults, even if they were crushed. Release of B. brassicae molecules similar to the host plant allelochemicals was demonstrated by GC-MS analysis. The lack of behavioral response of the ladybird at short distance toward the cruciferous specialist aphid was related only to the absence of (E)-beta-farnesene in the aphid prey volatile pattern.  相似文献   
68.
The field of systems biology has attracted the attention of biologists, engineers, mathematicians, physicists, chemists and others in an endeavour to create systems-level understanding of complex biological networks. In particular, systems engineering methods are finding unique opportunities in characterizing the rich behaviour exhibited by biological systems. In the same manner, these new classes of biological problems are motivating novel developments in theoretical systems approaches. Hence, the interface between systems and biology is of mutual benefit to both disciplines.  相似文献   
69.
This study examined whether mothers' preoccupation with their own weight and eating was linked to daughters' restrained eating behavior. Participants included 173 non-Hispanic, White mother-daughter dyads, measured longitudinally when daughters were ages 5, 7, 9, and 11. Mothers who were preoccupied with their own weight and eating reported higher levels of restricting daughters' intake and encouraging daughters to lose weight over time. Mothers' encouragement of daughters' weight loss was linked to daughters' restrained eating behavior; this relationship was partially mediated by daughters' perception of maternal pressure to lose weight. These findings suggest that mothers' preoccupation with weight and eating, via attempts to influence daughters' weight and eating, may place daughters at risk for developing problematic eating behaviors. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
70.
For nearly 10 years now, the Internet Architecture Board (IAB) and Internet Engineering Task Force (IETF) have been telling us that the pool of available IP addresses will soon be exhausted, and that Internet growth will come to a grinding halt. They have heavily promoted their solution, IPv6, which the commercial world has all but ignored. It is now becoming clear that IP address exhaustion is years off, at best. The primary reason for this is network address translation (NAT), the rogue technology that allows almost unlimited address reuse. Despite NAT's nagging technical problems that limit IP connectivity and make peer-to-peer (P2P) applications difficult to deploy, the commercial world has universally embraced the technology even as the IAB and IETF actively discourage its use.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号