首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1768篇
  免费   311篇
  国内免费   329篇
工业技术   2408篇
  2024年   9篇
  2023年   53篇
  2022年   71篇
  2021年   85篇
  2020年   114篇
  2019年   113篇
  2018年   90篇
  2017年   129篇
  2016年   116篇
  2015年   86篇
  2014年   133篇
  2013年   98篇
  2012年   134篇
  2011年   140篇
  2010年   100篇
  2009年   100篇
  2008年   97篇
  2007年   101篇
  2006年   74篇
  2005年   60篇
  2004年   67篇
  2003年   48篇
  2002年   47篇
  2001年   29篇
  2000年   32篇
  1999年   32篇
  1998年   25篇
  1997年   24篇
  1996年   20篇
  1995年   32篇
  1994年   21篇
  1993年   15篇
  1992年   18篇
  1991年   10篇
  1990年   17篇
  1989年   9篇
  1988年   12篇
  1987年   8篇
  1986年   10篇
  1985年   5篇
  1984年   8篇
  1983年   4篇
  1982年   2篇
  1981年   2篇
  1980年   1篇
  1979年   5篇
  1977年   1篇
  1974年   1篇
排序方式: 共有2408条查询结果,搜索用时 15 毫秒
1.
论文提出利用用户提供的个性化信息来随机产生关联大素数,保证了素数选取的随机化、个性化,提高了RSA算法的安全性。  相似文献   
2.
对板式塔中的受液槽进行了改进,将无伸缩型改性伸缩型,避免了漏液,提高了常压塔的分离效果。  相似文献   
3.
Computing surfaces invariant under subdivision   总被引:3,自引:0,他引:3  
In this paper, we propose a general subdivision algorithm for generating surfaces. The algorithm has as motivation our earlier work on the design of free form curves where similar ideas were investigated. Here we describe some properties of uniform refinement algorithms for surface generation. A detail analysis of their properties will be given later by one of us.  相似文献   
4.
The purpose of this study is to apply continuum damage mechanics – introduced through the concept of fabric tensors – to composite materials within the framework of the theory of elasticity. A directional data model of damage mechanics for composite materials will be developed using fabric tensors. The introduction of fabric tensors into the analysis of damage of composite materials will allow for an enhanced and better understood physical meaning of damage. The micromechanical approach will be used here to relate the damage effect through fabric tensors to the behavior of composite materials. In this approach, damage mechanics is introduced separately to the constituents of the composite material through different constituents’ damage effect tensors. The damaged properties of the composite system as a whole can then be obtained by proper homogenization of the damaged properties of the constituents.

The derivation of a generalized formulation of damage evolution will be shown here in a mathematically consistent manner that is based on sound thermodynamic principles. Numerical examples will be presented to show applicability. In addition, damage evolution for the one-dimensional tension case is also illustrated.  相似文献   

5.
Recently, four canonical forms have been developed and applied to the dynamics and stability analysis of symmetric frames. In this paper, hyper‐symmetric matrices and specially structured matrices are defined and efficient methods are proposed for the eigensolution of such matrices. Applications are extended to hyper‐graphs and specially structured graphs. Simple methods are developed for calculating the eigenvalues of the Laplacian matrices of such graphs. The developments presented in this paper can also be considered as generalization of Form II and Form III symmetry, previously defined by the authors. Copyright © 2006 John Wiley & Sons, Ltd.  相似文献   
6.
The queue of a single server is considered with independent and identically distributed interarrivai and service times and an infinite (GI/G/1) or finite (GI/G/1/N) waiting room. The queue discipline is non-preemptive and independent of the service times.

A discrete time version of the system is analyzed, using a two-component state model at the arrival and departure instants of customers. The equilibrium equations are solved by a polynomial factorization method. The steady state distribution of the queue size is then represented as a linear combination of geometrical series, whose parameters are evaluated by closed formulae depending on the roots of a characteristic polynomial.

Considering modified boundary constraints, systems with finite waiting room or with an exceptional first service in each busy period are included.  相似文献   

7.
We propose a robust digital watermarking algorithm for copyright protection.A stable feature is obtained by utilizing QR factorization and discrete cosine transform(DCT) techniques,and a meaningful watermark image is embedded into an image by modifying the stable feature with a quantization index modulation(QIM) method.The combination of QR factorization,DCT,and QIM techniques guarantees the robustness of the algorithm.Furthermore,an embedding location selection method is exploited to select blocks with small modifications as the embedding locations.This can minimize the embedding distortion and greatly improve the imperceptibility of our scheme.Several standard images were tested and the experimental results were compared with those of other published schemes.The results demonstrate that our proposed scheme can achieve not only better imperceptibility,but also stronger robustness against common signal processing operations and lossy compressions,such as filtering,noise addition,scaling,sharpening,rotation,cropping,and JPEG/JPEG2000 compression.  相似文献   
8.
Tensor interpolation is a key step in the processing algorithms of diffusion tensor imaging (DTI), such as registration and tractography. The diffusion tensor (DT) in biological tissues is assumed to be positive definite. However, the tensor interpolations in most clinical applications have used a Euclidian scheme that does not take this assumption into account. Several Rie-mannian schemes were developed to overcome this limitation. Although each of the Riemannian schemes uses different metrics, they all result in a ‘fixed’ interpolation profile that cannot adapt to a variety of diffusion patterns in biological tissues. In this paper, we propose a DT interpolation scheme to control the interpolation profile, and explore its feasibility in clinical applications. The profile controllability comes from the non-uniform motion of interpolation on the Riemannian geodesic. The interpolation experiment with medical DTI data shows that the profile control improves the interpolation quality by assessing the reconstruction errors with the determinant error, Euclidean norm, and Riemannian norm.  相似文献   
9.
推荐系统是用来解决当今时代信息过载的重要工具。随着在线社交网络的出现和普及,一些基于网络推荐算法研究的出现,已经引起研究者的广泛关注。信任是社会网络中的重要信息之一,通常用来改进基于社交网络的推荐系统,然而,大多数信任感知的推荐系统忽略了用户有不同行为偏好在不同的兴趣域;本文不仅考虑了用户间特定域信任网络,并且结合推荐项目之间特征属性信息,提出了一种新型社会化推荐算法(H-PMF)。实验表明,H-PMF算法在评分误差和推荐精度上都取得了更好的效果。  相似文献   
10.
Twitter provides search services to help people find users to follow by recommending popular users or the friends of their friends. However, these services neither offer the most relevant users to follow nor provide a way to find the most interesting tweet messages for each user. Recently, collaborative filtering techniques for recommendations based on friend relationships in social networks have been widely investigated. However, since such techniques do not work well when friend relationships are not sufficient, we need to take advantage of as much other information as possible to improve the performance of recommendations.In this paper, we propose TWILITE, a recommendation system for Twitter using probabilistic modeling based on latent Dirichlet allocation which recommends top-K users to follow and top-K tweets to read for a user. Our model can capture the realistic process of posting tweet messages by generalizing an LDA model as well as the process of connecting to friends by utilizing matrix factorization. We next develop an inference algorithm based on the variational EM algorithm for learning model parameters. Based on the estimated model parameters, we also present effective personalized recommendation algorithms to find the users to follow as well as the interesting tweet messages to read. The performance study with real-life data sets confirms the effectiveness of the proposed model and the accuracy of our personalized recommendations.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号