首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   38441篇
  免费   5070篇
  国内免费   3015篇
电工技术   4054篇
综合类   4146篇
化学工业   3763篇
金属工艺   1039篇
机械仪表   2050篇
建筑科学   2515篇
矿业工程   897篇
能源动力   1090篇
轻工业   1908篇
水利工程   838篇
石油天然气   1623篇
武器工业   630篇
无线电   5267篇
一般工业技术   3652篇
冶金工业   1497篇
原子能技术   578篇
自动化技术   10979篇
  2024年   125篇
  2023年   483篇
  2022年   932篇
  2021年   1093篇
  2020年   1376篇
  2019年   1304篇
  2018年   1126篇
  2017年   1514篇
  2016年   1685篇
  2015年   1772篇
  2014年   2384篇
  2013年   2775篇
  2012年   2769篇
  2011年   2899篇
  2010年   2142篇
  2009年   2271篇
  2008年   2173篇
  2007年   2574篇
  2006年   2409篇
  2005年   1981篇
  2004年   1630篇
  2003年   1531篇
  2002年   1328篇
  2001年   1151篇
  2000年   985篇
  1999年   737篇
  1998年   593篇
  1997年   520篇
  1996年   394篇
  1995年   329篇
  1994年   271篇
  1993年   224篇
  1992年   153篇
  1991年   151篇
  1990年   107篇
  1989年   91篇
  1988年   63篇
  1987年   67篇
  1986年   47篇
  1985年   54篇
  1984年   40篇
  1983年   29篇
  1982年   32篇
  1981年   28篇
  1980年   24篇
  1979年   22篇
  1978年   12篇
  1977年   11篇
  1964年   12篇
  1956年   11篇
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
941.
针对IEBLP模型中客体安全等级在整个寿命周期中固定不变的不足,提出了一种添加了时间限制元素的TBLP模型,主要在主客体安全标签中加入了时间限制元素,并对其安全公理进行了相对应的改进.最后,利用XACML实现了TBLP模型对XML文档的强制访问控制.  相似文献   
942.
From the perspective of data security, which has always been an important aspect of quality of service, cloud computing focuses a new challenging security threats. Therefore, a data security model must solve the most challenges of cloud computing security. The proposed data security model provides a single default gateway as a platform. It used to secure sensitive user data across multiple public and private cloud applications, including Salesforce, Chatter, Gmail, and Amazon Web Services, without influencing functionality or performance. Default gateway platform encrypts sensitive data automatically in a real time before sending to the cloud storage without breaking cloud application. It did not effect on user functionality and visibility. If an unauthorized person gets data from cloud storage, he only sees encrypted data. If authorized person accesses successfully in his cloud, the data is decrypted in real time for your use. The default gateway platform must contain strong and fast encryption algorithm, file integrity, malware detection, firewall, tokenization and more. This paper interested about authentication, stronger and faster encryption algorithm, and file integrity.  相似文献   
943.
This article considers stabilization of a one‐dimensional Schrödinger equation with variable coefficient and boundary observation which suffers from an arbitrary given time delay. We design an observer and predictor to stabilize the system. The state is estimated in the time span where the observation is available, and also predicted in the time interval where the observation is not available. It is shown that the estimated state feedback stabilizes the system exponentially. A numerical simulation is presented to illustrate the effect of the stabilizing controller.  相似文献   
944.
Consensus analysis and design problems of high‐dimensional discrete‐time swarm systems in directed networks with time delays and uncertainties are dealt with by using output information. Two subspaces are introduced, namely a consensus subspace and a complement consensus subspace. By projecting the state of a swarm system onto the two subspaces, a necessary and sufficient condition for consensus is presented, and based on different influences of time delays and uncertainties, an explicit expression of the consensus function is given which is very important in applications of swarm systems. A method to determine gain matrices of consensus protocols is proposed. Numerical simulations are presented to demonstrate theoretical results.  相似文献   
945.
It is well known that many industrial manipulators use an embedded linear proportional‐integral (PI) joint velocity controller to guarantee motion control through proper velocity commands. However, although this control scheme has been very successful in practice, not much attention has been paid to designing new PI velocity control structures. The problem of analyzing a saturated PI velocity joint velocity controller is addressed in this paper. By using the theory of singularly perturbed systems, the closed‐loop system is studied. The robot dynamics assumed in this paper take into account bounded time–varying disturbances which may include the friction at the joints. An experimental study in a planar two degrees‐of‐freedom direct‐drive robot is also presented, confirming the advantage of the new saturated PI joint velocity controller.  相似文献   
946.
This paper mainly studies the notions of detectability and observability for discrete‐time stochastic Markov jump systems with state‐dependent noise. Two concepts, called “W‐detectability” and “W‐observability,” for such systems are introduced, and are shown to coincide with the other concepts on detectability and observability reported recently in literature. Moreover, some criteria and interesting properties for both W‐detectability and W‐observability are obtained.  相似文献   
947.
In the present paper we obtain an explicit closed‐form solution for the discrete‐time algebraic Riccati equation (DTARE) with vanishing state weight, whenever the unstable eigenvalues are distinct. We discuss links to current algorithmic solutions and observe that the AREs in such a class solve on one hand the infimal signal‐to‐noise ratio (SNR) problem, whilst on the other hand, in their dual form they solve a Kalman filter problem. We then extend the main result to an example case of the optimal linear quadratic regulator gain. We relax some of the assumptions behind the main result and conclude with possible future directions for the present work.  相似文献   
948.
In this paper, the consensus problem is investigated via bounded controls for the multi‐agent systems with or without communication. Based on the nested saturation method, the saturated control laws are designed to solve the consensus problem. Under the designed saturated control laws, the transient performance of the closed‐loop system can be improved by tuning the saturation level. First of all, asymptotical consensus algorithms with bounded control inputs are proposed for the multi‐agent systems with or without communication delays. Under these consensus algorithms, the states’ consensus can be achieved asymptotically. Then, based on a kind of novel nonlinear saturation functions, bounded finite‐time consensus algorithms are further developed. It is shown that the states’ consensus can be achieved in finite time. Finally, two examples are given to verify the efficiency of the proposed methods.  相似文献   
949.
The problem of quantized H control for networked control systems (NCSs) subject to time‐varying delay and multiple packet dropouts is investigated in this paper. Both the control input and the measurement output signals are quantized before being transmitted and the quantized errors are described as sector bound uncertainties. The measurement channel and the control channel packet dropouts are considered simultaneously, and the stochastic variables satisfying Bernoulli random binary distribution are utilized to model the random multiple packet dropouts. Sufficient conditions for the existence of an observer‐based controller are established to ensure the exponential mean‐square stablility of the closed‐loop system and achieve the optimal H disturbance attenuation level. By using a globally convergent algorithm involving convex optimization, the nonconvex feasibility can be solved successfully. Finally, a numerical example is given to illustrate the effectiveness and applicability of the proposed method.  相似文献   
950.
根据实际工作需要,为克服采用传统手段利用上下游洪峰水位相关图法来进行洪水预报所带来的不精确性和任意性,笔者利用数学函数方程和回归分析计算软件,使用excel的图形功能,先绘制样本数据散点图,然后在图上添加趋势线,确定了回归方程类型。根据回归方程类型进行了方程系数率定分析,最终推求出预报黑龙江乌云站洪峰水位和洪峰传播时间的数学回归方程,经实例拟合验证,方程计算结果通过检验,基本满足实际应用要求。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号