首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5244篇
  免费   258篇
  国内免费   85篇
电工技术   71篇
技术理论   1篇
综合类   650篇
化学工业   240篇
金属工艺   51篇
机械仪表   134篇
建筑科学   952篇
矿业工程   53篇
能源动力   54篇
轻工业   1556篇
水利工程   34篇
石油天然气   160篇
武器工业   6篇
无线电   143篇
一般工业技术   289篇
冶金工业   235篇
原子能技术   8篇
自动化技术   950篇
  2024年   9篇
  2023年   38篇
  2022年   88篇
  2021年   112篇
  2020年   119篇
  2019年   89篇
  2018年   71篇
  2017年   87篇
  2016年   93篇
  2015年   114篇
  2014年   272篇
  2013年   220篇
  2012年   362篇
  2011年   473篇
  2010年   360篇
  2009年   403篇
  2008年   404篇
  2007年   453篇
  2006年   392篇
  2005年   263篇
  2004年   186篇
  2003年   163篇
  2002年   166篇
  2001年   132篇
  2000年   89篇
  1999年   81篇
  1998年   59篇
  1997年   39篇
  1996年   26篇
  1995年   22篇
  1994年   29篇
  1993年   23篇
  1992年   21篇
  1991年   13篇
  1990年   15篇
  1989年   10篇
  1988年   10篇
  1987年   10篇
  1986年   9篇
  1985年   8篇
  1984年   10篇
  1983年   4篇
  1982年   3篇
  1980年   3篇
  1979年   4篇
  1965年   3篇
  1964年   3篇
  1963年   4篇
  1959年   3篇
  1958年   3篇
排序方式: 共有5587条查询结果,搜索用时 15 毫秒
81.
目前综合器的优化功能越来越强,大部分设计都可以被优化。设计工程师也越来越依赖于综合工具,然而综合器的优化结果主要还是依靠设计工程师的代码风格。设计风格对综合结果的影响可以用一句话概括:“好的代码设计风格会使综合器事半功倍,达到最优的综合结果;不好的代码设计风格会使综合器南辕北辙,产生错误的综合结果。”有时候问题都源于其代码风格不尽合理,而并不在于综合器。  相似文献   
82.
在美术作品研究中,提出一种对三维模型实现水墨效果的渲染方法,可以对水墨画中浓淡远近的绘画技法进行仿真。首先构建二维水墨纹理,然后利用模型的轮廓线信息控制纹理的水平分量映射,最后通过属性函数控制纹理垂直分量的坐标,调整水墨颜色色调。分别采用线性属性函数、二次属性函数以及加入光源因子的属性函数进行仿真。结果表明,在三维场景的水墨仿真中,利用上述方法可以使画面更具层次感,更符合画家的实际手法,为三维模型的水墨渲染提供了一种可行的技术手段。  相似文献   
83.
In this survey article, we first introduce the concept of quasi-coincidence of a fuzzy interval value with an interval valued fuzzy set. This concept is a generalized concept of quasi-coincidence of a fuzzy point within a fuzzy set. By using this new idea, we consider the interval valued (∈,∈q)-fuzzy sub-hypernear-rings (hyperideals) of a hypernear-ring, and hence, a generalization of a fuzzy sub-near-ring (ideal) is given. Some related properties of fuzzy hypernear-rings are described. Finally, we consider the concept of implication-based interval valued fuzzy sub-hypernear-rings (hyperideals) in a hypernear-ring, in particular, the implication operators in Lukasiewicz system of continuous-valued logic are discussed.  相似文献   
84.
This paper studies the problem of state feedback control of continuous-time T-S fuzzy systems. Switched fuzzy controllers are exploited in the control design, which are switched based on the values of membership functions, and the control scheme is an extension of the parallel distributed compensation (PDC) scheme. Sufficient conditions for designing switched state feedback controllers are obtained with meeting an H norm bound requirement and quadratic D stability constraints. It is shown that the new control design method provides less conservative results than the corresponding ones via the parallel distributed compensation (PDC) scheme. A numerical example is given to illustrate the effectiveness of the proposed method.  相似文献   
85.
Suboptimal robust synthesis for MIMO nominal system under coprime factor perturbations is considered in classical and non-classical statements. In the classical statement, weights of perturbations and upper bound on magnitude bounded exogenous disturbance are assumed to be known to controller designer. Suboptimal synthesis within ε tolerance is reduced to the solution of log2(1/ε) standard mixed sensitivity problems of ℓ1 optimization. In the non-classical statement, the upper bounds on perturbations and exogenous disturbance are to be estimated from measurement data and suboptimal synthesis is reduced to the solution of 1/ε mixed sensitivity problems.  相似文献   
86.
In an organization operating in the bancassurance sector we identified a low-risk IT subportfolio of 84 IT projects comprising together 16,500 function points, each project varying in size and duration, for which we were able to quantify its requirements volatility. This representative portfolio stems from a much larger portfolio of IT projects. We calculated the volatility from the function point countings that were available to us. These figures were aggregated into a requirements volatility benchmark. We found that maximum requirements volatility rates depend on size and duration, which refutes currently known industrial averages. For instance, a monthly growth rate of 5% is considered a critical failure factor, but in our low-risk portfolio we found more than 21% of successful projects with a volatility larger than 5%. We proposed a mathematical model taking size and duration into account that provides a maximum healthy volatility rate that is more in line with the reality of low-risk IT portfolios. Based on the model, we proposed a tolerance factor expressing the maximal volatility tolerance for a project or portfolio. For a low-risk portfolio its empirically found tolerance is apparently acceptable, and values exceeding this tolerance are used to trigger IT decision makers. We derived two volatility ratios from this model, the π-ratio and the ρ-ratio. These ratios express how close the volatility of a project has approached the danger zone when requirements volatility reaches a critical failure rate. The volatility data of a governmental IT portfolio were juxtaposed to our bancassurance benchmark, immediately exposing a problematic project, which was corroborated by its actual failure. When function points are less common, e.g. in the embedded industry, we used daily source code size measures and illustrated how to govern the volatility of a software product line of a hardware manufacturer. With the three real-world portfolios we illustrated that our results serve the purpose of an early warning system for projects that are bound to fail due to excessive volatility. Moreover, we developed essential requirements volatility metrics that belong on an IT governance dashboard and presented such a volatility dashboard.  相似文献   
87.
control with limited communication and message losses   总被引:2,自引:0,他引:2  
We propose an H approach to a remote control problem where the communication is constrained due to the use of a shared channel. The controller employs a periodic time sequencing scheme for message transmissions from multiple sensors and to multiple actuators of the system. It further takes into account the information on the random message losses that occur in the channel. An exact characterization for controller synthesis is obtained and is stated in terms of linear matrix inequalities. Furthermore, an analysis on the loss probabilities of the messages to accomplish stabilization is carried out. The results are illustrated through a numerical example.  相似文献   
88.
Student modelling is an important process for adaptive virtual learning environments. Student models include a range of information about the learners such as their domain competence, learning style or cognitive traits. To be able to adapt to the learners’ needs in an appropriate way, a reliable student model is necessary, but getting enough information about a learner is quite challenging. Therefore, mechanisms are needed to support the detection process of the required information. In this paper, we investigate the relationship between learning styles, in particular, those pertaining to the Felder–Silverman learning style model and working memory capacity, one of the cognitive traits included in the cognitive trait model. The identified relationship is derived from links between learning styles, cognitive styles, and working memory capacity which are based on studies from the literature. As a result, we demonstrate that learners with high working memory capacity tend to prefer a reflective, intuitive, and sequential learning style whereas learners with low working memory capacity tend to prefer an active, sensing, visual, and global learning style. This interaction can be used to improve the student model. Systems which are able to detect either only cognitive traits or only learning styles retrieve additional information through the identified relationship. Otherwise, for systems that already incorporate learning styles and cognitive traits, the interaction can be used to improve the detection process of both by including the additional information of a learning style into the detection process of cognitive traits and vice versa. This leads to a more reliable student model.  相似文献   
89.
In this paper, by using the concept of (A,η)-accretive mappings and the new resolvent operator technique associated with (A,η)-accretive mappings, we introduce and study a system of general mixed quasivariational inclusions involving (A,η)-accretive mappings in Banach spaces, and construct a new perturbed iterative algorithm with mixed errors for this system of nonlinear (A,η)-accretive variational inclusions in q-uniformly smooth Banach spaces. Our results improve and generalize the corresponding results of recent works.  相似文献   
90.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号