首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6484篇
  免费   296篇
  国内免费   379篇
电工技术   81篇
技术理论   8篇
综合类   830篇
化学工业   658篇
金属工艺   98篇
机械仪表   184篇
建筑科学   517篇
矿业工程   183篇
能源动力   127篇
轻工业   300篇
水利工程   102篇
石油天然气   65篇
武器工业   1025篇
无线电   627篇
一般工业技术   678篇
冶金工业   535篇
原子能技术   42篇
自动化技术   1099篇
  2024年   11篇
  2023年   58篇
  2022年   86篇
  2021年   124篇
  2020年   121篇
  2019年   98篇
  2018年   84篇
  2017年   330篇
  2016年   344篇
  2015年   336篇
  2014年   449篇
  2013年   353篇
  2012年   309篇
  2011年   514篇
  2010年   383篇
  2009年   442篇
  2008年   336篇
  2007年   421篇
  2006年   409篇
  2005年   307篇
  2004年   246篇
  2003年   251篇
  2002年   198篇
  2001年   173篇
  2000年   164篇
  1999年   125篇
  1998年   71篇
  1997年   59篇
  1996年   49篇
  1995年   33篇
  1994年   47篇
  1993年   23篇
  1992年   19篇
  1991年   14篇
  1990年   22篇
  1989年   21篇
  1988年   10篇
  1986年   12篇
  1985年   6篇
  1984年   7篇
  1982年   5篇
  1970年   5篇
  1967年   4篇
  1966年   6篇
  1965年   5篇
  1964年   9篇
  1963年   5篇
  1961年   5篇
  1960年   5篇
  1955年   6篇
排序方式: 共有7159条查询结果,搜索用时 203 毫秒
91.
本文以高等院校为联系纽带,将其置身于经济欠发达地区的大环境中,探讨信息网的作用、建立与运作,政府的政策引导,招商引资与高校学生的创业,职高学生的就业有机结合,通过"教研结合,校企合一"的办学模式以及开放教科研设备、开展各种培训等方式,将高校与各界各业联系起来,使之成为中心城市的联络、辐射中心,为贫困地区如何发挥高职院校的作用提供新思路。  相似文献   
92.
云模型是实现定性概念与定量表示之间不确定性转换的模型,它把模糊性和随机性有机结合起来。本文提出了一种基于云模型的科技奖励评审模型,利用云模型客观描述项目的评分在各属性下的分布情况,通过计算云模型参数来确定云模型数字特征图或云滴分布情况,并以此确定最后等级。结果表明,该模型能够解决项目单一属性分类及非共识等问题,同时能够客观地反映出项目实际综合评审结果,从而使得评审更加公平合理。  相似文献   
93.
计算机专业实验室承担计算机各专业实验教学的需要,如何高效的维护好计算机专业实验室,使实验室的设备能充分合理的利用,更好的实现教学做一体的环境。本文通过实验室主要方面的维护浅析和总结,使实验室的维护工作更加的合理、高效。  相似文献   
94.
现有的大多数本体都是通过手工构建的。本体的构建是一项费时费力的过程,特别在医学领域更是如此。对此,提出了基于中文分词和文本挖掘技术的自动领域本体构建方法,该方法能大大提高本体构建的效率,保证本体的构建质量。  相似文献   
95.
离散数学课程中实践环节教学的探讨   总被引:1,自引:0,他引:1  
徐凤生 《计算机时代》2010,(9):64-65,68
在分析离散数学课程教学现状的基础上,论述了在该课程教学中加强实践环节的必要性,并就如何在离散数学课程中开展实验教学进行了深入探讨。多年的教学实践证明,在离散数学课程中加强实践环节,有助于培养学生理论与实际相结合的能力。  相似文献   
96.
In this survey article, we first introduce the concept of quasi-coincidence of a fuzzy interval value with an interval valued fuzzy set. This concept is a generalized concept of quasi-coincidence of a fuzzy point within a fuzzy set. By using this new idea, we consider the interval valued (∈,∈q)-fuzzy sub-hypernear-rings (hyperideals) of a hypernear-ring, and hence, a generalization of a fuzzy sub-near-ring (ideal) is given. Some related properties of fuzzy hypernear-rings are described. Finally, we consider the concept of implication-based interval valued fuzzy sub-hypernear-rings (hyperideals) in a hypernear-ring, in particular, the implication operators in Lukasiewicz system of continuous-valued logic are discussed.  相似文献   
97.
This paper studies the problem of state feedback control of continuous-time T-S fuzzy systems. Switched fuzzy controllers are exploited in the control design, which are switched based on the values of membership functions, and the control scheme is an extension of the parallel distributed compensation (PDC) scheme. Sufficient conditions for designing switched state feedback controllers are obtained with meeting an H norm bound requirement and quadratic D stability constraints. It is shown that the new control design method provides less conservative results than the corresponding ones via the parallel distributed compensation (PDC) scheme. A numerical example is given to illustrate the effectiveness of the proposed method.  相似文献   
98.
Suboptimal robust synthesis for MIMO nominal system under coprime factor perturbations is considered in classical and non-classical statements. In the classical statement, weights of perturbations and upper bound on magnitude bounded exogenous disturbance are assumed to be known to controller designer. Suboptimal synthesis within ε tolerance is reduced to the solution of log2(1/ε) standard mixed sensitivity problems of ℓ1 optimization. In the non-classical statement, the upper bounds on perturbations and exogenous disturbance are to be estimated from measurement data and suboptimal synthesis is reduced to the solution of 1/ε mixed sensitivity problems.  相似文献   
99.
In an organization operating in the bancassurance sector we identified a low-risk IT subportfolio of 84 IT projects comprising together 16,500 function points, each project varying in size and duration, for which we were able to quantify its requirements volatility. This representative portfolio stems from a much larger portfolio of IT projects. We calculated the volatility from the function point countings that were available to us. These figures were aggregated into a requirements volatility benchmark. We found that maximum requirements volatility rates depend on size and duration, which refutes currently known industrial averages. For instance, a monthly growth rate of 5% is considered a critical failure factor, but in our low-risk portfolio we found more than 21% of successful projects with a volatility larger than 5%. We proposed a mathematical model taking size and duration into account that provides a maximum healthy volatility rate that is more in line with the reality of low-risk IT portfolios. Based on the model, we proposed a tolerance factor expressing the maximal volatility tolerance for a project or portfolio. For a low-risk portfolio its empirically found tolerance is apparently acceptable, and values exceeding this tolerance are used to trigger IT decision makers. We derived two volatility ratios from this model, the π-ratio and the ρ-ratio. These ratios express how close the volatility of a project has approached the danger zone when requirements volatility reaches a critical failure rate. The volatility data of a governmental IT portfolio were juxtaposed to our bancassurance benchmark, immediately exposing a problematic project, which was corroborated by its actual failure. When function points are less common, e.g. in the embedded industry, we used daily source code size measures and illustrated how to govern the volatility of a software product line of a hardware manufacturer. With the three real-world portfolios we illustrated that our results serve the purpose of an early warning system for projects that are bound to fail due to excessive volatility. Moreover, we developed essential requirements volatility metrics that belong on an IT governance dashboard and presented such a volatility dashboard.  相似文献   
100.
A multi-objective controller synthesis problem is considered in which an output is to be regulated approximately by assuring a bound on the steady-state peak amplification in response to an infinite-energy disturbance, while also guaranteeing a desired level of performance measured in terms of the worst-case energy gain from a finite-energy input to a performance output. Relying on a characterization of the controllers with which almost asymptotic regulation is accomplished, the problem of guaranteeing the desired level of performance is reduced to solving a system of linear matrix inequalities subject to a set of linear equality constraints. Based on the solution of this system, a procedure is outlined for the construction of a suitable controller whose order is equal to the order of the plant plus the order of the exogenous system.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号