首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2108篇
  免费   183篇
  国内免费   69篇
电工技术   94篇
综合类   132篇
化学工业   406篇
金属工艺   40篇
机械仪表   97篇
建筑科学   153篇
矿业工程   38篇
能源动力   49篇
轻工业   152篇
水利工程   56篇
石油天然气   45篇
武器工业   10篇
无线电   193篇
一般工业技术   238篇
冶金工业   51篇
原子能技术   101篇
自动化技术   505篇
  2024年   1篇
  2023年   17篇
  2022年   32篇
  2021年   66篇
  2020年   46篇
  2019年   38篇
  2018年   53篇
  2017年   56篇
  2016年   67篇
  2015年   116篇
  2014年   112篇
  2013年   107篇
  2012年   127篇
  2011年   205篇
  2010年   90篇
  2009年   141篇
  2008年   155篇
  2007年   165篇
  2006年   113篇
  2005年   86篇
  2004年   95篇
  2003年   98篇
  2002年   64篇
  2001年   55篇
  2000年   49篇
  1999年   21篇
  1998年   17篇
  1997年   25篇
  1996年   16篇
  1995年   17篇
  1994年   10篇
  1993年   15篇
  1992年   16篇
  1991年   14篇
  1990年   4篇
  1989年   8篇
  1988年   4篇
  1987年   8篇
  1986年   5篇
  1985年   7篇
  1984年   10篇
  1982年   1篇
  1981年   1篇
  1978年   2篇
  1977年   1篇
  1974年   1篇
  1972年   3篇
排序方式: 共有2360条查询结果,搜索用时 234 毫秒
51.
In an organization operating in the bancassurance sector we identified a low-risk IT subportfolio of 84 IT projects comprising together 16,500 function points, each project varying in size and duration, for which we were able to quantify its requirements volatility. This representative portfolio stems from a much larger portfolio of IT projects. We calculated the volatility from the function point countings that were available to us. These figures were aggregated into a requirements volatility benchmark. We found that maximum requirements volatility rates depend on size and duration, which refutes currently known industrial averages. For instance, a monthly growth rate of 5% is considered a critical failure factor, but in our low-risk portfolio we found more than 21% of successful projects with a volatility larger than 5%. We proposed a mathematical model taking size and duration into account that provides a maximum healthy volatility rate that is more in line with the reality of low-risk IT portfolios. Based on the model, we proposed a tolerance factor expressing the maximal volatility tolerance for a project or portfolio. For a low-risk portfolio its empirically found tolerance is apparently acceptable, and values exceeding this tolerance are used to trigger IT decision makers. We derived two volatility ratios from this model, the π-ratio and the ρ-ratio. These ratios express how close the volatility of a project has approached the danger zone when requirements volatility reaches a critical failure rate. The volatility data of a governmental IT portfolio were juxtaposed to our bancassurance benchmark, immediately exposing a problematic project, which was corroborated by its actual failure. When function points are less common, e.g. in the embedded industry, we used daily source code size measures and illustrated how to govern the volatility of a software product line of a hardware manufacturer. With the three real-world portfolios we illustrated that our results serve the purpose of an early warning system for projects that are bound to fail due to excessive volatility. Moreover, we developed essential requirements volatility metrics that belong on an IT governance dashboard and presented such a volatility dashboard.  相似文献   
52.
A multi-objective controller synthesis problem is considered in which an output is to be regulated approximately by assuring a bound on the steady-state peak amplification in response to an infinite-energy disturbance, while also guaranteeing a desired level of performance measured in terms of the worst-case energy gain from a finite-energy input to a performance output. Relying on a characterization of the controllers with which almost asymptotic regulation is accomplished, the problem of guaranteeing the desired level of performance is reduced to solving a system of linear matrix inequalities subject to a set of linear equality constraints. Based on the solution of this system, a procedure is outlined for the construction of a suitable controller whose order is equal to the order of the plant plus the order of the exogenous system.  相似文献   
53.
control with limited communication and message losses   总被引:2,自引:0,他引:2  
We propose an H approach to a remote control problem where the communication is constrained due to the use of a shared channel. The controller employs a periodic time sequencing scheme for message transmissions from multiple sensors and to multiple actuators of the system. It further takes into account the information on the random message losses that occur in the channel. An exact characterization for controller synthesis is obtained and is stated in terms of linear matrix inequalities. Furthermore, an analysis on the loss probabilities of the messages to accomplish stabilization is carried out. The results are illustrated through a numerical example.  相似文献   
54.
In this paper, by using the concept of (A,η)-accretive mappings and the new resolvent operator technique associated with (A,η)-accretive mappings, we introduce and study a system of general mixed quasivariational inclusions involving (A,η)-accretive mappings in Banach spaces, and construct a new perturbed iterative algorithm with mixed errors for this system of nonlinear (A,η)-accretive variational inclusions in q-uniformly smooth Banach spaces. Our results improve and generalize the corresponding results of recent works.  相似文献   
55.
In many cases nanostructures present forbidden spots in their electron diffraction patterns when they are observed by transmission electron microscopy (TEM). To interpret their TEM and high resolution transmission electron microscopy (HRTEM) images properly, an understanding of the origin of these spots is necessary. In this work we comment on the origin of the forbidden spots observed in the [111] and [112] electron diffraction patterns of flat gold triangular nanoparticles. The forbidden spots were successfully indexed as corresponding to the first laue Zone (FOLZ) and the HRTEM images presented a contrast produced by the interference of the zero-order Laue zone (ZOLZ) and FOLZ spots. We discuss the use of the forbidden spots in the study of the structure of nanoparticles and show that they are related to the shape and incompleteness of layers in the very thin particles.  相似文献   
56.
A modern problem from aerospace control involves the certification of a large set of potential controllers with either a single plant or a fleet of potential plant systems, with both plants and controllers being MIMO and, for the moment, linear. Experiments on a limited number of controller/plant pairs should establish the stability and a certain level of margin of the complete set. We consider this certification problem for a set of controllers and provide algorithms for selecting an efficient subset for testing. This is done for a finite set of candidate controllers and, at least for SISO plants, for compact infinite set. In doing this, the ν-gap metric will be the main tool. Computational examples are given, including one of certification of an aircraft engine controller. The overarching aim is to introduce truly MIMO margin calculations and to understand their efficacy in certifying stability over a set of controllers and in replacing legacy single-loop gain and phase margin calculations.  相似文献   
57.
Jun  Gang  Sheng  Jian   《Automatica》2008,44(12):3093-3099
A novel optimal Finite Word Length (FWL) controller design is proposed in the framework of μ theory. A computationally tractable close-loop stability measure with FWL implementation considerations of the controller is derived based on the μ theory, and the optimal FWL controller realizations are obtained by solving the resulting optimal FWL realization problem using linear matrix inequality techniques.  相似文献   
58.
All-d Heuslers are a category of novel compounds combining versatile functionalities such as caloric responses and spintronics with enhanced mechanical properties. Despite the promising transport properties (anomalous Hall (AHC) and anomalous Nernst (ANC) conductivities) shown in the conventional Co2XY Heuslers with p-d hybridization, the all-d Heuslers with only d-d hybridization open a new horizon to search for new candidates with outstanding transport properties. In this work, the AHC and ANC are evaluated for thermodynamically stable ferro/ferri-magnetic all-d-metal regular Heusler compounds based on high-throughput first-principles calculations. It is observed that quite a few materials exhibit giant AHCs and ANCs, such as cubic Re2TaMn with an AHC of 2011 S cm-1, and tetragonal Pt2CrRh with an AHC of 1966 S cm-1 and an ANC of 7.50 A m-1K-1. Comprehensive analysis on the electronic structure reveals that the high AHC can be attributed to the occurrence of the Weyl nodes or gapped nodal lines in the neighborhood of the Fermi level. The correlations between such transport properties and the number of valence electrons are also thoroughly investigated, which provides a practical guidance to tailor AHC and ANC via chemical doping for transverse thermoelectric applications.  相似文献   
59.
对于原始麻雀搜索算法(SSA)在迭代过程中表现出的种群多样性减小,易陷入局部最优等问题,提出一种融合多向学习的混沌麻雀搜索算法(MSSA)。利用Hénon混沌映射初始化种群,增加麻雀种群的多样性,扩大可行解的搜索范围,为全局寻优奠定基础;采用多向学习策略增加麻雀跟随者探索未知领域的机会,平衡算法的局部开发性能和全局搜索能力;当算法陷入局部最优时,引用遗传算法中的变异策略依据动态的变异概率对当前最优个体进行扰动变异;将MSSA算法应用到无线传感器网络节点覆盖优化问题。数值实验结果与Wilcoxon秩和检验结果均表明MSSA算法在收敛精度与收敛速度等方面具有更明显的优势。  相似文献   
60.
针对高光谱遥感图像,提出了一种约束空间光谱的亚像素定位方法。传统的亚像素定位方法以解混的结果作为输入,可能无法充分利用高光谱图像丰富的光谱信息。本文所提出的基于约束空间光谱联合的亚像素定位方法(constraint spatial-spectral subpixel mapping,CSSSM),利用下采样将像素丰度与亚像素丰度显式联系起来,代入线性解混模型得到亚像素丰度求解的新模型。在求解过程中,通过添加稀疏性约束与平滑性约束,以限制亚像素丰度的解空间,亚像素丰度求解更精确。其中,针对亚像素丰度稀疏性先验采用重加权1范数作为新的约束,并自适应地更新权重;针对亚像素丰度空间先验信息则采用全变分(total variational,TV)正则化作为约束,然后使用乘法迭代算法求解亚像素丰度,最后利用赢者通吃的策略进行类别确定。在两个合成数据集上进行了实验,结果表明,本方法能够进一步提高亚像素定位的精度。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号