首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3208篇
  免费   345篇
  国内免费   184篇
电工技术   534篇
技术理论   1篇
综合类   288篇
化学工业   251篇
金属工艺   63篇
机械仪表   177篇
建筑科学   328篇
矿业工程   229篇
能源动力   64篇
轻工业   145篇
水利工程   114篇
石油天然气   214篇
武器工业   24篇
无线电   301篇
一般工业技术   211篇
冶金工业   83篇
原子能技术   19篇
自动化技术   691篇
  2024年   3篇
  2023年   37篇
  2022年   62篇
  2021年   113篇
  2020年   92篇
  2019年   77篇
  2018年   58篇
  2017年   94篇
  2016年   99篇
  2015年   118篇
  2014年   204篇
  2013年   202篇
  2012年   260篇
  2011年   276篇
  2010年   216篇
  2009年   208篇
  2008年   184篇
  2007年   240篇
  2006年   205篇
  2005年   153篇
  2004年   128篇
  2003年   108篇
  2002年   94篇
  2001年   84篇
  2000年   70篇
  1999年   62篇
  1998年   47篇
  1997年   47篇
  1996年   30篇
  1995年   35篇
  1994年   21篇
  1993年   19篇
  1992年   17篇
  1991年   6篇
  1990年   17篇
  1989年   3篇
  1988年   9篇
  1987年   5篇
  1986年   4篇
  1985年   5篇
  1984年   7篇
  1983年   9篇
  1982年   1篇
  1981年   2篇
  1980年   1篇
  1979年   1篇
  1978年   1篇
  1976年   1篇
  1975年   1篇
  1974年   1篇
排序方式: 共有3737条查询结果,搜索用时 359 毫秒
1.
Harmonic elimination pulse width modulation (HEPWM) method has been widely applied to multilevel voltage source inverter (MVSI) to remove low frequency harmonics from its output voltage. However, the computation of the HEPWM switching angles for MVSI is very challenging due to several constraints, namely angle sequencing, very tight angular spacing and the numerous possibilities of angles distribution ratio. Realizing the potential of Differential Evolution (DE) to handle complex problems, this work proposes its application to solve the HEPWM problem for cascaded MVSI. Its emphasis is on improving the availability of HEPWM for higher output voltage by extending the maximum range of modulation index (M). It also removes the discontinuities in the switching angles and reduces the number of distribution ratio required to obtain the required solution. Compared to the most advanced (similar) work, i.e., 7-level MVSI with seventeen switching angles, DE covers a wider range of M; the maximum achievable M is 2.80. Furthermore, it exhibits very low second order distortion factor (DF2): for the worst case, the value of DF2 is 0.0014%. To verify the viability of the proposed algorithm, simulation is carried out and hardware prototype is constructed. Both results show very good agreement with the theoretical prediction.  相似文献   
2.
ObjectiveTraffic collisions yield a substantial rate of morbidity and injury among child-pedestrians. We explored the formation of an innovative hazard perception training intervention – Child-pedestrians Anticipate and Act Hazard Perception Training (CA2HPT). Training was based upon enhancing participants’ ability to anticipate potential hazards by exposing them to an array of traffic scenes viewed from different angles.MethodTwenty-four 7–9-year-olds have participated. Trainees underwent a 40-min intervention of observing typical residential traffic scenarios in a simulated dome projection environment while engaging in a hazard detection task. Trainees were encouraged to note differences between the scenarios presented to them from separate angles (a pedestrian's point-of-view and a higher perspective angle). Next, trainees and control group members were required to perform crossing decision tasks.ResultsTrainees were found to be more aware of potential hazards related to restricted field of view relative to control.ConclusionsChild pedestrians are responsive to training and actively detecting materialized hazards may enrich child-pedestrians’ ability to cross roads.  相似文献   
3.
利用工作面高抽巷施工掩护顺槽掘进工作面下向穿层条带预抽钻孔,通过对钻场底板深、浅孔注浆封堵围岩裂隙解决了孔内返水不畅难题;采取了"两堵一注"封孔方式确保封孔严密不漏气;孔内全程下吹水管,实现了单孔、分组、定时吹水工作目标,提高了下向消突钻孔抽采效果,形成了一套高效、快速的下向穿层钻孔消突管理模式,实现了高地压严重突出区域煤层高效消突以及技术经济一体化目标,安全经济效益显著。  相似文献   
4.
忠武输气管道有4次悬索跨越,分别是蚂蝗溪悬索跨越、木龙河悬索跨越、马水河悬索跨越、野三河悬索跨越。文章介绍了这几座悬索跨越管桥设计中采用的多项新技术,如采用热聚乙烯半平行钢丝索代替以往的钢丝绳;采用钢管塔架代替以往的角钢塔架;根据地形地貌特点变换风索型式或取消塔架等。这些新技术、新设计在工程中均取得了良好的效果。另外,文章还针对悬索跨越桥面结构型式、预拱度设置、不对称荷载的影响、风索基础的设置等问题进行了探讨。  相似文献   
5.
提出挖金湾矿近距离煤层联合布置开采方案,并对开采方案的技术难点进行了分析,找出了解决方法。  相似文献   
6.
文中介绍了预应力钢筒混凝土管的概念、优越性,并结合山西省万家寨联接段引黄工程的实际施工,总结出了穿越各种地下管线的施工经验。  相似文献   
7.
We present a new algorithm, called MCS-M, for computing minimal triangulations of graphs. Lex-BFS, a seminal algorithm for recognizing chordal graphs, was the genesis for two other classical algorithms: LEX M and MCS. LEX M extends the fundamental concept used in Lex-BFS, resulting in an algorithm that not only recognizes chordality, but also computes a minimal triangulation of an arbitrary graph. MCS simplifies the fundamental concept used in Lex-BFS, resulting in a simpler algorithm for recognizing chordal graphs. The new algorithm MCS-M combines the extension of LEX M with the simplification of MCS, achieving all the results of LEX M in the same time complexity.  相似文献   
8.
基于准十字窗口的中值滤波法在红外图像处理中的应用   总被引:2,自引:1,他引:1  
中值滤波法是图像处理中一种非线性滤波技术,可对图像中的噪声进行有效的抑制,成为空域平滑的重要手段。针对中值滤波法的不足,提出一种基于准十字窗口的中值滤波方法。给出了抑制噪声、对图像边界最大保留的计算方法和运算步骤。并将其用于某型飞机实际红外图像处理实践,利用空间噪声曲线对该方法进行了验证。实践证明了其方法具有简单有效、易于编程实现、迭代性好、计算速度快的特点。  相似文献   
9.
We present a method based on extended linear real quantifier elimination for multiple object semilinear motion planning, i.e. finding collision-free trajectories for several robots in a time dependent environment. For practical applicability the method is limited to polygonal objects and linear trajectories. It can, however, deal with situations involving even non-convex objects.  相似文献   
10.
Single-assignment and functional languages have value semantics that do not permit side-effects. This lack of side-effects makes automatic detection of parallelism and optimization for data locality in programs much easier. However, the same property poses a challenge in implementing these languages efficiently. This paper describes an optimizing compiler system that solves the key problem of aggregate copy elimination. The methods developed rely exclusively on compile-time algorithms, including interprocedural analysis, that are applied to an intermediate data flow representation. By dividing the problem into update-in-place and build-in-place analysis, a small set of relatively simple techniques—edge substitution, graph pattern matching, substructure sharing and substructure targeting—was found to be very powerful. If combined properly and implemented carefully, the algorithms eliminate unnecessary copy operations to a very high degree. No run-time overhead is imposed on the compiled programs.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号