首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   18425篇
  免费   579篇
  国内免费   165篇
电工技术   257篇
综合类   7篇
化学工业   1864篇
金属工艺   746篇
机械仪表   629篇
建筑科学   212篇
能源动力   402篇
轻工业   627篇
水利工程   48篇
石油天然气   19篇
无线电   2042篇
一般工业技术   1911篇
冶金工业   671篇
原子能技术   233篇
自动化技术   9501篇
  2023年   103篇
  2022年   53篇
  2021年   274篇
  2020年   211篇
  2019年   191篇
  2018年   244篇
  2017年   266篇
  2016年   312篇
  2015年   224篇
  2014年   542篇
  2013年   707篇
  2012年   1306篇
  2011年   3709篇
  2010年   1604篇
  2009年   1492篇
  2008年   1130篇
  2007年   941篇
  2006年   768篇
  2005年   867篇
  2004年   794篇
  2003年   808篇
  2002年   520篇
  2001年   214篇
  2000年   205篇
  1999年   217篇
  1998年   389篇
  1997年   203篇
  1996年   141篇
  1995年   96篇
  1994年   102篇
  1993年   81篇
  1992年   48篇
  1991年   60篇
  1990年   47篇
  1989年   37篇
  1988年   36篇
  1987年   35篇
  1986年   28篇
  1985年   19篇
  1984年   35篇
  1983年   25篇
  1982年   15篇
  1981年   20篇
  1980年   8篇
  1979年   6篇
  1977年   10篇
  1976年   10篇
  1975年   3篇
  1974年   5篇
  1971年   2篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
71.
It is essential to automate the scanning path generation process to effectively implement the micro-stereolithography. However, a scanning path that is generated based only on a 3D CAD model introduces dimensional inaccuracies. In micro-stereolithography, the photopolymer solidification is affected by fabrication conditions, such as the optical properties (laser power, laser scanning speed, laser scanning pitch focusing condition, etc.) and material properties of the photopolymer. Thus, the photopolymer solidification phenomena must be considered when generating a laser scanning path. In this paper, a scanning path generation algorithm that uses 3D CAD data and considers the photopolymer solidification phenomena is proposed to improve the dimensional accuracy in micro-stereolithography. Multi-line photopolymer solidification experiments were performed for various laser scanning conditions to examine the photopolymer solidification phenomena. From these experiments, linear relations between the solidification length (width) and scanning length (width) were acquired and stored in a database. Subsequently, these data were utilized to compensate the scanning path of the laser beam. In addition, experiments for determining the layer thickness in the z-direction were performed and these results were also used in the scanning path generation algorithm.This research was supported by the Highly Advanced National Project (http://www.most.go.kr), which performs some of the National R&D Program, and sponsored by the Korean Ministry of Science and Technology under the contract project code M10214000116-02B1500-02010.  相似文献   
72.
A two-stage algorithm for identification of nonlinear dynamic systems   总被引:1,自引:0,他引:1  
This paper investigates the two-stage stepwise identification for a class of nonlinear dynamic systems that can be described by linear-in-the-parameters models, and the model has to be built from a very large pool of basis functions or model terms. The main objective is to improve the compactness of the model that is obtained by the forward stepwise methods, while retaining the computational efficiency. The proposed algorithm first generates an initial model using a forward stepwise procedure. The significance of each selected term is then reviewed at the second stage and all insignificant ones are replaced, resulting in an optimised compact model with significantly improved performance. The main contribution of this paper is that these two stages are performed within a well-defined regression context, leading to significantly reduced computational complexity. The efficiency of the algorithm is confirmed by the computational complexity analysis, and its effectiveness is demonstrated by the simulation results.  相似文献   
73.
In this paper, we present design features, implementation, and validation of a satellite simulator subsystem for the Korea Multi‐Purpose Satellite‐2 (KOMPSAT‐2). The satellite simulator subsystem is implemented on a personal computer to minimize costs and trouble on embedding onboard flight software into the simulator. An object‐oriented design methodology is employed to maximize software reusability. Also, instead of a high‐cost commercial database, XML is used for the manipulation of spacecraft characteristics data, telecommand, telemetry, and simulation data. The KOMPSAT‐2 satellite simulator subsystem is validated by various simulations for autonomous onboard launch and early orbit phase operations, anomaly operation, and science fine mode operation. It is also officially verified by successfully passing various tests such as the satellite simulator subsystem test, mission control element system integration test, interface test, site installation test, and acceptance test.  相似文献   
74.
The selection of valuable features is crucial in pattern recognition. In this paper we deal with the issue that part of features originate from directional instead of common linear data. Both for directional and linear data a theory for a statistical modeling exists. However, none of these theories gives an integrated solution to problems, where linear and directional variables are to be combined in a single, multivariate probability density function. We describe a general approach for a unified statistical modeling, given the constraint that variances of the circular variables are small. The method is practically evaluated in the context of our online handwriting recognition system frog on hand and the so-called tangent slope angle feature. Recognition results are compared with two alternative modeling approaches. The proposed solution gives significant improvements in recognition accuracy, computational speed and memory requirements.  相似文献   
75.
The Apollonius Tenth Problem, as defined by Apollonius of Perga circa 200 B.C., has been useful for various applications in addition to its theoretical interest. Even though particular cases have been handled previously, a general framework for the problem has never been reported. Presented in this paper is a theory to handle the Apollonius Tenth Problem by characterizing the spatial relationship among given circles and the desired Apollonius circles. Hence, the given three circles in this paper do not make any assumption regarding on the sizes of circles and the intersection/inclusion relationship among them. The observations made provide an easy-to-code algorithm to compute any desired Apollonius circle which is computationally efficient and robust.  相似文献   
76.
Years have lapsed since the inauguration of the first Wireless Application Protocol (WAP) application. One of the main reasons for the lukewarm response so far may be attributed to the lack of a “Killer” application. Many companies and developers have attempted to replicate email services (an Internet Killer appplication) within the WAP realm, but till now, no significant success has been reported. This paper will first discuss on the key functions which are lacking in the present WAP-email service, and which are arguably necessary if a much larger user base is to be attracted to these services. A new system will be proposed which can enable the user to send files residing in a remote personal computer (PC) as attachments to his emails using WAP-enabled mobile devices. The implementation of the system will be presented in details. Issue relating to the connection to various types of email servers and the security of the system will also be addressed in the paper.  相似文献   
77.
Until now, in many forensic reports, the failure cause assessments are usually carried out by a deterministic approach so far. However, it may be possible for the forensic investigation to lead to unreasonable results far from the real collapse scenario, because the deterministic approach does not systematically take into account any information on the uncertainties involved in the failures of structures.Reliability-based failure cause assessment (reliability-based forensic engineering) methodology is developed which can incorporate the uncertainties involved in structural failures and structures, and to apply them to the collapsed bridge in order to identify the most critical failure scenario and find the cause that triggered the bridge collapse. Moreover, to save the time and cost of evaluation, an algorithm of automated event tree analysis (ETA) is proposed and possible to automatically calculate the failure probabilities of the failure events and the occurrence probabilities of failure scenarios. Also, for reliability analysis, uncertainties are estimated more reasonably by using the Bayesian approach based on the experimental laboratory testing data in the forensic report. For the applicability, the proposed approach is applied to the Hang-ju Grand Bridge, which collapsed during construction, and compared with deterministic approach.  相似文献   
78.
79.
Guest Editors' Introduction: Social Media and Search   总被引:1,自引:0,他引:1  
The past few years have seen a rapid rise in social media Web sites. As user content becomes the dominant content form on the Web, various questions arise about the most effective approach to processing it.  相似文献   
80.
The certainty equivalence approach to adaptive control is commonly used with two types of identifiers: passivity-based identifiers and swapping identifiers. The “passive” (also known as “observer-based”) approach is the prevalent identification technique in existing results on adaptive control for PDEs but has so far not been used in boundary control problems. The swapping approach, prevalent in finite-dimensional adaptive control is employed here for the first time in adaptive control of PDEs. For a class of unstable parabolic PDEs we prove a separation principle result for both the passive and swapping identifiers combined with the backstepping boundary controllers. The result is applicable in any dimension. For physical reasons we restrict our attention to dimensions no higher than three. The results of the paper are illustrated by simulations.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号