首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2275篇
  免费   140篇
  国内免费   17篇
电工技术   32篇
综合类   3篇
化学工业   526篇
金属工艺   46篇
机械仪表   37篇
建筑科学   61篇
矿业工程   4篇
能源动力   110篇
轻工业   143篇
水利工程   14篇
石油天然气   13篇
无线电   262篇
一般工业技术   544篇
冶金工业   165篇
原子能技术   3篇
自动化技术   469篇
  2023年   39篇
  2022年   73篇
  2021年   93篇
  2020年   97篇
  2019年   109篇
  2018年   133篇
  2017年   120篇
  2016年   116篇
  2015年   79篇
  2014年   103篇
  2013年   181篇
  2012年   139篇
  2011年   161篇
  2010年   121篇
  2009年   103篇
  2008年   110篇
  2007年   77篇
  2006年   66篇
  2005年   59篇
  2004年   43篇
  2003年   37篇
  2002年   32篇
  2001年   26篇
  2000年   24篇
  1999年   17篇
  1998年   32篇
  1997年   31篇
  1996年   22篇
  1995年   20篇
  1994年   17篇
  1993年   19篇
  1992年   12篇
  1991年   6篇
  1990年   13篇
  1989年   5篇
  1988年   8篇
  1987年   6篇
  1985年   9篇
  1984年   3篇
  1983年   11篇
  1982年   4篇
  1981年   5篇
  1980年   3篇
  1979年   3篇
  1978年   4篇
  1977年   3篇
  1976年   10篇
  1975年   9篇
  1974年   7篇
  1973年   4篇
排序方式: 共有2432条查询结果,搜索用时 31 毫秒
81.
This paper is concerned with the problem of non-fragile robust optimal guaranteed cost control for a class of uncertain two-dimensional (2-D) discrete state-delayed systems described by the general model with norm-bounded uncertainties. Our attention is focused on the design of non-fragile state feedback controllers such that the resulting closed-loop system is asymptotically stable and the closed-loop cost function value is not more than a specified upper bound for all admissible parameter uncertainties and controller gain variations. A sufficient condition for the existence of such controllers is established under the linear matrix inequality framework. Moreover, a convex optimisation problem is proposed to select a non-fragile robust optimal guaranteed cost controller stabilising the 2-D discrete state-delayed system as well as achieving the least guaranteed cost for the resulting closed-loop system. The proposed method is compared with the previously reported criterion. Finally, illustrative examples are given to show the potential of the proposed technique.  相似文献   
82.
The accurate and early detection of epileptic seizures in continuous electroencephalographic (EEG) data has a growing role in the management of patients with epilepsy. Early detection allows for therapy to be delivered at the start of seizures and for caregivers to be notified promptly about potentially debilitating events. The challenge to detecting epileptic seizures, however, is that seizure morphologies exhibit considerable inter-patient and intra-patient variability. While recent work has looked at addressing the issue of variations across different patients (inter-patient variability) and described patient-specific methodologies for seizure detection, there are no examples of systems that can simultaneously address the challenges of inter-patient and intra-patient variations in seizure morphology. In our study, we address this complete goal and describe a multi-task learning approach that trains a classifier to perform well across many kinds of seizures rather than potentially overfitting to the most common seizure types. Our approach increases the generalizability of seizure detection systems and improves the tradeoff between latency and sensitivity versus false positive rates. When compared against the standard approach on the CHB–MIT multi-channel scalp EEG data, our proposed method improved discrimination between seizure and non-seizure EEG for almost 83 % of the patients while reducing false positives on nearly 70 % of the patients studied.  相似文献   
83.
To protect the remote server from various malicious attacks, many authentication schemes have been proposed. Some schemes have to maintain a password verification table in the remote server for checking the legitimacy of the login users. To overcome potential risks of verification tables, researchers proposed remote user authentication schemes using smartcard, in which the remote server only keeps a secret key for computing the user’s passwords and does not need any verification table for verifying legal user. In 2003 Shen, Lin, and Hwang proposed a timestamp-based password authentication scheme using smartcards in which the remote server does not need to store the passwords or verification table for user authentication. Unfortunately, this scheme is vulnerable to some deadly attacks. In this paper, we analyze few attacks and finally propose an improved timestamp-based remote user authentication scheme. The modified scheme is more efficient and secure than original scheme.  相似文献   
84.
There has been an explosion in the types, availability and volume of data accessible in an information system, thanks to the World Wide Web (the Web) and related inter-networking technologies. In this environment, there is a critical need to replace or complement earlier database integration approaches and current browsing and keyword-based techniques with concept-based approaches. Ontologies are increasingly becoming accepted as an important part of any concept or semantics based solution, and there is increasing realization that any viable solution will need to support multiple ontologies that may be independently developed and managed. In particular, we consider the use of concepts from pre-existing real world domain ontologies for describing the content of the underlying data repositories. The most challenging issue in this approach is that of vocabulary sharing, which involves dealing with the use of different terms or concepts to describe similar information. In this paper, we describe the architecture, design and implementation of the OBSERVER system. Brokering across the domain ontologies is enabled by representing and utilizing interontology relationships such as (but not limited to) synonyms, hyponyms and hypernyms across terms in different ontologies. User queries are rewritten by using these relationships to obtain translations across ontologies. Well established metrics like precision and recall based on the extensions underlying the concepts are used to estimate the loss of information, if any.  相似文献   
85.
Fructose-2,6-bisphosphatase (FBPase-2) is a switch between gluconeogenesis and glycolysis in the hepatic cells. The structural features required for inhibitory activity of FBPase-2 were unidentified; no leads are available for inhibiting this important enzyme. In this paper pharmacophore mapping, molecular docking methods were employed in a virtual screening strategy to identify leads for FBPase-2. A receptor based pharmacophore map was modeled which comprised of important interactions as observed in co-crystal of rat liver isozyme with the product inhibitor fructose-6-phosphate. The pharmacophore model was validated against two databases of best docked structural analogues of fructose-2,6-bisphosphate and fructose-6-phosphate. The query generated was submitted for flexible search of ligands in chemical databases, namely LeadQuest, Maybridge and NCI. The hits obtained were further screened by molecular docking using FlexX.  相似文献   
86.
At the central energy management center in a power system, the real time controls continuously track the load changes and endeavor to match the total power demand with total generation in such a manner that the operating cost is minimized while all the operating constraints are satisfied. However, due to the strict government regulations on environmental protection, operation at minimum cost is no longer the only criterion for dispatching electrical power. The idea behind the environmentally constrained economic dispatch formulation is to estimate the optimal generation schedule of generating units in such a manner that fuel cost and harmful emission levels are both simultaneously minimized for a given load demand. Conventional optimization techniques become very time consuming and computationally extensive for such complex optimization tasks. These methods are hence not suitable for on-line use. Neural networks and fuzzy systems can be trained to generate accurate relations among variables in complex non-linear dynamical environment, as both are model-free estimators. The existing synergy between these two fields has been exploited in this paper for solving the economic and environmental dispatch problem on-line. A multi-output modified neo-fuzzy neuron (NFN), capable of real time training is proposed for economic and environmental power generation allocation.This model is found to achieve accurate results and the training is observed to be faster than other popular neural networks. The proposed method has been tested on medium-sized sample power systems with three and six generating units and found to be suitable for on-line combined environmental economic dispatch (CEED).  相似文献   
87.
Previous high-temperature compression creep studies of NiAl have shown peculiar behaviour in the temperature range 700 to 900° C, which was perhaps due to precipitation of impurities in the matrix. To isolate the impurity effect, high-purity NiAl samples with 0.15 at% and 0.20 at% carbon (graphite) additions have been creep tested at four temperatures between 700 and 850° C. Addition of graphite has been shown to produce a significant reduction in the creep strength of the alloyS. However, alloys with higher graphite concentrations have shown better creep resistance than those with lower graphite concentrations. Transmission electron microscopy indicates the presence of competing softening and hardening mechanisms in the alloys. Softening is due to the graphite particles acting as a dislocation source. Hardening results from a grain-boundary hardening mechanism due to the graphite particles segregating at grain boundaries and a dislocation-impurity (fine graphite) interaction, developing a Cottrell-like atmosphere.  相似文献   
88.
Densification of Alumina and Silica in the Presence of a Liquid Phase   总被引:9,自引:0,他引:9  
Alumina and silica powders were sintered at 1250° to 1460°C in the presence of liquid phases containing CaO, A12O3, and SiO2. The data were analyzed using the equation D = K log t +C and the Arrhenius equation. The activation energy for sintering decreases with increasing amounts of liquid phase.  相似文献   
89.
Kumar et al. (Appl. Math. Model. 35:817?C823, 2011) pointed out that there is no method in literature to find the exact fuzzy optimal solution of fully fuzzy linear programming (FFLP) problems and proposed a new method to find the fuzzy optimal solution of FFLP problems with equality constraints having non-negative fuzzy variables and unrestricted fuzzy coefficients. There may exist several FFLP problems with equality constraints in which no restriction can be applied on all or some of the fuzzy variables but due to the limitation of the existing method these types of problems can not be solved by using the existing method. In this paper a new method is proposed to find the exact fuzzy optimal solution of FFLP problems with equality constraints having non-negative fuzzy coefficients and unrestricted fuzzy variables. The proposed method can also be used to solve the FFLP problems with equality constraints having non-negative fuzzy variables and unrestricted fuzzy coefficients. To show the advantage of the proposed method over existing method the results of some FFLP problems with equality constraints, obtained by using the existing and proposed method, are compared. Also, to show the application of proposed method a real life problem is solved by using the proposed method.  相似文献   
90.
一、印度钢铁工业发展历史和现状从远古时代开始,铁在人类的生活中就非常重要。无论是战争还是和平年代,钢铁对现代文明的发展是必不可少的。为了了解印度的钢铁工业,首先有必要简要地回顾一下印度的钢铁制造史。印度是一个古老的国度,文化遗产丰富。印度是一片不同地域间存在惊人差异的土地,而两百多年的殖民统治更造就了多样化的印度。除了几家糖厂和纺  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号