首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2443篇
  免费   221篇
  国内免费   137篇
电工技术   71篇
综合类   231篇
化学工业   116篇
金属工艺   34篇
机械仪表   103篇
建筑科学   75篇
矿业工程   38篇
能源动力   32篇
轻工业   31篇
水利工程   17篇
石油天然气   30篇
武器工业   35篇
无线电   319篇
一般工业技术   277篇
冶金工业   93篇
原子能技术   8篇
自动化技术   1291篇
  2023年   24篇
  2022年   34篇
  2021年   52篇
  2020年   65篇
  2019年   65篇
  2018年   51篇
  2017年   83篇
  2016年   91篇
  2015年   69篇
  2014年   136篇
  2013年   207篇
  2012年   172篇
  2011年   169篇
  2010年   130篇
  2009年   137篇
  2008年   139篇
  2007年   133篇
  2006年   134篇
  2005年   95篇
  2004年   92篇
  2003年   84篇
  2002年   78篇
  2001年   57篇
  2000年   63篇
  1999年   60篇
  1998年   33篇
  1997年   41篇
  1996年   36篇
  1995年   35篇
  1994年   23篇
  1993年   26篇
  1992年   18篇
  1991年   18篇
  1990年   24篇
  1989年   14篇
  1988年   11篇
  1987年   8篇
  1986年   9篇
  1985年   12篇
  1984年   7篇
  1983年   9篇
  1982年   8篇
  1981年   8篇
  1980年   8篇
  1979年   3篇
  1978年   4篇
  1977年   3篇
  1976年   4篇
  1973年   3篇
  1958年   2篇
排序方式: 共有2801条查询结果,搜索用时 15 毫秒
1.
As a promising and potential alternative to conventional fixed or variable speed wind turbines, continuously variable speed wind turbines (CVSWTs) with variable transmissions offer improved power efficiency and enhanced power control capabilities. The CVSWTs can be generally achieved by adapting mechatronic variable transmissions in the turbine drive train for continuously variable speed operations for wind turbines. Therefore, this paper serves to provide an up to date and exhaustive review of the CVSWTs with mechatronic variable transmissions such as mechanical variable transmission, electrical variable transmission, and power splitting transmission. In this paper, the analysis of CVSWTs with different mechatronic transmission topologies is performed regarding basic configurations, dynamic characteristics, control principles, and experimental or simulation results. Review results indicate the feasibility of applying CVSWTs with such mechatronic transmissions and highlight superiorities of the CVSWTs with power splitting transmission. The CVSWT with power splitting transmission will be particularly suitable for megawatt‐scale turbine systems and will hence increase the economic competitiveness of these turbines due to its large power capacity and high reliability. The directions or challenges for future investigations of CVSWTs with such mechatronic transmissions are also presented to foster in‐depth understanding of such CVSWTs and their control strategies.  相似文献   
2.
Stream ciphers based on linear feedback shift register (LFSR) are suitable for constrained environments, such as satellite communications, radio frequency identification devices tag, sensor networks and Internet of Things, due to its simple hardware structures, high speed encryption and lower power consumption. LFSR, as a cryptographic primitive, has been used to generate a maximum period sequence. Because the switching of the status bits is regular, the power consumption of the LFSR is correlated in a linear way. As a result, the power consumption characteristics of stream cipher based on LFSR are vulnerable to leaking initialization vectors under the power attacks. In this paper, a new design of LFSR against power attacks is proposed. The power consumption characteristics of LFSR can be masked by using an additional LFSR and confused by adding a new filter Boolean function and a flip-flop. The design method has been implemented easily by circuits in this new design in comparison with the others.  相似文献   
3.
Motivated by the continuing interest in the tree data model, we study the expressive power of downward navigational query languages on trees and chains. Basic navigational queries are built from the identity relation and edge relations using composition and union. We study the effects on relative expressiveness when we add transitive closure, projections, coprojections, intersection, and difference; this for Boolean queries and path queries on labeled and unlabeled structures. In all cases, we present the complete Hasse diagram. In particular, we establish, for each query language fragment that we study on trees, whether it is closed under difference and intersection.  相似文献   
4.
There has been an increasing pressure on manufacturing industries to reduce energy consumption. In this study, we propose a new variant of RCPSP called RCPSP/πRC, which can deal with realistic energy constraints such as power restriction during peak hours, contract demand, and energy consumption during setup operations. First, we present an integer programming (IP) model and a constraint programming (CP) model of the RCPSP/πRC. Next, we present a heuristic mode restriction method called a mask calculation algorithm to achieve efficient searching by restricting selectable modes. Finally, through computational experiments, we evaluate the proposed methods and show their effectiveness.  相似文献   
5.
提出了采用基于CGAL库定义的Nef多面体数据结构,并结合Nef多面体之间的三维布尔操作来解决组网雷达探测范围相互重叠的雷达包络可视化问题。试验测试结果表明,每组试验样本求交后的三角网格正常,可视化效果好,满足项目应用需求。  相似文献   
6.
针对具有重量大、形状不规则特征的物品,采用双机器人协同作业是该技术领域的研究热点问题之一。运用ADAMS软件对双机器人虚拟样机进行运动学仿真分析,模拟空间搬运轨迹,对DREE末端点的运动轨迹曲线进行同步误差分析。搭建了实验平台,对双机器人同步搬运箱体进行实验验证。实验结果表明:双机器人协作搬运箱体时,在水平方向和垂直方向的轨迹误差均小于±2.8mm,较好地满足同步搬运作业工艺要求。  相似文献   
7.
Abstract

Cryptographic attacks are typically constructed by black-box methods and combinations of simpler properties, for example in [Generalised] Linear Cryptanalysis. In this article, we work with a more recent white-box algebraic-constructive methodology. Polynomial invariant attacks on a block cipher are constructed explicitly through the study of the space of Boolean polynomials which does not have a unique factorisation and solving the so-called Fundamental Equation (FE). Some recent invariant attacks are quite symmetric and exhibit some sort of clear structure, or work only when the Boolean function is degenerate. As a proof of concept, we construct an attack where a highly irregular product of seven polynomials is an invariant for any number of rounds for T-310 under certain conditions on the long term key and for any key and any IV. A key feature of our attack is that it works for any Boolean function which satisfies a specific annihilation property. We evaluate very precisely the probability that our attack works when the Boolean function is chosen uniformly at random.  相似文献   
8.
Sustainable and efficient food supply chain has become an essential component of one’s life. The model proposed in this paper is deeply linked to people's quality of life as a result of which there is a large incentive to fulfil customer demands through it. This proposed model can enhance food quality by making the best possible food quality accessible to customers, construct a sustainable logistics system considering its environmental impact and ensure the customer demand to be fulfilled as fast as possible. In this paper, an extended model is examined that builds a unified planning problem for efficient food logistics operations where four important objectives are viewed: minimising the total expense of the system, maximising the average food quality along with the minimisation of the amount of CO2 emissions in transportation along with production and total weighted delivery lead time minimisation. A four objective mixed integer linear programming model for intelligent food logistics system is developed in the paper. The optimisation of the formulated mathematical model is proposed using a modified multi-objective particle swarm optimisation algorithm with multiple social structures: MO-GLNPSO (Multi-Objective Global Local Near-Neighbour Particle Swarm Optimisation). Computational results of a case study on a given dataset as well as on multiple small, medium and large-scale datasets followed by sensitivity analysis show the potency and effectiveness of the introduced method. Lastly, there has been a scope for future study displayed which would lead to the further progress of these types of models.  相似文献   
9.
It is established that radon concentration in dwellings is connected with the geological structure of the Upper Silesian Coal Basin, as well as the intensity and the depth of carrying out mining operations. The measurements revealed that radon level is higher in buildings located on outcropped Triassic layers than in those ones on Tertiary and Quaternary sediments. It is shown that the syncline regions are the zones of increased radiation hazard.  相似文献   
10.
The results are presented for the laboratory and in-situ investigations into influence exerted by construction of the vertical cylindrical explosive charges on the degree of rock-mass shattering. The necessity is shown for creating the ascending workings with a cross-section up to 1m 2. For the vertical concentrated charges with inert gaps, the drilling-and-blasting parameters ensuring a decrease in specific consumption of explosive for the secondary shattering are given.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号