首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   70227篇
  免费   5264篇
  国内免费   2809篇
电工技术   3453篇
技术理论   10篇
综合类   4095篇
化学工业   12271篇
金属工艺   3795篇
机械仪表   4319篇
建筑科学   5964篇
矿业工程   2010篇
能源动力   2072篇
轻工业   4256篇
水利工程   1106篇
石油天然气   4398篇
武器工业   540篇
无线电   8234篇
一般工业技术   8969篇
冶金工业   3623篇
原子能技术   792篇
自动化技术   8393篇
  2024年   254篇
  2023年   1131篇
  2022年   1860篇
  2021年   2541篇
  2020年   2004篇
  2019年   1763篇
  2018年   1924篇
  2017年   2226篇
  2016年   2002篇
  2015年   2641篇
  2014年   3263篇
  2013年   3913篇
  2012年   4296篇
  2011年   4540篇
  2010年   3942篇
  2009年   3742篇
  2008年   3665篇
  2007年   3654篇
  2006年   3863篇
  2005年   3339篇
  2004年   2302篇
  2003年   2014篇
  2002年   1941篇
  2001年   1761篇
  2000年   1760篇
  1999年   2035篇
  1998年   1820篇
  1997年   1496篇
  1996年   1428篇
  1995年   1086篇
  1994年   1039篇
  1993年   720篇
  1992年   554篇
  1991年   444篇
  1990年   331篇
  1989年   264篇
  1988年   242篇
  1987年   150篇
  1986年   107篇
  1985年   80篇
  1984年   38篇
  1983年   38篇
  1982年   42篇
  1981年   22篇
  1980年   14篇
  1979年   5篇
  1978年   1篇
  1976年   1篇
  1959年   2篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
941.
In this paper, optimum positioning of the conical cutter for five-axis flank milling of slender surfaces is addressed from the perspective of approximating the tool envelope surface to the data points on the design surface following the minimum zone criterion recommended by ANSI and ISO standards for tolerance evaluation. Based on the observation that a conical surface can be treated as a canal surface, i.e. envelope surface of one-parameter family of spheres, the swept envelope of a conical cutter is represented as a sphere-swept surface. Then, an approach is presented to efficiently compute the signed distance between a point in space and the swept surface without constructing the swept surface itself. The first order differential increment of the signed point-to-surface distance with respect to the differential deformation of the tool axis trajectory surface is derived. By using the distance function, tool path optimizations for semi-finish and finish millings are formulated as two constrained optimization problems in a unified framework, and a sequential approximation algorithm along with a hierarchical algorithmic structure is developed for the optimization. Numerical examples are given to confirm the validity and efficiency of the proposed approach. Comparing with the existing approaches, the present one improves the machining accuracy greatly. The rationale developed applies to general rotary cutters.  相似文献   
942.
Elections are a central model in a variety of areas. This paper studies parameterized computational complexity of five control problems in the Maximin election. We obtain the following results: constructive control by adding candidates is W[2]-hard with respect to the parameter “number of added candidates”; both constructive and destructive control by adding/deleting voters are W[1]-hard with respect to the parameter “number of added/deleted voters”.  相似文献   
943.
To study the communication between information systems, Wang et al. [C. Wang, C. Wu, D. Chen, Q. Hu, C. Wu, Communicating between information systems, Information Sciences 178 (2008) 3228-3239] proposed two concepts of type-1 and type-2 consistent functions. Some properties of such functions and induced relation mappings have been investigated there. In this paper, we provide an improvement of the aforementioned work by disclosing the symmetric relationship between type-1 and type-2 consistent functions. We present more properties of consistent functions and induced relation mappings and improve upon several deficient assertions in the original work. In particular, we unify and extend type-1 and type-2 consistent functions into the so-called neighborhood-consistent functions. This provides a convenient means for studying the communication between information systems based on various neighborhoods.  相似文献   
944.
On filter theory of residuated lattices   总被引:3,自引:0,他引:3  
Yiquan Zhu  Yang Xu 《Information Sciences》2010,180(19):3614-3632
The aim of this paper is to develop the filter theory of general residuated lattices. First, we extend some particular types of filters and fuzzy filters in BL-algebras and MTL-algebras naturally to general residuated lattices, and further enumerate some relative results obtained in BL-algebras or MTL-algebras, which still hold in general residuated lattices. Next, we introduce the concepts of regular filters and fuzzy regular filters to general residuated lattices, which are two new types of filters and fuzzy filters, and derive some of their characterizations. Finally, we discuss the relations between (fuzzy) regular filters and several other special (fuzzy) filters, and also characterize some special classes of residuated lattices by filters or fuzzy filters.  相似文献   
945.
As the development of the technology for radar target recognition, missile target automatic recognition has received considerable attention in recent years. Missile target, compared with the plane target, is hard to recognize for its smallness, feebleness and maneuver. In this paper, a new recognition method based on radar image time-series, which can significantly reduce the recognition time and classification error, is proposed. The image time-series are produced by range instantaneous Doppler imaging algorithm firstly, and then cross-range scaling of the images is processed. In particular, the inertia ratio, extracted from the obtained image time-series, is introduced to distinguish the missile from decoys. Furthermore, the effectiveness of this method is demonstrated by application to simulated data and it has been shown that this method has the potential to be used in a number of real-time applications.  相似文献   
946.
This paper is concerned with the parameter estimation and stabilization of a one‐dimensional wave equation with harmonic disturbance suffered by boundary observation at one end and the non‐collocated control at the other end. An adaptive observer is designed in terms of measured velocity corrupted by harmonic disturbance with unknown magnitude. The backstepping method for infinite‐dimensional system is adopted in the design of the feedback law. It is shown that the resulting closed‐loop system is asymptotically stable. Meanwhile, the estimated parameter is shown to be convergent to the unknown parameter as time goes to infinity. Copyright © 2010 John Wiley & Sons, Ltd.  相似文献   
947.
Three novel, super‐wideband antipodal slot antennas with different tuning stubs are studied and compared with each other. Smooth, half‐circular slot profile is used to improve the antennas' polarization purity and impedance bandwidth, and different tuning stubs are used to finely tune the antennas' radiation performance. As will be reported, low crosspolarization level, stable dipole‐like pattern, and flat gain performances can be obtained within an operation bandwidth of 6.3:1 by introducing a smooth antipodal slot structure and a cup‐shape tuning patch. © 2011 Wiley Periodicals, Inc. Int J RF and Microwave CAE, 2011.  相似文献   
948.
The single viewpoint constraint is a principal optical characteristic for most catadioptric omnidirectional vision. Single viewpoint catadioptric omnidirectional vision is very useful because it allows the generation of geometrically correct perspective images from one omnidirectional image. Therefore precise calibration for single viewpoint constraint is needed during system assembling. However, in most image detection based calibration methods, the nonlinear optical distortion brought by lens is often neglected. Hence the calibration precision is poor. In this paper, a new calibration method of single viewpoint constraint for the catadioptric omni-directional vision is proposed. Firstly, an image correction algorithm is obtained by training a neural network. Then, according to characteristics of the space circular perspective projection, the corrected image of the mirror boundary is used to estimate its position and attitude relative to the camera to guide the calibration. Since the estimate is conducted based on actual imaging model rather than the simplified model, the estimate error is largely reduced, and the calibration accuracy is significantly improved. Experiments are conducted on simulated images and real images to show the accuracy and the effectiveness of the proposed method.  相似文献   
949.
Complex networks exist in a wide range of real world systems, such as social networks, technological networks, and biological networks. During the last decades, many researchers have concentrated on exploring some common things contained in those large networks include the small-world property, power-law degree distributions, and network connectivity. In this paper, we will investigate another important issue, community discovery, in network analysis. We choose Nonnegative Matrix Factorization (NMF) as our tool to find the communities because of its powerful interpretability and close relationship between clustering methods. Targeting different types of networks (undirected, directed and compound), we propose three NMF techniques (Symmetric NMF, Asymmetric NMF and Joint NMF). The correctness and convergence properties of those algorithms are also studied. Finally the experiments on real world networks are presented to show the effectiveness of the proposed methods.  相似文献   
950.
Radio Frequency Identification (RFID) based systems have been used in different applications in the Architecture, Engineering, Construction, Owner and Operator (AECOO) industry. Applications are mainly designed for specific lifecycle stage of the facility and serve the needs of only one of the stakeholders. This would increase the cost and the labor for adding and removing tags and eliminate the chance of using shared resources. In this paper, the usage of tags permanently attached to components is proposed where the memory of the tags is used during the lifecycle by different stakeholders for data storage and handover. A Building Information Model (BIM) database is used for tackling the interoperability issues allowing different users to access and share the data. To securely and efficiently store data on RFID tags in ifcXML format, multi-level encryption together with role-based access control is applied on the data stored on RFID tags. Each user is assigned a certain role and can only access the part of data for which he has authorization according to a predefined role and the Access Control Policy. To explore the technical feasibility of the proposed approach, a case study considering both facilities management and emergency management has been implemented and tested at Concordia University.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号