首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5121篇
  免费   151篇
  国内免费   11篇
电工技术   67篇
综合类   7篇
化学工业   912篇
金属工艺   118篇
机械仪表   168篇
建筑科学   132篇
矿业工程   6篇
能源动力   202篇
轻工业   283篇
水利工程   10篇
石油天然气   16篇
无线电   915篇
一般工业技术   926篇
冶金工业   529篇
原子能技术   26篇
自动化技术   966篇
  2023年   22篇
  2022年   64篇
  2021年   130篇
  2020年   39篇
  2019年   62篇
  2018年   77篇
  2017年   79篇
  2016年   101篇
  2015年   105篇
  2014年   148篇
  2013年   428篇
  2012年   264篇
  2011年   351篇
  2010年   295篇
  2009年   347篇
  2008年   288篇
  2007年   255篇
  2006年   209篇
  2005年   167篇
  2004年   148篇
  2003年   140篇
  2002年   110篇
  2001年   108篇
  2000年   77篇
  1999年   95篇
  1998年   217篇
  1997年   148篇
  1996年   130篇
  1995年   85篇
  1994年   96篇
  1993年   87篇
  1992年   57篇
  1991年   37篇
  1990年   38篇
  1989年   36篇
  1988年   36篇
  1987年   19篇
  1986年   18篇
  1985年   15篇
  1984年   16篇
  1983年   10篇
  1982年   17篇
  1980年   9篇
  1979年   20篇
  1978年   12篇
  1977年   11篇
  1976年   9篇
  1975年   9篇
  1974年   8篇
  1973年   9篇
排序方式: 共有5283条查询结果,搜索用时 62 毫秒
91.
92.
On a novel press system with six links for precision deep drawing   总被引:1,自引:0,他引:1  
The objective of this paper is to propose a novel press system with six links for precision deep drawing, and verify its feasibility. First, the system is presented and its advantages are discussed. Then, the kinematic analysis of the system is obtained by examining the geometry of the design. Moreover, kinematic dimensions of the variable coupling are found by using optimization method. Furthermore, the proposed approach is illustrated by a design example, its solid model for the proposed design is established, and then kinematic simulation is performed by ADAMS software. Finally, a prototype and an experimental setup are established, and the experiment is conducted. The results show that the proposed new mechanism is feasible and of reasonable accuracy. In addition, it has the advantages of easy manufacture, lower cost, higher precision, and easy adjustability.  相似文献   
93.
In social psychology, emotional contagion describes the widely observed phenomenon of one person’s emotions being influenced by surrounding people’s emotions. While the overall effect is agreed upon, the underlying mechanism of the spread of emotions has seen little quantification and application to computational agents despite extensive evidence of its impacts in everyday life. In this paper, we examine computational models of emotional contagion by implementing two models (Bosse et al., European council on modeling and simulation, pp. 212–218, 2009) and Durupinar, From audiences to mobs: Crowd simulation with psychological factors, PhD dissertation, Bilkent University, 2010) that draw from two separate lines of contagion research: thermodynamics-based and epidemiological-based. We first perform sensitivity tests on each model in an evacuation simulation, ESCAPES, showing both models to be reasonably robust to parameter variations with certain exceptions. We then compare their ability to reproduce a real crowd panic scene in simulation, showing that the thermodynamics-style model (Bosse et al., European council on modeling and simulation, pp. 212–218, 2009) produces superior results due to the ill-suited contagion mechanism at the core of epidemiological models. We also identify that a graduated effect of fear and proximity-based contagion effects are key to producing the superior results. We then reproduce the methodology on a second video, showing that the same results hold, implying generality of the conclusions reached in the first scene.  相似文献   
94.
This paper presents an effective and efficient method for speeding up ant colony optimization (ACO) in solving the codebook generation problem. The proposed method is inspired by the fact that many computations during the convergence process of ant-based algorithms are essentially redundant and thus can be eliminated to boost their convergence speed, especially for large and complex problems. To evaluate the performance of the proposed method, we compare it with several state-of-the-art metaheuristic algorithms. Our simulation results indicate that the proposed method can significantly reduce the computation time of ACO-based algorithms evaluated in this paper while at the same time providing results that match or outperform those ACO by itself can provide.  相似文献   
95.
T. L. Lee  T. Y. Li  C. H. Tsai 《Computing》2008,83(2-3):109-133
HOM4PS-2.0 is a software package in FORTRAN 90 which implements the polyhedral homotopy continuation method for solving polynomial systems. It updates its original version HOM4PS in three key aspects: (1) new method for finding mixed cells, (2) combining the polyhedral and linear homotopies in one step, (3) new way of dealing with curve jumping. Numerical results show that this revision leads to a spectacular speed-up, ranging up to 1950s, over its original version on all benchmark systems, especially for large ones. It surpasses the existing packages in finding isolated zeros, such as PHCpack (Verschelde in ACM Trans Math Softw 25:251–276, 1999), PHoM (Gunji et al. in Computing 73:57–77, 2004), and Bertini (Bates et al. in Software for numerical algebraic geometry. Available at http://www.nd.edu/~sommese/bertini), in speed by big margins.  相似文献   
96.
Applying dither to highly nonlinear systems may suppress chaotic phenomena, but dynamic performance, such as convergence rate and disturbance attenuation, is usually not guaranteed. This paper presents a dithered H robust fuzzy control scheme to stabilize chaotic systems that ensures disturbance attenuation bounds. In the proposed scheme, Takagi-Sugeno (T-S) fuzzy linear models are used to describe the relaxed models of the dithered chaotic system, and fuzzy controllers are designed based on an extension to the concept of parallel distributed compensation (PDC). Sufficient condition for the existence of the H robust fuzzy controllers is presented in terms of a novel linear matrix inequalities (LMI) form which takes full consideration of modeling error and disturbances, but cannot be solved by the standard procedures. In order to solve the LMI problem and to identify the chaotic systems as T-S fuzzy modes, we propose a compound optimization strategy called the island-based random-walk algorithm (IRA). The algorithm is composed of a set of communicating random-walk optimization procedures concatenated with the down-hill simplex method. The design procedure and validity of the proposed scheme is demonstrated via numerical simulation of the dithered fuzzy control of a chaotic system.  相似文献   
97.
Customs and quarantine departments are applying information systems to automate their inspection processes and improve their inspection efficiency and accuracy. The product codes from the Harmonized System (HS codes) are the essential elements of the system's integration, automation and intelligence. The identified HS codes are well-accepted and precise product references used by customs authorities, to match applicable policies to the products being inspected and taxed. Domain ontology for importing and exporting industry can be used to acquire HS codes for given products, and is a prerequisite for an integrated and intelligent automated inspection system. The authors have proposed and implemented an importing and exporting domain ontology. The ontology is composed of an integrated and comprehensive knowledge base derived from static dictionaries and the HS specification, and dynamic processing data. Based on this ontology, a reasoning engine is developed to generate HS codes intelligently for the given product names. Information systems can use the engine to get HS codes for submitted products and find applicable policies automatically. The ontology and the engine have been implemented in a Java-based platform and published as a HS Web service. In this paper, knowledge structure, reasoning mechanism and implementation details for the domain ontology and reasoning engine are presented. A test bed in the application environment has been conducted and experimental results have been obtained. The ontology and the service have the potential to be widely used by authorities and international traders of importing and exporting industry around the world.  相似文献   
98.
In this paper, we propose a novel scheme of automatic image authentication and recovery, in which the altered region of the image can be detected and recovered in a fully automated fashion. To achieve high-quality image recovery, we choose the region of importance (ROI) in the image and perform fractal encoding for the blocks of ROI. And then we insert the fractal codes of ROI and the watermark into the original image to obtain the watermarked image. By watermark extraction, we can determine whether the watermarked image has been tampered or not. If the watermarked image has been tampered, we can automatically localize the altered region, and apply either fractal decoding or image inpainting for image recovery. Finally, experimental results are given to show the effectiveness of the proposed scheme.  相似文献   
99.
In this paper, we shall propose a new image steganographic technique capable of producing a secret-embedded image that is totally indistinguishable from the original image by the human eye. In addition, our new method avoids the falling-off-boundary problem by using pixel-value differencing and the modulus function. First, we derive a difference value from two consecutive pixels by utilizing the pixel-value differencing technique (PVD). The hiding capacity of the two consecutive pixels depends on the difference value. In other words, the smoother area is, the less secret data can be hidden; on the contrary, the more edges an area has, the more secret data can be embedded. This way, the stego-image quality degradation is more imperceptible to the human eye. Second, the remainder of the two consecutive pixels can be computed by using the modulus operation, and then secret data can be embedded into the two pixels by modifying their remainder. In our scheme, there is an optimal approach to alter the remainder so as to greatly reduce the image distortion caused by the hiding of the secret data. The values of the two consecutive pixels are scarcely changed after the embedding of the secret message by the proposed optimal alteration algorithm. Experimental results have also demonstrated that the proposed scheme is secure against the RS detection attack.  相似文献   
100.
This paper presents a comparison study for the optimization of stencil printing operations using hybrid intelligence technique and response surface methodology (RSM). An average 60% of soldering defects are attributed to solder paste stencil printing process in surface mount assembly (SMA). The manufacturing costs decrease with increasing first-pass yield in the stencil printing process. This study compares two hybrid intelligence approaches with RSM as methods of solving the stencil printing optimization problem that involves multiple performance characteristics. The optimization process is threefold. A data set obtained from an experimental design following data preprocessing process provides an accurate data source for RSM study and training neural networks to formulate the nonlinear model of the stencil printing process with/without combining multiple performance characteristics into a single desirability value, followed by a genetic algorithm searching the trained neural networks for obtaining the optimal parameter sets. The empirical defect-per-million-opportunities (DPMO) measurements demonstrate that the two hybrid intelligence methods can provide satisfactory performance for stencil printing optimization problem.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号