首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   8267篇
  免费   115篇
  国内免费   10篇
电工技术   166篇
综合类   22篇
化学工业   1542篇
金属工艺   218篇
机械仪表   405篇
建筑科学   175篇
矿业工程   5篇
能源动力   303篇
轻工业   633篇
水利工程   42篇
石油天然气   25篇
无线电   1511篇
一般工业技术   1414篇
冶金工业   721篇
原子能技术   90篇
自动化技术   1120篇
  2024年   70篇
  2023年   74篇
  2022年   91篇
  2021年   134篇
  2020年   137篇
  2019年   150篇
  2018年   167篇
  2017年   146篇
  2016年   224篇
  2015年   191篇
  2014年   311篇
  2013年   547篇
  2012年   448篇
  2011年   484篇
  2010年   353篇
  2009年   428篇
  2008年   367篇
  2007年   335篇
  2006年   338篇
  2005年   289篇
  2004年   276篇
  2003年   252篇
  2002年   283篇
  2001年   206篇
  2000年   187篇
  1999年   178篇
  1998年   377篇
  1997年   222篇
  1996年   162篇
  1995年   133篇
  1994年   115篇
  1993年   115篇
  1992年   60篇
  1991年   71篇
  1990年   57篇
  1989年   58篇
  1988年   40篇
  1987年   44篇
  1986年   39篇
  1985年   31篇
  1984年   29篇
  1983年   20篇
  1982年   14篇
  1981年   23篇
  1980年   16篇
  1979年   9篇
  1978年   15篇
  1977年   14篇
  1976年   21篇
  1973年   8篇
排序方式: 共有8392条查询结果,搜索用时 15 毫秒
11.
12.
13.
14.
This paper presents a method of autonomous topological modeling and localization in a home environment using only low-cost sonar sensors. The topological model is extracted from a grid map using cell decomposition and normalized graph cut. The autonomous topological modeling involves the incremental extraction of a subregion without predefining the number of subregions. A method of topological localization based on this topological model is proposed wherein a current local grid map is compared with the original grid map. The localization is accomplished by obtaining a node probability from a relative motion model and rotational invariant grid-map matching. The proposed method extracts a well-structured topological model of the environment, and the localization provides reliable node probability even when presented with sparse and uncertain sonar data. Experimental results demonstrate the performance of the proposed topological modeling and localization in a real home environment.  相似文献   
15.
In the sort-last-sparse parallel volume rendering system on distributed memory multicomputers, one can achieve a very good performance improvement in the rendering phase by increasing the number of processors. This is because each processor can render images locally without communicating with other processors. However, in the compositing phase, a processor has to exchange local images with other processors. When the number of processors exceeds a threshold, the image compositing time becomes a bottleneck. In this paper, we propose three compositing methods to efficiently reduce the compositing time in parallel volume rendering. They are the binary-swap with bounding rectangle (BSBR) method, the binary-swap with run-length encoding and static load-balancing (BSLC) method, and the binary-swap with bounding rectangle and run-length encoding (BSBRC) method. The proposed methods were implemented on an SP2 parallel machine along with the binary-swap compositing method. The experimental results show that the BSBRC method has the best performance among these four methods.  相似文献   
16.
"Ondol" is a Korean unique heating system. It is a specific radiant floor heating system using combustion heat of briquette or timber in Korea. Such traditional "Ondol" is changed to radiant heating system with pipe-coil embedded in the floor or slab. This study has contributed to the understandings of the transient behaviours of Ondol-heated floor panels and enclosure exposed to this type of heating system. The result is that the water supply temperature had a large effect on the rate of increase in floor surface and room air temperature. But, in spite of a higher water supply temperature, the heat flow rate was not increased considerably. The shallow pipe embedding depths, of course, result in a low heat flow rate.  相似文献   
17.
Lee D  Kwon S  Chung MK 《Applied ergonomics》2012,43(1):166-175
Target expansion, i.e., the increase of target size according to cursor movement, can be a practical scheme to improve the usability of target-selection tasks using a mouse. This study examined the effects of different user age groups and target-expansion methods on target-acquisition tasks with grouped icons. Twenty-eight subjects performed acquisition tasks under eight experimental conditions: combinations of four expansion areas (no, one-icon, fish-eye, and group expansion) and two expansion techniques (occlusion and push). Older users took longer to acquire targets than younger users; however, they showed no significant difference in accuracy. Target expansion did not substantially improve performance speed compared to the static condition. However, the error rate was lowest when group area was expanded with the push technique, and both age groups were most satisfied with one-icon area expansion with the occlusion technique. We suggest alternative guidelines in designing target-expansion schemes.  相似文献   
18.
19.
We propose and demonstrate a novel technique to monitor the frequency offset between the optical source and delay interferometer (DI) for direct-detection differential phase-shift-keying (DPSK) systems. In this scheme, a phase-modulated tone is applied to DPSK signals at the transmitter and then detected after being converted into an amplitude-modulated tone at the DI to be used for the monitoring signal. Our experimental demonstration shows that the monitoring range and sensitivity of the proposed scheme are measured to be /spl plusmn/2 GHz and /spl sim/10 MHz, respectively, which we believe are good enough to be used either to generate alarm signals for the frequency offset monitoring or to control the feedback loop of the DI.  相似文献   
20.
In the above mentioned paper by Mahmoud-Muthairi (ibid. vol.39 (1994)) a sufficient condition for memoryless stabilization of a class of uncertain linear systems with a variable-state delay and norm-bounded time-varying uncertainties is derived in terms of an algebraic Riccati equation. This Riccati equation depends on several free matrix variables, and a subsequent result in the paper, Theorem 2, states that failure or success of the stabilization algorithm is independent of the selection of these matrix variables. In this paper, we give a counterexample to this Theorem 2 as well as providing a fix  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号