首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1606篇
  免费   22篇
电工技术   23篇
综合类   1篇
化学工业   197篇
金属工艺   13篇
机械仪表   18篇
建筑科学   78篇
矿业工程   1篇
能源动力   34篇
轻工业   254篇
水利工程   5篇
石油天然气   3篇
无线电   97篇
一般工业技术   194篇
冶金工业   476篇
原子能技术   10篇
自动化技术   224篇
  2022年   7篇
  2021年   11篇
  2020年   14篇
  2019年   28篇
  2018年   24篇
  2017年   29篇
  2016年   15篇
  2015年   20篇
  2014年   14篇
  2013年   86篇
  2012年   52篇
  2011年   71篇
  2010年   50篇
  2009年   47篇
  2008年   59篇
  2007年   64篇
  2006年   59篇
  2005年   49篇
  2004年   59篇
  2003年   47篇
  2002年   41篇
  2001年   34篇
  2000年   30篇
  1999年   40篇
  1998年   125篇
  1997年   86篇
  1996年   58篇
  1995年   39篇
  1994年   35篇
  1993年   35篇
  1992年   15篇
  1991年   13篇
  1990年   11篇
  1989年   19篇
  1988年   11篇
  1987年   22篇
  1986年   15篇
  1985年   22篇
  1984年   13篇
  1983年   12篇
  1982年   13篇
  1981年   16篇
  1980年   7篇
  1979年   21篇
  1978年   8篇
  1977年   12篇
  1976年   19篇
  1975年   12篇
  1974年   9篇
  1971年   7篇
排序方式: 共有1628条查询结果,搜索用时 15 毫秒
91.
This paper combines fault-dependent control allocation with three different control schemes to obtain fault tolerance in the longitudinal control of unmanned aerial vehicles. The paper shows that fault-dependent control allocation is able to accommodate actuator faults that would otherwise be critical and it makes a performance assessment for the different control algorithms: an \(\mathcal {L}_{1}\) adaptive backstepping controller; a robust sliding mode controller; and a standard PID controller. The actuator faults considered are the partial to total loss of the elevator, which is a critical component for the safe operation of unmanned aerial vehicles. During nominal operation, only the main actuator, namely the elevator, is active for pitch control. In the event of a partial or total loss of the elevator, fault-dependent control allocation is used to redistribute control to available healthy actuators. Using simulations of a Cessna 182 aircraft model, controller performance and robustness are evaluated by metrics that assess control accuracy and energy use. System uncertainties are investigated over an envelope of pertinent variation, showing that sliding mode and \(\mathcal {L}_{1}\) adaptive backstepping provide robustness, where PID control falls short. Additionally, a key finding is that the fault-dependent control allocation is instrumental when handling actuator faults.  相似文献   
92.
We teach a hardware and software codesign course to second-year students who have expressed an interest in either electronics or informatics (computer science). The course emphasizes concepts and methods that are useful to both hardware and software developers and in particular to developers of embedded systems who must consider both disciplines as well as their interaction. We consider the course to be part of a search for better development methods and hope to increase the number of professional developers.  相似文献   
93.
Dealing with conflicting and target-specific requirements is an important issue in multisensor and multitarget tracking. This paper aims to allocate sensing resources among various targets in reaction to individual information requests. The proposed approach is to introduce agents for every relevant target responsible for its tracking. Such agents are expected to bargain with each other for a division of resources. A bilateral negotiation model is established for resource allocation in two-target tracking. The applications of agent negotiation to target covariance tuning are illustrated together with simulation results presented. Moreover, we suggest a way of organizing simultaneous one-to-one negotiations, making our negotiation model still applicable in scenarios of tracking more than two targets.  相似文献   
94.
Abstract

Lester Sanders Hill (1890–1961) is best known for the Hill cipher which he published in 1929. However, there seem to be four periods of Hill's career. First, in 1926 and 1927, Hill published a series of papers on mathematical error-detection. Hill's ideas for error-detection are similar to the ideas he used in his cipher. Next, in 1929 and 1931, Hill published two papers that describe the Hill cipher. The third period of Hill's career, from 1927 until 1960, was the time he served on the mathematics faculty of Hunter College. During his time at Hunter College, Hill seems to have had a relationship with the Navy in which he served during World War I. Finally, while teaching at Hunter College, in the 1950s, Hill wrote his “later papers” on cryptography, which were not published but were sent to Naval Communications.  相似文献   
95.
In this paper, a password authentication scheme based on a unit circle encoding is proposed. In our scheme, a one-way function and a cryptographic operation such as DES (data encryption standard) are adopted. Besides, in our scheme, the system only need to store a master secret key, and each user can select his own password freely. Instead of storing a password verification table inside the computer system, our method only has to store a corresponding table of identities, which is used by the computer system for validating the submitted passwords. Owing to this scheme the system can quickly and efficiently respond to any log-in attempt, and is suitable for real-time applications. Furthermore, in our scheme, the system does not need to reconstruct any term of the existing key table, when a new user is inserted into the system. Thus, our scheme is suitable for practical implementation.  相似文献   
96.
In this paper, we present a novel method for joint estimation of the fundamental frequency and order of a set of harmonically related sinusoids based on the multiple signal classification (MUSIC) estimation criterion. The presented method, termed HMUSIC, is shown to have an efficient implementation using fast Fourier transforms (FFTs). Furthermore, refined estimates can be obtained using a gradient-based method. Illustrative examples of the application of the algorithm to real-life speech and audio signals are given, and the statistical performance of the estimator is evaluated using synthetic signals, demonstrating its good statistical properties.  相似文献   
97.
IntroductionSeveral statistical methods of assessing seasonal variation are available. Brookhart and Rothman [3] proposed a second-order moment-based estimator based on the geometrical model derived by Edwards [1], and reported that this estimator is superior in estimating the peak-to-trough ratio of seasonal variation compared with Edwards’ estimator with respect to bias and mean squared error. Alternatively, seasonal variation may be modelled using a Poisson regression model, which provides flexibility in modelling the pattern of seasonal variation and adjustments for covariates.MethodBased on a Monte Carlo simulation study three estimators, one based on the geometrical model, and two based on log-linear Poisson regression models, were evaluated in regards to bias and standard deviation (SD). We evaluated the estimators on data simulated according to schemes varying in seasonal variation and presence of a secular trend. All methods and analyses in this paper are available in the R package Peak2Trough [13].ResultsApplying a Poisson regression model resulted in lower absolute bias and SD for data simulated according to the corresponding model assumptions. Poisson regression models had lower bias and SD for data simulated to deviate from the corresponding model assumptions than the geometrical model.ConclusionThis simulation study encourages the use of Poisson regression models in estimating the peak-to-trough ratio of seasonal variation as opposed to the geometrical model.  相似文献   
98.
99.
The present study offers new input to the discussion of how entrepreneurship education and training programmes can be tailored to suit design professionals. To a large extent, existing entrepreneurship teaching for creative people is based on a traditional administrative management logic that often results in a clash between entrepreneurial demands and creative identities. The paper is based on the following rationale: the better we understand designers' reasoning and their struggles concerning becoming entrepreneurs, the better we are able to design entrepreneurship learning experiences that meet their needs. Since designers' career‐making tends to be highly driven by their strong sense of identity, the paper takes an identity perspective. The empirical foundation of the research is based on observation studies and phenomenological interviews conducted during an eight‐week entrepreneurship training program. Twenty‐five nascent design entrepreneurs with a professional background as designers participated in the voluntary programme. The paper offers novel and critical insights into designers' experiences of the entrepreneurial identity and reasoning as they participate in entrepreneurship training.  相似文献   
100.
The technical feasibility of roll motion control devices has been amply demonstrated for over 100 years. Performance, however, can still fall short of expectations because of difficulties associated with control system designs, which have proven to be far from trivial due to fundamental performance limitations and large variations of the spectral characteristics of wave-induced roll motion. This tutorial paper presents an account of the development of various ship roll motion control systems together with the challenges associated with their design. It discusses the assessment of performance and the applicability of different mathematical models, and it surveys the control methods that have been implemented and validated with full scale experiments. The paper also presents an outlook on what are believed to be potential areas of research within this topic.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号