全文获取类型
收费全文 | 7105篇 |
免费 | 324篇 |
国内免费 | 53篇 |
专业分类
电工技术 | 133篇 |
综合类 | 26篇 |
化学工业 | 1789篇 |
金属工艺 | 119篇 |
机械仪表 | 213篇 |
建筑科学 | 277篇 |
矿业工程 | 6篇 |
能源动力 | 462篇 |
轻工业 | 725篇 |
水利工程 | 76篇 |
石油天然气 | 115篇 |
无线电 | 654篇 |
一般工业技术 | 1145篇 |
冶金工业 | 339篇 |
原子能技术 | 83篇 |
自动化技术 | 1320篇 |
出版年
2024年 | 24篇 |
2023年 | 151篇 |
2022年 | 319篇 |
2021年 | 405篇 |
2020年 | 295篇 |
2019年 | 335篇 |
2018年 | 419篇 |
2017年 | 358篇 |
2016年 | 355篇 |
2015年 | 236篇 |
2014年 | 319篇 |
2013年 | 641篇 |
2012年 | 356篇 |
2011年 | 505篇 |
2010年 | 350篇 |
2009年 | 326篇 |
2008年 | 289篇 |
2007年 | 217篇 |
2006年 | 201篇 |
2005年 | 140篇 |
2004年 | 111篇 |
2003年 | 118篇 |
2002年 | 90篇 |
2001年 | 64篇 |
2000年 | 73篇 |
1999年 | 51篇 |
1998年 | 77篇 |
1997年 | 41篇 |
1996年 | 49篇 |
1995年 | 42篇 |
1994年 | 36篇 |
1993年 | 44篇 |
1992年 | 36篇 |
1991年 | 32篇 |
1990年 | 31篇 |
1989年 | 21篇 |
1988年 | 35篇 |
1987年 | 30篇 |
1986年 | 20篇 |
1985年 | 15篇 |
1984年 | 27篇 |
1983年 | 22篇 |
1982年 | 22篇 |
1981年 | 16篇 |
1980年 | 20篇 |
1979年 | 16篇 |
1978年 | 17篇 |
1976年 | 18篇 |
1975年 | 19篇 |
1974年 | 12篇 |
排序方式: 共有7482条查询结果,搜索用时 15 毫秒
11.
In this paper, a novel direct instantaneous torque control scheme for a direct drive (DD) permanent magnet synchronous motor (PMSM) is presented. A hybrid control structure combining the internal model principle and the variable structure control (VSC) approach is proposed. First, a variable structure torque controller is adopted to regulate the torque angle increment according to the torque feedback error. Second, the appropriate control voltage vector is determined using the reference stator flux vector and the estimated dynamic back electromotive force (EMF) vector, as an internal model, in a deadbeat control manner. Subsequently, better disturbance rejection can be obtained with the proposed cascaded control structure. To robustly obtain the instantaneous torque and flux information, a robust adaptive motor model is proposed. The Lyapunov stability theory is used to analyze the stability of the augmented robust adaptive motor model and to give a guideline for tuning model parameters. Experimental results are presented to demonstrate the validity and effectiveness of the proposed instantaneous torque control scheme. 相似文献
12.
Neural Computing and Applications - This paper presents an adaptive fuzzy fault-tolerant tracking control for a class of unknown multi-variable nonlinear systems, with external disturbances,... 相似文献
13.
Mohamed I. Ismail 《Journal of chemical technology and biotechnology (Oxford, Oxfordshire : 1986)》1979,29(6):361-366
The kinetics of the reaction of chalcopyrite, iron sulphide, copper sulphide, and nickel sulphide with sulphur trioxide gas were studied using a fluidised bed technique. O2, N2, or air was used as a carrier gas for the sulphur trioxide in fluidisation. Binary mixtures of finely ground (0.37–75 μm) samples were reacted with the sulphur trioxide in a Pyrex column at 373–673 K. The reaction products were leached with water and the soluble metals in the solution were determined by atomic absorption spectrometry. The total soluble reaction products were determined gravimetrically. The results obtained showed that a higher yield of soluble salts was obtained when O2 or air was used as a carrier gas for sulphur trioxide than when an inert gas was used. Higher yields of soluble salts were obtained when the samples were most finely ground. Increase of copper sulphide content in binary mixtures with iron or nickel sulphide led to an increase in the yield of soluble salts. For iron sulphide/nickel sulphide mixtures, the yield of soluble salts increased with the nickel sulphide content. There were maximum values for the soluble metal ratios Ni/Fe and Cu/Ni in the corresponding sulphide binary mixtures and this maximum was at about 50% weight. The soluble Cu/Fe ratio increased with copper sulphide content in mixtures with iron sulphide. 相似文献
14.
Disperse-phase-controlled mass transfer rates from individual liquid drops suspended in a second liquid phase are measured optically immediately after the drop has been formed by coalescence of two smaller droplets. The net effect on mass transfer of the act of coalescence is determined by comparison to similar measurements made on the initial droplets in the absence of coalescence. The transfer rates immediately after coalescence are high rapidly fall to zero, rebound to an intermediate value and finally decay to the level expected for an undisturbed drop. The net effect on total mass transferred is detrimental in a clean system subject to interfacial instability but appears to be beneficial for contaminated systems or where no surface movements are spontaneously generated. 相似文献
15.
Recommendations in location-based social networks: a survey 总被引:2,自引:0,他引:2
16.
In this paper, we present a new sufficient condition for absolute stability of Lure system with two additive time-varying delay components. This criterion is expressed as a set of linear matrix inequalities (LMIs), which can be readily tested by using standard numerical software. We use this new criterion to stabilize a class of nonlinear time-delay systems. Some numerical examples are given to illustrate the applicability of the results using standard numerical software. 相似文献
17.
Mohamed Sadok Cherif Habib Chabchoub Belaïd Aouni 《International Transactions in Operational Research》2010,17(1):85-102
Quality function deployment (QFD) is a customer-oriented design tool for developing new or improved products to achieve higher customer satisfaction by integrating various functions of an organization. The engineering characteristics (ECs) affecting the product performances are designed to match the customer attributes (CAs). However, from the viewpoint of the QFD team, product design processes are performed in imprecise environments, and more than one factor must be taken into account in determining the target levels of ECs, especially the limited resources and increased market competition. This paper presents an imprecise goal programming (GP) approach to determine the optimum target levels of ECs in QFD for maximizing customer satisfaction under resource limitation and considerations of market competition. Based on benchmarking data of CAs, the concept of satisfaction functions is utilized to formulate explicitly the customer's preferences and to integrate the competitive analysis of target market into the modelling and solution process. In addition, the relationships linking CAs and ECs and the ECs to each other are integrated by functional relationships. The proposed approach will be illustrated through a car door design example. 相似文献
18.
We present a secure routing protocol that is immune to Sybil attacks and that can tolerate collusion of Byzantine routers. It can tolerate either initial collusion of Byzantine routers or runtime collusion of non-adjacent Byzantine routers, both in the absence of runtime collusion between adjacent routers. For these settings, the calculated distance from a destination to a node is not smaller than the actual shortest distance from the destination to the node. The protocol can also simultaneously tolerate initial collusion of Byzantine routers and runtime collusion of adjacent Byzantine routers but in the absence of runtime collusion between non-adjacent routers. For this setting, it guarantees a bound on the difference between the calculated distance and the actual shortest distance. The bound depends on the number of Byzantine routers on a path. The protocol makes very weak timing assumptions and requires synchronization only between neighbors or second neighbors. We propose to use this protocol for secure localization of routers using hop-count distances, which can be then used as a proof of identity of nodes. 相似文献
19.
Mohamed Sahli Christine Millot Claude Roques-Carmes Chantal Khan Malek 《Microsystem Technologies》2009,15(6):827-835
Numerical modelling of the deformation of a polymer using the finite elements method in axisymetrical mode was performed using the LsDyna® software to describe the filling of micro-cavities during the forming process of the material using the hot embossing. These simulations firstly allow verifying whether the chosen forming process conditions promote or not an optimized filling of the superficial cavities in order to achieve precise replicas which best reproduce the superficial topography of the mould. The simulations were carried out to evaluate the filling of the cavities taking into account the mechanical behaviour of the selected polymer into the model. Moreover, these models were developed to verify the effect of the distribution of the mould cavities on their filling. The influence of the mobility of non deformable rigid plates on the filling of the cavities represents an auxiliary variable. In the approach presented, the compression plates are assumed to be parallel and non deformable, whereas the polymer disk follows a rubbery behaviour around a temperature equal to 140°C. Globally the modelling results are satisfactory for they are rather close to the experimental observations conducted. In summary, the effect of the normal stress as also the distribution of micro-cavities at the mould surface seem to prevail in the case of the forming process by hot embossing. 相似文献
20.
Andrew Walenstein Rachit Mathur Mohamed R. Chouchane Arun Lakhotia 《Journal in Computer Virology》2008,4(4):307-322
A malware mutation engine is able to transform a malicious program to create a different version of the program. Such mutation
engines are used at distribution sites or in self-propagating malware in order to create variation in the distributed programs.
Program normalization is a way to remove variety introduced by mutation engines, and can thus simplify the problem of detecting
variant strains. This paper introduces the “normalizer construction problem” (NCP), and formalizes a restricted form of the
problem called “NCP=”, which assumes a model of the engine is already known in the form of a term rewriting system. It is
shown that even this restricted version of the problem is undecidable. A procedure is provided that can, in certain cases,
automatically solve NCP= from the model of the engine. This procedure is analyzed in conjunction with term rewriting theory
to create a list of distinct classes of normalizer construction problems. These classes yield a list of possible attack vectors.
Three strategies are defined for approximate solutions of NCP=, and an analysis is provided of the risks they entail. A case
study using the virus suggests the approximations may be effective in practice for countering mutated malware.
R. Mathur is presently at McAfee AVERT Labs. 相似文献