首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7105篇
  免费   324篇
  国内免费   53篇
电工技术   133篇
综合类   26篇
化学工业   1789篇
金属工艺   119篇
机械仪表   213篇
建筑科学   277篇
矿业工程   6篇
能源动力   462篇
轻工业   725篇
水利工程   76篇
石油天然气   115篇
无线电   654篇
一般工业技术   1145篇
冶金工业   339篇
原子能技术   83篇
自动化技术   1320篇
  2024年   24篇
  2023年   151篇
  2022年   319篇
  2021年   405篇
  2020年   295篇
  2019年   335篇
  2018年   419篇
  2017年   358篇
  2016年   355篇
  2015年   236篇
  2014年   319篇
  2013年   641篇
  2012年   356篇
  2011年   505篇
  2010年   350篇
  2009年   326篇
  2008年   289篇
  2007年   217篇
  2006年   201篇
  2005年   140篇
  2004年   111篇
  2003年   118篇
  2002年   90篇
  2001年   64篇
  2000年   73篇
  1999年   51篇
  1998年   77篇
  1997年   41篇
  1996年   49篇
  1995年   42篇
  1994年   36篇
  1993年   44篇
  1992年   36篇
  1991年   32篇
  1990年   31篇
  1989年   21篇
  1988年   35篇
  1987年   30篇
  1986年   20篇
  1985年   15篇
  1984年   27篇
  1983年   22篇
  1982年   22篇
  1981年   16篇
  1980年   20篇
  1979年   16篇
  1978年   17篇
  1976年   18篇
  1975年   19篇
  1974年   12篇
排序方式: 共有7482条查询结果,搜索用时 15 毫秒
11.
In this paper, a novel direct instantaneous torque control scheme for a direct drive (DD) permanent magnet synchronous motor (PMSM) is presented. A hybrid control structure combining the internal model principle and the variable structure control (VSC) approach is proposed. First, a variable structure torque controller is adopted to regulate the torque angle increment according to the torque feedback error. Second, the appropriate control voltage vector is determined using the reference stator flux vector and the estimated dynamic back electromotive force (EMF) vector, as an internal model, in a deadbeat control manner. Subsequently, better disturbance rejection can be obtained with the proposed cascaded control structure. To robustly obtain the instantaneous torque and flux information, a robust adaptive motor model is proposed. The Lyapunov stability theory is used to analyze the stability of the augmented robust adaptive motor model and to give a guideline for tuning model parameters. Experimental results are presented to demonstrate the validity and effectiveness of the proposed instantaneous torque control scheme.  相似文献   
12.
Neural Computing and Applications - This paper presents an adaptive fuzzy fault-tolerant tracking control for a class of unknown multi-variable nonlinear systems, with external disturbances,...  相似文献   
13.
The kinetics of the reaction of chalcopyrite, iron sulphide, copper sulphide, and nickel sulphide with sulphur trioxide gas were studied using a fluidised bed technique. O2, N2, or air was used as a carrier gas for the sulphur trioxide in fluidisation. Binary mixtures of finely ground (0.37–75 μm) samples were reacted with the sulphur trioxide in a Pyrex column at 373–673 K. The reaction products were leached with water and the soluble metals in the solution were determined by atomic absorption spectrometry. The total soluble reaction products were determined gravimetrically. The results obtained showed that a higher yield of soluble salts was obtained when O2 or air was used as a carrier gas for sulphur trioxide than when an inert gas was used. Higher yields of soluble salts were obtained when the samples were most finely ground. Increase of copper sulphide content in binary mixtures with iron or nickel sulphide led to an increase in the yield of soluble salts. For iron sulphide/nickel sulphide mixtures, the yield of soluble salts increased with the nickel sulphide content. There were maximum values for the soluble metal ratios Ni/Fe and Cu/Ni in the corresponding sulphide binary mixtures and this maximum was at about 50% weight. The soluble Cu/Fe ratio increased with copper sulphide content in mixtures with iron sulphide.  相似文献   
14.
Disperse-phase-controlled mass transfer rates from individual liquid drops suspended in a second liquid phase are measured optically immediately after the drop has been formed by coalescence of two smaller droplets. The net effect on mass transfer of the act of coalescence is determined by comparison to similar measurements made on the initial droplets in the absence of coalescence. The transfer rates immediately after coalescence are high rapidly fall to zero, rebound to an intermediate value and finally decay to the level expected for an undisturbed drop. The net effect on total mass transferred is detrimental in a clean system subject to interfacial instability but appears to be beneficial for contaminated systems or where no surface movements are spontaneously generated.  相似文献   
15.
Recommendations in location-based social networks: a survey   总被引:2,自引:0,他引:2  
  相似文献   
16.
In this paper, we present a new sufficient condition for absolute stability of Lure system with two additive time-varying delay components. This criterion is expressed as a set of linear matrix inequalities (LMIs), which can be readily tested by using standard numerical software. We use this new criterion to stabilize a class of nonlinear time-delay systems. Some numerical examples are given to illustrate the applicability of the results using standard numerical software.  相似文献   
17.
Quality function deployment (QFD) is a customer-oriented design tool for developing new or improved products to achieve higher customer satisfaction by integrating various functions of an organization. The engineering characteristics (ECs) affecting the product performances are designed to match the customer attributes (CAs). However, from the viewpoint of the QFD team, product design processes are performed in imprecise environments, and more than one factor must be taken into account in determining the target levels of ECs, especially the limited resources and increased market competition. This paper presents an imprecise goal programming (GP) approach to determine the optimum target levels of ECs in QFD for maximizing customer satisfaction under resource limitation and considerations of market competition. Based on benchmarking data of CAs, the concept of satisfaction functions is utilized to formulate explicitly the customer's preferences and to integrate the competitive analysis of target market into the modelling and solution process. In addition, the relationships linking CAs and ECs and the ECs to each other are integrated by functional relationships. The proposed approach will be illustrated through a car door design example.  相似文献   
18.
We present a secure routing protocol that is immune to Sybil attacks and that can tolerate collusion of Byzantine routers. It can tolerate either initial collusion of Byzantine routers or runtime collusion of non-adjacent Byzantine routers, both in the absence of runtime collusion between adjacent routers. For these settings, the calculated distance from a destination to a node is not smaller than the actual shortest distance from the destination to the node. The protocol can also simultaneously tolerate initial collusion of Byzantine routers and runtime collusion of adjacent Byzantine routers but in the absence of runtime collusion between non-adjacent routers. For this setting, it guarantees a bound on the difference between the calculated distance and the actual shortest distance. The bound depends on the number of Byzantine routers on a path. The protocol makes very weak timing assumptions and requires synchronization only between neighbors or second neighbors. We propose to use this protocol for secure localization of routers using hop-count distances, which can be then used as a proof of identity of nodes.  相似文献   
19.
Numerical modelling of the deformation of a polymer using the finite elements method in axisymetrical mode was performed using the LsDyna® software to describe the filling of micro-cavities during the forming process of the material using the hot embossing. These simulations firstly allow verifying whether the chosen forming process conditions promote or not an optimized filling of the superficial cavities in order to achieve precise replicas which best reproduce the superficial topography of the mould. The simulations were carried out to evaluate the filling of the cavities taking into account the mechanical behaviour of the selected polymer into the model. Moreover, these models were developed to verify the effect of the distribution of the mould cavities on their filling. The influence of the mobility of non deformable rigid plates on the filling of the cavities represents an auxiliary variable. In the approach presented, the compression plates are assumed to be parallel and non deformable, whereas the polymer disk follows a rubbery behaviour around a temperature equal to 140°C. Globally the modelling results are satisfactory for they are rather close to the experimental observations conducted. In summary, the effect of the normal stress as also the distribution of micro-cavities at the mould surface seem to prevail in the case of the forming process by hot embossing.  相似文献   
20.
A malware mutation engine is able to transform a malicious program to create a different version of the program. Such mutation engines are used at distribution sites or in self-propagating malware in order to create variation in the distributed programs. Program normalization is a way to remove variety introduced by mutation engines, and can thus simplify the problem of detecting variant strains. This paper introduces the “normalizer construction problem” (NCP), and formalizes a restricted form of the problem called “NCP=”, which assumes a model of the engine is already known in the form of a term rewriting system. It is shown that even this restricted version of the problem is undecidable. A procedure is provided that can, in certain cases, automatically solve NCP= from the model of the engine. This procedure is analyzed in conjunction with term rewriting theory to create a list of distinct classes of normalizer construction problems. These classes yield a list of possible attack vectors. Three strategies are defined for approximate solutions of NCP=, and an analysis is provided of the risks they entail. A case study using the virus suggests the approximations may be effective in practice for countering mutated malware. R. Mathur is presently at McAfee AVERT Labs.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号