首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5788篇
  免费   534篇
  国内免费   59篇
电工技术   78篇
综合类   25篇
化学工业   1300篇
金属工艺   101篇
机械仪表   284篇
建筑科学   108篇
矿业工程   8篇
能源动力   377篇
轻工业   760篇
水利工程   67篇
石油天然气   30篇
武器工业   1篇
无线电   726篇
一般工业技术   1322篇
冶金工业   114篇
原子能技术   51篇
自动化技术   1029篇
  2024年   34篇
  2023年   206篇
  2022年   471篇
  2021年   790篇
  2020年   483篇
  2019年   541篇
  2018年   505篇
  2017年   421篇
  2016年   425篇
  2015年   260篇
  2014年   319篇
  2013年   422篇
  2012年   254篇
  2011年   315篇
  2010年   174篇
  2009年   155篇
  2008年   102篇
  2007年   101篇
  2006年   47篇
  2005年   34篇
  2004年   39篇
  2003年   37篇
  2002年   22篇
  2001年   12篇
  2000年   17篇
  1999年   18篇
  1998年   32篇
  1997年   16篇
  1996年   13篇
  1995年   19篇
  1994年   16篇
  1993年   12篇
  1992年   10篇
  1991年   8篇
  1990年   2篇
  1989年   6篇
  1988年   4篇
  1987年   5篇
  1986年   1篇
  1985年   6篇
  1984年   3篇
  1983年   3篇
  1982年   5篇
  1981年   3篇
  1980年   2篇
  1979年   4篇
  1978年   2篇
  1977年   4篇
  1961年   1篇
排序方式: 共有6381条查询结果,搜索用时 15 毫秒
61.
A physical system can be studied as either continuous time or discrete-time system depending upon the control objectives. Discrete-time control systems can be further classified into two categories based on the sampling: (1) time-triggered control systems and (2) event-triggered control systems. Time-triggered systems sample states and calculate controls at every sampling instant in a periodic fashion, even in cases when states and calculated control do not change much. This indicates unnecessary and useless data transmission and computation efforts of a time-triggered system, thus inefficiency. For networked systems, the transmission of measurement and control signals, thus, cause unnecessary network traffic. Event-triggered systems, on the other hand, have potential to reduce the communication burden in addition to reducing the computation of control signals. This paper provides an up-to-date survey on the event-triggered methods for control systems and highlights the potential research directions.  相似文献   
62.
The asymmetric Sharpless epoxidation of methyl 13S‐hydroxy‐9Z, 11E‐octadeca‐dienoate (13S‐HODE, 1 ) with tert‐butyl hydroperoxide (TBHP) catalysed by titanium tetraisopropoxide {Ti(iOPr)4} in the presence of L(+)‐diisopropyl tartrate (L‐DIPT) gave methyl 13S‐hydroxy‐11S, 12S‐epoxy‐9Z‐octadecenoate 2 (erythro isomer) in 84% diastereomeric excess (de). The epoxidation of 1 with TBHP catalysed by Ti(iOPr)4 in the presence of D(‐)‐DIPT yielded methyl 13S‐hydroxy‐11RR12R‐epoxy‐9Z‐octadecenoate (threo isomer) 3 in 76% de.  相似文献   
63.
The interpretation of way-finding symbols for healthcare facilities in a multicultural community was assessed in a cross-sectional study. One hundred participants recruited from Al Ain city in the United Arab Emirates were asked to interpret 28 healthcare symbols developed at Hablamos Juntos (such as vaccinations and laboratory) as well as 18 general-purpose symbols (such as elevators and restrooms). The mean age was 27.6 years (16–55 years) of whom 84 (84%) were females. Healthcare symbols were more difficult to comprehend than general-purpose signs. Symbols referring to abstract concepts were the most misinterpreted including oncology, diabetes education, outpatient clinic, interpretive services, pharmacy, internal medicine, registration, social services, obstetrics and gynecology, pediatrics and infectious diseases. Interpretation rates varied across cultural backgrounds and increased with higher education and younger age. Signage within healthcare facilities should be tested among older persons, those with limited literacy and across a wide range of cultures.  相似文献   
64.
This paper introduces a certain graphical coalitional game where the internal topology of the coalition depends on a prescribed communication graph structure among the agents. The game Value Function is required to satisfy four Axioms of Value. These axioms make it possible to provide a refined study of coalition structures on graphs by defining a formal graphical game and by assigning a Positional Advantage, based on the Shapley value, to each agent in a coalition based on its connectivity properties within the graph. Using the Axioms of Value the graphical coalitional game can be shown to satisfy properties such as convexity, fairness, cohesiveness, and full cooperativeness. Three measures of the contributions of agents to a coalition are introduced: marginal contribution, competitive contribution, and altruistic contribution. The mathematical framework given here is used to establish results regarding the dependence of these three types of contributions on the graph topology, and changes in these contributions due to changes in graph topology. Based on these different contributions, three online sequential decision games are defined on top of the graphical coalitional game, and the stable graphs under each of these sequential decision games are studied. It is shown that the stable graphs under the objective of maximizing the marginal contribution are any connected graph. The stable graphs under the objective of maximizing the competitive contribution are the complete graph. The stable graphs under the objective of maximizing the altruistic contribution are any tree.  相似文献   
65.
66.
Fuzzy geographic information systems is a newly emerging field of computational intelligence. It combines fuzzy logic with spatial context. Most of the natural phenomena are fuzzy in nature. They show a degree of uncertainty or vagueness in their extent and attribute, which cannot be expressed by a crisp value. Agriculture is one of the fields of the spatial domain that needs to be described in fuzzy terms. Fertilizer is a key input for the agriculture sector. In this article, the spatial surfaces of fertilizers are developed for the wheat crop using a fuzzy decision support system. The algorithm of our system takes soil nutrients and cropping time as input, applies fuzzy logic on the input values, defuzzifies the fuzzy output to crisp value, and generates a fertilizer surface. The resultant output surface of fertilizer describes the amount of fertilizer needed to cultivate a specific crop in a specified area. The complexity of our algorithm is \(O(mnr)\) , where \(m\) is the height of the raster, \(n\) is the width of the raster, and \(r\) is the number of expert rules.  相似文献   
67.
Some ferrocene containing aromatic azo polyesters were prepared by condensing 1,1-ferrocenedicarbonyl chloride with different azo groups containing aromatic diols, which were synthesized by diazotization coupling reaction from aromatic diamines. The polymeric products were separated as two portions on the basis of their solubility and subsequently characterized by their elemental analysis and FTIR spectral studies. Thermal properties of the products were measured by differential scanning calorimetry and thermogravimetry and the activation energies of pyrolysis were calculated using Horowitz and Metzger's method. The molecular weights of the soluble portions were determined by gel permeation chromatography (GPC) and these portions were also characterized by their inherent viscosities and UV-Vis spectroscopic studies.  相似文献   
68.
Anomaly detection in resource constrained wireless networks is an important challenge for tasks such as intrusion detection, quality assurance and event monitoring applications. The challenge is to detect these interesting events or anomalies in a timely manner, while minimising energy consumption in the network. We propose a distributed anomaly detection architecture, which uses multiple hyperellipsoidal clusters to model the data at each sensor node, and identify global and local anomalies in the network. In particular, a novel anomaly scoring method is proposed to provide a score for each hyperellipsoidal model, based on how remote the ellipsoid is relative to their neighbours. We demonstrate using several synthetic and real datasets that our proposed scheme achieves a higher detection performance with a significant reduction in communication overhead in the network compared to centralised and existing schemes.  相似文献   
69.
High density of coexisting networks in the Industrial, Scientific and Medical (ISM) band leads to static and self interferences among different communication entities. The inevitability of these interferences demands for interference avoidance schemes to ensure reliability of network operations. This paper proposes a novel Diversified Adaptive Frequency Rolling (DAFR) technique for frequency hopping in Bluetooth piconets. DAFR employs intelligent hopping procedures in order to mitigate self interferences, weeds out the static interferer efficiently and ensures sufficient frequency diversity. We compare the performance of our proposed technique with the widely used existing frequency hopping techniques, namely, Adaptive Frequency Hopping (AFH) and Adaptive Frequency Rolling (AFR). Simulation studies validate the significant improvement in goodput and hopping diversity of our scheme compared to other schemes and demonstrate its potential benefit in real world deployment.  相似文献   
70.
Recently, physical layer security commonly known as Radio Frequency (RF) fingerprinting has been proposed to provide an additional layer of security for wireless devices. A unique RF fingerprint can be used to establish the identity of a specific wireless device in order to prevent masquerading/impersonation attacks. In the literature, the performance of RF fingerprinting techniques is typically assessed using high-end (expensive) receiver hardware. However, in most practical situations receivers will not be high-end and will suffer from device specific impairments which affect the RF fingerprinting process. This paper evaluates the accuracy of RF fingerprinting employing low-end receivers. The vulnerability to an impersonation attack is assessed for a modulation-based RF fingerprinting system employing low-end commodity hardware (by legitimate and malicious users alike). Our results suggest that receiver impairment effectively decreases the success rate of impersonation attack on RF fingerprinting. In addition, the success rate of impersonation attack is receiver dependent.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号