首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3113篇
  免费   393篇
  国内免费   44篇
电工技术   64篇
综合类   83篇
化学工业   716篇
金属工艺   160篇
机械仪表   170篇
建筑科学   110篇
矿业工程   13篇
能源动力   155篇
轻工业   202篇
水利工程   21篇
石油天然气   37篇
武器工业   7篇
无线电   538篇
一般工业技术   812篇
冶金工业   117篇
原子能技术   20篇
自动化技术   325篇
  2024年   4篇
  2023年   30篇
  2022年   40篇
  2021年   90篇
  2020年   82篇
  2019年   91篇
  2018年   128篇
  2017年   140篇
  2016年   142篇
  2015年   137篇
  2014年   164篇
  2013年   217篇
  2012年   206篇
  2011年   280篇
  2010年   219篇
  2009年   205篇
  2008年   168篇
  2007年   141篇
  2006年   125篇
  2005年   81篇
  2004年   93篇
  2003年   124篇
  2002年   171篇
  2001年   137篇
  2000年   72篇
  1999年   54篇
  1998年   41篇
  1997年   33篇
  1996年   17篇
  1995年   16篇
  1994年   15篇
  1993年   17篇
  1992年   8篇
  1991年   8篇
  1990年   2篇
  1989年   6篇
  1988年   9篇
  1987年   5篇
  1986年   7篇
  1985年   4篇
  1984年   5篇
  1983年   3篇
  1982年   2篇
  1981年   1篇
  1980年   1篇
  1977年   4篇
  1976年   4篇
  1974年   1篇
排序方式: 共有3550条查询结果,搜索用时 656 毫秒
81.
Abstract— Even though dyes have a fine resolution and good chromaticities, they are not widely used as coloring materials for color filters (CFs) due to their low thermal stability and chemical resistance. A series of azo‐dye derivatives, which consist of two cross‐linkable acrylate or methacrylate groups to improve thermal and chemical properties, have been synthesized and used to fabricate color filters. The spectral properties and chemical/thermal stabilities of the fabricated CFs were investigated by comparing dye‐based CFs, without a complicated dispersion process, but with pigment‐based CFs using dispersed pigment. Also, more properties including the development test and surface morphologies lithographic properties were studied. The synthesized azo dyes were characterized by elemental analysis, UV‐visible spectra, IR, mass, and 1H‐NMR spectra.  相似文献   
82.
Robust design (RD) and tolerance design (TD) have received much attention from researchers and practitioners for more than two decades, and a number of methodologies for modeling and optimizing the RD and TD processes have been studied. However, there is ample room for improvement. Because most existing research considers RD and TD as separate research fields, the primary objective of this paper is to develop a sequential robust–tolerance design method to jointly determine the best factor settings and the closed-form solutions for the optimal specification limits. We then apply the proposed method to a destructive quality characteristic. Finally, a case study and sensitivity analyses are performed for verification purposes, and further studies are discussed.  相似文献   
83.
Usage of frequency based error correction methods for repetitive disturbances becomes popular in data storage devices that use a rotating mechanical power plant. Two distinct disturbance cancellation methods, disturbance observer (DOB) and adaptive feed forward control (AFC) are the most popular approaches used for current drive servo integration. DOB reduces error using a predetermined function that is calculated thorough a complicated process. Generally the response to disturbance and initiation of control action of DOB is relatively fast even if the amount of error reduction is limited. Meanwhile the error elimination capability of AFC for the repetitive disturbance is normally better than DOB as it utilizes a Fourier coefficients updating feature that supports an enhanced fine adaptation of a certain frequency disturbance. Of course, AFC suffers for disturbances that have neighboring close frequencies due to the inherent fundamental frequency dependencies of AFC formulation. In the present work, an attempt for combining benefits of AFC and DOB is made. This might enables control action not only to generate fast response to disturbance but also perform an accurate error rejection. This feature also provides to the closed loop system a frequency selection for enabling a strategic selective error rejection. The proposed method named Hybrid Disturbance Observer (HDOB) is compared to the traditional AFC and DOB.  相似文献   
84.
Forward secrecy in an e-mail system means that compromising of the long-term secret keys of the mail users and mail servers does not affect the confidentiality of the e-mail messages. Previous forward-secure e-mail protocols used the certified public keys of the users using PKI (Public Key Infrastructure). In this paper, we propose a password-based authenticated e-mail protocol providing forward secrecy. The proposed protocol does not require certified public keys and is sufficiently efficient to be executed on resource-restricted mobile devices.  相似文献   
85.
User authentication is one of the fundamental procedures to ensure secure communications over an insecure public network channel. Especially, due to tamper-resistance and convenience in managing a password file, various user authentication schemes using smart cards have been proposed. A smart card however far from ubiquitous because of the high cost of a smart card and the infrastructure requirements. In this paper, we study secure user authentication using only a common storage device such as a universal serial bus (USB) memory, instead of using smart cards. We first show that the existing schemes using smart cards cannot be immediately converted into schemes using a common storage device. We then propose a practical and secure user authentication scheme, capable of supporting the use of the common storage device, which retains all the advantages of schemes using smart cards.  相似文献   
86.
Radio frequency Identification (RFID) systems are used to identify remote objects equipped with RFID tags by wireless scanning without manual intervention. Recently, EPCglobal proposed the Electronic Product Code (EPC) that is a coding scheme considered to be a possible successor to bar-code with added functionalities. In RFID-based applications where RFID tags are used to identify and track tagged objects, an RFID tag emits its EPC in plaintext. This makes the tag inevitably vulnerable to cloning attacks as well as information leakage and password disclosure. In this paper, we propose a novel anti-cloning method in accordance with the EPCglobal Class-1 Generation-2 (C1G2) standard. Our method only uses functions that can be supported by the standard and abides by the communication flow of the standard. The method is also secure against threats such as information leakage and password disclosure.  相似文献   
87.
88.
This paper presents a decentralised sampled-data control technique for a class of large-scale systems, which are considered to consist of linear subsystems and nonlinear interconnections. The decentralised sampled-data controller design problem is established using a closed-loop subsystem. Based on the controller design problem, the stability condition is derived for a closed-loop large-scale system, and the maximum interconnection bound is guaranteed to satisfy the stability condition. Also, its sufficient condition is formulated in terms of linear matrix inequalities. Finally, the effectiveness of the proposed technique is verified by using an example of the multi-machine power system.  相似文献   
89.
Digital image processing systems are complex, being usually composed of different computer vision libraries. Algorithm implementations cannot be directly used in conjunction with algorithms developed using other computer vision libraries. This paper formulates a software solution by proposing a processor with the capability of handling different types of image processing algorithms, which allow the end users to install new image processing algorithms from any library. This approach has other functionalities like capability to process one or more images, manage multiple processing jobs simultaneously and maintain the manner in which an image was processed for later use. It is a computational efficient and promising technique to handle variety of image processing algorithms. To promote the reusability and adaptation of the package for new types of analysis, a feature of sustainability is established. The framework is integrated and tested on a medical imaging application, and the software is made freely available for the reader. Future work involves introducing the capability to connect to another instance of processing service with better performance. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   
90.
This paper presents a fuzzy filter design method for nonlinear sampled-data systems using an intelligent digital redesign (IDR) technique. Based on a Takagi–Sugeno (T–S) fuzzy model, discretized closed-loop systems with pre-designed analog fuzzy and digital fuzzy filters are presented. An IDR problem is given to guarantee both state-matching condition and asymptotic stability. Sufficient conditions for solving the IDR problem are proposed and are derived in terms of linear matrix inequalities (LMIs). Finally, a simulation example is given to show the effectiveness of the proposed method.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号