首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   111209篇
  免费   3369篇
  国内免费   1848篇
电工技术   2519篇
技术理论   1篇
综合类   4280篇
化学工业   15939篇
金属工艺   6219篇
机械仪表   4772篇
建筑科学   4326篇
矿业工程   1472篇
能源动力   1875篇
轻工业   6030篇
水利工程   1807篇
石油天然气   2118篇
武器工业   206篇
无线电   11985篇
一般工业技术   19149篇
冶金工业   3941篇
原子能技术   581篇
自动化技术   29206篇
  2024年   142篇
  2023年   506篇
  2022年   900篇
  2021年   1209篇
  2020年   873篇
  2019年   753篇
  2018年   15187篇
  2017年   14215篇
  2016年   10714篇
  2015年   1706篇
  2014年   1702篇
  2013年   1991篇
  2012年   4991篇
  2011年   11493篇
  2010年   10070篇
  2009年   7274篇
  2008年   8530篇
  2007年   9357篇
  2006年   1652篇
  2005年   2586篇
  2004年   2044篇
  2003年   1929篇
  2002年   1253篇
  2001年   719篇
  2000年   791篇
  1999年   640篇
  1998年   503篇
  1997年   442篇
  1996年   395篇
  1995年   294篇
  1994年   268篇
  1993年   178篇
  1992年   159篇
  1991年   104篇
  1990年   66篇
  1989年   39篇
  1988年   57篇
  1987年   28篇
  1968年   43篇
  1967年   33篇
  1966年   42篇
  1965年   44篇
  1963年   28篇
  1960年   30篇
  1959年   37篇
  1958年   37篇
  1957年   36篇
  1956年   34篇
  1955年   63篇
  1954年   68篇
排序方式: 共有10000条查询结果,搜索用时 12 毫秒
101.
102.
Asymptotic homogenization is employed assuming a sharp length scale separation between the periodic structure (fine scale) and the whole composite (coarse scale). A classical approach yields the linear elastic-type coarse scale model, where the effective elastic coefficients are computed solving fine scale periodic cell problems. We generalize the existing results by considering an arbitrary number of subphases and general periodic cell shapes. We focus on the stress jump conditions arising in the cell problems and explicitly compute the corresponding interface loads. The latter represent a key driving force to obtain nontrivial cell problems solutions whenever discontinuities of the coefficients between the host medium (matrix) and the subphases occur. The numerical simulations illustrate the geometrically induced anisotropy and foster the comparison between asymptotic homogenization and well established Eshelby based techniques. We show that the method can be routinely implemented in three dimensions and should be applied to hierarchical hard tissues whenever the precise shape and arrangement of the subphases cannot be ignored. Our numerical results are benchmarked exploiting the semi-analytical solution which holds for cylindrical aligned fibers.  相似文献   
103.
This paper studies the lateral and longitudinal path tracking control of four-wheel steering vehicles. By the introduction of virtual points, a robust and adaptive path tracking control strategy is proposed to simultaneously counteract modeling uncertainties, unexpected disturbances, and coupling effects. An adaptive model-based feedforward adaptive term and the robust integral of the sign of the error (RISE) feedback term can be used to yield an asymptotic tracking result, which improve the tracking performance and reduce the control effort. The stability of closed-loop system is analyzed using a Lyapunov-based method. Simulation results are provided to demonstrate the performance of the proposed controller under different driving conditions.  相似文献   
104.
In this paper, the resilient control under the Denial-of-Service (DoS) attack is rebuilt within the framework of Joint Directors of Laboratories (JDL) data fusion model. The JDL data fusion process is characterized by the so-called Game-in-Game approach, where decisions are made at different layers. The interactions between different JDL levels are considered which take the form of Packet Delivery Rate of the communication channel. Some criterions to judge whether the cyber defense system is able to protect the underlying control system is provided. Finally, a numerical example is proposed to verify the validity of the proposed method.  相似文献   
105.
Traditionally, model calibration is formulated as a single objective problem, where fidelity to measurements is maximized by adjusting model parameters. In such a formulation however, the model with best fidelity merely represents an optimum compromise between various forms of errors and uncertainties and thus, multiple calibrated models can be found to demonstrate comparable fidelity producing non-unique solutions. To alleviate this problem, the authors formulate model calibration as a multi-objective problem with two distinct objectives: fidelity and robustness. Herein, robustness is defined as the maximum allowable uncertainty in calibrating model parameters with which the model continues to yield acceptable agreement with measurements. The proposed approach is demonstrated through the calibration of a finite element model of a steel moment resisting frame.  相似文献   
106.
The enigmatic Hypnerotomachia Poliphili published anonymously in 1499 has long posed puzzles for historians and other scholars. This present text argues that the volume can credibly be attributed, not to Francesca Colonna as is often done, but to the Renaissance humanist and polymath Leon Battista Alberti. Evidence for this is found in the unravelling of arithmogrammatical evidence sprinkled throughout the work, similar to those found in other of Alberti’s works.  相似文献   
107.
Resonance and wave-propagation problems are known to be highly sensitive towards parameter variations. This paper discusses topology optimization formulations for creating designs that perform robustly under spatial variations for acoustic cavity problems. For several structural problems, robust topology optimization methods have already proven their worth. However, it is shown that direct application of such methods is not suitable for the acoustic problem under consideration. A new double filter approach is suggested which makes robust optimization for spatial variations possible. Its effect and limitations are discussed. In addition, a known explicit penalization approach is considered for comparison. For near-uniform spatial variations it is shown that highly robust designs can be obtained using the double filter approach. It is finally demonstrated that taking non-uniform variations into account further improves the robustness of the designs.  相似文献   
108.
This paper proposes a robust image hashing method in discrete Fourier domain that can be applied in such fields as image authentication and retrieval. In the pre-processing stage, image resizing and total variation based filtering are first used to regularize the input image. Then the secondary image is obtained by the rotation projection, and the robust frequency feature is extracted from the secondary image after discrete Fourier transform. More sampling points are chosen from the low- and middle-frequency component to represent the salient content of the image effectively, which is achieved by the non-uniform sampling. Finally, the intermediate sampling feature vectors are scrambled and quantized to produce the resulting binary hash securely. The security of the method depends entirely on the secret key. Experiments are conducted to show that the present method has satisfactory robustness against perceptual content-preserving manipulations and has also very low probability for collision of the hashes of distinct images.  相似文献   
109.
Zusammenfassung Im Zeitalter der Informationsgesellschaft, so wurde postuliert, spielten r?umliche Distanzen keine Rolle mehr und unsere r?umliche Mobilit?t n?hme ab. Die Mobilit?t in den letzten Jahren, speziell die Freizeitmobilit?t, hat hingegen zugenommen. Die Bereitstellung ortsbezogener Dienste – ,,Location-based Services“ – unterstützt und f?rdert dieses Verhalten.  相似文献   
110.
This paper proposes an efficient parallel algorithm for computing Lagrange interpolation on k-ary n-cube networks. This is done using the fact that a k-ary n-cube can be decomposed into n link-disjoint Hamiltonian cycles. Using these n link-disjoint cycles, we interpolate Lagrange polynomial using full bandwidth of the employed network. Communication in the main phase of the algorithm is based on an all-to-all broadcast algorithm on the n link-disjoint Hamiltonian cycles exploiting all network channels, and thus, resulting in high-efficiency in using network resources. A performance evaluation of the proposed algorithm reveals an optimum speedup for a typical range of system parameters used in current state-of-the-art implementations.
Hamid Sarbazi-AzadEmail: Email:
  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号