首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   62730篇
  免费   6520篇
  国内免费   4134篇
电工技术   5474篇
技术理论   3篇
综合类   5289篇
化学工业   8856篇
金属工艺   3746篇
机械仪表   4216篇
建筑科学   5339篇
矿业工程   1655篇
能源动力   1813篇
轻工业   4804篇
水利工程   1501篇
石油天然气   2690篇
武器工业   699篇
无线电   7768篇
一般工业技术   6915篇
冶金工业   2173篇
原子能技术   830篇
自动化技术   9613篇
  2024年   374篇
  2023年   1098篇
  2022年   2166篇
  2021年   2992篇
  2020年   2255篇
  2019年   1727篇
  2018年   1780篇
  2017年   2070篇
  2016年   1922篇
  2015年   2691篇
  2014年   3339篇
  2013年   3934篇
  2012年   4728篇
  2011年   4893篇
  2010年   4421篇
  2009年   4351篇
  2008年   4390篇
  2007年   3933篇
  2006年   3719篇
  2005年   2974篇
  2004年   2141篇
  2003年   1859篇
  2002年   2163篇
  2001年   1907篇
  2000年   1427篇
  1999年   1013篇
  1998年   645篇
  1997年   537篇
  1996年   437篇
  1995年   351篇
  1994年   269篇
  1993年   194篇
  1992年   171篇
  1991年   124篇
  1990年   85篇
  1989年   79篇
  1988年   57篇
  1987年   43篇
  1986年   22篇
  1985年   23篇
  1984年   15篇
  1983年   8篇
  1982年   15篇
  1981年   10篇
  1980年   14篇
  1979年   6篇
  1976年   1篇
  1974年   1篇
  1959年   5篇
  1951年   5篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
71.
Xue  Xia  Gao  Yi  Liu  Meng  Sun  Xia  Zhang  Wenyu  Feng  Jun 《Applied Intelligence》2021,51(7):4730-4743
Applied Intelligence - Personnel performance is a key factor to maintain core competitive advantages. Thus, predicting personnel future performance is a significant research domain in human...  相似文献   
72.
水下相机对海洋生物科学研究有重要意义,其控制系统的设计关键在于光源控制方案以及电源效率的提高;提出并实现了一种基于低功耗微控制器、高亮LED光源以及LED控制驱动器MAX16802B的水下相机控制系统,详细介绍了系统组成,并给出了基于低功耗策略的硬件和软件优化设计方案;实验结果表明,该设计方案电路结构简单,稳定性好,电源效率达75%以上,能够满足长时间水下拍摄工作;在实际海下测试中,按20分钟的拍摄间隔需求,水下相机可连续工作2个月以上。  相似文献   
73.
飞机环控试验台须模拟流量0~14000kg/h、压力0~2.5MPa和常温~500℃的空气环境;项目要求测控范围广、精度±1%且不超调;空气状态具有非线性、时变等特点,且控制参数之间存在复杂耦合;针对以上难点,设计了分布式测控系统,提出了改进的智能PID控制方案;通过遗传算法分段整定PID参数,离线建立PID数据库,使系统能够根据控制目标值选择最优PID初值;在此基础上,结合模糊推理在线调整PID参数,使系统具有了自适应性,能在具体工况和干扰下达到很好的控制效果;实际应用中完全满足了指标要求,解决了传统PID的控制难点,对类似的复杂系统有一定借鉴意义。  相似文献   
74.
The effective strategy of Internet of Things (IoT) can help firms to grasp the emerging opportunities from the IoT and then improve their competitive advantage. In this article, based on organizational capability perspective, we provide a theoretical framework which classifies IoT strategies into four archetypes from two dimensions of managers’ strategic intent and industrial driving force, and propose that market-based exploratory capabilities play a more important role for firms adopting get-ahead strategy, and market-based exploitative capabilities play a more important role for firms adopting catch-up strategy in market. The technology-based exploratory capabilities play a more important role for firms adopting get-ahead strategy in technology, and technology-based exploitative capabilities play a more important role for firms adopting catch-up strategy in technology. Especially, external industry information sharing more efficiently contributes to the enhancement of both market-based and technology-based exploratory capabilities, and internal industry information sharing more efficiently contributes to the enhancement of both market-based and technology-based exploitative capabilities.  相似文献   
75.
76.
In this paper, we study the existence and asymptotic stability in the pth moment of the mild solutions to impulsive stochastic neutral partial differential equations with infinite delays. Sufficient conditions ensuring the stability of the impulsive stochastic system are established. The results are obtained via the Banach fixed point theorem.  相似文献   
77.
Next-generation scientific applications feature complex workflows comprised of many computing modules with intricate inter-module dependencies. Supporting such scientific workflows in wide-area networks especially Grids and optimizing their performance are crucial to the success of collaborative scientific discovery. We develop a Scientific Workflow Automation and Management Platform (SWAMP), which enables scientists to conveniently assemble, execute, monitor, control, and steer computing workflows in distributed environments via a unified web-based user interface. The SWAMP architecture is built entirely on a seamless composition of web services: the functionalities of its own are provided and its interactions with other tools or systems are enabled through web services for easy access over standard Internet protocols while being independent of different platforms and programming languages. SWAMP also incorporates a class of efficient workflow mapping schemes to achieve optimal end-to-end performance based on rigorous performance modeling and algorithm design. The performance superiority of SWAMP over existing workflow mapping schemes is justified by extensive simulations, and the system efficacy is illustrated by large-scale experiments on real-life scientific workflows for climate modeling through effective system implementation, deployment, and testing on the Open Science Grid.  相似文献   
78.
Oblivious signature-based envelope (OSBE) schemes have demonstrated their potential applications in the protection of users privacy and rights. In an OSBE protocol, an encrypted message can only be decrypted by the receiver who holds a valid signature on a public message, while the sender (encrypter) does not know whether the receiver has the signature or not. Our major contributions in this work lie in the following aspects. We improve the notion of OSBE so that a valid credential holder cannot share his/her credential with other users (i.e., all-or-nothing non-transferability). We clarify the relationship between one-round OSBE and identity-based encryption (IBE) and show that one-round OSBE and semantically secure IBE against the adaptively chosen identity attack (IND-ID-CPA) are equivalent, if the signature in the OSBE scheme is existentially unforgeable against adaptively chosen message attacks. We propose an oblivious access control scheme to protect user privacy without the aid of any zero-knowledge proof. Finally, we also highlight some other novel applications of OSBE, such as attributed-based encryption.  相似文献   
79.
This paper presents a method for designing a controller that uses an active anti-roll bar (AARB) and an electronic stability program (ESP) for rollover prevention. ESP with longitudinal speed control (LSC) can carry out active braking to reduce vehicle speed and lateral acceleration to prevent a rollover. To enhance the rollover prevention capability of the ESP, an AARB is adopted. The controller for the AARB was designed based on linear quadratic (LQ) static output feedback (SOF) control methodology, which attenuates the effect of lateral acceleration on the roll angle and roll rate by control of the suspension stroke and the tire deflection of the vehicle. Although this AARB significantly increases ride comfort and rollover prevention, it has a drawback — the vehicle loses its maneuverability. Therefore, the ESP with LSC is used to overcome this drawback. Simulations showed that the proposed method was effective in preventing a rollover.  相似文献   
80.
Summary Byzantine Agreement is important both in the theory and practice of distributed computing. However, protocols to reach Byzantine Agreement are usually expensive both in the time required as well as in the number of messages exchanged. In this paper, we present a self-adjusting approach to the problem. The Mostly Byzantine Agreement is proposed as a more restrictive agreement problem that requires that in the consecutive attempts to reach agreement, the number of disagreements (i.e., failures to reach Byzantine Agreement) is finite. Fort faulty processes, we give an algorithm that has at mostt disagreements for 4t or more processes. Another algorithm is given forn3t+1 processes with the number of disagreements belowt 2/2. Both algorithms useO(n 3) message bits for binary value agreement. Yi Zhao is currently working on his Ph.D. degree in Computer Science at University of Houston. His research interests include fault tolerance, distributed computing, parallel computation and neural networks. He obtained his M.S. from University of Houston in 1988 and B.S. from Beijing University of Aeronautics and Astronautics in 1984, both in computer science. Farokh B. Bastani received the B. Tech. degree in electrical engineering from the Indian Institute of Technology, Bombay, India, and the M.S. and Ph.D. degrees in electrical engineering and computer science from the University of California, Berkeley. He joined the University of Houston in 1980, where he is currently an Associate Professor of Computer Science. His research interests include software design and validation techniques, distributed systems, and fault-tolerant systems. He is a member of the ACM and the IEEE and is on the editorial board of theIEEE Transactions on Software Engineering.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号