首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   50721篇
  免费   6389篇
  国内免费   3543篇
电工技术   5004篇
技术理论   1篇
综合类   3899篇
化学工业   7400篇
金属工艺   2952篇
机械仪表   3291篇
建筑科学   4095篇
矿业工程   1742篇
能源动力   1499篇
轻工业   3877篇
水利工程   1359篇
石油天然气   2529篇
武器工业   670篇
无线电   6432篇
一般工业技术   5627篇
冶金工业   1875篇
原子能技术   487篇
自动化技术   7914篇
  2024年   405篇
  2023年   1387篇
  2022年   2672篇
  2021年   3633篇
  2020年   2534篇
  2019年   1900篇
  2018年   1917篇
  2017年   2122篇
  2016年   1874篇
  2015年   2530篇
  2014年   3018篇
  2013年   3396篇
  2012年   3930篇
  2011年   3993篇
  2010年   3439篇
  2009年   3238篇
  2008年   3141篇
  2007年   2823篇
  2006年   2529篇
  2005年   2220篇
  2004年   1410篇
  2003年   1074篇
  2002年   986篇
  2001年   837篇
  2000年   758篇
  1999年   653篇
  1998年   423篇
  1997年   375篇
  1996年   331篇
  1995年   261篇
  1994年   224篇
  1993年   138篇
  1992年   118篇
  1991年   81篇
  1990年   61篇
  1989年   46篇
  1988年   33篇
  1987年   24篇
  1986年   32篇
  1985年   11篇
  1984年   11篇
  1983年   4篇
  1982年   11篇
  1981年   6篇
  1980年   14篇
  1979年   12篇
  1975年   1篇
  1973年   1篇
  1959年   7篇
  1951年   8篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
71.
In Role Based Access Control (RBAC) systems, it is necessary and important to update the role–permission assignments in order to reflect the evolutions of the system transactions. However, role updating is generally complex and challenging, especially for large-scale RBAC systems. This is because the resulting state is usually expected to meet various requirements and constraints. In this paper, we focus on a fundamental problem of role updating in RBAC, which determines whether there exists a valid role–permission assignment, i.e., whether it can satisfy all the requirements of the role updating and without violating any role–capacity or permission–capacity constraint. We formally define such a problem as the Role Updating Feasibility Problem (RUFP), and study the computational complexity of RUFP in different subcases. Our results show that although several subcases are solvable in linear time, this problem is NP-complete in the general case.  相似文献   
72.
Recently, many local-feature based methods have been proposed for feature learning to obtain a better high-level representation of human behavior. Most of the previous research ignores the structural information existing among local features in the same video sequences, while it is an important clue to distinguish ambiguous actions. To address this issue, we propose a Laplacian group sparse coding for human behavior representation. Unlike traditional methods such as sparse coding, our approach prefers to encode a group of relevant features simultaneously and meanwhile allow as less atoms as possible to participate in the approximation so that video-level sparsity is guaranteed. By incorporating Laplacian regularization the method is capable to ensure the similar approximation of closely related local features and the structural information is successfully preserved. Thus, a compact but discriminative human behavior representation is achieved. Besides, the objective of our model is solved with a closed-form solution, which reduces the computational cost significantly. Promising results on several popular benchmark datasets prove the efficiency and effectiveness of our approach.  相似文献   
73.
The HUB-CI model is investigated in a telerobotic system in a client/server network to manage the lifecycle of engineering design and prototyping. The purpose of this platform is to support collaborative engineering design and proof of concept to enhance distributed team collaboration and resource utilization. The suggested platform is exemplified in two collaboration support tools and a physical prototyping platform. Structured Co-Insight Management is developed to support innovative idea exchanges and the consensus decision-making during the design process. Conflict/error detection management helps preventing conflicts and errors during the lifecycle of design and development. Physical collaboration over the network occurs when a team controls the telerobot operation during prototyping and testing in design cycles. A pilot system is implemented with a group project for the design of an electronic circuit (including both hardware and software designs). The functional assessment method is used to compare this platform to other collaborative design tools. The system presented offers unique qualitative advantages as an integrated collaboration support system.  相似文献   
74.
1 率值控制工艺结构 衡量生料质量的标准是水泥的三个率值.石灰石饱和系数KH、硅酸率SM、铝氧率IM,即在出磨生料中,、Fe2O3、Al2O3、SiO2诸氧化物的百分比含量必须满足以下二三式:  相似文献   
75.
节理化岩体力学参数是矿山工程地质和稳定性分析的重要基础数据,一般在实验室通过单轴、三轴试验只能得到岩石的力学参数,无法得到岩体的力学参数。目前,利用岩石力学参数确定岩体力学参数的方法较多,但都过于烦琐或准确度不高,急需一种新的简易确定方法。因此,通过利用基于广义Hoek-Brown准则的地质强度指标(GSI法),并结合相应的岩土分析软件,强度折剪岩石力学参数值,从而得到岩体的力学参数。通过将该方法应用于赤峰中色白音诺尔矿业有限公司岩体力学参数的计算中,证明采用该方法考虑岩体的结构面和完整性,可较为准确地反映节理化岩体的力学特性,且方便可行,具有工程实用价值。?  相似文献   
76.
Three-dimensionally ordered long-range macroporous carbon structures were prepared using commercially available phenolic resin by utilizing sacrificial colloidal silica crystalline arrays as templates that were subsequently removed by HF etching after pyrolysis in an argon atmosphere. SEM, TEM, and BET were employed to characterize the morphology and the surface area of the porous carbon structures. The pore size (150–1000 nm) and BET surface area, which reflect pore volume (298.6 m2/g (1.32 cm3/g) ∼ 93.7 m2/g (0.12 cm3/g)), of the macroporous carbon structures produced were approximately proportional to the size (150–1000 nm) of the sacrificial silica sphere templates used (annealing temp. 550°C). The achieved 550 nm porous carbon structures were examined to function as potential catalyst carriers and were successfully impregnated with Ag or Pt-Ru on their inner walls after borohydride reduction at room temperature. In addition, porous carbon patterns were fabricated using the ‘micromolding in capillary’ technique, which has potential applications in the microreaction technology.  相似文献   
77.
A quantum identity authentication scheme based on ping-pong technique without entanglements is proposed. It can verify the legitimate user’s identity and update the initial authentication key for reuse. The security of the proposed scheme is extensively analyzed and accordingly confirmed in the case of general individual attacks. The present scheme owns high efficiency due to the use of single-particle states in a two-way quantum channel. Moreover, the scheme is economical and feasible with present-day technique.  相似文献   
78.
Fault-tolerant shortest connection topology design for formation control   总被引:1,自引:0,他引:1  
This paper studies the fault tolerant formation keeping problem of multi-agent systems with consideration of shortest connection topology. This is motivated by the requirement of low communication cost which largely depends on the communication length. Given a formation shape, a connection topology design method and its reconfiguration strategy are proposed in the sense that the whole connection path is shortest despite of communication faults. A control framework that combines the individual formation controller of each agent and connection topology is further presented. The stability of the whole system process is analyzed by switched system theories. Simulation results of unmanned aerial vehicles (UAVs) show the effectiveness of the proposed strategy.  相似文献   
79.
在基础设施网络(如电力网、互联网等)设施中,往往会出现关键节点,主要表现为节点流量大、在网络中位置关键等,其性能不稳定将制约网络部分区域的功能。因此从提高关键基础设施的性能和安全性的角度出发,针对关键基础设施的检测成为一个重要的研究课题。提出了一种新颖的基于分布相似度迁移的互联网关键路由设备的检测算法,其目的是自动地检测当前互联网线路中的关键路由设备。在真实环境中,不同线路中不同路由设备的行为特征由于若干客观因素(网络状态、路由设备性能等)导致其分布通常不相同。因此,所提方法主要基于路由之间的分布相似度迁移:首先在目标域(当前路由)中通过谱聚类方法自动判断出可疑的路由设备,然后通过提出的基于分布相似度迁移的分类器对上一步中检测出的可疑路由设备进行分类。在华为公司提供的真实数据集上进行的测试表明,所提方法能够有效发现线路中的关键路由设备,同时能够根据不同线路之间的分布相似度迁移来提高分类结果。  相似文献   
80.
介绍了应用线性矩阵不等式(LMI)解决一类时滞系统H∞控制问题,给出了基于Lyapunov第二法的H∞稳定条件,通过求解锥补线性化问题,得到相应的控制器,使得闭环系统稳定且满足H∞性能指标.并通过实例给出了仿真结果.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号