首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   8471篇
  免费   782篇
  国内免费   178篇
电工技术   556篇
综合类   240篇
化学工业   1671篇
金属工艺   336篇
机械仪表   576篇
建筑科学   723篇
矿业工程   339篇
能源动力   283篇
轻工业   646篇
水利工程   124篇
石油天然气   432篇
武器工业   31篇
无线电   812篇
一般工业技术   1137篇
冶金工业   328篇
原子能技术   34篇
自动化技术   1163篇
  2024年   53篇
  2023年   201篇
  2022年   284篇
  2021年   453篇
  2020年   343篇
  2019年   330篇
  2018年   394篇
  2017年   397篇
  2016年   314篇
  2015年   414篇
  2014年   589篇
  2013年   696篇
  2012年   772篇
  2011年   778篇
  2010年   670篇
  2009年   548篇
  2008年   511篇
  2007年   444篇
  2006年   482篇
  2005年   355篇
  2004年   163篇
  2003年   110篇
  2002年   58篇
  2001年   22篇
  2000年   20篇
  1999年   12篇
  1998年   4篇
  1997年   1篇
  1996年   2篇
  1995年   1篇
  1994年   1篇
  1993年   1篇
  1991年   1篇
  1990年   1篇
  1986年   2篇
  1985年   2篇
  1979年   2篇
排序方式: 共有9431条查询结果,搜索用时 15 毫秒
91.
信任模型是整个网络安全体系的基础,决定了在网络上采用信任的形式与采用该形式带来的信任风险,并提供了建立和管理信任关系的框架。可见,对于信任模型的研究在网络安全中非常重要。文章着重分析了基于PKI的各类信任模型的信任机制、认证过程及其存在优缺点,指出了各类信任模型对网络信息安全产生影响的主要原因。通过总结与对比,指出了PKI信任模型的设计策略与发展趋势。  相似文献   
92.
A neural network approach is presented for solving mathematical programs with equilibrium constraints (MPEC). The proposed neural network is proved to be Lyapunov stable and capable of generating approximal optimal solution to the MPEC problem. The asymptotic properties of the neural network are analyzed and the condition for asymptotic stability, solution feasibility and solution optimality are derived and the transient behavior of the neural network is simulated and the validity of the network is verified with numerical examples.  相似文献   
93.
Though cryptography is being used more and more widely in reality, it seems that there exists no scheme or a concatenation of some existing schemes that could deal soundly with such practical situations as providing a clue, where the provider of the clue may want to reserve his beneficial rights while keeping his identity secret. To address this problem, inspired by the two notions of the ring signature and the authenticated encryption signature, we propose a new type of authenticated encryption scheme, which we call the ring authenticated encryption scheme, which can enable any member of a group of persons to provide a clue to some designated recipient wisely.  相似文献   
94.
An online adaptive optimal control is proposed for continuous-time nonlinear systems with completely unknown dynamics, which is achieved by developing a novel identifier-critic-based approximate dynamic programming algorithm with a dual neural network (NN) approximation structure. First, an adaptive NN identifier is designed to obviate the requirement of complete knowledge of system dynamics, and a critic NN is employed to approximate the optimal value function. Then, the optimal control law is computed based on the information from the identifier NN and the critic NN, so that the actor NN is not needed. In particular, a novel adaptive law design method with the parameter estimation error is proposed to online update the weights of both identifier NN and critic NN simultaneously, which converge to small neighbourhoods around their ideal values. The closed-loop system stability and the convergence to small vicinity around the optimal solution are all proved by means of the Lyapunov theory. The proposed adaptation algorithm is also improved to achieve finite-time convergence of the NN weights. Finally, simulation results are provided to exemplify the efficacy of the proposed methods.  相似文献   
95.
In this article, two adaptive iterative learning control (ILC) algorithms are presented for nonlinear continuous systems with non-parametric uncertainties. Unlike general ILC techniques, the proposed adaptive ILC algorithms allow that both the initial error at each iteration and the reference trajectory are iteration-varying in the ILC process, and can achieve non-repetitive trajectory tracking beyond a small initial time interval. Compared to the neural network or fuzzy system-based adaptive ILC schemes and the classical ILC methods, in which the number of iterative variables is generally larger than or equal to the number of control inputs, the first adaptive ILC algorithm proposed in this paper uses just two iterative variables, while the second even uses a single iterative variable provided that some bound information on system dynamics is known. As a result, the memory space in real-time ILC implementations is greatly reduced.  相似文献   
96.
An energy-efficient intelligent manufacturing system could significantly save energy compared to traditional intelligent manufacturing systems that do not consider energy issues. Intelligent energy estimation of machining processes is the foundation of the energy-efficient intelligent manufacturing system. This paper proposes a method for machining activity extraction and energy attributes inheritance to support the intelligent energy estimation of machining processes. Fifteen machining activities and their energy attributes are defined according to their operating and energy consumption characteristics. Activities and energy attributes are extracted mainly from NC program supplemented with blank dimensional information. An effective extraction method of activities and energy attributes is the basis for the intelligent energy calculating of machining process. Based on an investigation on the extraction procedure of activities and energy attributes, energy attributes inheritance method is further discussed. Four types of energy attribute inheritance rules are summarized according to the different inheritance characteristics. Based on these four types of inheritance rules, the energy attributes can be transmitted from activity to Therblig as effective inputs of Therblig-based energy model of machining processes. The proposed methodology is finally demonstrated through two machining cases.  相似文献   
97.
For the issues of large space and storage security of multimedia files, we analyzed the impact of access control and cloud storage on multimedia file, and proposed a mixed security cloud storage framework based on Internet of Things. This paper introduced the concept of multimedia protection into the method based on role access control. Moreover, we also adopted a scheme based on the combination of multimedia data state and role access control. At the same time, all input and output devices were connected to this system. Internet of Things is used to judge whether circuits are connected and whether the devices are normally operated, so as to improve the access efficiency. On this basis, we also described in detail the complete process of registration, role assignment, multimedia file owner’s request for data encryption, and user login and access to multimedia file. According to the result, this scheme can be used to resist the known attacks. It guarantees security of multimedia files.  相似文献   
98.
Based on seed region growing method, lesion segmentation for ultrasound breast tumor images often requires manual selection of the seed point, which is both time-consuming and laborious. To overcome this limit, this paper attempts to explore an automatic method for finding the seed point inside the tumor. Two criteria combining iterative quadtree decomposition (QTD) and the gray characteristics of the lesion are thus designed to locate the seed point. One is to seek the biggest homogenous region and the other is to select the seed region where the seed point is found. Furthermore, this study validates the proposed algorithm through 110 ultrasonic breast tumor images (including 58 malignant tumor images and 52 benign tumor images). According to the needs of the seed region growing algorithm, if the seed point is found inside the tumor, it means the proposed method is correct. Otherwise, it means that the method is a failure. As the quantitative experiment results show, the proposed method in this paper can automatically find the seed point inside the tumor with an accuracy rate of 97.27 %.  相似文献   
99.
为了更加准确地监测动态变化的交通信息,通过分析城市道路交通流量变化的特点,提出一种基于数据融合的监测方法。根据数据属性的特点,将数据构造为多个相关的时间序列,在此基础上进行数据融合,以最终的结果对交通信号灯进行实时控制,保证道路通畅。仿真实验结果证明,该方法具有较高的判断准确率和良好的识别性能。  相似文献   
100.
采用分子动力学方法,模拟计算了阻垢剂HEDP及其取代物与方解石(104,(102),(202),(113)面的相互作用,计算并分析了阻垢剂与方解石(104),(102),(202),(113)面作用的相互作用能,包括结合能,库仑能和范德华作用能.并且分析了方解石(104)晶面上的钙离子与阻垢剂中双键氧原子、整个(104)晶面与阻垢剂中所有氧原子之间和整个(104)晶面与整个阻垢剂分子之间的对关联函数,结果表明:阻垢剂分子中的氧原子与碳酸钙的Ca2+形成的离子键对吸附起到了主要作用,同时阻垢剂与晶面间存在较弱的范德华力相互作用,阻垢剂与各晶面的的结合能强弱顺序为(102)>(202)≥(113)≈(104).苯环的大π键有利于阻垢效果的提高.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号