首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7534篇
  免费   379篇
  国内免费   46篇
电工技术   213篇
综合类   20篇
化学工业   1579篇
金属工艺   158篇
机械仪表   183篇
建筑科学   238篇
矿业工程   8篇
能源动力   511篇
轻工业   757篇
水利工程   86篇
石油天然气   153篇
武器工业   4篇
无线电   935篇
一般工业技术   1346篇
冶金工业   450篇
原子能技术   77篇
自动化技术   1241篇
  2023年   171篇
  2022年   375篇
  2021年   520篇
  2020年   369篇
  2019年   373篇
  2018年   479篇
  2017年   333篇
  2016年   377篇
  2015年   232篇
  2014年   357篇
  2013年   588篇
  2012年   389篇
  2011年   441篇
  2010年   280篇
  2009年   240篇
  2008年   226篇
  2007年   206篇
  2006年   172篇
  2005年   152篇
  2004年   124篇
  2003年   102篇
  2002年   117篇
  2001年   62篇
  2000年   65篇
  1999年   76篇
  1998年   123篇
  1997年   107篇
  1996年   71篇
  1995年   78篇
  1994年   51篇
  1993年   50篇
  1992年   40篇
  1991年   23篇
  1990年   28篇
  1989年   42篇
  1988年   46篇
  1987年   28篇
  1986年   28篇
  1985年   42篇
  1984年   49篇
  1983年   41篇
  1982年   26篇
  1981年   21篇
  1980年   28篇
  1979年   23篇
  1978年   18篇
  1977年   21篇
  1976年   30篇
  1975年   15篇
  1974年   16篇
排序方式: 共有7959条查询结果,搜索用时 328 毫秒
111.
Standard genetic algorithms (SGAs) are investigated to optimise discrete-time proportional-integral-derivative (PID) controller parameters, by three tuning approaches, for a multivariable glass furnace process with loop interaction. Initially, standard genetic algorithms (SGAs) are used to identify control oriented models of the plant which are subsequently used for controller optimisation. An individual tuning approach without loop interaction is considered first to categorise the genetic operators, cost functions and improve searching boundaries to attain the desired performance criteria. The second tuning approach considers controller parameters optimisation with loop interaction and individual cost functions. While, the third tuning approach utilises a modified cost function which includes the total effect of both controlled variables, glass temperature and excess oxygen. This modified cost function is shown to exhibit improved control robustness and disturbance rejection under loop interaction.  相似文献   
112.
Non-symmetric similarity relation-based rough set model (NS-RSM) is viewed as mathematical tool to deal with the analysis of imprecise and uncertain information in incomplete information systems with “?” values. NS-RSM relies on the concept of non-symmetric similarity relation to group equivalent objects and generate knowledge granules that are then used to approximate the target set. However, NS-RSM results in unpromising approximation space when addressing inconsistent data sets that have lots of boundary objects. This is because objects in the same similarity classes are not necessarily similar to each other and may belong to different target classes. To enhance NS-RSM capability, we introduce the maximal limited similarity-based rough set model (MLS-RSM) which describes the maximal collection of indistinguishable objects that are limited tolerance to each other in similarity classes. This allows accurate computation to be done for the approximation space. Furthermore, approximation accuracy comparisons have been conducted among NS-RSM and MLS-RSM. The results demonstrate that MLS-RSM model outperforms NS-RSM and can approximate the target set more efficiently.  相似文献   
113.
Internet of Things (IoT) connects billions of devices in an Internet-like structure. Each device encapsulated as a real-world service which provides functionality and exchanges information with other devices. This large-scale information exchange results in new interactions between things and people. Unlike traditional web services, internet of services is highly dynamic and continuously changing due to constant degrade, vanish and possibly reappear of the devices, this opens a new challenge in the process of resource discovery and selection. In response to increasing numbers of services in the discovery and selection process, there is a corresponding increase in number of service consumers and consequent diversity of quality of service (QoS) available. Increase in both sides’ leads to the diversity in the demand and supply of services, which would result in the partial match of the requirements and offers. This paper proposed an IoT service ranking and selection algorithm by considering multiple QoS requirements and allowing partially matched services to be counted as a candidate for the selection process. One of the applications of IoT sensory data that attracts many researchers is transportation especially emergency and accident services which is used as a case study in this paper. Experimental results from real-world services showed that the proposed method achieved significant improvement in the accuracy and performance in the selection process.  相似文献   
114.
This article draws on three case studies of drip irrigation adoption in Morocco to consider the water–energy–food nexus concept from a bottom-up perspective. Findings indicate that small farmers' adoption of drip irrigation is conditional, that water and energy efficiency does not necessarily reduce overall consumption, and that adoption of drip irrigation (and policies supporting it) can create winners and losers. The article concludes that, although the water–energy–food WEF nexus concept may offer useful insights, its use in policy formulation should be tempered with caution. Technical options that appear beneficial at the conceptual level can have unintended consequences in practice, and policies focused on issues of scarcity and efficiency may exacerbate other dimensions of poverty and inequality.  相似文献   
115.
This paper proposes a new method for control of continuous large-scale systems where the measures and control functions are distributed on calculating members which can be shared with other applications and connected to digital network communications.At first, the nonlinear large-scale system is described by a Takagi-Sugeno(TS) fuzzy model. After that, by using a fuzzy LyapunovKrasovskii functional, sufficient conditions of asymptotic stability of the behavior of the decentralized networked control system(DNCS),are developed in terms of linear matrix inequalities(LMIs). Finally, to illustrate the proposed approach, a numerical example and simulation results are presented.  相似文献   
116.
117.
118.
Ahmed A  Rehan M  Iqbal N 《ISA transactions》2011,50(2):249-255
This paper proposes the design of anti-windup compensator gain for stability of actuator input constrained state delay systems using constrained pole-position of the closed-loop. Based on Delay-Dependent Lyapunov-Krasovskii functionals and local sector conditions, a new LMI characterization is derived that ensures closed-loop asymptotic stability of constrained state delay systems while accounting upper bound fixed state delay and largest lower bound of the system’s pole-position in the formulation of anti-windup gain. Besides, at saturation, the method significantly nullifies the inherent slow dynamics present in the system. It is shown in the comparative numerical examples that the LMI formulation draws stability with improved time-domain performance.  相似文献   
119.
Bug fixing accounts for a large amount of the software maintenance resources. Generally, bugs are reported, fixed, verified and closed. However, in some cases bugs have to be re-opened. Re-opened bugs increase maintenance costs, degrade the overall user-perceived quality of the software and lead to unnecessary rework by busy practitioners. In this paper, we study and predict re-opened bugs through a case study on three large open source projects—namely Eclipse, Apache and OpenOffice. We structure our study along four dimensions: (1) the work habits dimension (e.g., the weekday on which the bug was initially closed), (2) the bug report dimension (e.g., the component in which the bug was found) (3) the bug fix dimension (e.g., the amount of time it took to perform the initial fix) and (4) the team dimension (e.g., the experience of the bug fixer). We build decision trees using the aforementioned factors that aim to predict re-opened bugs. We perform top node analysis to determine which factors are the most important indicators of whether or not a bug will be re-opened. Our study shows that the comment text and last status of the bug when it is initially closed are the most important factors related to whether or not a bug will be re-opened. Using a combination of these dimensions, we can build explainable prediction models that can achieve a precision between 52.1–78.6 % and a recall in the range of 70.5–94.1 % when predicting whether a bug will be re-opened. We find that the factors that best indicate which bugs might be re-opened vary based on the project. The comment text is the most important factor for the Eclipse and OpenOffice projects, while the last status is the most important one for Apache. These factors should be closely examined in order to reduce maintenance cost due to re-opened bugs.  相似文献   
120.
In our connected world, recommender systems have become widely known for their ability to provide expert and personalize referrals to end-users in different domains. The rapid growth of social networks and new kinds of systems so called “social recommender systems” are rising, where recommender systems can be utilized to find a suitable content according to end-users' personal preferences. However, preserving end-users' privacy in social recommender systems is a very challenging problem that might prevent end-users from releasing their own data, which detains the accuracy of extracted referrals. In order to gain accurate referrals, social recommender systems should have the ability to preserve the privacy of end-users registered in this system. In this paper, we present a middleware that runs on end-users' Set-top boxes to conceal their profile data when released for generating referrals, such that computation of recommendation proceeds over the concealed data. The proposed middleware is equipped with two concealment protocols to give users a complete control on the privacy level of their profiles. We present an IPTV network scenario and perform a number of different experiments to test the efficiency and accuracy of our protocols. As supported by the experiments, our protocols maintain the recommendations accuracy with acceptable privacy level.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号