首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1309篇
  免费   60篇
  国内免费   6篇
电工技术   19篇
综合类   1篇
化学工业   294篇
金属工艺   32篇
机械仪表   58篇
建筑科学   44篇
矿业工程   5篇
能源动力   59篇
轻工业   75篇
水利工程   13篇
石油天然气   5篇
无线电   198篇
一般工业技术   209篇
冶金工业   122篇
原子能技术   9篇
自动化技术   232篇
  2023年   18篇
  2022年   40篇
  2021年   61篇
  2020年   55篇
  2019年   51篇
  2018年   57篇
  2017年   50篇
  2016年   93篇
  2015年   39篇
  2014年   53篇
  2013年   96篇
  2012年   86篇
  2011年   83篇
  2010年   61篇
  2009年   61篇
  2008年   47篇
  2007年   34篇
  2006年   27篇
  2005年   34篇
  2004年   16篇
  2003年   26篇
  2002年   14篇
  2001年   20篇
  2000年   9篇
  1999年   17篇
  1998年   40篇
  1997年   27篇
  1996年   16篇
  1995年   18篇
  1994年   11篇
  1993年   6篇
  1992年   6篇
  1991年   6篇
  1990年   10篇
  1989年   6篇
  1988年   5篇
  1987年   4篇
  1986年   9篇
  1985年   5篇
  1984年   4篇
  1983年   4篇
  1982年   6篇
  1981年   3篇
  1980年   5篇
  1979年   6篇
  1977年   3篇
  1976年   5篇
  1975年   3篇
  1974年   4篇
  1973年   4篇
排序方式: 共有1375条查询结果,搜索用时 31 毫秒
41.
This paper presents a study on improving the traversability of a quadruped walking robot in 3D rough terrains. The key idea is to exploit body movement of the robot. The position and orientation of the robot are systematically adjusted and the possibility of finding a valid foothold for the next swing is maximized, which makes the robot have more chances to overcome the rough terrains. In addition, a foothold search algorithm that provides the valid foothold while maintaining a high traversability of the robot, is investigated and a gait selection algorithm is developed to help the robot avoid deadlock situations. To explain the algorithms, new concepts such as reachable area, stable area, potential search direction, and complementary kinematic margin are introduced, and the effectiveness of the algorithms is validated via simulations and experiments.  相似文献   
42.
In automated container terminals, containers are transported from the marshalling yard to a ship and vice versa by automated vehicles. The automated vehicle type studied in this paper is an automated lifting vehicle (ALV) that is capable of lifting a container from the ground by itself. This study discusses how to dispatch ALVs by utilizing information about pickup and delivery locations and time in future delivery tasks. A mixed-integer programming model is provided for assigning optimal delivery tasks to ALVs. A procedure for converting buffer constraints into time window constraints and a heuristic algorithm for overcoming the excessive computational time required for solving the mathematical model are suggested. Numerical experiments are reported to compare the objective values and computational times by a heuristic algorithm with those by an optimizing method and to analyze the effects of dual cycle operation, number of ALVs, and buffer capacity on the performance of ALVs.  相似文献   
43.
Vu VQ  Yu B  Kass RE 《Neural computation》2009,21(3):688-703
Information estimates such as the direct method of Strong, Koberle, de Ruyter van Steveninck, and Bialek (1998) sidestep the difficult problem of estimating the joint distribution of response and stimulus by instead estimating the difference between the marginal and conditional entropies of the response. While this is an effective estimation strategy, it tempts the practitioner to ignore the role of the stimulus and the meaning of mutual information. We show here that as the number of trials increases indefinitely, the direct (or plug-in) estimate of marginal entropy converges (with probability 1) to the entropy of the time-averaged conditional distribution of the response, and the direct estimate of the conditional entropy converges to the time-averaged entropy of the conditional distribution of the response. Under joint stationarity and ergodicity of the response and stimulus, the difference of these quantities converges to the mutual information. When the stimulus is deterministic or nonstationary the direct estimate of information no longer estimates mutual information, which is no longer meaningful, but it remains a measure of variability of the response distribution across time.  相似文献   
44.
A nanowire structured nanocomposite of tin oxide (SnOx) and a single-walled carbon nanotube (SWNT) are fabricated using rheotaxial growth and thermal oxidation method for gas sensor application. The morphology, gas sensing properties, as well as the chemical and electrical properties are investigated. The oxidation temperature for Sn mainly determines the stoichiometry of the SnOx nano-beads, and consequently the electrical and gas sensing properties of the nanocomposite sensors. The gas sensing to nitrogen oxide, hydrogen, oxygen, xylene, acetone, carbon monoxide, and ammonia are also examined to determine the gas selectivity of the sensor. The high sensitivity and selectivity towards NOx of the nanocomposite sensor is realized via the porous structure of the SWNT template. The gas sensing mechanism of the nanocomposite structure is also discussed.  相似文献   
45.
Within the human computation paradigm, gamification is increasingly gaining interest. This is because an enjoyable experience generated by game features can be a powerful approach to attract participants. Although potentially useful, little research has been conducted into understanding the effectiveness of gamification in human computation. In this experimental study, we operationalized effectiveness as perceived engagement and user acceptance and examined it by comparing the performance of a gamified human computation system against a non-gamified version. We also investigate the determinants of acceptance and how their effects differ between these two systems. Analysis of our data found that participants experienced more engagement and showed higher behavioral intentions toward the gamified system. Moreover, perceived output quality and perceived engagement were significant determinants of acceptance of the gamified system. In contrast, determinants for acceptance of the non-gamified system were perceived output quality and perceived usability.  相似文献   
46.
Automated Tape Laying and Fiber Placement of composite materials are the two principal automated processes used for fabrication of large composite structures in aeronautical industry. The aluminum parts produced by High Speed Machining tend to be replaced by carbon fiber composite parts realized with these processes. However, structural parts present reinforcement zones which disturb the tool path follow-up and generate an increase of the manufacturing time. Thus, this paper deals with the optimization of tool paths of a 7-axis machine tool of Fiber Placement with the objective of reducing the manufacturing time while ensuring the requested quality of the final part. In this paper, two complementary methods are detailed. The first method takes advantage of the degree of redundancy of the machine tool to decrease the kinematic loads of the control joints. The second method aims to smooth the orientation of the machine head along the tool path while ensuring quality constraints. These two methods are then applied on a test tool path and bring to a significant decrease of the manufacturing time (32.9%).  相似文献   
47.
This paper deals with the stability radii of implicit dynamic equations on time scales when the structured perturbations act on both the coefficient of derivative and the right-hand side. Formulas of the stability radii are derived as a unification and generalization of some previous results. A special case where the real stability radius and the complex stability radius are equal is studied. Examples are derived to illustrate results.  相似文献   
48.
Malicious software and other attacks are a major concern in the computing ecosystem and there is a need to go beyond the answers based on untrusted software. Trusted and secure computing can add a new hardware dimension to software protection. Several secure computing hardware architectures using memory encryption and memory integrity checkers have been proposed during the past few years to provide applications with a tamper resistant environment. Some solutions, such as HIDE, have also been proposed to solve the problem of information leakage on the address bus. We propose the CRYPTOPAGE architecture which implements memory encryption, memory integrity protection checking and information leakage protection together with a low performance penalty (3% slowdown on average) by combining the Counter Mode of operation, local authentication values and MERKLE trees. It has also several other security features such as attestation, secure storage for applications and program identification. We present some applications of the CRYPTOPAGE architecture in the computer virology field as a proof of concept of improving security in presence of viruses compared to software only solutions.  相似文献   
49.
A technological milestone for experiments employing transition edge sensor bolometers operating at sub-Kelvin temperature is the deployment of detector arrays with 100s-1000s of bolometers. One key technology for such arrays is readout multiplexing: the ability to read out many sensors simultaneously on the same set of wires. This paper describes a frequency-domain multiplexed readout system which has been developed for and deployed on the APEX-SZ and South Pole Telescope millimeter wavelength receivers. In this system, the detector array is divided into modules of seven detectors, and each bolometer within the module is biased with a unique ~MHz sinusoidal carrier such that the individual bolometer signals are well separated in frequency space. The currents from all bolometers in a module are summed together and pre-amplified with superconducting quantum interference devices operating at 4 K. Room temperature electronics demodulate the carriers to recover the bolometer signals, which are digitized separately and stored to disk. This readout system contributes little noise relative to the detectors themselves, is remarkably insensitive to unwanted microphonic excitations, and provides a technology pathway to multiplexing larger numbers of sensors.  相似文献   
50.
The purpose is to perform a sharp analysis of the Lavrentiev method applied to the regularization of the ill-posed Cauchy problem, set in the Steklov-Poincaré variational framework. Global approximation results have been stated earlier that demonstrate that the Lavrentiev procedure yields a convergent strategy. However, no convergence rates are available unless a source condition is assumed on the exact Cauchy solution. We pursue here bounds on the approximation (bias) and the noise propagation (variance) errors away from the incomplete boundary where instabilities are located. The investigation relies on a Carleman inequality that enables enhanced local convergence rates for both bias and variance errors without any particular smoothness assumption on the exact solution. These improved results allows a new insight on the behavior of the Lavrentiev solution, look similar to those established for the Quasi-Reversibility method in [Inverse Problems 25, 035005, 2009]. There is a case for saying that this sort of ??super-convergence?? is rather inherent to the nature of the Cauchy problem and any reasonable regularization procedure would enjoy the same locally super-convergent behavior.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号