首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   659篇
  免费   52篇
  国内免费   5篇
电工技术   10篇
综合类   2篇
化学工业   198篇
金属工艺   14篇
机械仪表   26篇
建筑科学   17篇
矿业工程   3篇
能源动力   46篇
轻工业   84篇
水利工程   17篇
石油天然气   21篇
无线电   36篇
一般工业技术   87篇
冶金工业   35篇
原子能技术   9篇
自动化技术   111篇
  2023年   15篇
  2022年   25篇
  2021年   38篇
  2020年   27篇
  2019年   36篇
  2018年   42篇
  2017年   32篇
  2016年   33篇
  2015年   24篇
  2014年   26篇
  2013年   79篇
  2012年   53篇
  2011年   44篇
  2010年   26篇
  2009年   21篇
  2008年   15篇
  2007年   22篇
  2006年   15篇
  2005年   13篇
  2004年   7篇
  2003年   9篇
  2002年   9篇
  2001年   9篇
  2000年   5篇
  1999年   6篇
  1998年   12篇
  1997年   5篇
  1996年   4篇
  1993年   3篇
  1991年   5篇
  1989年   2篇
  1988年   3篇
  1987年   6篇
  1986年   3篇
  1985年   3篇
  1984年   2篇
  1982年   3篇
  1981年   2篇
  1980年   5篇
  1977年   2篇
  1976年   6篇
  1975年   4篇
  1974年   3篇
  1973年   1篇
  1972年   2篇
  1971年   1篇
  1969年   1篇
  1967年   1篇
  1966年   1篇
  1965年   1篇
排序方式: 共有716条查询结果,搜索用时 15 毫秒
11.
Urmia Lake in Iran is the second largest saline lake in the world. This ecosystem is the home for different species. Due to various socio-economical and ecological criteria, Urmia Lake has important role in the Northwestern part of the country but it has faced many problems in recent years. Because of droughts, overuse of surface water resources and dam constructions, water level has decreased in such a way that one quarter of the lake has changed to saline area in the last 10 years. The purpose of this research is to determine the main factors which reduce the lake’s water level. To this end, a simulation model, based on system dynamics method, is developed for the Urmia Lake basin to estimate the lake’s level. After successful verification of the model, results show that (among the proposed factors) changes in inflows due to the climate change and overuse of surface water resources is the main factor for 65% of the effect, constructing four dams is responsible for 25% of the problem, and less precipitation on lake has 10% effect on decreasing the lake’s level in the recent years. In the future, the model also can be used by managers as a decision support system to find the effects of building new dams or other infrastructures.  相似文献   
12.
In this paper, we introduce a new adaptive controller design scheme for nonlinear telerobotic systems with varying time delays where the delays and their variation rates are unknown. The designed controller has the ability to synchronize the state behaviors of the local and the remote robots. In this paper, asymptotic stability in the presence of varying time delays is of interest. Using the proposed controller, asymptotic stability of the bilateral telerobotic system subject to any bounded yet unknown varying delay with a bounded yet unknown rate of change can be guaranteed. Besides the varying time delay, the proposed adaptive controller has the ability to adapt to the parameter variations in the local and the remote robots’ dynamics. It is shown that position and velocity errors between the local and the remote manipulators converge to the zero asymptotically, thus ensuring teleoperation transparency. Experimental and simulation results with a pair of PHANToM haptic devices and a pair of planar manipulators under varying time delays in the communication channel demonstrate the effectiveness of the proposed scheme.  相似文献   
13.
This paper presents a novel image encryption/decryption algorithm based on chaotic neural network (CNN). The employed CNN is comprised of two 3-neuron layers called chaotic neuron layer (CNL) and permutation neuron layer (PNL). The values of three RGB (Red, Green and Blue) color components of image constitute inputs of the CNN and three encoded streams are the network outputs. CNL is a chaotic layer where, three well-known chaotic systems i.e. Chua, Lorenz and Lü systems participate in generating weights and biases matrices of this layer corresponding to each pixel RGB features. Besides, a chaotic tent map is employed as the activation function of this layer, and makes the relationship between the plain image and cipher image nonlinear. The output of CNL, i.e. the diffused information, is the input of PNL, where three-dimensional permutation is applied to the diffused information. The overall process is repeated several times to make the encryption process more robust and complex. A 160-bit-long authentication code has been used to generate the initial conditions and the parameters of the CNL and PNL. Some security analysis are given to demonstrate that the key space of the new algorithm is large enough to make brute-force attacks infeasible and simulations have been carried out with detailed numerical analysis, demonstrating the high security of the new image encryption scheme.  相似文献   
14.
Reverse logistics consists of all operations related to the reuse of products. External suppliers are one of the important members of reverse logistics and closed loop supply chain (CLSC) networks. However in CLSC network configuration models, suppliers are assessed based on purchasing cost and other factors such as on-time delivery are ignored. In this research, a general closed loop supply chain network is examined that includes manufacturer, disassembly, refurbishing, and disposal sites. Meanwhile, it is managed by the manufacturer. We propose an integrated model which has two phases. In the first phase, a framework for supplier selection criteria in RL is proposed. Besides, a fuzzy method is designed to evaluate suppliers based on qualitative criteria. The output of this stage is the weight of each supplier according to each part. In the second phase, we propose a multi objective mixed-integer linear programming model to determine which suppliers and refurbishing sites should be selected (strategic decisions), and find out the optimal number of parts and products in CLSC network (tactical decisions). The objective functions maximize profit and weights of suppliers, and one of them minimizes defect rates. To our knowledge, this model is the first effort to consider supplier selection, order allocation, and CLSC network configuration, simultaneously. The mathematical programming model is validated through numerical analysis.  相似文献   
15.
A method of tuning for PI controllers with one-way lead/lag decoupling tuning is demonstrated for 2×2 input-output systems, based on finite frequency response data. The frequency response estimates are obtained from closed loop tests using an identification technique based on bandpass filters. The open-loop frequency response is calculated and used to tune PI controllers and to fit lead-lag compensators for decoupling by weighted least-squares. Separate optimization of the PI controllers and the lead-lag compensator is preferred. The tuning takes into account violations of desired multivariable robustness criteria. The method is illustrated by application to a paper machine headbox simulation and by experiments in distillation column temperature control.  相似文献   
16.
17.
By considering the problems that commercial saffron companies have faced in international markets, the aim of this study is to investigate the impact of website content, including informational and design dimensions, on the effectiveness of e-marketing and e-trust as mediator variables. These aspects are examined with reference to sales and marketing division managers in a sample of 100 commercial saffron corporations in the Khorasan province. The findings support the ideas that website content has an effect on e-marketing and e-trust and that e-trust plays a mediating role in the relationship between e-trust and e-marketing effectiveness.  相似文献   
18.
Safety systems, built on state-of-the-art technology, are essential for achieving acceptable levels of plant safety to minimize hazards to the reactor and the general public. The second shutdown system(SSS) as an engineered safety feature and a part of the reactor protection system(RPS) is a means for rapidly shutting down a nuclear reactor, keeping it in a subcritical state and serving as a backup to the first shutdown system(FSS). In this research, one SSS with two types of optimum chamber designs is proposed that take into account the main current characteristic features of the Tehran research reactor with improvements over earlier designs. They are based on a liquid neutron absorber injection that is preferably different, diverse, and independent from the FSS based on the rod drop mechanism. The major design characteristics of this SSS with two different chambers were investigated using MCNPX 2.6.0 code. The performed calculations showed that the designed SSS is a reliable shutdown system, assuring an appropriate shutdown margin and injection time, with no significant effects on the effective delayed neutron fraction while causing minimal variations to the core structure. Further, the reasonable financial cost and the prolongation of the operation cycle are additional advantages of this design.  相似文献   
19.
20.
A novel nanocomposite consisting bisphenol A diglycidyl ether/1,4-Bis(3-aminopropoxy) butane (1,4-APB)/multiwall carbon nanotube (MWCNT) was synthesized and characterized. Kinetics of the reaction was described by applying differential scanning calorimetry (DSC) data to isoconversional methods of Flynn-Wall-Ozawa (FWO), advanced isoconversional method of Vyazovkin, and non-linear integral isoconversional algorithm (NLN). It was found that at the presence of MWCNT the thermal decomposition temperature increased by rising the curing temperature and time. Data from dynamic mechanical thermal analysis (DMTA) showed that the glass transition temperature of the cured nanocomposite is 7 °C higher than that value found for the system without carbon nanotube. Scanning electron microscopy (SEM) was used to observe the fracture surface morphology and results indicated evidence of the interfacial interaction improvement and adhesion strength due to good dispersion of MWCNT.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号