首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   78980篇
  免费   5270篇
  国内免费   1664篇
电工技术   4137篇
技术理论   7篇
综合类   4476篇
化学工业   13147篇
金属工艺   4233篇
机械仪表   5079篇
建筑科学   5251篇
矿业工程   2433篇
能源动力   2447篇
轻工业   5076篇
水利工程   1019篇
石油天然气   5426篇
武器工业   462篇
无线电   8409篇
一般工业技术   10286篇
冶金工业   3974篇
原子能技术   900篇
自动化技术   9152篇
  2025年   139篇
  2024年   1865篇
  2023年   1620篇
  2022年   2253篇
  2021年   3125篇
  2020年   2627篇
  2019年   2365篇
  2018年   2459篇
  2017年   2617篇
  2016年   2298篇
  2015年   2806篇
  2014年   3544篇
  2013年   4282篇
  2012年   4359篇
  2011年   4869篇
  2010年   4188篇
  2009年   3971篇
  2008年   3853篇
  2007年   3742篇
  2006年   3802篇
  2005年   3442篇
  2004年   2291篇
  2003年   2084篇
  2002年   1870篇
  2001年   1636篇
  2000年   1801篇
  1999年   2059篇
  1998年   1780篇
  1997年   1431篇
  1996年   1409篇
  1995年   1189篇
  1994年   963篇
  1993年   721篇
  1992年   548篇
  1991年   432篇
  1990年   327篇
  1989年   258篇
  1988年   229篇
  1987年   141篇
  1986年   122篇
  1985年   99篇
  1984年   71篇
  1983年   44篇
  1982年   47篇
  1981年   33篇
  1980年   26篇
  1979年   13篇
  1977年   7篇
  1976年   8篇
  1953年   5篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
51.
52.
With the rapid development of network technologies and deteriorating of network environment, traditional single-net security system cannot satisfy the security requirement. The excellent security performance of biological systems impels the bio-inspired network security theory to be a hot research area currently. Based on Bio-inspired Multidimensional Network Security Model we have put forward, we have advanced Bio-inspired Multi-Net Security system by implementing the functional distribution of different subnets of different transient states in Multi-Net Paralleling structure. Firstly, parameter estimation and modified algorithms of Hidden Markov Model are introduced to construct the mathematical mode of B-MNS; secondly, the integrated performance of our modified B-MNS has been tested and its simulation has been carried out. So the feasibility, validity and high efficiency of our model have been demonstrated theoretically, and practically.  相似文献   
53.
CAD软件与基于多边形的3D软件之间数据转换需求不断增加,但是CAD模型复杂度和精细度却越来越高,数据转换的难度变大.为了解决这一难题,结合PolyTrans,分析如何解决一般3D软件难以导入大型的IGES(Initial Graphics Exchange Specifi-cation)文件的问题.从PolyTrans模型简化模块的理论依据着手,研究如何控制多边形的数量、降低文件的复杂性和减少文件的数量,使大型CAD装配模型能顺利地以单个实体形式导入Lightwave、3DS MAX以及Maya类的3D软件.并结合具体科研项目,给出了模型优化前后各指标参数对比情况.  相似文献   
54.
This technical note is concerned with the problem of controlling plants over communication channels, where the plant is subject to two types of unstructured uncertainty: additive uncertainty and stable coprime factor uncertainty. Necessary lower bounds on the rate of transmission (or channel capacity) C, for robust stabilization, are computed explicitly. In particular, it is shown that the lower bound in the additive uncertainty case corresponds to a fixed point of a particular function. In the stable coprime factor uncertainty case, the derivation relies on linear fractional transformation concepts. The results are important in determining the minimum channel capacity needed in order to stabilize plants subject to unstructured uncertainty over communication channels. For instance, the bounds obtained can be used to analyze the effect of uncertainty on the channel capacity. An illustrative example is provided.  相似文献   
55.
Reachability is one of the most important behavioral properties of Petri nets. We propose in this paper a novel approach for solving the fundamental equation in the reachability analysis of acyclic Petri nets, which has been known to be NP-complete. More specifically, by adopting a revised version of the cell enumeration method for an arrangement of hyperplanes in discrete geometry, we develop an efficient solution scheme to identify firing count vector solution(s) to the fundamental equation on a bounded integer set, with a complexity bound of O((nu)nm), where n is the number of transitions, m is the number of places and u is the upper bound of the number of firings for all individual transitions.  相似文献   
56.
Xiaoqiang Lu  Yi Sun  Yuan Yuan 《Pattern recognition》2011,44(10-11):2427-2435
This paper aims to reduce the problems of incomplete data in computed tomography, which happens frequently in medical image process and analysis, e.g., when the high-density region of objects can only be penetrated by X-rays at a limited angular range. As the projection data are available only in an angular range, the incomplete data problem can be attributed to the limited angle problem, which is an ill-posed inverse problem. Image reconstruction based on total variation (TV) reduces the problem and gives better performance on edge-preserving reconstruction; however, the artificial parameter can only be determined through considerable experimentation. In this paper, an effective TV objective function is proposed to reduce the inverse problem in the limited angle tomography. This novel objective function provides a robust and effective reconstruction without any artificial parameter in the iterative processes, using the TV as a multiplicative constraint. The results demonstrate that this reconstruction strategy outperforms some previous ones.  相似文献   
57.
Some of the relationships between optimal control and statistics are examined. We produce generalized, smoothing splines by solving an optimal control problem for linear control systems, minimizing the L2-norm of the control signal, while driving the scalar output of the control system close to given, prespecified interpolation points. We then prove a convergence result for the smoothing splines, using results from the theory of numerical quadrature. Finally, we show, in simulations, that our approach works in practice as well as in theory  相似文献   
58.
近年来计算机犯罪案件呈迅速增长趋势,为有效控制和侦破此类案件,急需寻找一套行之有效的侦查办案途径.归纳各种犯罪手段,分别针对单机犯罪、专用网络犯罪和互联网犯罪,提出三种解决方案.  相似文献   
59.
智能仪表的可靠性设计与评估技术   总被引:1,自引:0,他引:1  
本文主要探讨智能仪表设计中最常采用的几种可靠性设计技术及其具体应用,详细介绍了其中的可靠性预计与可靠性分配技术具体方法和步骤,比较了现有的几种可靠性评估技术.  相似文献   
60.
A new direct closed-loop identification method, which uses the output intersampling technique, is proposed in this note. By using the intersampled plant input-output data, the proposed method removes the traditional restrictive identifiability condition, and does not require an external persistently exciting (PE) test signal  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号