首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   38127篇
  免费   1381篇
  国内免费   80篇
电工技术   406篇
综合类   41篇
化学工业   7537篇
金属工艺   831篇
机械仪表   803篇
建筑科学   2066篇
矿业工程   121篇
能源动力   1090篇
轻工业   3006篇
水利工程   446篇
石油天然气   140篇
武器工业   5篇
无线电   2622篇
一般工业技术   6359篇
冶金工业   7015篇
原子能技术   345篇
自动化技术   6755篇
  2023年   221篇
  2022年   463篇
  2021年   713篇
  2020年   479篇
  2019年   638篇
  2018年   805篇
  2017年   727篇
  2016年   865篇
  2015年   800篇
  2014年   1074篇
  2013年   2459篇
  2012年   1733篇
  2011年   2185篇
  2010年   1708篇
  2009年   1615篇
  2008年   1890篇
  2007年   1855篇
  2006年   1673篇
  2005年   1498篇
  2004年   1224篇
  2003年   1176篇
  2002年   1086篇
  2001年   729篇
  2000年   579篇
  1999年   633篇
  1998年   695篇
  1997年   630篇
  1996年   594篇
  1995年   609篇
  1994年   558篇
  1993年   542篇
  1992年   527篇
  1991年   311篇
  1990年   433篇
  1989年   407篇
  1988年   349篇
  1987年   391篇
  1986年   329篇
  1985年   441篇
  1984年   442篇
  1983年   330篇
  1982年   309篇
  1981年   296篇
  1980年   286篇
  1979年   285篇
  1978年   259篇
  1977年   247篇
  1976年   225篇
  1975年   203篇
  1974年   181篇
排序方式: 共有10000条查询结果,搜索用时 11 毫秒
111.
There is a rich variety of physics underlying the fundamental gating operations for quantum information processing (QIP). A key aspect of a QIP system is how noise may enter during quantum operations and how suppressing or correcting its effects can best be addressed. Quantum control techniques have been developed to specifically address this effort, although a detailed classification of the compatibility of controls schemes with noise sources found in common quantum systems has not yet been performed. This work numerically examines the performance of modern control methods for suppressing decoherence in the presence of noise forms found in viable quantum systems. The noise-averaged process matrix for controlled one-qubit and two-qubit operations are calculated across noise found in systems driven by Markovian open quantum dynamics. Rather than aiming to describe the absolute best control scheme for a given physical circumstance, this work serves instead to classify quantum control behavior across a large class of noise forms so that opportunities for improving QIP performance may be identified.  相似文献   
112.
113.
Recommendations in location-based social networks: a survey   总被引:2,自引:0,他引:2  
  相似文献   
114.
115.
Nonlinear systems can be probed by driving them with two or more pure tones while measuring the intermodulation products of the drive tones in the response. We describe a digital lockin analyzer which is designed explicitly for this purpose. The analyzer is implemented on a field-programmable gate array, providing speed in analysis, real-time feedback, and stability in operation. The use of the analyzer is demonstrated for intermodulation atomic force microscopy. A generalization of the intermodulation spectral technique to arbitrary drive waveforms is discussed.  相似文献   
116.
Backlash-like hysteresis is one of the nonsmooth and multi-valued nonlinearities usually existing in mechanical systems. The traditional identification method is quite difficult to be used to model the systems involved with such complex nonlinearities. In this paper, a nonsmooth recursive identification algorithm for the systems with backlash-like hysteresis is proposed. In this method, the concept of Clarke subgradient is introduced to approximate the gradients at nonsmooth points and the so-called bundle method is used to obtain the optimization search direction in nonsmooth cases. Then, a recursive algorithm based on the idea of bundle method is developed for parameter estimation. After that, the convergence analysis of the algorithm is investigated. Finally, simulation results to validate the proposed method on a simulated mechanical transmission system are presented.  相似文献   
117.
This work introduces a novel formulation of system optimal dynamic traffic assignment that captures strategic route choice in users under demand uncertainty. We define strategic route choice to be that users choose a path prior to knowing the true travel demand which will be experienced (therefore users consider the full set of possible demand scenarios). The problem is formulated based on previous work by Ziliaskopoulos (Transp Sci 34(1):37–49, 2000). The resulting novel formulation requires substantial enhancement to account for path-based flows and scenario-based stochastic demands. Further, a numerical demonstration is presented on a network with different demand loading profiles. Finally, model complexity, implications on scalability and future research directions are discussed.  相似文献   
118.
Missing data are common in range images, due to geometric occlusions, limitations in the sensor field of view, poor reflectivity, depth discontinuities, and cast shadows. Using registration to align these data often fails, because points without valid correspondences can be incorrectly matched. This paper presents a maximum likelihood method for registration of scenes with unmatched or missing data. Using ray casting, correspondences are formed between valid and missing points in each view. These correspondences are used to classify points by their visibility properties, including occlusions, field of view, and shadow regions. The likelihood of each point match is then determined using statistical properties of the sensor, such as noise and outlier distributions. Experiments demonstrate a high rates of convergence on complex scenes with varying degrees of overlap.  相似文献   
119.
This paper proposes and implements a novel hybrid level set method which combines the numerical efficiency of the local level set approach with the temporal stability afforded by a semi-implicit technique. By introducing an extraction/insertion algorithm into the local level set approach, we can accurately capture complicated behaviors such as interface separation and coalescence. This technique solves a well known problem when treating a semi-implicit system with spectral methods, where spurious interface movements emerge when two interfaces are close to each other. Numerical experiments show that the proposed method is stable, efficient and scales up well into three dimensional problems.  相似文献   
120.
It is impossible to make any progress on the security vs. privacy debate, or move towards a political settlement around identity for the coming years, unless we develop a more modern notion of what identity is and how it should be addressed online. So long as we maintain an essentially “Victorian” view of the balance between security and privacy, founded on the central concept of identity as a card in a filing cabinet, then society cannot properly take advantage of technological developments. If it does, then security and privacy are no longer competing concerns that need to be balanced but simultaneous deliverables of an infrastructure founded in utility.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号