首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6854篇
  免费   384篇
  国内免费   20篇
电工技术   83篇
综合类   9篇
化学工业   1482篇
金属工艺   148篇
机械仪表   149篇
建筑科学   250篇
矿业工程   10篇
能源动力   194篇
轻工业   590篇
水利工程   56篇
石油天然气   28篇
无线电   1005篇
一般工业技术   1224篇
冶金工业   865篇
原子能技术   32篇
自动化技术   1133篇
  2024年   10篇
  2023年   112篇
  2022年   197篇
  2021年   336篇
  2020年   243篇
  2019年   226篇
  2018年   277篇
  2017年   230篇
  2016年   322篇
  2015年   217篇
  2014年   281篇
  2013年   453篇
  2012年   368篇
  2011年   453篇
  2010年   344篇
  2009年   310篇
  2008年   340篇
  2007年   299篇
  2006年   212篇
  2005年   193篇
  2004年   159篇
  2003年   129篇
  2002年   123篇
  2001年   123篇
  2000年   80篇
  1999年   90篇
  1998年   218篇
  1997年   114篇
  1996年   101篇
  1995年   87篇
  1994年   66篇
  1993年   86篇
  1992年   54篇
  1991年   38篇
  1990年   38篇
  1989年   40篇
  1988年   25篇
  1987年   33篇
  1986年   28篇
  1985年   27篇
  1984年   29篇
  1983年   19篇
  1982年   16篇
  1981年   14篇
  1980年   14篇
  1979年   12篇
  1978年   13篇
  1977年   15篇
  1976年   9篇
  1973年   8篇
排序方式: 共有7258条查询结果,搜索用时 15 毫秒
181.
Nguyen AD  Shen XA  Huestis DL  Kachru R 《Applied optics》1998,37(35):8215-8218
We present an algorithm for fast and reliable extraction of page-formatted binary digital data. The advantages of the algorithm include a low raw bit-error rate, fast extraction speed, the use of a simple and density-efficient coding scheme, and large tolerance to a change of the signal-to-noise ratio. We used this algorithm to analyze shot-noise-limited binary data that had large interpage and intrapage intensity variations and obtained an improvement in the bit-error rate of 3-4 orders of magnitude compared with that in a single-threshold-detection scheme. Implications of our results for the development of high-speed, high-density holographic memories are discussed.  相似文献   
182.
The ability to trap, manipulate, and separate magnetic beads has become one of the key requirements in realizing an integrated magnetic lab-on-chip biosensing system. In this article, we present the design and fabrication of an integrated magneto-fluidic device for sorting magnetic particles with a sorting efficiency of up to 95%. The actuation and manipulation of magnetic beads are realized using microfabricated square meandering current-carrying micro striplines. The current is alternated between two neighboring micro striplines to switch the magnetic beads to either one of the two outlets. We performed a series of parametric study to investigate the effect of applied current, flow rate, and switching frequency on the sorting efficiency. Experimental results reveal that the sorting efficiency is proportional to the square of current applied to the stripline, and decreases with increasing buffer flow rate and switching frequency. Such phenomena agree well with our theoretical analysis and simulation result. The fastest switching rate, which is limited by the microchannel geometry and bead velocity, is 2 Hz.  相似文献   
183.
In this technical note, we investigate a solution of the matrix differential Riccati equation that plays an important role in the linear quadratic optimal control problem. Unlike many methods in the literature, the approach that we propose employs the negative definite anti-stabilizing solution of the matrix algebraic Riccati equation and the solution of the matrix differential Lyapunov equation. An illustrative numerical example is provided to show the efficiency of our approach.   相似文献   
184.
185.
Lawry's label semantics for modeling and computing with linguistic information in natural language provides a clear interpretation of linguistic expressions and thus a transparent model for real‐world applications. Meanwhile, annotated logic programs (ALPs) and its fuzzy extension AFLPs have been developed as an extension of classical logic programs offering a powerful computational framework for handling uncertain and imprecise data within logic programs. This paper proposes annotated linguistic logic programs (ALLPs) that embed Lawry's label semantics into the ALP/AFLP syntax, providing a linguistic logic programming formalism for development of automated reasoning systems involving soft data as vague and imprecise concepts occurring frequently in natural language. The syntax of ALLPs is introduced, and their declarative semantics is studied. The ALLP SLD‐style proof procedure is then defined and proved to be sound and complete with respect to the declarative semantics of ALLPs. © 2010 Wiley Periodicals, Inc.  相似文献   
186.
In this study, an open programmable logic controller (PLC) from Fuji electric prescribed in the Structured Text program was applied to develop a look-ahead linear jerk filter (LALJF) for a computerized numerically controlled (CNC) machine. To ensure the smooth and accurate motion of a tool with a linear change in jerk during real-time machining, the proposed filter was formed by combining a look-ahead algorithm with three modified moving average filters (3MMAF). The look-ahead algorithm performed a single look-ahead step-change in the speed of the speed curve. Based on a step-changing speed profile, given maximal acceleration/deceleration and maximum jerk, the speed curve was modified before it was passed through a linear jerk filter to reduce machining time. The speed commands filtered by the proposed filter stabilize machine table at the beginning and end of its motion, and at any point at which its speed exhibits a step-change. The theoretical and computational aspects of the LALJF are presented together with experimental results of its implementation on an XY table. The multiple-step-changing speed curve of a CNC machine and the speed curve of a high-speed measurement system were constructed in order to verify the feasibility and precision of the proposed method.  相似文献   
187.
In this paper, a control scheme that combines a kinematic controller and a sliding mode dynamic controller with external disturbances is proposed for an automatic guided vehicle to track a desired trajectory with a specified constant velocity. It provides a method of taking into account specific mobile robot dynamics to convert desired velocity control inputs into torques for the actual mobile robot. First, velocity control inputs are designed for the kinematic controller to make the tracking error vector asymptotically stable. Then, a sliding mode dynamic controller is designed such that the mobile robot’s velocities converge to the velocity control inputs. The control law is obtained based on the backstepping technique. System stability is proved using the Lyapunov stability theory. In addition, a scheme for measuring the errors using a USB camera is described. The simulation and experimental results are presented to illustrate the effectiveness of the proposed controller.  相似文献   
188.
Robust design (RD) and tolerance design (TD) have received much attention from researchers and practitioners for more than two decades, and a number of methodologies for modeling and optimizing the RD and TD processes have been studied. However, there is ample room for improvement. Because most existing research considers RD and TD as separate research fields, the primary objective of this paper is to develop a sequential robust–tolerance design method to jointly determine the best factor settings and the closed-form solutions for the optimal specification limits. We then apply the proposed method to a destructive quality characteristic. Finally, a case study and sensitivity analyses are performed for verification purposes, and further studies are discussed.  相似文献   
189.

Context

Information system development (ISD) has been plagued with high failure rates. This is partially due to the activities being a combination of both a technical and social processes involving stakeholders with conflicting interests.

Objective

Existing software risk management theories and frameworks offer limited suggestions for actions that can be taken to reduce the chance of failure of ISD projects. Our objective is to examine the connections among some of the more important user related risks in order to shed light on how specific strategies enhance the chance of project success.

Method

We conducted a sample of information systems project managers to test a multivariate model to explain the impact of pursuing a partnership with users on the conflicts that arise between users and developers, role ambiguity, and subsequent impact on project performance.

Results

The proposed model was supported, suggesting that user-developer conflict and role ambiguity have a negative impact on performance estimation difficulty, which negatively affects project performance.

Conclusion

Pursuit of project partnering yields a number of significant relationships in the model indicating an organization can implement practices that reduce risks associated with role ambiguity and conflict in system development projects.  相似文献   
190.
Ad hoc networks consist of wireless hosts that communicate with each other in the absence of a fixed infrastructure. Such networks cannot rely on centralized and organized network management. The clustering problem consists of partitioning network nodes into non-overlapping groups called clusters. Clusters give a hierarchical organization to the network that facilitates network management and that increases its scalability.In a weight-based clustering algorithm, the clusterheads are selected according to their weight (a node’s parameter). The higher the weight of a node, the more suitable this node is for the role of clusterhead. In ad hoc networks, the amount of bandwidth, memory space or battery power of a node could be used to determine weight values.A self-stabilizing algorithm, regardless of the initial system configuration, converges to legitimate configurations without external intervention. Due to this property, self-stabilizing algorithms tolerate transient faults and they are adaptive to any topology change.In this paper, we present a robust self-stabilizing weight-based clustering algorithm for ad hoc networks. The robustness property guarantees that, starting from an arbitrary configuration, after one asynchronous round, the network is partitioned into clusters. After that, the network stays partitioned during the convergence phase toward a legitimate configuration where the clusters verify the “ad hoc clustering properties”.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号