首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   13542篇
  免费   1066篇
  国内免费   521篇
电工技术   714篇
综合类   711篇
化学工业   2381篇
金属工艺   741篇
机械仪表   840篇
建筑科学   930篇
矿业工程   343篇
能源动力   423篇
轻工业   791篇
水利工程   191篇
石油天然气   863篇
武器工业   82篇
无线电   1852篇
一般工业技术   1733篇
冶金工业   671篇
原子能技术   91篇
自动化技术   1772篇
  2024年   48篇
  2023年   231篇
  2022年   369篇
  2021年   537篇
  2020年   359篇
  2019年   316篇
  2018年   360篇
  2017年   398篇
  2016年   372篇
  2015年   512篇
  2014年   688篇
  2013年   819篇
  2012年   812篇
  2011年   962篇
  2010年   810篇
  2009年   736篇
  2008年   783篇
  2007年   707篇
  2006年   757篇
  2005年   679篇
  2004年   435篇
  2003年   372篇
  2002年   303篇
  2001年   279篇
  2000年   280篇
  1999年   406篇
  1998年   362篇
  1997年   274篇
  1996年   262篇
  1995年   189篇
  1994年   183篇
  1993年   122篇
  1992年   101篇
  1991年   67篇
  1990年   58篇
  1989年   37篇
  1988年   29篇
  1987年   9篇
  1986年   23篇
  1985年   6篇
  1984年   14篇
  1983年   7篇
  1982年   16篇
  1981年   9篇
  1980年   9篇
  1979年   5篇
  1977年   4篇
  1976年   5篇
  1975年   3篇
  1974年   2篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
提出了一种利用有用时序偏差来提高电路性能的方法,利用时钟偏差规划算法在时钟树综合之前对时序偏差重新调整规划,以提高电路的性能.使用ISCAS89作为实验对象来验证算法并进行了分析.  相似文献   
992.
Network forensics supports capabilities such as attacker identification and attack reconstruction, which complement the traditional intrusion detection and perimeter defense techniques in building a robust security mechanism. Attacker identification pinpoints attack origin to deter future attackers, while attack reconstruction reveals attack causality and network vulnerabilities. In this paper, we discuss the problem and feasibility of back tracking the origin of a self-propagating stealth attack when given a network traffic trace for a sufficiently long period of time. We propose a network forensics mechanism that is scalable in computation time and space while maintaining high accuracy in the identification of the attack origin. We further develop a data reduction method to filter out attack-irrelevant data and only retain evidence relevant to potential attacks for a post-mortem investigation. Using real-world trace driven experiments, we evaluate the performance of the proposed mechanism and show that we can trim down up to 97% of attack-irrelevant network traffic and successfully identify attack origin.  相似文献   
993.
UAVs surpassing satellites and aircraft in remote sensing over China   总被引:1,自引:0,他引:1  
ABSTRACT

Many users are now showing strong interest in UAV RS (Unmanned Aerial Vehicle Remote Sensing) due to its easy accessibility. UAVs have become popular platforms for remote sensing data acquisition. In a number of practical and time constrained circumstances, UAV RS data have been widely used as a substitute for traditional satellite remote sensing data. However, airspace-related regulations are far behind the rapid growth in the number of UAVs and their wide applications. Much effort of the network-based UAV RS have been made by the UAV RS group of the Institute of Geographic Sciences and Natural Resources Research, Chinese Academy of Sciences (IGSNRR, CAS), which proposed the concept of UAV RS data carrier. UAV RS data carrier refers to UAV RS data platform with task planning, data storage, image processing, product generation and output products for various UAVs. An ongoing effort to create a nationwide UAV RS network in addition to an existing ground observational network is being carried out in China.  相似文献   
994.
结合卫星测高技术的海潮模型能方便、精确地模拟大洋潮汐,可用于缺乏观测资料的地区。为评估该方法在珠江河口潮位预测应用中的精度,本文采用NAO.99b、OTPS和WWT等3种海潮模型预测珠江口不同验潮站的潮位过程,与实测数据对比并计算误差均方根。分析结果表明,海潮模型可以较好地预测珠江河口区潮汐基本时间特征,潮位预测精度在一定区域、一定时段不低于传统的预测方法。口门附近尤其口外的预测精度明显高于口内;在洪水期精度下降但口外开阔区域影响较小;在口门处,潮优型河口湾的预测精度高于径流型河口。3种模型中,推荐使用WWT。  相似文献   
995.
In this paper, we propose an iterative approach to increase the computation efficiency of the homotopy analysis method (HAM), a analytic technique for highly nonlinear problems. By means of the Schmidt–Gram process (Arfken et al., 1985)  [15], we approximate the right-hand side terms of high-order linear sub-equations by a finite set of orthonormal bases. Based on this truncation technique, we introduce the MMth-order iterative HAM by using each MMth-order approximation as a new initial guess. It is found that the iterative HAM is much more efficient than the standard HAM without truncation, as illustrated by three nonlinear differential equations defined in an infinite domain as examples. This work might greatly improve the computational efficiency of the HAM and also the Mathematica package BVPh for nonlinear BVPs.  相似文献   
996.
We analyze a distributed algorithm for the estimation of scalar parameters belonging to nodes in a mobile network from noisy relative measurements. The motivation comes from the problem of clock skew and offset estimation for the purpose of time synchronization. The time variation of the network was modeled as a Markov chain. The estimates are shown to be mean square convergent under fairly weak assumptions on the Markov chain, as long as the union of the graphs is connected. Expressions for the asymptotic mean and correlation are also provided.  相似文献   
997.
998.
Ship deck landing control of a quadrotor requires certain robustness with respect to ship heave motion. Typical systems only provide relative height, therefore do not have relative heave rate information. In this paper, a linear output feedback control consisting of a full state feedback controller and a Luenberger observer is formulated. Invariant ellipsoid method is used to formulate an estimation of a bound on the response of a linear output feedback-controlled system subjected to external disturbances and measurement noise. The gains that result in a minimum bound are optimized using a gradient descent iterative approach proposed in this paper where the invariant ellipsoid condition is linearized into a tractable LMI condition. This approach is applied to a simulation of a quadrotor landing on a ship deck and results are compared with other gains. The gains selected using the proposed approach exhibits improved robustness to external disturbances and measurement noise.  相似文献   
999.
We analyse disturbance rejection for a platoon of vehicles with intelligent cruise control, both for the spatially discrete model and the continuum model with open and periodic boundary conditions. By explicitly calculating the eigenmodes for both the discrete and the continuum models, we derive the dynamic response of an individual discrete mode, as well as the response of a single vehicle to disturbances generated through either boundary vehicles or vehicles within the platoon. It is shown that if the biasing is small then the n-mode truncated continuum model and the spatially discrete model predict same qualitative responses to disturbances for the lower order modes. In the case of periodic boundary conditions, the two types of models predict quantitatively the same responses to disturbances for a range of feedback gains.  相似文献   
1000.
Abstract

Value Engineering can reduce costs and enhance the value of projects. Currently, the acceptance rate of Value Engineering Study (VES) recommendations and total potential savings are considered the principal performance indicators of a VES. In reality the success of a VES depends on numerous interrelated factors not easy for a VES team to control. However, a study team can ensure the success of a VES by fully implementing a VES job plan. Thus, realizing a job plan is a principal contribution toward insuring the success of the VES. This study presents a novel model that is able to evaluate the performance of a VES for a construction project. Two questionnaires, distributed to VE experts, were used to collect data needed for this research. Factor analysis, AHP, and SWAM were applied to build the VES performance evaluation model which consists of six evaluation groups and thirty‐two evaluation items. A real‐life VES for a construction project was then analyzed using the proposed model to demonstrate its usefulness in performance assessment. Defects of the VES were identified and suggestions were provided for the particular VES. The proposed model can be used by VES teams for self‐diagnosis, improvement, and motivation in achieving enhanced performance.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号