首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   36047篇
  免费   3022篇
  国内免费   1436篇
电工技术   1882篇
技术理论   2篇
综合类   2348篇
化学工业   6618篇
金属工艺   2109篇
机械仪表   2098篇
建筑科学   2788篇
矿业工程   1112篇
能源动力   932篇
轻工业   2021篇
水利工程   594篇
石油天然气   2676篇
武器工业   242篇
无线电   4192篇
一般工业技术   4324篇
冶金工业   1649篇
原子能技术   447篇
自动化技术   4471篇
  2024年   171篇
  2023年   611篇
  2022年   1063篇
  2021年   1464篇
  2020年   1125篇
  2019年   925篇
  2018年   1088篇
  2017年   1206篇
  2016年   1005篇
  2015年   1341篇
  2014年   1713篇
  2013年   2139篇
  2012年   2226篇
  2011年   2500篇
  2010年   2113篇
  2009年   1932篇
  2008年   1864篇
  2007年   1728篇
  2006年   1920篇
  2005年   1718篇
  2004年   1166篇
  2003年   1001篇
  2002年   921篇
  2001年   792篇
  2000年   907篇
  1999年   1064篇
  1998年   818篇
  1997年   737篇
  1996年   706篇
  1995年   575篇
  1994年   473篇
  1993年   356篇
  1992年   274篇
  1991年   205篇
  1990年   153篇
  1989年   133篇
  1988年   114篇
  1987年   68篇
  1986年   51篇
  1985年   25篇
  1984年   19篇
  1983年   18篇
  1982年   30篇
  1981年   16篇
  1980年   13篇
  1979年   2篇
  1977年   6篇
  1976年   2篇
  1975年   1篇
  1951年   6篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
811.
相关证据的融合及其在机器人多感觉信息融合中的应用   总被引:5,自引:1,他引:4  
D-S证据理论在多信息融合中的应用要求各证据间相互独立,这在很多实际场合中却很难实现。本文简要地阐述了基于D-S证据理论的多传感器信息融合算法,提供了一种基于D-S理论的推广方法以理解决融合信息的相关性问题,并用机器人的力学和热学传感器作实验,对该方法有效性进行了研究。  相似文献   
812.
用于三维图像恢复的广义点扩展函数   总被引:3,自引:0,他引:3  
采用传统的摄像系统点扩展函数恢复三维图像,往往不能得到满意的结果。文中提出一种新的概念-广义点扩展函数,取代传统的摄像系统点扩展函数,用于三维图像恢复。首先给出广义点扩展函数的定义,它等于物体和场景到摄像系统的点扩展函数与摄像系统的点扩展函数的券积。然后给出物体和场景到摄像系统的点扩展函数估计。最后还给出采用广义点扩展函数恢复三维图像的实验结果。实验结果表明,采用广义点扩展函数恢复三维图像,比采用  相似文献   
813.
基于虚拟模糊集的PID参数整定器的仿真研究   总被引:1,自引:0,他引:1  
该文中给出的模糊整定器是在虚拟模糊集概念的基础上实现的。该方法首先根据Z-N整规则,按照过程的开环阶跃响应设置初始参数,然后基于闭环控制系统的响应特性,利用模糊系统精确整定控制器参数。模糊控制规则知识库由整定知识和专家经验规则构成。其中整定知识可通过对一典型过程的参数整定来自动提取。最后给出的数字仿真结果证明该方法的有效性。  相似文献   
814.
本文设计与实现了局域网防火墙。首先阐述了防火墙的原理,然后分析防火墙系统总体设计,最后论述防火墙的设计与实现,并详述其具体实现的各个模块。  相似文献   
815.
以ARM9和嵌入式Linux为平台,采用光电码盘,解决了在ARM中无高速I/O外部脉冲计数寄存器情况下轮式移动机器人的速度检测问题,并利用积分分离的PID算法实现了速度调制。在嵌入式Linux操作系统中完成整个控制过程驱动的编写,并在测速和动态调速等关键实现上给出详细的介绍,最终实现智能机器人的闭环控制。  相似文献   
816.
Discrete surface Ricci flow   总被引:1,自引:0,他引:1  
This work introduces a unified framework for discrete surface Ricci flow algorithms, including spherical, Euclidean, and hyperbolic Ricci flows, which can design Riemannian metrics on surfaces with arbitrary topologies by user-defined Gaussian curvatures. Furthermore, the target metrics are conformal (angle-preserving) to the original metrics. A Ricci flow conformally deforms the Riemannian metric on a surface according to its induced curvature, such that the curvature evolves like a heat diffusion process. Eventually, the curvature becomes the user defined curvature. Discrete Ricci flow algorithms are based on a variational framework. Given a mesh, all possible metrics form a linear space, and all possible curvatures form a convex polytope. The Ricci energy is defined on the metric space, which reaches its minimum at the desired metric. The Ricci flow is the negative gradient flow of the Ricci energy. Furthermore, the Ricci energy can be optimized using Newton's method more efficiently. Discrete Ricci flow algorithms are rigorous and efficient. Our experimental results demonstrate the efficiency, accuracy and flexibility of the algorithms. They have the potential for a wide range of applications in graphics, geometric modeling, and medical imaging. We demonstrate their practical values by global surface parameterizations.  相似文献   
817.
There is a potential server bottleneck problem when the Kerberos model is applied in large-scale networks because the model uses centralized management. To enlarge its application scope, researchers must consider how to build a trust relation among those Kerberos servers located on different isolated domains, but have not provided a way to prevent the potential bottleneck that can occur with Kerberos servers. With the development of across-domain authentication techniques, the local server bottleneck problem has not been alleviated; in fact, it has become more serious.Adopting the rigorous binary tree code algorithm, we present an authentication model based on Kerberos. Compared with similar models, our model has several advantages. First, it overcomes the potential server bottleneck problem and can balance the load automatically. Second, it can process across-domain authentication and enlarge the authentication boundary. Finally, its authentication path is short, with no more than two Kerberos servers being involved when authenticating a user.  相似文献   
818.
In this paper, a parameterization approach is presented for structural shape and topology optimization of compliant mechanisms using a moving boundary representation. A level set model is developed to implicitly describe the structural boundary by embedding into a scalar function of higher dimension as zero level set. The compactly supported radial basis function of favorable smoothness and accuracy is used to interpolate the level set function. Thus, the temporal and spatial initial value problem is now converted into a time-separable parameterization problem. Accordingly, the more difficult shape and topology optimization of the Hamilton–Jacobi equation is then transferred into a relatively easy size optimization with the expansion coefficients as design variables. The design boundary is therefore advanced by applying the optimality criteria method to iteratively evaluate the size optimization so as to update the level set function in accordance with expansion coefficients of the interpolation. The optimization problem of the compliant mechanism is established by including both the mechanical efficiency as the objective function and the prescribed material usage as the constraint. The design sensitivity analysis is performed by utilizing the shape derivative. It is noted that the present method is not only capable of simultaneously addressing shape fidelity and topology changes with a smooth structural boundary but also able to avoid some of the unfavorable numerical issues such as the Courant–Friedrich–Levy condition, the velocity extension algorithm, and the reinitialization procedure in the conventional level set method. In particular, the present method can generate new holes inside the material domain, which makes the final design less insensitive to the initial guess. The compliant inverter is applied to demonstrate the availability of the present method in the framework of the implicit free boundary representation.  相似文献   
819.
The present study was design to examine the effect of tautomerism upon the CoMFA results. Three selected data sets involving protropic tautomerism, which are 21 p-hydroxyphenylpyruvate dioxygenase (HPPD) inhibitors, 35 inhibitors of puromycin-sensitive aminopeptidase (PSA), and 67 anxiolytic agents, were used for this purpose. Atom-by-atom alignment technique was adopted to superimpose the molecules in the data sets onto a template. The structural alignments using different tautomeric forms had no significant difference except the atoms involved in tautomerism, which ensures, to a great extent, that the differences of the CoMFA results result primarily from the tautomerism. All-orientation and all-placement search (AOS-APS) based CoMFA models, in addition to the conventional ones, were derived for each system and proved to be capable of yielding much improved statistical results. In the cases of the data sets of HPPD inhibitors and PSA inhibitors, excellent AOS-APS CoMFA models (q2>0.8 with four components for the former and q2>0.7 with seven components for the latter) were obtained, and almost no significant difference in statistical quality was observed when using different tautomeric forms to derive the models. However, it was not the case when treating the data set of anxiolytic agents. The keto tautomer, which was the active form of the PBI type inhibitors, produced measurably better results (q2=0.54 with eight components) than that the enol one (q2=0.37 with five components), indicating the importance of selecting proper tautomer in the CoMFA studies. Furthermore, there existed some substantial differences of the electrostatic field contours between the two different tautomeric forms for all of the three systems considered, whereas the differences in the steric field contour maps were limited. This implies that the resulting new potent ligands may be quite different if one utilizes the CoMFA models of different tautomeric forms for guiding further structural refinements.  相似文献   
820.
在按时间控制的PLC控制系统中,正确处理定时是一个关键,本文介绍电子钟的显示数值范围、PLC控制的硬件接口及软件设计。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号