首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   52822篇
  免费   4676篇
  国内免费   2095篇
电工技术   2648篇
技术理论   3篇
综合类   2593篇
化学工业   9997篇
金属工艺   2937篇
机械仪表   3517篇
建筑科学   3187篇
矿业工程   1340篇
能源动力   1667篇
轻工业   3455篇
水利工程   695篇
石油天然气   2595篇
武器工业   347篇
无线电   6770篇
一般工业技术   7822篇
冶金工业   2853篇
原子能技术   594篇
自动化技术   6573篇
  2024年   263篇
  2023年   972篇
  2022年   1663篇
  2021年   2466篇
  2020年   1805篇
  2019年   1706篇
  2018年   1798篇
  2017年   1859篇
  2016年   1798篇
  2015年   2195篇
  2014年   2703篇
  2013年   3276篇
  2012年   3379篇
  2011年   3852篇
  2010年   3003篇
  2009年   2977篇
  2008年   2969篇
  2007年   2526篇
  2006年   2613篇
  2005年   2130篇
  2004年   1611篇
  2003年   1470篇
  2002年   1354篇
  2001年   1164篇
  2000年   1110篇
  1999年   1176篇
  1998年   1008篇
  1997年   853篇
  1996年   762篇
  1995年   602篇
  1994年   493篇
  1993年   340篇
  1992年   285篇
  1991年   263篇
  1990年   206篇
  1989年   185篇
  1988年   122篇
  1987年   102篇
  1986年   70篇
  1985年   80篇
  1984年   56篇
  1983年   48篇
  1982年   38篇
  1981年   35篇
  1980年   39篇
  1979年   31篇
  1978年   21篇
  1976年   22篇
  1975年   15篇
  1973年   18篇
排序方式: 共有10000条查询结果,搜索用时 10 毫秒
91.
Due to the explosive increases of data from both the cyber and physical worlds, the demand for database support in embedded systems is increasing. Databases for embedded systems, or embedded databases, are expected to provide timely in situ data services under various resource constraints, such as limited energy. However, traditional buffer cache management schemes, in which the primary goal is to minimize the number of I/O operations, is problematic since they do not consider the constraints of modern embedded devices such as limited energy and distinctive underlying storage. In particular, due to asymmetric read/write characteristics of flash memory-based storage of modern embedded devices, minimum buffer cache misses neither coincide with minimum power consumption nor minimum I/O deadline misses. In this paper we propose a novel power- and time-aware buffer cache management scheme for embedded databases. A novel multi-dimensional feedback control architecture is proposed and the characteristics of underlying storage of modern embedded devices is exploited for the simultaneous support of the desired I/O power consumption and the I/O deadline miss ratio. We have shown through an extensive simulation that our approach satisfies both power and timing requirements in I/O operations under a variety of workloads while consuming significantly smaller buffer space than baseline approaches.  相似文献   
92.
A set of elementary siphons plays a key role in the development of deadlock prevention policies for automated manufacturing systems. This paper addresses the computation problem for elementary siphons in a subclass of Petri nets which are basic systems of simple sequential processes with resources (BS3PR) and can model many automated manufacturing systems. An algorithm for enumerating elementary siphons is established by the one‐to‐one relationship between maximal perfect resource‐transition circuits (MPCs) and strict minimal siphons. A set of MPCs is first computed, followed by a set of elementary siphons in a BS3PR. The presented algorithm is proved to have polynomial‐time complexity. An example is used to illustrate the algorithm.  相似文献   
93.
An intelligent control for a stand‐alone doubly‐fed induction generator (DFIG) system using a proportional‐integral‐derivative neural network (PIDNN) is proposed in this study. This system can be applied as a stand‐alone power supply system or as the emergency power system when the electricity grid fails for all sub‐synchronous, synchronous, and super‐synchronous conditions. The rotor side converter is controlled using field‐oriented control to produce 3‐phase stator voltages with constant magnitude and frequency at different rotor speeds. Moreover, the grid side converter, which is also controlled using field‐oriented control, is primarily implemented to maintain the magnitude of the DC‐link voltage. Furthermore, the intelligent PIDNN controller is proposed for both the rotor and grid side converters to improve the transient and steady‐state responses of the DFIG system for different operating conditions. Both the network structure and online learning algorithm are introduced in detail. Finally, the feasibility of the proposed control scheme is verified through experimentation. Copyright © 2011 John Wiley and Sons Asia Pte Ltd and Chinese Automatic Control Society  相似文献   
94.
Pattern recognition techniques have been widely used in a variety of scientific disciplines including computer vision, artificial intelligence, biology, and so forth. Although many methods present satisfactory performances, they still have several weak points, thus leaving a lot of space for further improvements. In this paper, we propose two performance-driven subspace learning methods by extending the principal component analysis (PCA) and the kernel PCA (KPCA). Both methods adopt a common structure where genetic algorithms are employed to pursue optimal subspaces. Because the proposed feature extractors aim at achieving high classification accuracy, enhanced generalization ability can be expected. Extensive experiments are designed to evaluate the effectiveness of the proposed algorithms in real-world problems including object recognition and a number of machine learning tasks. Comparative studies with other state-of-the-art techniques show that the methods in this paper are capable of enhancing generalization ability for pattern recognition systems.  相似文献   
95.
A signal tracking method of GNSS receivers for spinning vehicles is proposed in order to eliminate the influence of spinning to the GNSS signal of a vehicle. In the proposed method, a rotation tracking loop is added into the carrier tracking loop of a conventional GNSS receiver. The proposed method was verified through computer simulations and an experiment for live GPS signals. The results show that the proposed method gives an accurate tracking performance.  相似文献   
96.
Oblivious signature-based envelope (OSBE) schemes have demonstrated their potential applications in the protection of users privacy and rights. In an OSBE protocol, an encrypted message can only be decrypted by the receiver who holds a valid signature on a public message, while the sender (encrypter) does not know whether the receiver has the signature or not. Our major contributions in this work lie in the following aspects. We improve the notion of OSBE so that a valid credential holder cannot share his/her credential with other users (i.e., all-or-nothing non-transferability). We clarify the relationship between one-round OSBE and identity-based encryption (IBE) and show that one-round OSBE and semantically secure IBE against the adaptively chosen identity attack (IND-ID-CPA) are equivalent, if the signature in the OSBE scheme is existentially unforgeable against adaptively chosen message attacks. We propose an oblivious access control scheme to protect user privacy without the aid of any zero-knowledge proof. Finally, we also highlight some other novel applications of OSBE, such as attributed-based encryption.  相似文献   
97.
The equilibrium Ca3P2(s) = 3[Ca] + 2[P] was studied at 1600 ° by equilibrating liquid iron, saturated with Ca3P2, and contained in a TiN crucible, with Ca vapor. The source of Ca was liquid Ca contained in an Mo crucible, and the vapor pressure of Ca was varied by varying the position of the Mo crucible in the temperature gradient of a vertical tube furnace. A least-squares analysis of the data gave and. The simultaneous equilibria CaO(s) = [Ca] + [O] and CaS(s) = [Ca] + [S] were studied at 1600 ° by equilibrating liquid iron, contained in a pressed and sintered CaO-CaS crucible with Ca vapor. The advantage of this technique is that two equilibrium constants,K cas andK cao, and two interaction coefficients, and can be determined from one set of experiments. It was determined that, at 1600 °,K cas = 5.9 × 10−8 K cao = 5.5 × 10−9,, and. Formerly Graduate Students  相似文献   
98.
红外弱小目标的匹配方法研究与仿真   总被引:1,自引:0,他引:1  
徐寒  夏森  徐健健 《计算机仿真》2012,29(2):233-236,256
研究红外图像中的目标匹配问题。针对传统的红外图像中目标匹配效果不理想,匹配不准确。当红外图像中是弱小目标时,背景灰度值与目标灰度值非常相近,灰度直方图均衡化无法实现目标与背景的完整分离,导致漏匹配率较高的问题。为提高目标的匹配精度,提出一种形态学预处理的红外目标匹配方法,通过形态学算法提取出图像中的形状信息,利用形状信息将红外图像中的目标与背景完整分离,避免了只依靠灰度图像信息造成的不能完整分离目标与背景带来的漏匹配问题。进行仿真的结果证明,采用的形态学与处理的匹配方法能够完整将目标与背景分离,成功完成目标匹配,取得了满意的结果。  相似文献   
99.
研究了一种制造低电电压氧化锌压敏电阻器的方法。在基本成分的基础上适当加入二氧化钛可降低梯度电压(V1mA/mm),适量掺硼和改进热处理工艺可减小元件的漏电流和提高其稳定性。  相似文献   
100.
Dong  Yibiao  Han  Ru  Wang  Danghui  Wang  Ruofei  Guo  Chenmeng 《SILICON》2021,13(9):3101-3111
Silicon - In this paper, an analytical model for negative capacitance double gate field effect transistor (NC-DG-FET) is proposed. This model includes interface traps and temperature effects, which...  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号