首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6072篇
  免费   151篇
  国内免费   11篇
电工技术   68篇
综合类   7篇
化学工业   949篇
金属工艺   118篇
机械仪表   168篇
建筑科学   135篇
矿业工程   6篇
能源动力   202篇
轻工业   282篇
水利工程   10篇
石油天然气   17篇
无线电   914篇
一般工业技术   926篇
冶金工业   1439篇
原子能技术   26篇
自动化技术   967篇
  2023年   27篇
  2022年   95篇
  2021年   131篇
  2020年   39篇
  2019年   62篇
  2018年   77篇
  2017年   79篇
  2016年   101篇
  2015年   105篇
  2014年   148篇
  2013年   428篇
  2012年   265篇
  2011年   352篇
  2010年   296篇
  2009年   347篇
  2008年   287篇
  2007年   254篇
  2006年   209篇
  2005年   167篇
  2004年   148篇
  2003年   142篇
  2002年   110篇
  2001年   108篇
  2000年   78篇
  1999年   117篇
  1998年   457篇
  1997年   301篇
  1996年   223篇
  1995年   141篇
  1994年   147篇
  1993年   139篇
  1992年   59篇
  1991年   61篇
  1990年   48篇
  1989年   54篇
  1988年   48篇
  1987年   29篇
  1986年   29篇
  1985年   29篇
  1984年   16篇
  1983年   12篇
  1982年   21篇
  1981年   13篇
  1980年   20篇
  1979年   20篇
  1978年   16篇
  1977年   39篇
  1976年   90篇
  1975年   12篇
  1973年   9篇
排序方式: 共有6234条查询结果,搜索用时 15 毫秒
181.
Fuzzy rule base systems verification using high-level Petri nets   总被引:3,自引:0,他引:3  
In this paper, we propose a Petri nets formalism for the verification of rule-based systems. Typical structural errors in a rule-based system are redundancy, inconsistency, incompleteness, and circularity. Since our verification is based on Petri nets and their incidence matrix, we need to transform rules into a Petri nets first, then derive an incidence matrix from the net. In order to let fuzzy rule-based systems detect above the structural errors, we are presenting a Petri-nets-based mechanism. This mechanism consists of three phases: rule normalization, rules transformation, and rule verification. Rules will be first normalized into Horn clauses, then transform the normalized rules into a high-level Petri net, and finally we verify these normalized rules. In addition, we are presenting our approach to simulate the truth conditions which still hold after a transition firing and negation in Petri nets for rule base modeling. In this paper, we refer to fuzzy rules as the rules with certainty factors, the degree of truth is computed in an algebraic form based on state equation which can be implemented in matrix computation in Petri nets. Therefore, the fuzzy reasoning problems can be transformed as the liner equation problems that can be solved in parallel. We have implemented a Petri nets tool to realize the mechanism presented fuzzy rules in this paper.  相似文献   
182.
An interactive agent-based system for concept-based web search   总被引:1,自引:0,他引:1  
Search engines are useful tools in looking for information from the Internet. However, due to the difficulties of specifying appropriate queries and the problems of keyword-based similarity ranking presently encountered by search engines, general users are still not satisfied with the results retrieved. To remedy the above difficulties and problems, in this paper we present a multi-agent framework in which an interactive approach is proposed to iteratively collect a user's feedback from the pages he has identified. By analyzing the pages gathered, the system can then gradually formulate queries to efficiently describe the content a user is looking for. In our framework, the evolution strategies are employed to evolve critical feature words for concept modeling in query formulation. The experimental results show that the framework developed is efficient and useful to enhance the quality of web search, and the concept-based semantic search can thus be achieved.  相似文献   
183.
In this paper, we shall discuss oscillatory behavior of the solutions of difference equations, including the self-adjoint second-order linear equation and the discrete version of the nonlinear wave equation. Our work is to give sufficient conditions such that every nontrivial solution of the equations oscillates.  相似文献   
184.
The image template matching problem is one of the fundamental problems of and has many practical applications in image processing, pattern recognition, and computer vision. It is a useful operation for filtering, edge detection, image registration, and object detection [13]. In this paper, we first design twoO[(M2/p2)log logM] andO[(M2/p2)+(M/p)log logp] time parallel image template matching algorithms on a 3-D processor array with a reconfigurable bus system usingp2N2processors with each processor containingO(1) andO(M/p) restricted memory for 1 ≤pMN, respectively, for anN×Ndigital image and anM×Mtemplate. By increasing the number of processors, these two proposed algorithms can be run inO(M2/p2) time for speeding up the time complexity usingp2M1/cN2andp2+1/cN2processors, respectively, wherecis a constant andc≥1. Furthermore, anO(1) time can be also obtained from these two proposed algorithms by usingM2+1/cN2processors. These results improve the best known bounds and achieve both optimal and optimal speed-up in their time and processor complexities.  相似文献   
185.
An approach to landmark location estimation by computer vision techniques is proposed. The objective is to derive the position and the orientation of the landmark with respect to the vehicle by a single image. Such information is necessary for automatic vehicle navigation. This approach requires lower hardware cost and simple computation. The vanishing points of the parallel lines on the landmark are used to detect the landmark orientation. The detected vanishing points are used to derive the relative orientation between the landmark and the camera, which is then utilized to compute the landmark orientation with respect to the vehicle. The size of the landmark is used to determine the landmark position. Sets of collinear points are extracted from the landmark and their inter-point distances are computed. The positions of the collinear point sets are evaluated and used to determine the landmark position. Landing site location estimation by using the identification marking H on the helicopter landing site for automatic helicopter landing is presented as an application of the proposed approach. Simulations and experiments have been conducted to prove the feasibility of the proposed approach.  相似文献   
186.
Provided with plenty of data (experience), data mining techniques are widely used to extract suitable management skills from the data. Nevertheless, in the early stages of a manufacturing system, only rare data can be obtained, and built scheduling knowledge is usually fragile. Using small data sets, this research's purpose is improving the accuracy of machine learning for flexible manufacturing system (FMS) scheduling. The study develops a data trend estimation technique and combines it with mega-fuzzification and adaptive-network-based fuzzy inference systems (ANFIS). The results of the simulated FMS scheduling problem indicate that learning accuracy can be significantly improved using the proposed method involving a very small data set.  相似文献   
187.
We propose and demonstrate electrostatic sidewall-electrodes actuation of three-dimensional (3-D) microelectromechanical systems (MEMS) gimbal mirrors. The linearity of the mirror angle dependence on actuation voltage is improved with the sidewall-electrodes actuation. In addition, the undesired spring-softening effect commonly found in electrostatic actuation, where the mirror resonance frequency decreases with increased tilt angle, is significantly reduced. Sidewall actuation enables superior performance of 3-D MEMS mirrors including large pull-in angles, reduced actuation voltages, improved device reliability, and fast switching times.  相似文献   
188.
Attachment researchers claim that individual differences in how adults talk about their early memories reflect qualitatively distinct organizations of emotion regarding childhood experiences with caregivers. Testing this assumption, the present study examined the relationship between attachment dimensions and physiological, facial expressive, as well as self-reported emotional responses during the Adult Attachment Interview (AAI). Consistent with theoretical predictions, more prototypically secure adults behaviorally expressed and reported experiencing emotion consistent with the valence of the childhood events they described. Insecure adults also showed distinctive and theoretically anticipated forms of emotional response: Dismissing participants evidenced increased electrodermal activity during the interview, a sign of emotional suppression, whereas preoccupied adults showed reliable discrepancies between the valence of their inferred childhood experiences and their facial expressive as well as reported emotion during the AAI. Results substantiate a case that the AAI reflects individual differences in emotion regulation that conceptually parallel observations of attachment relationships in infancy. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
189.
In a graph G, a k-container Ck(u,v) is a set of k disjoint paths joining u and v. A k-container Ck(u,v) is k∗-container if every vertex of G is passed by some path in Ck(u,v). A graph G is k∗-connected if there exists a k∗-container between any two vertices. An m-regular graph G is super-connected if G is k∗-connected for any k with 1?k?m. In this paper, we prove that the recursive circulant graphs G(2m,4), proposed by Park and Chwa [Theoret. Comput. Sci. 244 (2000) 35-62], are super-connected if and only if m≠2.  相似文献   
190.
The discretized quadratic sub‐optimal tracker for nonlinear continuous two‐dimensional (2‐D) systems is newly proposed in this paper. The proposed method provides a novel methodology for indirect digital redesign for nonlinear continuous 2‐D systems with a continuous performance index. This includes the following features: (1) the 2‐D optimal‐linearization approach of the nonlinear 2‐D Roesser's model (RM), (2) the dynamic programming‐based discretized quadratic optimal tracker for linear continuous 2‐D systems, (3) the steady‐state discretized quadratic sub‐optimal tracker for linear continuous 2‐D systems, and (4) the discretized quadratic sub‐optimal tracker for nonlinear continuous 2‐D systems. Illustrative examples are presented to demonstrate the effectiveness of the proposed procedure.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号