首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3999篇
  免费   238篇
  国内免费   9篇
电工技术   55篇
综合类   2篇
化学工业   1118篇
金属工艺   59篇
机械仪表   98篇
建筑科学   198篇
矿业工程   3篇
能源动力   159篇
轻工业   594篇
水利工程   43篇
石油天然气   44篇
无线电   287篇
一般工业技术   557篇
冶金工业   195篇
原子能技术   14篇
自动化技术   820篇
  2024年   11篇
  2023年   46篇
  2022年   119篇
  2021年   176篇
  2020年   107篇
  2019年   141篇
  2018年   150篇
  2017年   123篇
  2016年   199篇
  2015年   102篇
  2014年   176篇
  2013年   337篇
  2012年   267篇
  2011年   332篇
  2010年   243篇
  2009年   256篇
  2008年   228篇
  2007年   180篇
  2006年   130篇
  2005年   100篇
  2004年   107篇
  2003年   77篇
  2002年   84篇
  2001年   51篇
  2000年   37篇
  1999年   48篇
  1998年   57篇
  1997年   54篇
  1996年   37篇
  1995年   33篇
  1994年   28篇
  1993年   23篇
  1992年   27篇
  1991年   17篇
  1990年   16篇
  1989年   16篇
  1988年   18篇
  1987年   8篇
  1986年   5篇
  1985年   9篇
  1984年   10篇
  1983年   8篇
  1981年   8篇
  1980年   7篇
  1979年   3篇
  1978年   3篇
  1977年   6篇
  1976年   6篇
  1969年   3篇
  1966年   5篇
排序方式: 共有4246条查询结果,搜索用时 15 毫秒
61.
In this paper, a fuzzy logic controller (FLC) based variable structure control (VSC) is presented. The main objective is to obtain an improved performance of highly non‐linear unstable systems. New functions for chattering reduction and error convergence without sacrificing invariant properties are proposed. The main feature of the proposed method is that the switching function is added as an additional fuzzy variable and will be introduced in the premise part of the fuzzy rules; together with the state variables. In this work, a tuning of the well known weighting parameters approach is proposed to optimize local and global approximation and modelling capability of the Takagi‐Sugeno (T‐S) fuzzy model to improve the choice of the performance index and minimize it. The main problem encountered is that the T‐S identification method can not be applied when the membership functions are overlapped by pairs. This in turn restricts the application of the T‐S method because this type of membership function has been widely used in control applications. The approach developed here can be considered as a generalized version of the T‐S method. An inverted pendulum mounted on a cart is chosen to evaluate the robustness, effectiveness, accuracy and remarkable performance of the proposed estimation approach in comparison with the original T‐S model. Simulation results indicate the potential, simplicity and generality of the estimation method and the robustness of the chattering reduction algorithm. In this paper, we prove that the proposed estimation algorithm converge the very fast, thereby making it very practical to use. The application of the proposed FLC‐VSC shows that both alleviation of chattering and robust performance are achieved.  相似文献   
62.
In public key encryption schemes with a double decryption mechanism (DD-PKE), decryption can be done in either of two ways: by the user owning the secret/public key pair corresponding to the ciphertext, or by a trusted party holding a sort of master secret-key. In this note we argue that the classical security notion for standard public key encryption schemes does not suffice for DD-PKE schemes, and propose a new natural definition. Additionally, we illustrate the usefulness of the new security definition by showing that a DD-PKE scheme presented in the workshop Selected Areas in Cryptography 2005 is insecure under this augmented security notion.  相似文献   
63.
A hybrid scheme for the inversion of the Rahman-Pinty-Verstraete (RPV) model is presented. It combines the inversion technique described by Lavergne et al. (Lavergne, T., Kaminski, T., Pinty, B., Taberner, M., Gobron, N., Verstraete, M.M., Vossbeck, M., Widlowski, J.L., Giering, R. (2007). Application to MISR land products of an RPV model inversion package using adjoint and Hessian codes. Remote Sensing of Environment, 107, 362-375.) and a multilayer backpropagation feedforward neural network. The RPV inversion package is applied to a sample set of pixels within the satellite scene. Subsequently the pairs of bidirectional reflectance factors (BRF) and model parameters estimated from the sample set of pixels are used to train the neural network. Since the mathematical formulation of the RPV model is embedded in these training data variables, the neural network can efficiently retrieve the model parameters for the whole satellite scene. This scheme has been tested for a MISR L2 BRF scene, MISR L1B2-derived BRF data corresponding to two different dates and a mosaic of MISR L2 BRF scenes acquired over Southern Africa covering a large extent of Miombo woodland. The results show this strategy retrieves the RPV model parameters and uncertainties with high accuracy and considerable speed over large areas.  相似文献   
64.
65.
A steady-state interval operability methodology is introduced here for multivariable non-square systems with fewer inputs than output variables to be used in the design of model-based constrained controllers (MPC, DMC). For such systems, set-point control is not possible for all the outputs and interval control is needed. The proposed iterative approach enables the selection of the needed interval constraints systematically, so that the tightest possible control is achieved without rendering the control problem infeasible. The application of this methodology to high-dimensional industrial problems characterizing processes of Air Products and Chemicals and DuPont shows that very significant reduction of the constrained region can be achieved from the steady-state point of view. Ratios of the initial to the calculated volume of the constrained regions examined range between 104 and 108.  相似文献   
66.
A telecommunications network is isolated failure immune (IFI) if and only if communication between operative sites can be completed as long as network failures are isolated. It is known that the class of minimal IFI networks is equivalent to the class of spanning 2-trees. To the best of our knowledge, this work is the first computational study dealing with the construction of a minimum cost IFI network. The problem is known to be NP-complete. We develop a tabu search based heuristic for solving the minimum cost spanning 2-tree (MCS2T) problem. The complex structure of 2-trees makes the tabu search heuristic highly dependent on the starting solution. We develop four heuristic algorithms to obtain diversified good starting solutions. They are: completion of a 2-tree from a spanning tree, two greedy approaches, and a method based on the recursive definition of a 2-tree. We also formulate an integer programming problem (IP) whose objective function value is a lower bound to the MCS2T problem. We solve the IP by developing a constraint generation scheme. The algorithms were tested on complete random graphs with Euclidean distances and on two real data sets (Civil Aeronautics Board) with instances of 10, 15, 20 and 25 nodes. As a result of this research for small problems (10 and 15 nodes), the heuristic solutions are on average within 0.8% from the optimal solution and for large problems (20 and 25 nodes), the average error is less than 2.8%.  相似文献   
67.
Summary The cleavage of styrene-butadiene rubber (SBR) with periodic acid (H5IO6) and simultaneous injection of ultrasonic radiation has been performed. Two frequencies, 25 and 40 kHz, respectively, have been used. The results demonstrate clearly that 40 kHz ultrasound radiation accelerates significantly the cleavage reaction. The Pearl String Model theory had been used to elucidate this process.  相似文献   
68.
Permanent magnets based on neodymium-iron-boron (Nd-Fe-B) alloys provide the highest performance and energy density, finding usage in many high-tech applications. Their magnetic performance relies on the intrinsic properties of the hard-magnetic Nd2Fe14B phase combined with control over the microstructure during production. In this study, a novel magnetic hardening mechanism is described in such materials based on a solid-state phase transformation. Using modified Nd-Fe-B alloys of the type Nd16Febal-x-y-zCoxMoyCuzB7 for the first time it is revealed how the microstructural transformation from the metastable Nd2Fe17Bx phase to the hard-magnetic Nd2Fe14B phase can be thermally controlled, leading to an astonishing increase in coercivity from ≈200 kAm−1 to almost 700 kAm−1. Furthermore, after thermally treating a quenched sample of Nd16Fe56Co20Mo2Cu2B7, the presence of Mo leads to the formation of fine FeMo2B2 precipitates, in the range from micrometers down to a few nanometers. These precipitates are responsible for the refinement of the Nd2Fe14B grains and so for the high coercivity. This mechanism can be incorporated into existing manufacturing processes and can prove to be applicable to novel fabrication routes for Nd-Fe-B magnets, such as additive manufacturing.  相似文献   
69.
70.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号