首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   20416篇
  免费   1339篇
  国内免费   41篇
电工技术   148篇
综合类   115篇
化学工业   5744篇
金属工艺   491篇
机械仪表   388篇
建筑科学   610篇
矿业工程   62篇
能源动力   718篇
轻工业   4680篇
水利工程   160篇
石油天然气   157篇
武器工业   1篇
无线电   871篇
一般工业技术   2968篇
冶金工业   1979篇
原子能技术   106篇
自动化技术   2598篇
  2024年   45篇
  2023年   188篇
  2022年   704篇
  2021年   928篇
  2020年   571篇
  2019年   654篇
  2018年   809篇
  2017年   812篇
  2016年   885篇
  2015年   687篇
  2014年   1005篇
  2013年   1722篇
  2012年   1365篇
  2011年   1423篇
  2010年   1101篇
  2009年   1065篇
  2008年   908篇
  2007年   775篇
  2006年   596篇
  2005年   493篇
  2004年   449篇
  2003年   460篇
  2002年   367篇
  2001年   267篇
  2000年   227篇
  1999年   233篇
  1998年   753篇
  1997年   495篇
  1996年   339篇
  1995年   212篇
  1994年   185篇
  1993年   144篇
  1992年   76篇
  1991年   48篇
  1990年   53篇
  1989年   51篇
  1988年   62篇
  1987年   56篇
  1986年   34篇
  1985年   60篇
  1984年   57篇
  1983年   55篇
  1982年   44篇
  1981年   40篇
  1980年   51篇
  1979年   33篇
  1978年   22篇
  1977年   37篇
  1976年   59篇
  1973年   22篇
排序方式: 共有10000条查询结果,搜索用时 14 毫秒
81.
The issue of trust is a research problem in emerging open environments, such as ubiquitous networks. Such environments are highly dynamic and they contain diverse number of services and autonomous entities. Entities in open environments have different security needs from services. Trust computations related to the security systems of services necessitate information that meets needs of each entity. Obtaining such information is a challenging issue for entities. In this paper, we propose a model for extracting trust information from the security system of a service based on the needs of an entity. We formally represent security policies and security systems to extract trust information according to needs of an entity. The formal representation ensures an entity to extract trust information about a security property of a service and trust information about whole security system of the service. The proposed model is applied to Dental Clinic Patient Service as a case study with two scenarios. The scenarios are analyzed experimentally with simulations. The experimental evaluation shows that the proposed model provides trust information related to the security system of a service based on the needs of an entity and it is applicable in emerging open environments.  相似文献   
82.
We focus on two aspects of the face recognition, feature extraction and classification. We propose a two component system, introducing Lattice Independent Component Analysis (LICA) for feature extraction and Extreme Learning Machines (ELM) for classification. In previous works we have proposed LICA for a variety of image processing tasks. The first step of LICA is to identify strong lattice independent components from the data. In the second step, the set of strong lattice independent vector are used for linear unmixing of the data, obtaining a vector of abundance coefficients. The resulting abundance values are used as features for classification, specifically for face recognition. Extreme Learning Machines are accurate and fast-learning innovative classification methods based on the random generation of the input-to-hidden-units weights followed by the resolution of the linear equations to obtain the hidden-to-output weights. The LICA-ELM system has been tested against state-of-the-art feature extraction methods and classifiers, outperforming them when performing cross-validation on four large unbalanced face databases.  相似文献   
83.
The IEEE 802.3az standard provides a new low power mode that Ethernet network interfaces can use to save energy when there is no traffic to transmit. Simultaneously with the final standard approval, several algorithms were proposed to govern the physical interface state transition between the normal active mode and the new low power mode. In fact, the standard leaves this sleeping algorithm unspecified to spur competition among different vendors and achieve the greatest energy savings. In this paper, we try to bring some light to the most well known sleeping algorithms, providing mathematical models for the expected energy savings and the average packet delay inflicted on outgoing traffic. We will then use the models to derive optimum configuration parameters for them under given efficiency constraints.  相似文献   
84.
Kinematic redundancy occurs when a manipulator possesses more degrees of freedom than those required to execute a given task. Several kinematic techniques for redundant manipulators control the gripper through the pseudo-inverse of the Jacobian, but lead to a kind of chaotic inner motion with unpredictable arm configurations. Such algorithms are not easy to adapt to optimization schemes and, moreover, often there are multiple optimization objectives that can conflict between them. Unlike single optimization, where one attempts to find the best solution, in multi-objective optimization there is no single solution that is optimum with respect to all indices. Therefore, trajectory planning of redundant robots remains an important area of research and more efficient optimization algorithms are needed. This paper presents a new technique to solve the inverse kinematics of redundant manipulators, using a multi-objective genetic algorithm. This scheme combines the closed-loop pseudo-inverse method with a multi-objective genetic algorithm to control the joint positions. Simulations for manipulators with three or four rotational joints, considering the optimization of two objectives in a workspace without and with obstacles are developed. The results reveal that it is possible to choose several solutions from the Pareto optimal front according to the importance of each individual objective.  相似文献   
85.
The perovskite-type oxide PrCoO3 has been studied by means of X-ray photoelectron spectroscopy (XPS), reduction in H2 and X-ray diffraction. Two types of oxygen were detected: lattice oxygen (binding energy = 528.4 eV) and adsorbed oxygen (binding energy = 530.9 eV). The increase in relative intensity of the peak corresponding to the latter species after reduction of PrCo03 to 3e per molecule is assigned to the formation of hydroxyl groups. Temperature-programmed reduction (TPR) results showed two reduction steps: to 1 e per molecule (Co3.1 Co2+) at 475 to 635 K, and to 3e per molecule (Co21 Co0) at 725 to 815 K. Reduction in the first and second steps occurs according to the contracting sphere model and the nucleation mechanism, respectively. Reduction of Co3+ to Co2+ causes minimal structural changes in the perovskite. Reduction to 3e per molecule yielded Pr2O3 and metallic cobalt. After this reduction and reoxidation at 973 K, the perovskite structure was regained. By XPS and TPR it was shown that PrCo03 is more easily reducible than LaCo03. It is concluded that the cation in the A position of the structure plays a significant role in the bulk and surface properties of LnCo03 (Ln, lanthanide elements) oxides.  相似文献   
86.
The conductivity measurements of carbon black (CB)-polyvinyl chloride (PCV) composite in a tetrachloride (CCl4), trichloromethane (chloroform, CHCl3) or methylene chloride (CH2Cl2) vapour ambient have been performed. The composite contains 20% Chezacarb K2 carbon black and was prepared as a plastic strip. Based on the =f(t) dependence, three methods to determine the vapour concentration,c, are presented. The investigations could allow one to construct a CCl4 and CHCl3 vapour detector.  相似文献   
87.
A universal curve relating the maximum of thermal conductivity and its respective temperature with the residual electrical resistivity has been proposed for metals and dilute alloys. Based on the equation of that curve, a comparative analysis of selected literature data of thermal conductivity of metals, which have residual electrical resistivity in the range 10–11<0<10–5. cm, have been performed. Using the data for 33 metals, confirmation of the Wiedemann-Franz law for the impurity component/T of thermal conductivity was obtained, which means that th/el1, where th and el are the parameters of the electron-lattice defect interaction obtained from measurements of thermal and electrical conductivity, respectively. Examples of the failure of the Wiedemann-Franz law are also presented, exhibiting the values of th/el in the range 0.16 to 25. Measurements of thermal conductivity in the range 2 to 20 K and determination of the residual electrical resistivity for the samples of Cd doped with Zn and quenched were performed, resulting in values th/el1.  相似文献   
88.
The different groups and/or classes among phenolic acids and aldehydes identified during the elaboration process of "fino" sherry wine have been studied. The study was carried out using different processes during the elaboration of the wine and we have attempted to establish whether the different treatments of the grape affect these groupings. The study was undertaken by means of cluster and multifactorial analysis on the data obtained by the quantitative determination of phenolic acids and aldehydes during vinification and in experiments carried out on the grape under different mechanical treatments. The analysis of phenolic acids and aldehydes was done with HPLC, using a C-18 mu-Bondapak and a stepwise composite gradient. The samples were previously extracted with ethylic ether.  相似文献   
89.
The conditions for current oscillations in austenitic stainless steel (AISI Type 303) in 1M H2SO4 containing Cl? ions are given. The periodic oscillations are produced in a close potential range determined at the active-passive transition region. It requires a non-homogeneous distribution of inclusions and carbides at the metal surface and a concentration range of Cl? ion where active and passive areas coexist on the metal surface. The constraints at the surface determining these two regions are related to the Cl? ion competitive adsorption and the local accumulation of corrosion products. Electrochemical data and SEM observations are correlated.  相似文献   
90.
This paper considers systems with two-dimensional dynamics (2D systems) described by the continuous-time nonlinear state-space Roesser model. The sufficient conditions of exponential stability in terms of vector Lyapunov functions are established. These conditions are then applied to analysis of the absolute stability of a certain class of systems comprising a linear continuous-time plant in the form of the Roesser model with a nonlinear characteristic in the feedback loop, which satisfies quadratic constraints. The absolute stability conditions are reduced to computable expressions in the form of linear matrix inequalities. The obtained results are extended to the class of continuous-time systems governed by the Roesser model with Markovian switching. The problems of absolute stability and stabilization via state- and output-feedback are solved for linear systems of the above class. The solution procedures for these problems are in the form of algorithms based on linear matrix inequalities.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号