首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6574篇
  免费   478篇
  国内免费   18篇
电工技术   127篇
综合类   9篇
化学工业   1419篇
金属工艺   245篇
机械仪表   409篇
建筑科学   126篇
矿业工程   2篇
能源动力   234篇
轻工业   622篇
水利工程   22篇
石油天然气   6篇
无线电   1151篇
一般工业技术   1406篇
冶金工业   415篇
原子能技术   71篇
自动化技术   806篇
  2024年   5篇
  2023年   79篇
  2022年   90篇
  2021年   217篇
  2020年   153篇
  2019年   177篇
  2018年   219篇
  2017年   218篇
  2016年   246篇
  2015年   225篇
  2014年   320篇
  2013年   435篇
  2012年   445篇
  2011年   527篇
  2010年   346篇
  2009年   394篇
  2008年   347篇
  2007年   264篇
  2006年   279篇
  2005年   226篇
  2004年   209篇
  2003年   183篇
  2002年   177篇
  2001年   145篇
  2000年   123篇
  1999年   127篇
  1998年   205篇
  1997年   139篇
  1996年   78篇
  1995年   83篇
  1994年   67篇
  1993年   59篇
  1992年   45篇
  1991年   37篇
  1990年   30篇
  1989年   23篇
  1988年   10篇
  1987年   17篇
  1986年   16篇
  1985年   12篇
  1984年   15篇
  1983年   10篇
  1982年   4篇
  1981年   3篇
  1980年   5篇
  1979年   7篇
  1978年   3篇
  1977年   5篇
  1976年   10篇
  1975年   4篇
排序方式: 共有7070条查询结果,搜索用时 515 毫秒
171.
172.
Networked manufacturing changes conventional enterprise activities. With a networked manufacturing system, enterprises are able to perform a range of activities, such as product planning, design, production, and marketing, in collaboration with international partners, regardless of geographical location. However, strict security measures are required, as the authentication and information transfers for networked manufacturing are conducted over a network. With the development of biometric technology, more and more enterprises are using the unique biometric data of individuals to verify the identity of users, in order to restrict and provide access to technology research centers or factory facilities. This paper analyzes the vulnerabilities of the biometric system used for access control and the authentication of access to confidential information in the networked manufacturing system. In addition, the biometric systems that can be built in an open network environment are classified into 9 general models, and a biometric network protocol is suggested that is secure and compatible with international standards.  相似文献   
173.
Key supplier-side factors that affect the usage level of mobile Internet were identified and the procedural mechanism among the independent and dependent variables was investigated. For this, a research model was introduced to describe associations among four external variables (access quality, service variety, cost rationality, and ease of use), an intermediate variable (usefulness) and a dependent variable (the usage level of mobile Internet). Through the on-line survey, data were gathered from actual mobile Internet users. Confirmatory factor analysis and path analysis were applied to test the overall integrity of the research model and of proposed hypotheses. All four external variables affected user perceptions on the usefulness of mobile Internet. Among them, service variety and cost rationality had a relatively larger influence on perceived usefulness. Perceived usefulness of the mobile Internet had a positive effect on its usage, confirming the important role of usefulness as a significant mediator between the four external variables and the dependent variable. Meanwhile, the cost rationality was the only external variable with direct influence on the MI usage. Theoretical and practical implications of the study results are discussed.  相似文献   
174.
The conventional approach to reducing control signal chattering in sliding mode control is to use the boundary layer design. However, when there is high‐level measurement noise, the boundary layer design becomes ineffective in chattering reduction. This paper, therefore, proposes a new design for chattering reduction by low‐pass filtering the control signal. The new design is non‐trivial since it requires estimation of the sliding variable via a disturbance estimator. The new sliding mode control has the same performance as the boundary layer design in noise‐free environments, and outperforms the boundary layer design in noisy environments. Copyright © 2010 John Wiley and Sons Asia Pte Ltd and Chinese Automatic Control Society  相似文献   
175.
Conventional robot motion teaching methods use a teaching pendant or a motion capture device and are not the most convenient or intuitive ways to teach a robot sophisticated and fluid movements such as martial arts motions. Ideally, a robot could be set up as if it were a clothing mannequin that has light limbs and flexible yet frictional joints which can be positioned at desirable shape and hold all the positions. To do the same with a robot, an operator could pull or push the links with minor forces until the desired robot posture is attained. For this, a robot should measure the applied external force by using torque sensors at the robot joints. However, torque sensors are bulky and expensive to install in every DOF joints while keeping a compact design, which is essential to humanoid robots. In this paper, we use only motor current readings to acquire joint torques. The equations used to compensate for the effect of gravity on the joint torques and the self-calibration method to earn link parameters are presented. Additionally, kinematic restrictions can be imposed on the robot’s arms to simplify the motion teaching. Here, we teach the Kendo training robot with this method and the robot’s learnt martial art motions are demonstrated.  相似文献   
176.
Robust design (RD) and tolerance design (TD) have received much attention from researchers and practitioners for more than two decades, and a number of methodologies for modeling and optimizing the RD and TD processes have been studied. However, there is ample room for improvement. Because most existing research considers RD and TD as separate research fields, the primary objective of this paper is to develop a sequential robust–tolerance design method to jointly determine the best factor settings and the closed-form solutions for the optimal specification limits. We then apply the proposed method to a destructive quality characteristic. Finally, a case study and sensitivity analyses are performed for verification purposes, and further studies are discussed.  相似文献   
177.
Simulation has been used to evaluate various aspects of manufacturing systems. However, building a simulation model of a manufacturing system is time-consuming and error-prone because of the complexity of the systems. This paper introduces a generic simulation modeling framework to reduce the simulation model build time. The framework consists of layout modeling software and a data-driven generic simulation model. The generic simulation model was developed considering the processing as well as the logistics aspects of assembly manufacturing systems. The framework can be used to quickly develop an integrated simulation model of the production schedule, operation processes and logistics of a system. The framework was validated by developing simulation models of cellular and conveyor manufacturing systems.  相似文献   
178.
This paper presents an evolutionary algorithm, called the multi-objective symbiotic evolutionary algorithm (MOSEA), to solve a multi-objective FMS process planning (MFPP) problem with various flexibilities. The MFPP problem simultaneously considers four types of flexibilities related to machine, tool, sequence, and process and takes into account three objectives: balancing the machine workload, minimizing part movements, and minimizing tool changes. The MOSEA is modeled as a two-leveled structure to find a set of well-distributed solutions close to the true Pareto optimal solutions. To promote the search capability of such solutions, two main processes imitating symbiotic evolution and endosymbiotic evolution are introduced, together with an elitist strategy and a fitness sharing scheme. Evolutionary components suitable for the MFPP problem are provided. With a variety of test-bed problems, the performance of the proposed MOSEA is compared with those of existing multi-objective evolutionary algorithms. The experimental results show that the MOSEA is promising in solution convergence and diversity.  相似文献   
179.
Usage of frequency based error correction methods for repetitive disturbances becomes popular in data storage devices that use a rotating mechanical power plant. Two distinct disturbance cancellation methods, disturbance observer (DOB) and adaptive feed forward control (AFC) are the most popular approaches used for current drive servo integration. DOB reduces error using a predetermined function that is calculated thorough a complicated process. Generally the response to disturbance and initiation of control action of DOB is relatively fast even if the amount of error reduction is limited. Meanwhile the error elimination capability of AFC for the repetitive disturbance is normally better than DOB as it utilizes a Fourier coefficients updating feature that supports an enhanced fine adaptation of a certain frequency disturbance. Of course, AFC suffers for disturbances that have neighboring close frequencies due to the inherent fundamental frequency dependencies of AFC formulation. In the present work, an attempt for combining benefits of AFC and DOB is made. This might enables control action not only to generate fast response to disturbance but also perform an accurate error rejection. This feature also provides to the closed loop system a frequency selection for enabling a strategic selective error rejection. The proposed method named Hybrid Disturbance Observer (HDOB) is compared to the traditional AFC and DOB.  相似文献   
180.
This article discusses construction of maximally equidistributed (ME) linear feedback shift register generators by using linear output transformations. We introduce a new strategy to find linear output transformations attaining the ME property, and apply it to the WELL generators and the Mersenne Twister. As a result, we found a modified version of the WELL generators with the ME property, having fewer operations than the original ME WELL generators. We also found a ME Mersenne Twister which is faster than the WELL generators with a period of 219937−12199371 on some platforms. The C codes of the obtained generators are available at http://www3.ocn.ne.jp/∼harase/megenerators.html.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号