首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   40390篇
  免费   1535篇
  国内免费   65篇
电工技术   419篇
综合类   34篇
化学工业   8196篇
金属工艺   765篇
机械仪表   810篇
建筑科学   2091篇
矿业工程   122篇
能源动力   1213篇
轻工业   3584篇
水利工程   456篇
石油天然气   128篇
武器工业   5篇
无线电   2819篇
一般工业技术   6765篇
冶金工业   7044篇
原子能技术   293篇
自动化技术   7246篇
  2023年   266篇
  2022年   609篇
  2021年   857篇
  2020年   562篇
  2019年   741篇
  2018年   932篇
  2017年   838篇
  2016年   964篇
  2015年   874篇
  2014年   1207篇
  2013年   2654篇
  2012年   1931篇
  2011年   2374篇
  2010年   1855篇
  2009年   1732篇
  2008年   1987篇
  2007年   1945篇
  2006年   1764篇
  2005年   1562篇
  2004年   1287篇
  2003年   1210篇
  2002年   1133篇
  2001年   760篇
  2000年   593篇
  1999年   658篇
  1998年   716篇
  1997年   667篇
  1996年   612篇
  1995年   620篇
  1994年   577篇
  1993年   539篇
  1992年   522篇
  1991年   311篇
  1990年   442篇
  1989年   413篇
  1988年   338篇
  1987年   364篇
  1986年   320篇
  1985年   427篇
  1984年   424篇
  1983年   327篇
  1982年   305篇
  1981年   290篇
  1980年   277篇
  1979年   275篇
  1978年   250篇
  1977年   231篇
  1976年   221篇
  1975年   200篇
  1974年   176篇
排序方式: 共有10000条查询结果,搜索用时 10 毫秒
141.
Backlash-like hysteresis is one of the nonsmooth and multi-valued nonlinearities usually existing in mechanical systems. The traditional identification method is quite difficult to be used to model the systems involved with such complex nonlinearities. In this paper, a nonsmooth recursive identification algorithm for the systems with backlash-like hysteresis is proposed. In this method, the concept of Clarke subgradient is introduced to approximate the gradients at nonsmooth points and the so-called bundle method is used to obtain the optimization search direction in nonsmooth cases. Then, a recursive algorithm based on the idea of bundle method is developed for parameter estimation. After that, the convergence analysis of the algorithm is investigated. Finally, simulation results to validate the proposed method on a simulated mechanical transmission system are presented.  相似文献   
142.
This work introduces a novel formulation of system optimal dynamic traffic assignment that captures strategic route choice in users under demand uncertainty. We define strategic route choice to be that users choose a path prior to knowing the true travel demand which will be experienced (therefore users consider the full set of possible demand scenarios). The problem is formulated based on previous work by Ziliaskopoulos (Transp Sci 34(1):37–49, 2000). The resulting novel formulation requires substantial enhancement to account for path-based flows and scenario-based stochastic demands. Further, a numerical demonstration is presented on a network with different demand loading profiles. Finally, model complexity, implications on scalability and future research directions are discussed.  相似文献   
143.
Missing data are common in range images, due to geometric occlusions, limitations in the sensor field of view, poor reflectivity, depth discontinuities, and cast shadows. Using registration to align these data often fails, because points without valid correspondences can be incorrectly matched. This paper presents a maximum likelihood method for registration of scenes with unmatched or missing data. Using ray casting, correspondences are formed between valid and missing points in each view. These correspondences are used to classify points by their visibility properties, including occlusions, field of view, and shadow regions. The likelihood of each point match is then determined using statistical properties of the sensor, such as noise and outlier distributions. Experiments demonstrate a high rates of convergence on complex scenes with varying degrees of overlap.  相似文献   
144.
This paper proposes and implements a novel hybrid level set method which combines the numerical efficiency of the local level set approach with the temporal stability afforded by a semi-implicit technique. By introducing an extraction/insertion algorithm into the local level set approach, we can accurately capture complicated behaviors such as interface separation and coalescence. This technique solves a well known problem when treating a semi-implicit system with spectral methods, where spurious interface movements emerge when two interfaces are close to each other. Numerical experiments show that the proposed method is stable, efficient and scales up well into three dimensional problems.  相似文献   
145.
This paper explores the feasibility of using the unsteady forces generated by the Karman street around a microprism in the laminar flow regime as a means to generate mechanical work. In particular, the study has the objective of assessing whether this physical effect could be used for practical energy-harvesting purposes. The confined flow, either of a liquid or a gas, around a rectangular microprism, of which different aspect ratios have been studied, is considered at Reynolds 200 so as to make sure that the Karman street is developed and that the flow remains 2-D. The microprism is allowed to move freely in the direction perpendicular to the flow. The equation of motion of the prism includes a term that simulates its coupling with a vibration-driven micropower generator. Two different couplings have been considered: a velocity-damped resonant generator and a Coulomb-damped resonant generator. Different configurations have been studied, and comparisons have been carried out between them so as to draw a first set of design guidelines. Finally, it is shown that this type of energy-harvesting microdevice, which is basically 2-D, would yield a reasonable compromise between power output, manufacturing simplicity, and cost.  相似文献   
146.
It is impossible to make any progress on the security vs. privacy debate, or move towards a political settlement around identity for the coming years, unless we develop a more modern notion of what identity is and how it should be addressed online. So long as we maintain an essentially “Victorian” view of the balance between security and privacy, founded on the central concept of identity as a card in a filing cabinet, then society cannot properly take advantage of technological developments. If it does, then security and privacy are no longer competing concerns that need to be balanced but simultaneous deliverables of an infrastructure founded in utility.  相似文献   
147.
Evans  David 《ITNOW》2009,51(1):20-21
David Evans, BCS government relations, looks at what it couldtake to convince kids that the hard stuff is worth doing.  相似文献   
148.
Some of the current best conformant probabilistic planners focus on finding a fixed length plan with maximal probability. While these approaches can find optimal solutions, they often do not scale for large problems or plan lengths. As has been shown in classical planning, heuristic search outperforms bounded length search (especially when an appropriate plan length is not given a priori). The problem with applying heuristic search in probabilistic planning is that effective heuristics are as yet lacking.In this work, we apply heuristic search to conformant probabilistic planning by adapting planning graph heuristics developed for non-deterministic planning. We evaluate a straight-forward application of these planning graph techniques, which amounts to exactly computing a distribution over many relaxed planning graphs (one planning graph for each joint outcome of uncertain actions at each time step). Computing this distribution is costly, so we apply Sequential Monte Carlo (SMC) to approximate it. One important issue that we explore in this work is how to automatically determine the number of samples required for effective heuristic computation. We empirically demonstrate on several domains how our efficient, but sometimes suboptimal, approach enables our planner to solve much larger problems than an existing optimal bounded length probabilistic planner and still find reasonable quality solutions.  相似文献   
149.
Synthetic aggregation pheromones ofCarpophilus hemipterus (L.) andCarpophilus mutilatus Erichson were field tested during a 10-month period in southern New South Wales stone fruit orchards to determineCarpophilus spp. phenology and the effect of two pheromone doses on attraction. Aggregation pheromones synergize the attraction of host volatiles toCarpophilus spp. Four major species,C. hemipterus, C. mutilatus, C. davidsoni Dobson andC. (Urophorus) humeralis (F.), were trapped, with greater numbers of each species inC. hemipterus pheromone/fermenting whole-wheat breaddough-baited traps, than in dough-only-traps. InC. mutilatus pheromone/ fermenting-dough-baited traps, onlyC. mutilatus andC. davidsoni responded in greater numbers than to dough-only traps. Beetles first appeared in traps in late September (early spring) when daily maximum temperatures averaged 17.5C. Trappings reached a peak during October and declined to very low levels in November–December (late spring-early summer). Numbers trapped of all species increased during February–March (late summer–early autumn), presumably due to the presence of abundant host resources (ripening and fallen fruit), and continued at high levels until May (late autumn). An 18-week study demonstrated significantly greater responses byCarpophilus spp. to 5000-g than to 500-g doses of C.hemipterus andC. mutilatus pheromones. Greatest responses to 5000g were recorded forC. hemipterus andC. mutilatus responding to their own pheromones (increased attraction over dough alone of 259x and 21.2x respectively). Implications of the study and the potential for using synthetic aggregation pheromones for managingCarpophilus spp. populations in Australian stone fruit are discussed.  相似文献   
150.
The virtual path (VP) can simplifyAtm network management by minimizing connection routing and admission costs, and by facilitating the layered control of resources. However, fully exploiting these advantages may lead to a large number of relatively low capacity virtual paths travelling on each physical link. If each VP is treated as a separate unit, as is commonly assumed, low path capacities will lead to low network utilisation. This paper carefully examines the trade-off between simplification through traffic separation and improved efficiency due to traffic consolidation. We review existing vp bandwidth assignment and control techniques, and propose a new vp tagging control method. A comparison shows that by permitting resource sharing between paths it is possible to influence significantly the trade-off between simplified network management and multiplexing gain from traffic consolidation.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号