首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   17072篇
  免费   277篇
  国内免费   159篇
电工技术   216篇
综合类   9篇
化学工业   1769篇
金属工艺   565篇
机械仪表   152篇
建筑科学   400篇
矿业工程   13篇
能源动力   258篇
轻工业   416篇
水利工程   64篇
石油天然气   135篇
武器工业   2篇
无线电   804篇
一般工业技术   1417篇
冶金工业   1478篇
原子能技术   160篇
自动化技术   9650篇
  2022年   80篇
  2021年   189篇
  2020年   113篇
  2019年   124篇
  2018年   132篇
  2017年   114篇
  2016年   125篇
  2015年   131篇
  2014年   362篇
  2013年   646篇
  2012年   1090篇
  2011年   3399篇
  2010年   1370篇
  2009年   1238篇
  2008年   950篇
  2007年   866篇
  2006年   674篇
  2005年   792篇
  2004年   719篇
  2003年   752篇
  2002年   461篇
  2001年   109篇
  2000年   116篇
  1999年   139篇
  1998年   173篇
  1997年   115篇
  1996年   131篇
  1995年   91篇
  1994年   83篇
  1993年   93篇
  1992年   92篇
  1991年   67篇
  1990年   86篇
  1989年   97篇
  1988年   85篇
  1987年   94篇
  1986年   91篇
  1985年   107篇
  1984年   135篇
  1983年   93篇
  1982年   79篇
  1981年   91篇
  1980年   62篇
  1979年   96篇
  1978年   68篇
  1977年   75篇
  1976年   55篇
  1975年   65篇
  1974年   57篇
  1973年   74篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
51.
Nonlinear model predictive control with polytopic invariant sets   总被引:1,自引:0,他引:1  
Ellipsoidal invariant sets have been widely used as target sets in model predictive control (MPC). These sets can be computed by constructing appropriate linear difference inclusions together with additional constraints to ensure that the ellipsoid lies within a given inclusion polytope. The choice of inclusion polytope has a significant effect on the size of the target ellipsoid, but the optimal inclusion polytope cannot in general be computed systematically. This paper shows that use of polytopic invariant sets overcomes this difficulty, allowing larger stabilizable sets without loss of performance. In the interests of online efficiency, consideration is focused on interpolation-based MPC.  相似文献   
52.
This paper generalizes the frequency-domain results on the delay-type Nehari problem in the stable case to the unstable case. The solvability condition of the delay-type Nehari problem is formulated in terms of the nonsingularity of three matrices. The optimal value γopt is the maximal γ∈(0,∞) such that one of the three matrices becomes singular. All sub-optimal compensators are parameterized in a transparent structure incorporating a modified Smith predictor.  相似文献   
53.
Image segmentation using Markov random fields involves parameter estimation in hidden Markov models for which the EM algorithm is widely used. In practice, difficulties arise due to the dependence structure in the models and approximations are required. Using ideas from the mean field approximation principle, we propose a class of EM-like algorithms in which the computation reduces to dealing with systems of independent variables. Within this class, the simulated field algorithm is a new stochastic algorithm which appears to be the most promising for its good performance and speed, on synthetic and real image experiments.  相似文献   
54.
Fingerprints are the oldest and most widely used biometrics for personal identification. Unfortunately, it is usually possible to deceive automatic fingerprint identification systems by presenting a well-duplicated synthetic or dismembered finger. This paper introduces one method to provide fingerprint vitality authentication in order to solve this problem. Detection of a perspiration pattern over the fingertip skin identifies the vitality of a fingerprint. Mapping the two-dimensional fingerprint images into one-dimensional signals, two ensembles of measures, namely static and dynamic measures, are derived for classification. Static patterns as well as temporal changes in dielectric mosaic structure of the skin, caused by perspiration, demonstrate themselves in these signals. Using these measures, this algorithm quantifies the sweating pattern and makes a final decision about vitality of the fingerprint by a neural network trained by examples.  相似文献   
55.
Hydroprocessing of heavy petroleum feeds: Tutorial   总被引:1,自引:0,他引:1  
  相似文献   
56.
The accumulation of two independent, broadly applicable formulations for determining the boundary to manipulator workspaces, presented elsewhere, are compared in this paper. Insights gained from one method are used to explain behavior exhibited in the other. Results are also compared and validated. A numerical formulation based on continuation methods is used to map curves that are on the boundary of a manipulator workspace. Analytical criteria based on row rank deficiency criteria of the manipulator's analytical Jacobian are used to map a family of one-dimensional solution curves on the boundary. The other formulation, based on a similar rank-deficiency criteria, yields analytic boundaries parametrized in terms of surface patches on the boundary. Results concerning the applicability of the numerical method to open- and closed-loop systems are compared with those limited to the open-loop for the analytical method. Conclusions regarding the behavior of the manipulator on geometric entities characterized by singular curves, higher-order bifurcation points, and surfaces inside the workspace are drawn. Applicability of both methods and their limitations are also addressed.  相似文献   
57.
Previous research demonstrated a contradiction effect: Although text currently being processed was locally coherent, readers were aware of inconsistencies between a protagonist's actions and characteristics of the protagonists that were described earlier in the text and subsequently backgrounded. In the present experiments, not only the critical characteristics but also the protagonist were backgrounded. When the protagonist was reintroduced into the narrative in the context of carrying out an inconsistent action, the contradiction effect again occurred. In Exps 1–3, we examined the effects of several variables on the onset of the effect. In Exp 4, we presented probes at various points in the passage with results that supported the conclusion that the critical characteristics had been backgrounded before the sentence that contradicted them. Results are discussed in terms of several recent models in which currently active representational elements serve as retrieval cues for other inactive, but highly related, elements. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
58.
59.
A national survey of school psychologists' acceptability of psychological assessment techniques in the area of externalizing problem behaviors was examined. School psychologists' ratings of 2 procedures, Behavioral Assessment (BA) and Traditional Assessment (TA), were compared using an analog case study methodology. Using a random sample of 500 National Association of School Psychologists members from the 1991–1992 membership directory, 339 Ss completed the Assessment Rating Profile after reading a hypothetical case summary describing a student with suspected externalizing problem behaviors. Results indicated statistically significant differences between assessment methods and ratings of acceptability. BA procedures were found to be more acceptable than TA procedures. Implications related to the acceptability of psychological assessment techniques, as well as implications for school psychology practitioners are discussed. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
60.
This paper sketches the contours of the evolving international/monetary system and examines the various roles of the intemediation mechanisms. Then it examines the extent to which the financial system is independent from the “real economy” and the various ways in which it impacts it. The paper discusses some views in good currency on the dynamics of the technology-trade-finance nexus and shows how the financial system influences organization, location and technology choices in meso-innovation systems. The final section of the paper looks at the policy implications that might be derived from the analysis and suggests some directions for the future research.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号