首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   13544篇
  免费   117篇
  国内免费   6篇
电工技术   245篇
综合类   8篇
化学工业   1276篇
金属工艺   369篇
机械仪表   137篇
建筑科学   306篇
矿业工程   20篇
能源动力   130篇
轻工业   470篇
水利工程   57篇
石油天然气   8篇
无线电   600篇
一般工业技术   661篇
冶金工业   883篇
原子能技术   158篇
自动化技术   8339篇
  2022年   45篇
  2021年   71篇
  2020年   44篇
  2019年   57篇
  2018年   45篇
  2017年   55篇
  2016年   66篇
  2015年   72篇
  2014年   308篇
  2013年   355篇
  2012年   892篇
  2011年   2469篇
  2010年   1226篇
  2009年   1074篇
  2008年   830篇
  2007年   717篇
  2006年   586篇
  2005年   681篇
  2004年   617篇
  2003年   669篇
  2002年   372篇
  2001年   68篇
  2000年   66篇
  1999年   81篇
  1998年   144篇
  1997年   118篇
  1996年   87篇
  1995年   86篇
  1994年   73篇
  1993年   63篇
  1992年   51篇
  1991年   50篇
  1990年   63篇
  1989年   59篇
  1988年   52篇
  1987年   59篇
  1986年   51篇
  1985年   65篇
  1984年   61篇
  1983年   63篇
  1982年   53篇
  1981年   44篇
  1979年   48篇
  1978年   60篇
  1977年   61篇
  1976年   69篇
  1975年   55篇
  1974年   52篇
  1973年   59篇
  1972年   43篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
31.
This paper generalizes the frequency-domain results on the delay-type Nehari problem in the stable case to the unstable case. The solvability condition of the delay-type Nehari problem is formulated in terms of the nonsingularity of three matrices. The optimal value γopt is the maximal γ∈(0,∞) such that one of the three matrices becomes singular. All sub-optimal compensators are parameterized in a transparent structure incorporating a modified Smith predictor.  相似文献   
32.
Image segmentation using Markov random fields involves parameter estimation in hidden Markov models for which the EM algorithm is widely used. In practice, difficulties arise due to the dependence structure in the models and approximations are required. Using ideas from the mean field approximation principle, we propose a class of EM-like algorithms in which the computation reduces to dealing with systems of independent variables. Within this class, the simulated field algorithm is a new stochastic algorithm which appears to be the most promising for its good performance and speed, on synthetic and real image experiments.  相似文献   
33.
Fingerprints are the oldest and most widely used biometrics for personal identification. Unfortunately, it is usually possible to deceive automatic fingerprint identification systems by presenting a well-duplicated synthetic or dismembered finger. This paper introduces one method to provide fingerprint vitality authentication in order to solve this problem. Detection of a perspiration pattern over the fingertip skin identifies the vitality of a fingerprint. Mapping the two-dimensional fingerprint images into one-dimensional signals, two ensembles of measures, namely static and dynamic measures, are derived for classification. Static patterns as well as temporal changes in dielectric mosaic structure of the skin, caused by perspiration, demonstrate themselves in these signals. Using these measures, this algorithm quantifies the sweating pattern and makes a final decision about vitality of the fingerprint by a neural network trained by examples.  相似文献   
34.
A numerical simulation of unsteady compressible flow induced by two high-speed trains in oncoming traffic within a tunnel is presented. The computations were carried out by means of a second-order accurate Harten-Yee type upwind TVD scheme. In order to take the effect of friction into account, a source term is included in the governing flow equations. In the computation, moving boundary configurations were used to simulate the two trains passing through the tunnel. As geometrical configuration, the Einmalberg tunnel, where experimental data are available, was selected. The computational results agree reasonably well with their experimental counter-part. The waves interaction and the waves propagation process at the tunnel entrance and exit as well as within the tunnel are addressed. Finally, the influence on the transmitted waves at the tunnel exit portal and the variation of the negative pressure drop during the passage of the two trains are discussed.  相似文献   
35.
Systemised serendipity for producing computer art   总被引:4,自引:0,他引:4  
Serendipity applied to Newton's method, and its derivative the Secant Method, produces unusual and beautiful fractal patterns. Serendipity may be systemised, for example, by the introduction of a perturbation parameter P1, [1] to facilitate searches for interesting pattern variations.  相似文献   
36.
Explores the role of early supervisory experience and cognitive ability in 1st-line supervisor performance. Similar to the F. L. Schmidt et al (see record 1986-31441-001) study of nonsupervisors, this research tested structural models hypothesizing relationships among supervisory experience, cognitive ability, supervisory knowledge and proficiency, and performance ratings, using a sample of 570 2nd-tour soldiers. The Schmidt et al model with an additional ability?→?experience path provided the best fit. The significant ability?→?experience path was interpreted as indicating that demonstrated ability contributes to soldiers being given the opportunity to obtain supervisory experience. Experience had a greater impact on supervisor proficiency than on supervisor knowledge. Ability had a greater impact on supervisor knowledge than on proficiency. Discussion focuses on the personal characteristics that might be involved in being assigned supervisory responsibilities. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
37.
Reorganisation and evolution of class hierarchies is important for object-oriented system development and has received considerable attention in the literature. The contributions of this paper are: (1) a formal study of a set of extension relations and transformations on class hierarchies; (2) a presentation of a small set of primitive transformations which form a minimal and complete basis for the extension relations; and (3) an analysis of the impact of these transformations at the object level.The study leads to a better understanding of evolution and reuse of object-oriented software and class hierarchies. It also provides a terminology and a means of classification for design reuse. The theory presented in this paper is based on the Demeter data model, which gives a concise mathematical foundation for classes and their inheritance and part-of relationships. Parts of the theory have been implemented in the Demeter System TM C++, a CASE tool for object-oriented design and programming.  相似文献   
38.
39.
40.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号