首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   13364篇
  免费   447篇
  国内免费   258篇
电工技术   501篇
综合类   276篇
化学工业   1090篇
金属工艺   553篇
机械仪表   288篇
建筑科学   328篇
矿业工程   113篇
能源动力   147篇
轻工业   288篇
水利工程   101篇
石油天然气   326篇
武器工业   43篇
无线电   726篇
一般工业技术   553篇
冶金工业   187篇
原子能技术   168篇
自动化技术   8381篇
  2024年   18篇
  2023年   38篇
  2022年   133篇
  2021年   230篇
  2020年   169篇
  2019年   108篇
  2018年   139篇
  2017年   135篇
  2016年   153篇
  2015年   211篇
  2014年   421篇
  2013年   441篇
  2012年   1070篇
  2011年   2652篇
  2010年   1406篇
  2009年   1206篇
  2008年   916篇
  2007年   861篇
  2006年   647篇
  2005年   746篇
  2004年   670篇
  2003年   679篇
  2002年   374篇
  2001年   103篇
  2000年   85篇
  1999年   94篇
  1998年   73篇
  1997年   73篇
  1996年   48篇
  1995年   50篇
  1994年   27篇
  1993年   21篇
  1992年   28篇
  1991年   17篇
  1990年   4篇
  1989年   11篇
  1988年   2篇
  1987年   4篇
  1986年   2篇
  1982年   1篇
  1981年   1篇
  1980年   1篇
  1951年   1篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
41.
Years have lapsed since the inauguration of the first Wireless Application Protocol (WAP) application. One of the main reasons for the lukewarm response so far may be attributed to the lack of a “Killer” application. Many companies and developers have attempted to replicate email services (an Internet Killer appplication) within the WAP realm, but till now, no significant success has been reported. This paper will first discuss on the key functions which are lacking in the present WAP-email service, and which are arguably necessary if a much larger user base is to be attracted to these services. A new system will be proposed which can enable the user to send files residing in a remote personal computer (PC) as attachments to his emails using WAP-enabled mobile devices. The implementation of the system will be presented in details. Issue relating to the connection to various types of email servers and the security of the system will also be addressed in the paper.  相似文献   
42.
43.
The certainty equivalence approach to adaptive control is commonly used with two types of identifiers: passivity-based identifiers and swapping identifiers. The “passive” (also known as “observer-based”) approach is the prevalent identification technique in existing results on adaptive control for PDEs but has so far not been used in boundary control problems. The swapping approach, prevalent in finite-dimensional adaptive control is employed here for the first time in adaptive control of PDEs. For a class of unstable parabolic PDEs we prove a separation principle result for both the passive and swapping identifiers combined with the backstepping boundary controllers. The result is applicable in any dimension. For physical reasons we restrict our attention to dimensions no higher than three. The results of the paper are illustrated by simulations.  相似文献   
44.
45.
Time-domain limitations due to right half-plane zeros and poles in linear multivariable control systems are studied. Lower bounds on the interaction are derived. They show not only how the location of zeros and poles are critical in multivariable systems, but also how the zero and pole directions influence the performance. The results are illustrated on the quadruple-tank process, which is a new multivariable laboratory process.  相似文献   
46.
This paper presents a novel concept for power quality hardware and software architecture. Software tools related to detection, classification and characterization of power quality events can be integrated into a Distribution Control Center in which the interconnection between different subsystems is being carried out through the Internet allowing flexibility to the system. This system is implemented using wavelet analysis applied in all proposed algorithms. Different power quality events are taken as examples to illustrate the capabilities of the proposed method. The obtained results reveal that the proposed architecture is feasible to be implemented as an integral part of a control center system.The proposed system has the property of fast and accurate detection and classification of any power quality disturbance event and introduces a new PQ index determination that allows characterizing any type of disturbance including the non-periodic signals.  相似文献   
47.
Linear discriminant analysis (LDA) is a data discrimination technique that seeks transformation to maximize the ratio of the between-class scatter and the within-class scatter. While it has been successfully applied to several applications, it has two limitations, both concerning the underfitting problem. First, it fails to discriminate data with complex distributions since all data in each class are assumed to be distributed in the Gaussian manner. Second, it can lose class-wise information, since it produces only one transformation over the entire range of classes. We propose three extensions of LDA to overcome the above problems. The first extension overcomes the first problem by modelling the within-class scatter using a PCA mixture model that can represent more complex distribution. The second extension overcomes the second problem by taking different transformation for each class in order to provide class-wise features. The third extension combines these two modifications by representing each class in terms of the PCA mixture model and taking different transformation for each mixture component. It is shown that all our proposed extensions of LDA outperform LDA concerning classification errors for synthetic data classification, hand-written digit recognition, and alphabet recognition.  相似文献   
48.
This paper investigates the issues of QoS routing in CDMA/TDMA ad hoc networks. Since the available bandwidth is very limited in ad hoc networks, a QoS request between two nodes will be blocked if there does not exist a path that can meet the QoS requirements, even though there is enough free bandwidth in the whole system. In this paper, we propose a new scheme of using multiple paths between two nodes as the route for a QoS call. The aggregate bandwidth of the multiple paths can meet the bandwidth requirement of the call and the delays of these paths are within the required bound of the call. We also propose three strategies by which to choose a set of paths as the route, namely, shortest path first (SPF), largest bandwidth first (LBF), and largest hop‐bandwidth first (LHBF). Extensive simulations have been conducted to evaluate the performance of the three strategies in comparison with a traditional single path routing algorithm. The simulation results show that the proposed multiple paths routing scheme significantly reduces the system blocking rates in various network environments, especially when the network load is heavy. Copyright © 2005 John Wiley & Sons, Ltd.  相似文献   
49.
Presented in this paper is a topology reconstruction algorithm from a set of unorganized trimmed surfaces. Error-prone small geometric elements are handled to give proper topological information. It gives complete topology to topologically complete models, and it is also tolerant to incomplete models. The proposed algorithm is vertex-based in that clues for topological information are searched from the set of vertices first, not from that of edges.  相似文献   
50.
Since1970s,rare earths(RE)have been exten-sively used as micro-fertilizers for crops in China.Ithas already been proved that REcani mprove the pro-duction and quality of crops.However,there havebeen a fewinvestigations about using RE as regulatorin pollution ecology.For example,An et al[1]studiedthe effects of O3on wheat growth and the protectiveeffect of RE.Yan and Zhou et al[2,3]discussed theprotective effect of RE on plants under acid rainstress.Jia et al[4]and Hu et al[5]reported th…  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号