首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   13059篇
  免费   1010篇
  国内免费   489篇
电工技术   667篇
综合类   681篇
化学工业   2285篇
金属工艺   681篇
机械仪表   816篇
建筑科学   886篇
矿业工程   332篇
能源动力   413篇
轻工业   747篇
水利工程   176篇
石油天然气   851篇
武器工业   72篇
无线电   1819篇
一般工业技术   1687篇
冶金工业   642篇
原子能技术   89篇
自动化技术   1714篇
  2024年   33篇
  2023年   211篇
  2022年   349篇
  2021年   508篇
  2020年   327篇
  2019年   296篇
  2018年   336篇
  2017年   376篇
  2016年   351篇
  2015年   486篇
  2014年   661篇
  2013年   802篇
  2012年   773篇
  2011年   928篇
  2010年   778篇
  2009年   715篇
  2008年   762篇
  2007年   689篇
  2006年   746篇
  2005年   667篇
  2004年   424篇
  2003年   361篇
  2002年   296篇
  2001年   276篇
  2000年   275篇
  1999年   395篇
  1998年   353篇
  1997年   269篇
  1996年   256篇
  1995年   182篇
  1994年   174篇
  1993年   112篇
  1992年   98篇
  1991年   67篇
  1990年   57篇
  1989年   35篇
  1988年   28篇
  1987年   8篇
  1986年   22篇
  1985年   4篇
  1984年   10篇
  1983年   7篇
  1982年   16篇
  1981年   9篇
  1980年   8篇
  1979年   5篇
  1977年   4篇
  1976年   5篇
  1975年   3篇
  1974年   2篇
排序方式: 共有10000条查询结果,搜索用时 156 毫秒
991.
提出了一种利用有用时序偏差来提高电路性能的方法,利用时钟偏差规划算法在时钟树综合之前对时序偏差重新调整规划,以提高电路的性能.使用ISCAS89作为实验对象来验证算法并进行了分析.  相似文献   
992.
Network forensics supports capabilities such as attacker identification and attack reconstruction, which complement the traditional intrusion detection and perimeter defense techniques in building a robust security mechanism. Attacker identification pinpoints attack origin to deter future attackers, while attack reconstruction reveals attack causality and network vulnerabilities. In this paper, we discuss the problem and feasibility of back tracking the origin of a self-propagating stealth attack when given a network traffic trace for a sufficiently long period of time. We propose a network forensics mechanism that is scalable in computation time and space while maintaining high accuracy in the identification of the attack origin. We further develop a data reduction method to filter out attack-irrelevant data and only retain evidence relevant to potential attacks for a post-mortem investigation. Using real-world trace driven experiments, we evaluate the performance of the proposed mechanism and show that we can trim down up to 97% of attack-irrelevant network traffic and successfully identify attack origin.  相似文献   
993.
UAVs surpassing satellites and aircraft in remote sensing over China   总被引:1,自引:0,他引:1  
ABSTRACT

Many users are now showing strong interest in UAV RS (Unmanned Aerial Vehicle Remote Sensing) due to its easy accessibility. UAVs have become popular platforms for remote sensing data acquisition. In a number of practical and time constrained circumstances, UAV RS data have been widely used as a substitute for traditional satellite remote sensing data. However, airspace-related regulations are far behind the rapid growth in the number of UAVs and their wide applications. Much effort of the network-based UAV RS have been made by the UAV RS group of the Institute of Geographic Sciences and Natural Resources Research, Chinese Academy of Sciences (IGSNRR, CAS), which proposed the concept of UAV RS data carrier. UAV RS data carrier refers to UAV RS data platform with task planning, data storage, image processing, product generation and output products for various UAVs. An ongoing effort to create a nationwide UAV RS network in addition to an existing ground observational network is being carried out in China.  相似文献   
994.
结合卫星测高技术的海潮模型能方便、精确地模拟大洋潮汐,可用于缺乏观测资料的地区。为评估该方法在珠江河口潮位预测应用中的精度,本文采用NAO.99b、OTPS和WWT等3种海潮模型预测珠江口不同验潮站的潮位过程,与实测数据对比并计算误差均方根。分析结果表明,海潮模型可以较好地预测珠江河口区潮汐基本时间特征,潮位预测精度在一定区域、一定时段不低于传统的预测方法。口门附近尤其口外的预测精度明显高于口内;在洪水期精度下降但口外开阔区域影响较小;在口门处,潮优型河口湾的预测精度高于径流型河口。3种模型中,推荐使用WWT。  相似文献   
995.
In this paper, we propose an iterative approach to increase the computation efficiency of the homotopy analysis method (HAM), a analytic technique for highly nonlinear problems. By means of the Schmidt–Gram process (Arfken et al., 1985)  [15], we approximate the right-hand side terms of high-order linear sub-equations by a finite set of orthonormal bases. Based on this truncation technique, we introduce the MMth-order iterative HAM by using each MMth-order approximation as a new initial guess. It is found that the iterative HAM is much more efficient than the standard HAM without truncation, as illustrated by three nonlinear differential equations defined in an infinite domain as examples. This work might greatly improve the computational efficiency of the HAM and also the Mathematica package BVPh for nonlinear BVPs.  相似文献   
996.
We analyze a distributed algorithm for the estimation of scalar parameters belonging to nodes in a mobile network from noisy relative measurements. The motivation comes from the problem of clock skew and offset estimation for the purpose of time synchronization. The time variation of the network was modeled as a Markov chain. The estimates are shown to be mean square convergent under fairly weak assumptions on the Markov chain, as long as the union of the graphs is connected. Expressions for the asymptotic mean and correlation are also provided.  相似文献   
997.
998.
Ship deck landing control of a quadrotor requires certain robustness with respect to ship heave motion. Typical systems only provide relative height, therefore do not have relative heave rate information. In this paper, a linear output feedback control consisting of a full state feedback controller and a Luenberger observer is formulated. Invariant ellipsoid method is used to formulate an estimation of a bound on the response of a linear output feedback-controlled system subjected to external disturbances and measurement noise. The gains that result in a minimum bound are optimized using a gradient descent iterative approach proposed in this paper where the invariant ellipsoid condition is linearized into a tractable LMI condition. This approach is applied to a simulation of a quadrotor landing on a ship deck and results are compared with other gains. The gains selected using the proposed approach exhibits improved robustness to external disturbances and measurement noise.  相似文献   
999.
We analyse disturbance rejection for a platoon of vehicles with intelligent cruise control, both for the spatially discrete model and the continuum model with open and periodic boundary conditions. By explicitly calculating the eigenmodes for both the discrete and the continuum models, we derive the dynamic response of an individual discrete mode, as well as the response of a single vehicle to disturbances generated through either boundary vehicles or vehicles within the platoon. It is shown that if the biasing is small then the n-mode truncated continuum model and the spatially discrete model predict same qualitative responses to disturbances for the lower order modes. In the case of periodic boundary conditions, the two types of models predict quantitatively the same responses to disturbances for a range of feedback gains.  相似文献   
1000.
Abstract

Value Engineering can reduce costs and enhance the value of projects. Currently, the acceptance rate of Value Engineering Study (VES) recommendations and total potential savings are considered the principal performance indicators of a VES. In reality the success of a VES depends on numerous interrelated factors not easy for a VES team to control. However, a study team can ensure the success of a VES by fully implementing a VES job plan. Thus, realizing a job plan is a principal contribution toward insuring the success of the VES. This study presents a novel model that is able to evaluate the performance of a VES for a construction project. Two questionnaires, distributed to VE experts, were used to collect data needed for this research. Factor analysis, AHP, and SWAM were applied to build the VES performance evaluation model which consists of six evaluation groups and thirty‐two evaluation items. A real‐life VES for a construction project was then analyzed using the proposed model to demonstrate its usefulness in performance assessment. Defects of the VES were identified and suggestions were provided for the particular VES. The proposed model can be used by VES teams for self‐diagnosis, improvement, and motivation in achieving enhanced performance.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号