首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   63657篇
  免费   5716篇
  国内免费   2896篇
电工技术   3571篇
技术理论   2篇
综合类   4112篇
化学工业   10701篇
金属工艺   3749篇
机械仪表   4069篇
建筑科学   4695篇
矿业工程   2137篇
能源动力   1695篇
轻工业   3997篇
水利工程   1073篇
石油天然气   3943篇
武器工业   525篇
无线电   7691篇
一般工业技术   7761篇
冶金工业   3068篇
原子能技术   634篇
自动化技术   8846篇
  2024年   353篇
  2023年   1132篇
  2022年   1831篇
  2021年   2584篇
  2020年   1974篇
  2019年   1766篇
  2018年   1923篇
  2017年   2117篇
  2016年   1917篇
  2015年   2479篇
  2014年   3020篇
  2013年   3626篇
  2012年   4054篇
  2011年   4455篇
  2010年   3682篇
  2009年   3520篇
  2008年   3390篇
  2007年   3294篇
  2006年   3665篇
  2005年   3037篇
  2004年   2128篇
  2003年   1798篇
  2002年   1590篇
  2001年   1446篇
  2000年   1558篇
  1999年   1711篇
  1998年   1513篇
  1997年   1268篇
  1996年   1150篇
  1995年   957篇
  1994年   837篇
  1993年   572篇
  1992年   431篇
  1991年   370篇
  1990年   261篇
  1989年   213篇
  1988年   185篇
  1987年   122篇
  1986年   97篇
  1985年   60篇
  1984年   30篇
  1983年   20篇
  1982年   28篇
  1981年   16篇
  1980年   21篇
  1979年   10篇
  1978年   7篇
  1977年   5篇
  1976年   14篇
  1975年   9篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
Petri nets based deadlock prevention for flexible manufacturing systems has received much attention over the past decade, primarily due to the seminal work of Ezpeleta et al. in 1995. A Petri net based deadlock prevention mechanism is usually implemented by adding monitors or control places to a plant Petri net model such that liveness can be enforced. The significance of this methodology lies in that both a plant model and its supervisor are in a same formalism-Petri nets. Due to the inherent complexity of Petri nets, in theory, the number of additional monitors that have to been added to achieve liveness-enforcement purpose for an uncontrolled plant model is exponential with respect to the size of the model. This paper first proposes a systematic method to minimize the number of additional monitors in a liveness-enforcing Petri net supervisor such that the resultant net system has the same permissive behavior while liveness can still be preserved. Furthermore, for the liveness-enforcing Petri net supervisors of flexible manufacturing systems, which have some particular property, an algorithm is developed such that more permissive liveness-enforcing Petri net supervisors can be obtained after liveness-restrictive monitor removal. Compared with the existing techniques of eliminating redundant monitors in the literature, the complete state enumeration of a supervisor is avoided, which implies the high computational efficiency of the methods in this paper. Flexible manufacturing examples are used to demonstrate the proposed approaches.  相似文献   
992.
In this paper, the global exponential stability is investigated for the bi-directional associative memory networks with time delays. Several new sufficient conditions are presented to ensure global exponential stability of delayed bi-directional associative memory neural networks based on the Lyapunov functional method as well as linear matrix inequality technique. To the best of our knowledge, few reports about such “linearization” approach to exponential stability analysis for delayed neural network models have been presented in literature. The method, called parameterized first-order model transformation, is used to transform neural networks. The obtained conditions show to be less conservative and restrictive than that reported in the literature. Two numerical simulations are also given to illustrate the efficiency of our result.  相似文献   
993.
通过对中原油田注水站应用高压大功率变频调速节能技术的原理及效果分析,揭示了油田注水系统应用变频实施节能改遗的巨大潜力.  相似文献   
994.
在高速数据采集系统中,对模拟信号调理通道带宽的要求越来越高。本文结合无源衰减网络、高增益可变增益放大器(VGA)、高速电流反馈放大器(CFA),设计并实现了一种宽带模拟信号调理电路,并给出了实验结果与分析。该电路具有高带宽、动态范围大、低噪声等特性,能满足数据采集系统高带宽的要求,也可以应用于宽带电子测量仪器的前端信号调理电路。  相似文献   
995.
The intersecting path is an important tool path generation method. This paper proposes an approach for the quart-parametric interpolation of intersecting paths. The objective of our approach is that the intersecting paths for surface machining can be directly interpolated within the computer numerical control (CNC) system. This enables the CNC interpolator to process the intersecting paths without geometric approximation as in existing approaches and take into consideration any specific feedrate profiles and further machining dynamical issues along the path.The interpolation of the intersection of two general parametric surfaces is transferred into interpolation of its projection curves and the time trajectories of four parameters along the intersecting curves are obtained. Our strategy is to carry out the quart-parametric interpolation based on the projection interpolation. The feedrate control method is developed, and then the interpolation algorithms for two projection curves are proposed. An error reduction scheme is presented to alleviate point deviation from the drive parametric surface. Simulations of quart-parametric interpolation have been carried out to verify the effectiveness of the proposed algorithm.  相似文献   
996.
A (t, n) threshold proxy signature scheme allows any t or more proxy signers to cooperatively sign messages on behalf of an original signer, but t ? 1 or fewer proxy signers cannot. In a recent work [C.H. Yang, S.F. Tzeng, M.S. Hwang, On the efficiency of nonrepudiable threshold proxy signature scheme with known signers, Systems and Software 73(3) (2004) 507–514], C.H. Yang, S.F. Tzeng and M.S. Hwang proposed a new threshold proxy signature scheme (called as YTH scheme), which is more efficient in algorithm and communication than Hsu et al.'s scheme proposed in 2001. However, YTH scheme still has some security weaknesses. In this paper, we show that YTH scheme cannot resist frame attack and public-key substitute attack. A new improvement with high safety and efficiency is proposed. The new scheme remedies the weaknesses of YTH scheme, especially, it can resist public-key substitute attack successfully by Zero-Knowledge Proof. Furthermore, the system doesn't need a security channel and computational complexity can be lowered.  相似文献   
997.
A belief rule base inference methodology using the evidential reasoning approach (RIMER) has been developed recently, where a new belief rule base (BRB) is proposed to extend traditional IF-THEN rules and can capture more complicated causal relationships using different types of information with uncertainties, but these models are trained off-line and it is very expensive to train and re-train them. As such, recursive algorithms have been developed to update the BRB systems online and their calculation speed is very high, which is very important, particularly for the systems that have a high level of real-time requirement. The optimization models and recursive algorithms have been used for pipeline leak detection. However, because the proposed algorithms are both locally optimal and there may exist some noise in the real engineering systems, the trained or updated BRB may violate some certain running patterns that the pipeline leak should follow. These patterns can be determined by human experts according to some basic physical principles and the historical information. Therefore, this paper describes under expert intervention, how the recursive algorithm update the BRB system so that the updated BRB cannot only be used for pipeline leak detection but also satisfy the given patterns. Pipeline operations under different conditions are modeled by a BRB using expert knowledge, which is then updated and fine tuned using the proposed recursive algorithm and pipeline operating data, and validated by testing data. All training and testing data are collected from a real pipeline. The study demonstrates that under expert intervention, the BRB expert system is flexible, can be automatically tuned to represent complicated expert systems, and may be applied widely in engineering. It is also demonstrated that compared with other methods such as fuzzy neural networks (FNNs), the RIMER has a special characteristic of allowing direct intervention of human experts in deciding the internal structure and the parameters of a BRB expert system.  相似文献   
998.
In this paper, effects of the implant thread pitch on the maximum Von Mises stresses were evaluated in jaw bones and implant–abutment complex by a finite element method. The thread pitch ranged from 0.5 mm to 1.6 mm. Results suggested that under axial load, the maximum equivalent stresses in cortical bone, cancellous bone and implant–abutment complex decreased by 6.7%, 55.2% and 22.3%, respectively with the variation of thread pitch; and under buccolingual load, 2.7%, 22.4% and 13.0%, respectively. When thread pitch exceeded 0.8 mm, minimum stresses were obtained. Data indicated that cancellous bone was more sensitive to thread pitch than cortical bone did; thread pitch played a great role in protecting dental implant under axial load than under buccolingual load; and thread pitch exceeding 0.8 mm were optimal selection for a screwed implant by biomechanical consideration.  相似文献   
999.
基于WinCE的电梯监控系统多串口通信实现   总被引:2,自引:0,他引:2  
提出了一种基于WinCE的多串口电梯远程监控系统的实现方法.该方法以S3C2440微处理器为核心构建硬件平台,实现了与其他设备的串口通信;同时以WinCE5.0为软件平台,完成多串口分层流驱动的设计.通过文件映射,解决了访问多串口设备时产生的竞态问题.测试结果表明,该系统通信正常、数据稳定,能充分满足电梯监控对串行通信的要求.  相似文献   
1000.
复杂产品虚拟样机协同开发平台设计与实现   总被引:2,自引:0,他引:2       下载免费PDF全文
提出复杂产品虚拟样机协同开发平台的体系结构和功能框架,设计统一数据访问接口,自主开发了“复杂产品虚拟样机协同开发平台”软件。该软件包括个人工作空间管理、仿真建模、数据管理、过程管理、模型库管理和仿真评估等功能模块,能够支持复杂产品从设计、仿真、分析和优化的整个多学科协同开发过程,实现了对协同开发相关的项目、人员、模型、数据和工作流等资源的集成化管理,为复杂产品虚拟样机的实施提供了设计、仿真和资源管理的分布式支撑环境。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号