首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   57504篇
  免费   9699篇
  国内免费   4705篇
电工技术   3517篇
技术理论   1篇
综合类   3461篇
化学工业   10280篇
金属工艺   3883篇
机械仪表   4218篇
建筑科学   3236篇
矿业工程   1604篇
能源动力   3395篇
轻工业   6963篇
水利工程   1215篇
石油天然气   1543篇
武器工业   1284篇
无线电   6376篇
一般工业技术   7245篇
冶金工业   1060篇
原子能技术   268篇
自动化技术   12359篇
  2024年   372篇
  2023年   2004篇
  2022年   3101篇
  2021年   3429篇
  2020年   3610篇
  2019年   2945篇
  2018年   2789篇
  2017年   3159篇
  2016年   3278篇
  2015年   3076篇
  2014年   3824篇
  2013年   4676篇
  2012年   6469篇
  2011年   5984篇
  2010年   3949篇
  2009年   4128篇
  2008年   2634篇
  2007年   3668篇
  2006年   3071篇
  2005年   1334篇
  2004年   547篇
  2003年   450篇
  2002年   457篇
  2001年   393篇
  2000年   280篇
  1999年   311篇
  1998年   146篇
  1997年   114篇
  1996年   140篇
  1995年   130篇
  1994年   85篇
  1993年   80篇
  1992年   80篇
  1991年   60篇
  1990年   64篇
  1989年   53篇
  1988年   95篇
  1987年   307篇
  1986年   285篇
  1985年   75篇
  1984年   51篇
  1983年   24篇
  1982年   30篇
  1981年   24篇
  1980年   27篇
  1979年   28篇
  1978年   21篇
  1977年   8篇
  1976年   11篇
  1951年   32篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
61.
Generally, if a user wants to use numerous different network services, he/she must register himself/herself to every service providing server. It is extremely hard for users to remember these different identities and passwords. In order to resolve this problem, various multi-server authentication protocols have been proposed. Recently, Sood et al. analyzed Hsiang and Shih's multi-server authentication protocol and proposed an improved dynamic identity based authentication protocol for multi-server architecture. They claimed that their protocol provides user's anonymity, mutual authentication, the session key agreement and can resist several kinds of attacks. However, through careful analysis, we find that Sood et al.'s protocol is still vulnerable to leak-of-verifier attack, stolen smart card attack and impersonation attack. Besides, since there is no way for the control server CS to know the real identity of the user, the authentication and session key agreement phase of Sood et al.'s protocol is incorrect. We propose an efficient and security dynamic identity based authentication protocol for multi-server architecture that removes the aforementioned weaknesses. The proposed protocol is extremely suitable for use in distributed multi-server architecture since it provides user's anonymity, mutual authentication, efficient, and security.  相似文献   
62.
Message Sequence Chart (MSC) is a graphical and textual language for describing the interactions between system components, and MSC specifications (MSSs) are a combination of a set of basic MSCs (bMSCs) and a High-level MSC that describes potentially iterating and branching system behavior by specifying the compositions of basic MSCs, which offer an intuitive and visual way of specifying design requirements. With concurrent, timing, and asynchronous properties, MSSs are amenable to errors, and their analysis is important and difficult. This paper deals with timing analysis of MSC specifications with asynchronous concatenation. For an MSC specification, we require that for any loop, its first node be flexible in execution time and its any associated external timing constraint be enforced on the entire loop. Such an MSC specification is called a flexible loop-closed MSC specification (FLMSS). We show that for FLMSSs, the reachability analysis and bounded delay analysis problems can be solved efficiently by linear programming. The solutions have been implemented into our tool TASS and evaluated by experiments.  相似文献   
63.
This paper addresses the problem of semi‐global stabilization by output feedback for a class of nonlinear systems whose output gains are unknown. For each subsystem, we first design a state compensator and use the compensator states to construct a control law to stabilize the nominal linear system without the perturbing nonlinearities. Then, combining the output feedback domination approach with block‐backstepping scheme, a series of homogeneous output feedback controllers are constructed recursively for each subsystem and the closed‐loop system is rendered semi‐globally asymptotically stable.  相似文献   
64.
This paper is concerned with the neutral‐delay‐dependent and discrete‐delay‐dependent stability for uncertain neutral systems with mixed delays and norm‐bounded uncertainties. Through constructing a new augmented Lyapunov‐Krasovskii functional and proving its positive definiteness, introducing some slack matrices and using integral inequality, the improved delay‐dependent stability criteria are derived in terms of linear matrix inequalities. Numerical examples are given to illustrate the significant improvement on the conservatism of the delay bound over some existing results. Copyright © 2010 John Wiley and Sons Asia Pte Ltd and Chinese Automatic Control Society  相似文献   
65.
General competence trust among supply chain partners, referring to the trust that a partner holds the general ability of fulfilling contracts, is a critical factor to ensure effective cooperation in a supply chain, especially in the current financial crisis. The method of supply chain trust diagnosis (SCTD) is to evaluate whether or not a partner holds such competence. This research devotes to an early investigation on diagnosing competence trust of supply chain with the method of inductive case-based reasoning ensemble (ICBRE). The so-called supply chain trust diagnosis with inductive case-based reasoning ensemble consists of five levels, that is, information level, the level of ratios of general competence states, the level of inductive case-based reasoning, ensemble level, and diagnosis result level. Knowledge for diagnosing competence trust, which composes of a case base, is hidden in data represented by ratios of general competence states. Inductive approach is combined with randomness to construct diverse and good member methods of inductive case-based reasoning. Finally, simple voting is used to integrate outputs of member inductive case-based reasoning methods in order to produce the final diagnosis on whether or not a partner holds the general ability of fulfilling contracts. We statistically validated results of the method of supply chain trust diagnosis with inductive case-based reasoning ensemble by comparing them with those of multivariate discriminant analysis, logistic regression, single Euclidean case-based reasoning, and single inductive case-based reasoning. The results indicate that the method of supply chain trust diagnosis with inductive case-based reasoning ensemble significantly improves predictive capability of case-based reasoning in this problem and outperforms all the comparative models by group decision of several decision-making agents and non-strict assumptions like statistical methods.  相似文献   
66.
Computational modeling and simulation can provide an effective predictive capability for flow properties of the confined fluids in micro/nanoscales. In this paper, considering the boundary slip at the fluid–solid interface, the motion property of fluids confined in parallel-plate nanochannels are investigated to couple the atomistic regime to continuum. The corrected second-order slip boundary condition is used to solve the Navier–Stokes equations for confined fluids. Molecular dynamics simulations for Poiseuille flows are performed to study the influences of the strength of the solid–fluid coupling, the fluid temperature, and the density of the solid wall on the velocity slip at the fluid boundary. For weak solid–fluid coupling strength, high temperature of the confined fluid and high density of the solid wall, the large velocity slip at the fluid boundary can be obviously observed. The effectiveness of the corrected second-order slip boundary condition is demonstrated by comparing the velocity profiles of Poiseuille flows from MD simulations with that from continuum.  相似文献   
67.
The paper is concerned with the stability of linear systems with interval time-varying delay. Through constructing a new augmented Lyapunov-Krasovskii functional (LKF) which contains some quadruple-integral terms and estimating the time derivative of the LKF less conservatively, new stability criteria are derived without introducing any free matrices. Moreover, by proving the positive definiteness of the LKF with some integral inequalities, the constraints on some functional parameters are relaxed and the conservatism of the obtained results are further reduced. Numerical examples are also given to demonstrate the effectiveness and reduced conservatism of the obtained results.  相似文献   
68.
Microstructural observations of brittle materials indicated that a variety of microdefect events can be responsible not only for inelastic behaviour, but also for macroscopic crack front irregularity. This irregularity produces an increase in the fracture toughness of the material. In this paper, this irregularity is analysed by fractal geometry in a very simple manner; a fractal model of crack branching is established. Both microscopic and macroscopic analytical results show that the toughness can be raised appreciably as a fractal geometric effect of the irregularity.
Résumé Des observations microscopiques sur des matériaux fragiles ont montré qu'une variété d'évènements à l'échelle du microdéfaut peuvent être responsables non seulement du comportement inélastique, mais aussi de l'irrégularité du front d'une fissure macroscopique. Cette irrégularité provoque un accroissement de la ténacité à la rupture du matériau. Dans cette étude, on analyse de manière très simple cette irrégularité par fractogéométrie (Mandelbrot) et on établit un modèle fractal relatif à une fissure qui se ramifie. Les résultats de l'analyse microscopique et macroscopique montrent qu'un effet fractogéométrique de l'irrégularité du front de fissure est d'accroitre de manière appréciable la ténacité.
  相似文献   
69.
离散序列AR模型定阶方法研究   总被引:1,自引:0,他引:1  
介绍了AR模型及其参数计算方法,结合具体实例,用Gram-Schmidt正交法、奇异值分解法、LD递推法,编写程序,确定AR模型有效阶数,并进行比较分析。结果表明:Gram-Schmidt正交法所得模型的阶数、计算时间、精确度都较为适中,适合在AR模型的研究中推广普及。  相似文献   
70.
何涛 《计算机仿真》2012,29(9):132-135
研究了煤矿安全监测及灾害预警的检测问题,提高检测的准确性。已有的煤矿安全监测技术多是基于单层传感网络设计,当瓦斯等危险气氛浓度泄露受到外界干扰,容易发生检测节点特征退化,传统方法抗噪能力差,效率低,监测结果不稳定。为了解决这一问题,提出一种基于改进最大熵算法的井下实时监控与灾害监测预警系统设计方法。设计了基于抗干扰的最大熵检索建模功能,快速计算跳数和能耗信息,实现安全隐患的准确检测。仿真结果表明,系统能够大幅降低干扰风险,取得良好的效果。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号