首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4973篇
  免费   456篇
  国内免费   247篇
电工技术   262篇
技术理论   1篇
综合类   334篇
化学工业   554篇
金属工艺   196篇
机械仪表   653篇
建筑科学   70篇
矿业工程   52篇
能源动力   176篇
轻工业   631篇
水利工程   39篇
石油天然气   246篇
武器工业   51篇
无线电   450篇
一般工业技术   452篇
冶金工业   151篇
原子能技术   22篇
自动化技术   1336篇
  2024年   20篇
  2023年   86篇
  2022年   197篇
  2021年   214篇
  2020年   176篇
  2019年   140篇
  2018年   138篇
  2017年   129篇
  2016年   168篇
  2015年   224篇
  2014年   245篇
  2013年   308篇
  2012年   325篇
  2011年   337篇
  2010年   250篇
  2009年   285篇
  2008年   278篇
  2007年   296篇
  2006年   251篇
  2005年   268篇
  2004年   210篇
  2003年   182篇
  2002年   162篇
  2001年   134篇
  2000年   121篇
  1999年   112篇
  1998年   81篇
  1997年   66篇
  1996年   55篇
  1995年   47篇
  1994年   32篇
  1993年   17篇
  1992年   22篇
  1991年   22篇
  1990年   14篇
  1989年   15篇
  1988年   6篇
  1987年   8篇
  1986年   4篇
  1985年   3篇
  1984年   9篇
  1983年   2篇
  1982年   2篇
  1981年   4篇
  1975年   2篇
  1963年   1篇
  1958年   2篇
  1957年   1篇
  1955年   2篇
  1954年   1篇
排序方式: 共有5676条查询结果,搜索用时 0 毫秒
61.
光纤陀螺输入轴失准角温度补偿研究   总被引:2,自引:0,他引:2  
提高温度特性是光纤陀螺仪工程化的一个难题,温度补偿是解决该问题的一种有效方法。光纤陀螺与温度相关误差项主要为零漂和标度因数,输入轴失准角也是影响光纤陀螺应用的一个重要误差项。在大量试验的基础上,分析了光纤陀螺输入轴失准角误差产生机理,采用多项式拟合方法建立了输入轴失准角误差全温模型,对多套光纤陀螺进行了全温补偿。试验结果表明,输入轴失准角补偿前全温变化在2?10-3rad数量级,补偿后全温变化小于3?10-4rad,精度提高了近一个数量级,大大提高了光纤陀螺仪的全温性能。  相似文献   
62.
可靠的网格作业调度机制   总被引:1,自引:1,他引:0  
陶永才  石磊 《计算机应用》2010,30(8):2066-2069
针对网格环境的动态性特征,提出了一种可靠的网格作业调度机制(DGJS)。按照作业完成时间期限,DGJS将作业分为:高QoS级、低QoS级和无QoS级,不同QoS级作业有不同的调度优先权;基于资源可用性预测,DGJS采用基于可靠性代价的作业调度策略,将作业尽可能调度到可靠性高的资源节点;另外,DGJS对不同QoS级作业采用不同的容错策略,在保证故障容错的同时,节省网格资源。实验表明:在动态的网格环境下,较之传统的网格作业调度算法,DGJS提高了作业成功率,减少了作业完成时间。  相似文献   
63.
孙丽萍  罗永龙 《计算机工程》2011,37(11):203-205
结合诊断模型与遗传算法,提出一种针对t-可诊断多处理器系统的遗传诊断算法。通过运用模型的诊断性质提高初始种群的质量,并定义判断结点状态的诊断方程,设计基于该方程的适应度函数。理论分析和模拟实验表明,算法具有较好的最优解搜索能力和较快的收敛速度。  相似文献   
64.
We propose an effective and low cost method to increase the yield and the lifetime of torus NoCs. The method consists in detecting and diagnosing NoC interconnect faults using BIST structures and activating alternative paths for the faulty links. Alternative paths use the inherent redundancy of the torus topology, thus leading to minimal performance, area, and power overhead. We assume an extended interconnect fault model comprising stuck-at and pairwise shorts within a single link or between any two links in the network. Experimental results for a 3×3 NoC show that the proposed approach can correctly diagnose 93% of all possible interconnect faults and can mitigate 42% of those faults (representing 94.4% of the solvable faults) with a worst case performance penalty of 8% and 1% of area overhead. We also demonstrate the scalability of the method by presenting its application to larger NoCs.  相似文献   
65.
Preventive measures sometimes fail to defect malicious attacks. With attacks on data-intensive applications becoming an ever more serious threat, intrusion tolerant database systems are a significant concern. The main objective of such systems is to detect attacks, and to assess and repair the damage in a timely manner. This paper focuses on efficient damage assessment and repair in distributed database systems. The complexity caused by data partition, distributed transaction processing, and failures makes intrusion recovery much more challenging than in centralized database systems. This paper identifies the key challenges and presents an efficient algorithm for distributed damage assessment and repair.  相似文献   
66.
We introduce a machine learning-based classifier that identifies free radio channels for cognitive radio. The architecture is designed for nanoscale implementation, under nanoscale implementation constraints; we do not describe all physical details but believe future physical implementation to be feasible. The system uses analog computation and consists of cyclostationary feature extraction and a radial basis function network for classification. We describe a model for nanoscale faults in the system, and simulate experimental performance and fault tolerance in recognizing WLAN signals, under different levels of noise and computational errors. The system performs well under expected non-ideal manufacturing and operating conditions.  相似文献   
67.
This paper presents a model which predicts the part orientation error tolerance of a three-fingered robotic gripper. The concept of “self-alignment” is introduced, where the gripper uses the grasping process to bring the workpiece into its final state of orientation. The gripper and part are represented mathematically, and initial contact locations upon grasp closure determined. This information is used to solve for the contact forces present, and criteria are developed to determine if beneficial part motion resulting in self-alignment is expected. The results are visualized via a boundary projected on a reference plane below the part. The model is validated experimentally with a number of part configurations with favorable results. This method presents a useful tool by which the mechanical designer can quantitatively predict the performance of an intuitively designed gripping system.  相似文献   
68.
Sensor networks are finding significant applications in large scale distributed systems. One of the basic operations in sensor networks is in-network aggregation. Among the various approaches to in-network aggregation, such as gossip and tree, including the hash-based techniques, the tree-based approaches have better performance and energy-saving characteristics. However, sensor networks are highly prone to failures. Numerous techniques suggested in the literature to counteract the effect of failures have not been carefully analyzed. In this paper, we focus on the performance of these tree-based aggregation techniques in the presence of failures. First, we identify a fault model that captures the important failure traits of the system. Then, we analyze the correctness of simple tree aggregation with our fault model. We then use the same fault model to analyze the techniques that utilize redundant trees to improve the variance. The impact of techniques for maintaining the correctness under faults, such as rebuilding or locally fixing the tree, is then studied under the same fault model. We also do the cost-benefit analysis of using the hash-based schemes which are based on FM sketches. We conclude that these fault tolerance techniques for tree aggregation do not necessarily result in substantial improvement in fault tolerance.  相似文献   
69.
The maximum acceptable weights of lift (MAWL) of obese and non-obese participants were empirically investigated. Three obesity levels were considered: non-obese (18.5 kg/m(2)< or= body mass index (BMI)or= 40 kg/m(2)). Ten male and 10 female participants were recruited for each obesity level. The participants determined their MAWL for 18 different lifting task conditions (six lifting frequencies x three lifting heights). An analysis of variance (ANOVA) was conducted to determine the effects of obesity level, gender, lifting height, lifting frequency and their interactions on MAWL. Overall, the ANOVA results indicated that obesity does not reduce MAWL, and thus, suggested that the existing MAWL data can be used to accommodate both general and obese workers. However, further studies based on the biomechanical and physiological approaches are required to provide more complete understanding of obesity effects on lifting tolerance limits.  相似文献   
70.
When implementing multivalued consensus using binary consensus, previous algorithms assume the availability of uniform reliable broadcast, which is not implementable in systems with fair-lossy links. In this paper, we show that with binary consensus we can implement uniform reliable broadcast directly in systems with fair-lossy links, and thus the separate assumption of the availability of uniform reliable broadcast is not necessary. We further prove that, when binary consensus instances are available only as black boxes, any implementation of uniform reliable broadcast in the fair-lossy link model requires the invocation of an infinite number of binary consensus instances even if no process ever broadcasts any messages, and this is true even when multivalued consensus is used.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号