首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   29026篇
  免费   1425篇
  国内免费   353篇
电工技术   819篇
技术理论   2篇
综合类   2726篇
化学工业   1251篇
金属工艺   253篇
机械仪表   454篇
建筑科学   19047篇
矿业工程   531篇
能源动力   1009篇
轻工业   571篇
水利工程   337篇
石油天然气   184篇
武器工业   52篇
无线电   597篇
一般工业技术   1410篇
冶金工业   303篇
原子能技术   70篇
自动化技术   1188篇
  2024年   61篇
  2023年   205篇
  2022年   506篇
  2021年   507篇
  2020年   549篇
  2019年   427篇
  2018年   360篇
  2017年   588篇
  2016年   656篇
  2015年   828篇
  2014年   3313篇
  2013年   1824篇
  2012年   2140篇
  2011年   2224篇
  2010年   1901篇
  2009年   2039篇
  2008年   1805篇
  2007年   2091篇
  2006年   1544篇
  2005年   1351篇
  2004年   1117篇
  2003年   937篇
  2002年   779篇
  2001年   719篇
  2000年   533篇
  1999年   496篇
  1998年   314篇
  1997年   236篇
  1996年   194篇
  1995年   127篇
  1994年   96篇
  1993年   89篇
  1992年   64篇
  1991年   44篇
  1990年   27篇
  1989年   14篇
  1988年   10篇
  1987年   20篇
  1986年   9篇
  1985年   15篇
  1984年   7篇
  1983年   8篇
  1982年   3篇
  1981年   1篇
  1980年   21篇
  1979年   2篇
  1975年   2篇
  1954年   1篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
81.
Ultrasonic sensors have been widely applied in mobile robots to obtain environmental information and avoid obstacles. In general, a typical domestic environment consists of planes, edges and corners. It is usually difficult to distinguish a plane from a corner directly with a single ultrasonic sensor. To overcome this difficulty, a corner differentiation algorithm for a single ultrasonic sensor is proposed in this paper. The algorithm is based on the features of all of the actual reflection points from the environment obtained by a reflection search algorithm from which the corners are realized by a corner differentiation algorithm. The experimental results show that the developed algorithm can successfully detect all planes and corners. Furthermore, an environmental map can be built based on the information obtained on planes and corners. Copyright © 2008 John Wiley and Sons Asia Pte Ltd and Chinese Automatic Control Society  相似文献   
82.
操作系统课程教学与学生能力培养   总被引:5,自引:4,他引:1  
本文介绍了我院在操作系统教学过程中通过改进教学方法、引入任务驱动和加强实践环节,对学生的思考能力、学习能力和实践动手能力进行培养的一些经验。  相似文献   
83.
An accurate and compact map is essential to an autonomous mobile robot system. A topological map, one of the most popular map types, can be used to represent the environment in terms of discrete nodes with edges connecting them. It is usually constructed by Voronoi-like graphs, but in this paper the topological map is incrementally built based on the local grid map by using a thinning algorithm. This algorithm, when combined with the application of the C-obstacle, can easily extract only the meaningful topological information in real-time and is robust to environment change, because this map is extracted from a local grid map generated based on the Bayesian update formula. In this paper, position probability is defined to evaluate the quantitative reliability of the end node extracted by the thinning process. Since the thinning process builds only local topological maps, a global topological map should be constructed by merging local topological maps according to nodes with high position probability. For real and complex environments, experiments showed that the proposed map building method based on the thinning process can accurately build a local topological map in real-time, with which an accurate global topological map can be incrementally constructed.  相似文献   
84.
工艺设计知识库的建造与维护   总被引:5,自引:0,他引:5  
文中根据工艺设计知识的特点,构造了层次化的知识表达、组织与知识库模型,分析了工艺知识库不一致的表现形式,并给出了相应的一致性验证算法,提出了基于广义决策表的知识库完备性检查方法。  相似文献   
85.
针对DCRI模糊推理方法的复杂性,首先提出了作用模糊子集推理方法;然后将该推理方法与单片机数字运算少年叮结合,提出了基于作用模糊子集推理的单片机模糊控制实现原理,研制了开发了80C552型单片机模糊控制器;最后以建筑热工系统为被控对象,试验研究了测试室温度模糊控制过程。  相似文献   
86.
黄勇理  瞿坦 《测控技术》2001,20(6):25-28
针对目前智能建筑中几种常见的中央空调机组单元配置及其运行机制,简要分析了采用网络化数字监控技术的空调机组的工作原理,并说明了此类空调配置方案的控制系统结构及其性能特点和应用场合。  相似文献   
87.
The emerging multi-layer functional model for network operations decomposes management functions into several layers:Service Management Layer, Network Management Layer, Element Management Layer, andElement Layer. To realize the full benefits of this functional distribution, a reference architecture for operations applications is needed. This architecture should enable flexible placement of functions in computing systems or nodes, enable hiding of the complexities of distribution from applications, and prescribe principles for the specification of application interfaces to facilitate application interoperability. This paper describes such a framework architecture. In this framework, applications are deployed in software units calledbuilding blocks, each of which is independently installed and administered. Building blocks interact via interfaces calledcontracts. A contract is an open interface that is specified according to some principles, such as adherence to standard communication paradigms, separation of engineering aspects from functional aspects, and support for previous interface versions. The infrastructure, called theDistributed Processing Environment (DPE), provides communication and security services that enable building blocks to interact via contracts. The DPE provides access and location transparency to applications. The paper presents details of this architecture framework and an example to illustrate specification of contracts for network management functions.  相似文献   
88.
Green sand moulding machines for cast iron foundries are presently unable to uniquely identify individual castings. An insert tool concept is developed and tested via incremental mock-up development. The tool is part of the pattern plate and changes shape between each moulding, thus giving each mould a unique ID by embossing a Data Matrix symbol into the sand. In the process of producing the mould, each casting can be given a unique (DPM), enabling part tracking throughout the casting's life cycle. Sand embossing is achieved with paraffin-actuated reconfigurable pin-type tooling under simulated processing conditions. The marker geometry limitations have been tested using static symbol patterns, both for sand embossing and actual casting marking. The marked castings have successfully been identified with decoding software. The study shows that the function of each element of this technology can be successfully applied within the foundry industry.  相似文献   
89.
Low carbon footprint energy sources such as solar and wind power typically suffer from unpredictable or limited availability. By globally distributing a number of these renewable sources, these effects can largely be compensated for. We look at the feasibility of this approach for powering already distributed data centers in order to operate at a reduced total carbon footprint. From our study we show that carbon footprint reductions are possible, but that these are highly dependent on the approach and parameters involved. Especially the manufacturing footprint and the geographical region are critical parameters to consider. Deploying additional data centers can help in reducing the total carbon footprint, but substantial reductions can be achieved when data centers with nominal capacity well below maximum capacity redistribute processing to sites based on renewable energy availability.  相似文献   
90.
As the sizes of IT infrastructure continue to grow, cloud computing is a natural extension of virtualisation technologies that enable scalable management of virtual machines over a plethora of physically connected systems. The so-called virtualisation-based cloud computing paradigm offers a practical approach to green IT/clouds, which emphasise the construction and deployment of scalable, energy-efficient network software applications (NetApp) by virtue of improved utilisation of the underlying resources. The latter is typically achieved through increased sharing of hardware and data in a multi-tenant cloud architecture/environment and, as such, accentuates the critical requirement for enhanced security services as an integrated component of the virtual infrastructure management strategy. This paper analyses the key security challenges faced by contemporary green cloud computing environments, and proposes a virtualisation security assurance architecture, CyberGuarder, which is designed to address several key security problems within the ‘green’ cloud computing context. In particular, CyberGuarder provides three different kinds of services; namely, a virtual machine security service, a virtual network security service and a policy based trust management service. Specifically, the proposed virtual machine security service incorporates a number of new techniques which include (1) a VMM-based integrity measurement approach for NetApp trusted loading, (2) a multi-granularity NetApp isolation mechanism to enable OS user isolation, and (3) a dynamic approach to virtual machine and network isolation for multiple NetApp’s based on energy-efficiency and security requirements. Secondly, a virtual network security service has been developed successfully to provide an adaptive virtual security appliance deployment in a NetApp execution environment, whereby traditional security services such as IDS and firewalls can be encapsulated as VM images and deployed over a virtual security network in accordance with the practical configuration of the virtualised infrastructure. Thirdly, a security service providing policy based trust management is proposed to facilitate access control to the resources pool and a trust federation mechanism to support/optimise task privacy and cost requirements across multiple resource pools. Preliminary studies of these services have been carried out on our iVIC platform, with promising results. As part of our ongoing research in large-scale, energy-efficient/green cloud computing, we are currently developing a virtual laboratory for our campus courses using the virtualisation infrastructure of iVIC, which incorporates the important results and experience of CyberGuarder in a practical context.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号