首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   32999篇
  免费   2161篇
  国内免费   1842篇
电工技术   1303篇
技术理论   1篇
综合类   1747篇
化学工业   12375篇
金属工艺   1736篇
机械仪表   953篇
建筑科学   1043篇
矿业工程   405篇
能源动力   691篇
轻工业   4745篇
水利工程   366篇
石油天然气   2036篇
武器工业   231篇
无线电   2605篇
一般工业技术   2446篇
冶金工业   889篇
原子能技术   502篇
自动化技术   2928篇
  2024年   87篇
  2023年   490篇
  2022年   2216篇
  2021年   2228篇
  2020年   850篇
  2019年   782篇
  2018年   750篇
  2017年   909篇
  2016年   1118篇
  2015年   1196篇
  2014年   1607篇
  2013年   1817篇
  2012年   2019篇
  2011年   2424篇
  2010年   1685篇
  2009年   1890篇
  2008年   1750篇
  2007年   1880篇
  2006年   1748篇
  2005年   1417篇
  2004年   1192篇
  2003年   1036篇
  2002年   894篇
  2001年   708篇
  2000年   601篇
  1999年   558篇
  1998年   424篇
  1997年   400篇
  1996年   378篇
  1995年   355篇
  1994年   308篇
  1993年   206篇
  1992年   173篇
  1991年   147篇
  1990年   134篇
  1989年   102篇
  1988年   78篇
  1987年   49篇
  1986年   72篇
  1985年   46篇
  1984年   48篇
  1983年   31篇
  1982年   37篇
  1981年   30篇
  1980年   32篇
  1979年   34篇
  1978年   14篇
  1977年   11篇
  1976年   10篇
  1975年   12篇
排序方式: 共有10000条查询结果,搜索用时 9 毫秒
101.
设计了由GSM/GPRS模块SIM300和射频收发芯片nRF24LE1组成的无线数据采集系统,实现了对数据的采集与无线传输。系统由嵌入高速单片机的nRF24LE1芯片完成对多路数据的采集、处理和收发,并由SIM300将数据通过网络传递给TCP服务器和手机终端。在完成系统的硬件设计和软件开发的过程中,重点探究了nRF24LE1芯片的多通道收发过程和TCP服务器的建立。该系统具有功耗低、扩展方便等优点,适合多种无线数据采集和传输的场合。  相似文献   
102.
103.
We investigate in this note solution properties of semidefinite programming (SDP) relaxation for 0-1 quadratic knapsack problem (QKP). In particular, we focus on the issue of uniqueness of the optimal solution to the SDP relaxation for QKP. We first give a counterexample which shows that the optimal solution to the SDP relaxation for QKP could be non-unique. This is in contrast with the case of unconstrained 0-1 quadratic problems. A necessary and sufficient condition is then derived to ensure the uniqueness of the optimal solution to the SDP relaxation for QKP.  相似文献   
104.
针对不同现场总线类型设备间互操作的问题,通过对EPA和FF H1通信模型的分析,提出了EPA与FF H1协议转换网关模型,并介绍了网关的实现方法和硬件结构。最后根据实验数据对网关进行性能分析,结果表明本网关有很好的性能。  相似文献   
105.
火炮初速测量是火炮进行弹道准备中的一项重要内容,运用灰色理论探讨火炮初速预测问题,既有利于提高火炮射击精度的修正,又有利于进一步完善火炮初速测量雷达的使用操作和改进设计。针对火炮初速随机变化的特点,基于灰色理论中的GM(1,1)模型,构建火炮初速灰预测模型,确定预测结果精度检验方法。最后通过一应用实例验证该方法具有一定的合理性与实用性。  相似文献   
106.
针对TV-L1分解模型在进行图像分解时所得到的结构部分有阶梯效应的问题,本文提出一种改进的图像分解模型即GJTV-L1模型。该模型首先得到结构部分的切向量场,由切向量场可得到结构部分的法向量场,然后拟合法向量场得到重构图像,即结构部分。通过仿真实验,验证了GJTV-L1模型和算法的合理性及有效性。  相似文献   
107.
基于辐射传输模型和人工神经网络算法,研究出适用于环境一号卫星CCD相机数据的叶面积指数反演算法针对环境一号卫星CCD相机的波段特征,设计出一种新的植被指数HJVI,有效的避免了数据饱和现象,提高了算法的精度。  相似文献   
108.
In an organization operating in the bancassurance sector we identified a low-risk IT subportfolio of 84 IT projects comprising together 16,500 function points, each project varying in size and duration, for which we were able to quantify its requirements volatility. This representative portfolio stems from a much larger portfolio of IT projects. We calculated the volatility from the function point countings that were available to us. These figures were aggregated into a requirements volatility benchmark. We found that maximum requirements volatility rates depend on size and duration, which refutes currently known industrial averages. For instance, a monthly growth rate of 5% is considered a critical failure factor, but in our low-risk portfolio we found more than 21% of successful projects with a volatility larger than 5%. We proposed a mathematical model taking size and duration into account that provides a maximum healthy volatility rate that is more in line with the reality of low-risk IT portfolios. Based on the model, we proposed a tolerance factor expressing the maximal volatility tolerance for a project or portfolio. For a low-risk portfolio its empirically found tolerance is apparently acceptable, and values exceeding this tolerance are used to trigger IT decision makers. We derived two volatility ratios from this model, the π-ratio and the ρ-ratio. These ratios express how close the volatility of a project has approached the danger zone when requirements volatility reaches a critical failure rate. The volatility data of a governmental IT portfolio were juxtaposed to our bancassurance benchmark, immediately exposing a problematic project, which was corroborated by its actual failure. When function points are less common, e.g. in the embedded industry, we used daily source code size measures and illustrated how to govern the volatility of a software product line of a hardware manufacturer. With the three real-world portfolios we illustrated that our results serve the purpose of an early warning system for projects that are bound to fail due to excessive volatility. Moreover, we developed essential requirements volatility metrics that belong on an IT governance dashboard and presented such a volatility dashboard.  相似文献   
109.
A multi-objective controller synthesis problem is considered in which an output is to be regulated approximately by assuring a bound on the steady-state peak amplification in response to an infinite-energy disturbance, while also guaranteeing a desired level of performance measured in terms of the worst-case energy gain from a finite-energy input to a performance output. Relying on a characterization of the controllers with which almost asymptotic regulation is accomplished, the problem of guaranteeing the desired level of performance is reduced to solving a system of linear matrix inequalities subject to a set of linear equality constraints. Based on the solution of this system, a procedure is outlined for the construction of a suitable controller whose order is equal to the order of the plant plus the order of the exogenous system.  相似文献   
110.
control with limited communication and message losses   总被引:2,自引:0,他引:2  
We propose an H approach to a remote control problem where the communication is constrained due to the use of a shared channel. The controller employs a periodic time sequencing scheme for message transmissions from multiple sensors and to multiple actuators of the system. It further takes into account the information on the random message losses that occur in the channel. An exact characterization for controller synthesis is obtained and is stated in terms of linear matrix inequalities. Furthermore, an analysis on the loss probabilities of the messages to accomplish stabilization is carried out. The results are illustrated through a numerical example.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号