首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   14103篇
  免费   1737篇
  国内免费   1419篇
电工技术   739篇
综合类   1580篇
化学工业   937篇
金属工艺   638篇
机械仪表   765篇
建筑科学   557篇
矿业工程   366篇
能源动力   435篇
轻工业   338篇
水利工程   321篇
石油天然气   780篇
武器工业   123篇
无线电   1923篇
一般工业技术   2087篇
冶金工业   220篇
原子能技术   167篇
自动化技术   5283篇
  2024年   74篇
  2023年   260篇
  2022年   338篇
  2021年   390篇
  2020年   458篇
  2019年   480篇
  2018年   453篇
  2017年   530篇
  2016年   603篇
  2015年   585篇
  2014年   820篇
  2013年   1031篇
  2012年   1026篇
  2011年   1151篇
  2010年   758篇
  2009年   841篇
  2008年   866篇
  2007年   987篇
  2006年   813篇
  2005年   700篇
  2004年   582篇
  2003年   541篇
  2002年   473篇
  2001年   330篇
  2000年   310篇
  1999年   283篇
  1998年   239篇
  1997年   214篇
  1996年   199篇
  1995年   153篇
  1994年   151篇
  1993年   112篇
  1992年   105篇
  1991年   77篇
  1990年   64篇
  1989年   54篇
  1988年   32篇
  1987年   24篇
  1986年   34篇
  1985年   24篇
  1984年   14篇
  1983年   22篇
  1982年   10篇
  1981年   8篇
  1980年   7篇
  1979年   6篇
  1978年   5篇
  1977年   8篇
  1976年   4篇
  1951年   3篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
The problem of detecting a subspace signal embedded in subspace Gaussian interference and thermal noise is studied in this paper. In this problem, both the signal-independent and signal-dependent interferences are assumed to be present, therefore the overall interference subspace covers the signal subspace. The approach of this paper extends previous works involving either of those two kinds of interferences. A set of secondary data containing only interference plus noise is employed to estimate the interference covariance matrix and the noise power. Three new detectors are designed via the generalized likelihood ratio (GLR), Rao and Wald tests, respectively. Their probabilities of false alarms (PFAs) and detections are analytically derived. The PFAs show that the new detectors have the constant false alarm rate (CFAR) property against the interference and noise. Numerical results show that the new detectors outperform their counterparts for the studied problem. Furthermore, the new detectors are less sensitive to the secondary data size and to the mismatched subspace signal than some other detectors, such as the GLR detector (GLRD), the adaptive matched filter (AMF), the adaptive subspace detector (ASD), etc.  相似文献   
2.
We deal with the mathematical model of the incremental degradation of the internal coating (e.g. a polymeric material) of a metallic pipe in which a fluid flows relatively fast. The fluid drags solid impurities so that longitudinal scratches, inaccessible to any direct inspection procedure, are produced on the coating. Time evolution of this kind of defects can be reconstructed from the knowledge of a sequence of temperature maps of the external surface. The time-varying orthogonal section of this damaged interface is determined as a function of time and polar angle through the identification of a suitable effective heat transfer coefficient by means of Thin Plate Approximation.  相似文献   
3.
针对传统的小区内开环功率控制算法通常以提升本小区的吞吐量性能为目标,忽略了当前小区用户对邻小区用户同频干扰的问题,为提升边缘用户性能的同时兼顾系统整体性能,提出了一种LTE系统小区间上行联合功率控制(UJPC)算法。该算法采用单基站三扇区为系统模型,以最优化系统吞吐量比例公平函数为目标,首先根据最小信干噪比(SINR)约束值和用户最大发射功率这两个约束条件得到相应的数学优化模型,然后采用连续凸近似的方法求解优化问题得出各个基站所管辖的小区内所有用户的最优发射功率。仿真结果表明,与基准的开环功控方案相比,联合功控方案在保证系统平均频谱利用率的情况下能够较大幅度地提高小区边缘频谱利用率,其最佳性能增益能达到50%。  相似文献   
4.
We extend the definition of the classical Jacobi polynomials withindexes α, β>−1 to allow α and/or β to be negative integers. We show that the generalized Jacobi polynomials, with indexes corresponding to the number of boundary conditions in a given partial differential equation, are the natural basis functions for the spectral approximation of this partial differential equation. Moreover, the use of generalized Jacobi polynomials leads to much simplified analysis, more precise error estimates and well conditioned algorithms.Mathematics subject classification 1991. 65N35, 65N22, 65F05, 35J05  相似文献   
5.
Depending on whether bidirectional links or unidirectional links are used for communications, the network topology under a given range assignment is either an undirected graph referred to as the bidirectional topology, or a directed graph referred to as the unidirectional topology. The Min-Power Bidirectional (resp., Unidirectional) k-Node Connectivity problem seeks a range assignment of minimum total power subject to the constraint that the produced bidirectional (resp. unidirectional) topology is k-vertex connected. Similarly, the Min-Power Bidirectional (resp., Unidirectional) k-Edge Connectivity problem seeks a range assignment of minimum total power subject to the constraint the produced bidirectional (resp., unidirectional) topology is k-edge connected. The Min-Power Bidirectional Biconnectivity problem and the Min-Power Bidirectional Edge-Biconnectivity problem have been studied by Lloyd et al. [23]. They show that range assignment based the approximation algorithm of Khuller and Raghavachari [18], which we refer to as Algorithm KR, has an approximation ratio of at most 2(2 – 2/n)(2 + 1/n) for Min-Power Bidirectional Biconnectivity, and range assignment based on the approximation algorithm of Khuller and Vishkin [19], which we refer to as Algorithm KV, has an approximation ratio of at most 8(1 – 1/n) for Min-Power Bidirectional Edge-Biconnectivity. In this paper, we first establish the NP-hardness of Min-Power Bidirectional (Edge-) Biconnectivity. Then we show that Algorithm KR has an approximation ratio of at most 4 for both Min-Power Bidirectional Biconnectivity and Min-Power Unidirectional Biconnectivity, and Algorithm KV has an approximation ratio of at most 2k for both Min-Power Bidirectional k-Edge Connectivity and Min-Power Unidirectional k-Edge Connectivity. We also propose a new simple constant-approximation algorithm for both Min-Power Bidirectional Biconnectivity and Min-Power Unidirectional Biconnectivity. This new algorithm applies only to Euclidean instances, but is best suited for distributed implementation. A preliminary version of this work appeared in the proceedings of the 2nd International Conference on AD-HOC Network and Wireless (Adhoc-Now 2003). Research performed in part while visiting the Max-Plank-Institut fur Informatik. Gruia Calinescu is an Assistant Professor of Computer Science at the Illinois Institute of Technology since 2000. He held postdoc or visiting researcher positions at DIMACS, University of Waterloo, and Max-Plank Institut fur Informatik. Gruia has a Diploma from University of Bucharest and a Ph.D. from Georgia Insitute of Technology. His research interests are in the area of algorithms. Peng-Jun Wan has joined the Computer Science Department at Illinois Institute of Technology in 1997 and has been an Associate Professor since 2004. He received his Ph.D. in Computer Science from University of Minnesota in 1997, M.S. in Operations Research and Control Theory from Chinese Academy of Science in 1993, and B.S. in Applied Mathematics from Tsinghua University in 1990. His research interests include optical networks and wireless networks.  相似文献   
6.
It is shown that, for the spectrum analysis of digital quasi-periodic signals, one must use a procedure based on approximating the sequence of data readouts by a first-order trigonometric polynomial with a varying frequency of its harmonic functions.  相似文献   
7.
为了进一步提高渤海油田J3井区缔合聚合物驱的技术经济效果,在渤海油田室内配方和先导性矿场试验研究基础上,利用化学驱油藏数值模拟软件FAPMS,分析和研究了高浓度缔合聚合物前置段塞、主段塞的大小和浓度以及段塞组合方式对驱油效果的影响,优化设计了渤海绥中油田J3井区块矿场试验的最佳注入程序及段塞大小。结果表明,通过对不同浓度的疏水缔合聚合物注入的前置段塞及主段塞和梯度式后续段塞的优化后,原油采收率比未优化时提高了约10个百分点。研究表明,渤海油田应该高度重视聚合物驱的注入方式和段塞优化设计,进一步提高聚合物的技术经济效果。  相似文献   
8.
9.
在实际应用中常常需要将人像从照片的背景中有效地分割出来,通常的做法是通过提取照片中人像各部分特征来实现分割,其缺陷是计算复杂度较大,分割效果受各种干扰因素影响很大。现提出了一种基于主体外部轮廓信息的照片分割算法,通过梯度锐化、边缘保护、临近像素点相似度比较来确定图像的边界,该算法对于具有相对均匀背景的照片具有较高的计算效率。  相似文献   
10.
本文介绍用真空铸造法制造抗拉强度超过1000MPa的高强度C/Mg复合材料。将T300纤维经C-Si-O梯度涂层处理后单向排布于型腔内,在真空下注入ZM-5合金液,凝固后即得C/Mg复合材料零件或试样。试样的抗拉强度在纤维体积分数为0.35时达1050MPa。本文讨论C-Si-O梯度涂层对获得高强度复合材料的作用。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号