首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   49748篇
  免费   5326篇
  国内免费   4644篇
电工技术   4659篇
技术理论   5篇
综合类   3663篇
化学工业   2740篇
金属工艺   709篇
机械仪表   2570篇
建筑科学   1531篇
矿业工程   292篇
能源动力   1641篇
轻工业   548篇
水利工程   336篇
石油天然气   332篇
武器工业   614篇
无线电   5800篇
一般工业技术   3828篇
冶金工业   1072篇
原子能技术   190篇
自动化技术   29188篇
  2024年   174篇
  2023年   849篇
  2022年   869篇
  2021年   1202篇
  2020年   1510篇
  2019年   1572篇
  2018年   1428篇
  2017年   1932篇
  2016年   2148篇
  2015年   2149篇
  2014年   3265篇
  2013年   4303篇
  2012年   2975篇
  2011年   3455篇
  2010年   2545篇
  2009年   2952篇
  2008年   2970篇
  2007年   2997篇
  2006年   2570篇
  2005年   2234篇
  2004年   1818篇
  2003年   1695篇
  2002年   1545篇
  2001年   1216篇
  2000年   1172篇
  1999年   1035篇
  1998年   914篇
  1997年   797篇
  1996年   725篇
  1995年   627篇
  1994年   546篇
  1993年   525篇
  1992年   403篇
  1991年   377篇
  1990年   302篇
  1989年   228篇
  1988年   194篇
  1987年   170篇
  1986年   143篇
  1985年   183篇
  1984年   192篇
  1983年   171篇
  1982年   148篇
  1981年   97篇
  1980年   71篇
  1979年   88篇
  1978年   64篇
  1977年   67篇
  1976年   19篇
  1975年   13篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
41.
近年来深度学习迅猛发展,颠覆了语音识别、图像分类、文本理解等领域的算法设计思路。深度学习因其具备强大的特征提取能力,在图像识别领域的成绩尤为突出。然而深度学习与视频监控领域的结合并不多,由于深度模型具有多层网络结构,算法复杂度大,训练和更新模型时比较耗时,很难满足实时性要求。回顾了深度学习的发展史,介绍了最近10年来国内外深度学习主要模型,论述了基于深度学习的目标跟踪算法,指出了各算法的优缺点,最后对当前该领域存在的问题和发展前景进行了总结和展望。  相似文献   
42.
以高精度三维地震资料为基础,结合构造演化恢复和区域构造背景,系统研究了准噶尔盆地车排子凸起断裂分布和形成机制。结果表明,车排子凸起发育深部和浅部2套断裂体系,深部断裂体系和浅部断裂体系分别发育3种断裂样式。车排子凸起共经历5个构造演化阶段,其中,晚二叠世挤压-逆冲控制了深部断裂体系的初始形成,晚侏罗世逆冲-走滑控制了深部断裂体系的最终定型,新近纪叠加掀斜、局部伸展控制了浅部断裂体系的形成。不同断裂体系在油气成藏过程中均起到了重要作用。其中:深部断裂体系的红车断裂是重要的油源断裂,低序级断层控制形成了石炭系火山岩优质储集体;浅部断裂体系使得油气向浅部层系运移调整,同时形成了断块圈闭、断鼻圈闭和断层-岩性圈闭等丰富的圈闭类型。  相似文献   
43.
Control of self-assembling systems at the micro- and nano-scale provides new opportunities for the engineering of novel materials in a bottom-up fashion. These systems have several challenges associated with control including high-dimensional and stochastic nonlinear dynamics, limited sensors for real-time measurements, limited actuation for control, and kinetic trapping of the system in undesirable configurations. Three main strategies for addressing these challenges are described, which include particle design (active self-assembly), open-loop control, and closed-loop (feedback) control. The strategies are illustrated using a variety of examples such as the design of patchy and Janus particles, the toggling of magnetic fields to induce the crystallization of paramagnetic colloids, and high-throughput crystallization of organic compounds in nanoliter droplets. An outlook of the future research directions and the necessary technological advancements for control of micro- and nano-scale self-assembly is provided.  相似文献   
44.
The objective of this paper is to review and document the mine fleet management systems’ models and algorithms. The purpose is to understand the algorithms behind the fleet management systems and the proposed academic solutions in this area to identify any gaps in the current literature and to open up opportunities to establish research questions that need to be addressed in an integrated simulation and optimisation operational planning research framework. In this paper, we review industrial fleet management systems and the main academic algorithms behind such systems. The fleet management systems are divided into three subsequently related problems to review: shortest path, production optimisation and real-time dispatching. Finally, the limitations of current algorithms for fleet management systems are documented in terms of mining practice feasibility and optimality of the solution on large-scale problems. The results of this literature review enable us to evaluate the logical links between major components of an integrated simulation and optimisation operational planning framework with current theory of fleet management systems.  相似文献   
45.
This paper presents a novel approach to the localization of moving targets in a complex environment based on the measurement of the perturbations induced by the target presence on an independently‐generated time‐varying electromagnetic field. Field perturbations are measured via a set of sensors deployed over the domain of interest and used to detect and track a possible target by resorting to a particle Bernoulli filter (PBF). To comply with real‐time operation, the PBF works along with an artificial neural network (ANN) model of the environment trained offline via finite elements (FEs). The performance of the proposed algorithm is assessed via simulation experiments.  相似文献   
46.
This article presents a new approach for solving the Optimal Control Problem (OCP) of linear time-delay systems with a quadratic cost functional. The proposed method can also be used for designing optimal control time-delay systems with disturbance. In this study, the Variational Iteration Method (VIM) is employed to convert the original Time-Delay Optimal Control Problem (TDOCP) into a sequence of nonhomogeneous linear two-point boundary value problems (TPBVPs). The optimal control law obtained consists of an accurate linear feedback term and a nonlinear compensation term which is the limit of an adjoint vector sequence. The feedback term is determined by solving Riccati matrix differential equation. By using the finite-step iteration of a nonlinear compensation sequence, we can obtain a suboptimal control law. Finally, Illustrative examples are included to demonstrate the validity and applicability of the technique.  相似文献   
47.
In recent years, the Industry 4.0 concept brings new demands and trends in different areas; one of them is distributing computational power to the cloud. This concept also introduced the Reference Architectural Model for Industry 4.0 (RAMI 4.0). The efficiency of data communications within the RAMI 4.0 model is a critical issue. Aiming to evaluate the efficiency of data communication in the Cloud Based Cyber-Physical Systems (CB-CPS), this study analyzes the periods and data amount required to communicate with individual hierarchy levels of the RAMI 4.0 model. The evaluation of the network properties of the communication protocols eligible for CB-CPS is presented. The network properties to different cloud providers and data centers’ locations have been measured and interpreted. To test the findings, an architecture for cloud control of laboratory model was proposed. It was found that the time of the day; the day of the week; and data center utilization have a negligible impact on latency. The most significant impact lies in the data center distance and the speed of the communication channel. Moreover, the communication protocol also has impact on the latency. The feasibility of controlling each level of RAMI 4.0 through cloud services was investigated. Experimental results showed that control is possible in many solutions, but these solutions mostly cannot depend just on cloud services. The intelligence on the edge of the network will play a significant role. The main contribution is a thorough evaluation of different cloud providers, locations, and communication protocols to provide recommendations sufficient for different levels of the RAMI 4.0 architecture.  相似文献   
48.
This article investigates an adaptive fuzzy tracking control problem for a class of nontriangular form systems with asymmetric time-varying full state constraints. Unknown functions are approximated by the fuzzy logic systems. A domination approach is employed to tackle the nontriangular form structure. Time-varying asymmetric barrier Lyapunov functions (ABLFs) are adopted to ensure full-state constraints satisfaction. Based on the backstepping technique and time-varying ABLFs, an adaptive controller is proposed and guarantees that all the signals in the closed-loop system are ultimately bounded and the time-varying full state constraints are met. Simulation examples are presented to further demonstrate the effectiveness of the proposed approach.  相似文献   
49.
Berkeley [Minds Machines 10 (2000) 1] described a methodology that showed the subsymbolic nature of an artificial neural network system that had been trained on a logic problem, originally described by Bechtel and Abrahamsen [Connectionism and the mind. Blackwells, Cambridge, MA, 1991]. It was also claimed in the conclusion of this paper that the evidence was suggestive that the network might, in fact, count as a symbolic system. Dawson and Piercey [Minds Machines 11 (2001) 197] took issue with this latter claim. They described some lesioning studies that they argued showed that Berkeley’s (2000) conclusions were premature. In this paper, these lesioning studies are replicated and it is shown that the effects that Dawson and Piercey rely upon for their argument are merely an artifact of a threshold function they chose to employ. When a threshold function much closer to that deployed in the original studies is used, the significant effects disappear.  相似文献   
50.
A system is frequently represented by transfer functions in an input–output characterization. However, such a system (under mild assumptions) can also be represented by transfer functions in a port characterization, frequently referred to as a chain-scattering representation. Due to its cascade properties, the chain-scattering representation is used throughout many fields of engineering. This paper studies the relationship between poles and zeros of input–output and chain-scattering representations of the same system.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号