首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4310篇
  免费   189篇
  国内免费   87篇
电工技术   73篇
技术理论   1篇
综合类   651篇
化学工业   230篇
金属工艺   52篇
机械仪表   136篇
建筑科学   959篇
矿业工程   60篇
能源动力   54篇
轻工业   541篇
水利工程   50篇
石油天然气   143篇
武器工业   6篇
无线电   143篇
一般工业技术   291篇
冶金工业   237篇
原子能技术   8篇
自动化技术   951篇
  2024年   8篇
  2023年   26篇
  2022年   59篇
  2021年   80篇
  2020年   79篇
  2019年   53篇
  2018年   43篇
  2017年   68篇
  2016年   70篇
  2015年   73篇
  2014年   224篇
  2013年   153篇
  2012年   266篇
  2011年   390篇
  2010年   296篇
  2009年   358篇
  2008年   355篇
  2007年   397篇
  2006年   345篇
  2005年   229篇
  2004年   163篇
  2003年   150篇
  2002年   149篇
  2001年   109篇
  2000年   74篇
  1999年   71篇
  1998年   45篇
  1997年   32篇
  1996年   22篇
  1995年   20篇
  1994年   20篇
  1993年   14篇
  1992年   19篇
  1991年   12篇
  1990年   14篇
  1989年   11篇
  1988年   10篇
  1987年   10篇
  1986年   9篇
  1985年   8篇
  1984年   10篇
  1983年   4篇
  1982年   3篇
  1979年   4篇
  1965年   3篇
  1964年   3篇
  1963年   4篇
  1962年   2篇
  1959年   3篇
  1958年   3篇
排序方式: 共有4586条查询结果,搜索用时 15 毫秒
61.
为促进S1000D标准在以信息化为中心的综合保障技术中的应用,提高装备技术文档制作和发布的正确性和效率,文章研究了S1000D标准对PDF格式发布样式的规定,分析了XSL的工作原理和各类技术信息的Schema模式,利用XSL-FO技术编写了把数据模块发布成PDF格式的XML文档,通过XMLSPY实现了技术文档的发布;通过实例展示了实现规定的发布样式的关键技术以及从数据模块到PDF发布样式的显示效果,证明了所用方法的正确性与实用性,为实现S1000D标准下的技术信息发布提供了新的可行方法.  相似文献   
62.
Abstract

The layout of pages which carry information is the bread and butter of the graphic design profession. The rationale of what elements are chosen and where they are placed is based on tacit knowledge gained over a number of years of experience. The aesthetics associated with the overall finished design are often based on a style. Important elements of style are complexity and aesthetic value. In this paper I explore how various mathematical aesthetic functions can use complexity as an arousal enhancing or limiting mechanism in the application of layout designs.  相似文献   
63.
目前综合器的优化功能越来越强,大部分设计都可以被优化。设计工程师也越来越依赖于综合工具,然而综合器的优化结果主要还是依靠设计工程师的代码风格。设计风格对综合结果的影响可以用一句话概括:“好的代码设计风格会使综合器事半功倍,达到最优的综合结果;不好的代码设计风格会使综合器南辕北辙,产生错误的综合结果。”有时候问题都源于其代码风格不尽合理,而并不在于综合器。  相似文献   
64.
In this survey article, we first introduce the concept of quasi-coincidence of a fuzzy interval value with an interval valued fuzzy set. This concept is a generalized concept of quasi-coincidence of a fuzzy point within a fuzzy set. By using this new idea, we consider the interval valued (∈,∈q)-fuzzy sub-hypernear-rings (hyperideals) of a hypernear-ring, and hence, a generalization of a fuzzy sub-near-ring (ideal) is given. Some related properties of fuzzy hypernear-rings are described. Finally, we consider the concept of implication-based interval valued fuzzy sub-hypernear-rings (hyperideals) in a hypernear-ring, in particular, the implication operators in Lukasiewicz system of continuous-valued logic are discussed.  相似文献   
65.
This paper studies the problem of state feedback control of continuous-time T-S fuzzy systems. Switched fuzzy controllers are exploited in the control design, which are switched based on the values of membership functions, and the control scheme is an extension of the parallel distributed compensation (PDC) scheme. Sufficient conditions for designing switched state feedback controllers are obtained with meeting an H norm bound requirement and quadratic D stability constraints. It is shown that the new control design method provides less conservative results than the corresponding ones via the parallel distributed compensation (PDC) scheme. A numerical example is given to illustrate the effectiveness of the proposed method.  相似文献   
66.
Suboptimal robust synthesis for MIMO nominal system under coprime factor perturbations is considered in classical and non-classical statements. In the classical statement, weights of perturbations and upper bound on magnitude bounded exogenous disturbance are assumed to be known to controller designer. Suboptimal synthesis within ε tolerance is reduced to the solution of log2(1/ε) standard mixed sensitivity problems of ℓ1 optimization. In the non-classical statement, the upper bounds on perturbations and exogenous disturbance are to be estimated from measurement data and suboptimal synthesis is reduced to the solution of 1/ε mixed sensitivity problems.  相似文献   
67.
In an organization operating in the bancassurance sector we identified a low-risk IT subportfolio of 84 IT projects comprising together 16,500 function points, each project varying in size and duration, for which we were able to quantify its requirements volatility. This representative portfolio stems from a much larger portfolio of IT projects. We calculated the volatility from the function point countings that were available to us. These figures were aggregated into a requirements volatility benchmark. We found that maximum requirements volatility rates depend on size and duration, which refutes currently known industrial averages. For instance, a monthly growth rate of 5% is considered a critical failure factor, but in our low-risk portfolio we found more than 21% of successful projects with a volatility larger than 5%. We proposed a mathematical model taking size and duration into account that provides a maximum healthy volatility rate that is more in line with the reality of low-risk IT portfolios. Based on the model, we proposed a tolerance factor expressing the maximal volatility tolerance for a project or portfolio. For a low-risk portfolio its empirically found tolerance is apparently acceptable, and values exceeding this tolerance are used to trigger IT decision makers. We derived two volatility ratios from this model, the π-ratio and the ρ-ratio. These ratios express how close the volatility of a project has approached the danger zone when requirements volatility reaches a critical failure rate. The volatility data of a governmental IT portfolio were juxtaposed to our bancassurance benchmark, immediately exposing a problematic project, which was corroborated by its actual failure. When function points are less common, e.g. in the embedded industry, we used daily source code size measures and illustrated how to govern the volatility of a software product line of a hardware manufacturer. With the three real-world portfolios we illustrated that our results serve the purpose of an early warning system for projects that are bound to fail due to excessive volatility. Moreover, we developed essential requirements volatility metrics that belong on an IT governance dashboard and presented such a volatility dashboard.  相似文献   
68.
control with limited communication and message losses   总被引:2,自引:0,他引:2  
We propose an H approach to a remote control problem where the communication is constrained due to the use of a shared channel. The controller employs a periodic time sequencing scheme for message transmissions from multiple sensors and to multiple actuators of the system. It further takes into account the information on the random message losses that occur in the channel. An exact characterization for controller synthesis is obtained and is stated in terms of linear matrix inequalities. Furthermore, an analysis on the loss probabilities of the messages to accomplish stabilization is carried out. The results are illustrated through a numerical example.  相似文献   
69.
Student modelling is an important process for adaptive virtual learning environments. Student models include a range of information about the learners such as their domain competence, learning style or cognitive traits. To be able to adapt to the learners’ needs in an appropriate way, a reliable student model is necessary, but getting enough information about a learner is quite challenging. Therefore, mechanisms are needed to support the detection process of the required information. In this paper, we investigate the relationship between learning styles, in particular, those pertaining to the Felder–Silverman learning style model and working memory capacity, one of the cognitive traits included in the cognitive trait model. The identified relationship is derived from links between learning styles, cognitive styles, and working memory capacity which are based on studies from the literature. As a result, we demonstrate that learners with high working memory capacity tend to prefer a reflective, intuitive, and sequential learning style whereas learners with low working memory capacity tend to prefer an active, sensing, visual, and global learning style. This interaction can be used to improve the student model. Systems which are able to detect either only cognitive traits or only learning styles retrieve additional information through the identified relationship. Otherwise, for systems that already incorporate learning styles and cognitive traits, the interaction can be used to improve the detection process of both by including the additional information of a learning style into the detection process of cognitive traits and vice versa. This leads to a more reliable student model.  相似文献   
70.
In this paper, by using the concept of (A,η)-accretive mappings and the new resolvent operator technique associated with (A,η)-accretive mappings, we introduce and study a system of general mixed quasivariational inclusions involving (A,η)-accretive mappings in Banach spaces, and construct a new perturbed iterative algorithm with mixed errors for this system of nonlinear (A,η)-accretive variational inclusions in q-uniformly smooth Banach spaces. Our results improve and generalize the corresponding results of recent works.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号