首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   20163篇
  免费   2597篇
  国内免费   1602篇
电工技术   2528篇
技术理论   2篇
综合类   1908篇
化学工业   957篇
金属工艺   352篇
机械仪表   1714篇
建筑科学   969篇
矿业工程   363篇
能源动力   348篇
轻工业   3036篇
水利工程   300篇
石油天然气   1160篇
武器工业   241篇
无线电   2260篇
一般工业技术   1678篇
冶金工业   435篇
原子能技术   139篇
自动化技术   5972篇
  2024年   148篇
  2023年   425篇
  2022年   759篇
  2021年   862篇
  2020年   910篇
  2019年   777篇
  2018年   716篇
  2017年   880篇
  2016年   873篇
  2015年   942篇
  2014年   1307篇
  2013年   1288篇
  2012年   1531篇
  2011年   1646篇
  2010年   1197篇
  2009年   1198篇
  2008年   1118篇
  2007年   1314篇
  2006年   1120篇
  2005年   882篇
  2004年   707篇
  2003年   621篇
  2002年   544篇
  2001年   390篇
  2000年   357篇
  1999年   270篇
  1998年   257篇
  1997年   225篇
  1996年   163篇
  1995年   156篇
  1994年   122篇
  1993年   98篇
  1992年   82篇
  1991年   71篇
  1990年   57篇
  1989年   53篇
  1988年   35篇
  1987年   27篇
  1986年   28篇
  1985年   15篇
  1984年   27篇
  1983年   14篇
  1982年   23篇
  1981年   22篇
  1980年   27篇
  1979年   14篇
  1978年   14篇
  1977年   8篇
  1961年   4篇
  1959年   8篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
61.
有滞后环节的系统的闭环鲁棒辨识方法   总被引:4,自引:1,他引:4  
提出一种新的针对带滞后环节的任意阶系统的闭环辨识方法。通过“三步法”,实现在闭环条件下的被控制对象的传递函数参数的辨识,所提出方法具有很强的鲁棒性。仿真例子表明该方法的有效性。  相似文献   
62.
A new minor component in the female volatile extract ofLeucoptera malifoliella (Costa) (Lepidoptera, Lyonetiidae) has been identified as 5,9-dimethyloctadecane (2). The amount detected of the minor compound2 ranged from 4 to 8% in comparison with the major component 5,9-dimethylheptadecane (1). Neither compound has been found in the male volatile extract. The identification has been based on its spectroscopic properties and Chromatographic behavior in comparison with an authentic synthetic sample. The synthesis has been carried out through a short route from 2,6-dimethylcyclohexanone (3). In field tests, compound2 appears to act as a Synergist of the major component1 when mixed with the latter in a 1000.1– 5 ratio.  相似文献   
63.
《Automatica》2014,50(12):3019-3029
An adaptive control algorithm for open-loop stable, constrained, linear, multiple input multiple output systems is presented. The proposed approach can deal with both input and output constraints, as well as measurement noise and output disturbances. The adaptive controller consists of an iterative set membership identification algorithm, that provides a set of candidate plant models at each time step, and a model predictive controller, that enforces input and output constraints for all the plants inside the model set. The algorithm relies only on the solution of standard convex optimization problems that are guaranteed to be recursively feasible. The experimental results obtained by applying the proposed controller to a quad-tank testbed are presented.  相似文献   
64.
This contribution concerns variance analysis of linear multi-input single-output models when the inputs are temporally white but where different inputs may be correlated. An expression is provided for the variance of a linearly parametrized estimate of the frequency response function from one block, i.e. from one input to the output. In particular, this expression reveals that the variance increases in one block when the number of estimated parameters in another block is increased, but levels off when the number of parameters in the other block reaches the number of parameters in the block in question. It also quantifies exactly how correlation between inputs affects the resulting accuracy and a graphical representation is provided for this purpose. The results are applicable to parallel MISO Hammerstein models when the nonlinearities are known and generalize an existing variance expression for this type of model.  相似文献   
65.
We compared methods for predicting and understanding the source of confusion errors during military vehicle identification training. Participants completed training to identify main battle tanks. They also completed card-sorting and similarity-rating tasks to express their mental representation of resemblance across the set of training items. We expected participants to selectively attend to a subset of vehicle features during these tasks, and we hypothesised that we could predict identification confusion errors based on the outcomes of the card-sort and similarity-rating tasks. Based on card-sorting results, we were able to predict about 45% of observed identification confusions. Based on multidimensional scaling of the similarity-rating data, we could predict more than 80% of identification confusions. These methods also enabled us to infer the dimensions receiving significant attention from each participant. This understanding of mental representation may be crucial in creating personalised training that directs attention to features that are critical for accurate identification.

Practitioner Summary: Participants completed military vehicle identification training and testing, along with card-sorting and similarity-rating tasks. The data enabled us to predict up to 84% of identification confusion errors and to understand the mental representation underlying these errors. These methods have potential to improve training and reduce identification errors leading to fratricide.  相似文献   

66.
曹鹏飞  罗雄麟 《自动化学报》2014,40(10):2179-2192
Wiener模型结构能有效地表征系统的动态和静态特性, 因此这里首先基于这一结构建立软测量模型, 利用动态与静态子模型分别建立辅助变量与主导变量间的动态与静态关系, 并说明该软测量模型的可行性, 给出模型具体表达式. 其次, 针对所提模型, 提出分步辨识方式获得最优模型参数, 说明其可行性. 再次, 为了减少计算和实现模型在线更新, 这里提出参数辨识递推算法, 并给出软测量模型参数的收敛性结论. 通过实例仿真, 可以看出本文提出模型的可行性, 以及分步辨识方式与递推算法的有效性.  相似文献   
67.
The weak signal concept according to Ansoff has the aim to advance strategic early warning. It enables to predict the appearance of events in advance that are relevant for an organization. An example is to predict the appearance of a new and relevant technology for a research organization. Existing approaches detect weak signals based on an environmental scanning procedure that considers textual information from the internet. This is because about 80% of all data in the internet are textual information. The texts are processed by a specific clustering approach where clusters that represent weak signals are identified. In contrast to these related approaches, we propose a new methodology that investigates a sequence of clusters measured at successive points in time. This enables to trace the development of weak signals over time and thus, it enables to identify relevant weak signal developments for organization’s decision making in strategic early warning environment.  相似文献   
68.
假性紫罗兰酮在浓硫酸及 - 2 0°C低温条件下反应 ,主要生成 β-紫罗兰酮 ,少量的 α-及 γ-紫罗兰酮 ,同时生成副产物 ( I)及 ( II)。用 IR、1H NMR及 MS光谱分析方法 ,对副产物 ( I)进行了结构鉴定 ,结构为 3,4,4a,5 ,8,8a-六氢 - 2 ,5 ,5 ,8a-四甲基 - 2 H - 1 -苯并吡喃  相似文献   
69.
In the present investigation, we develop a method for estimating rheological parameters of viscoelastic fluids using velocity measurement in a square straight channel. It is believed that a somewhat complicated patterns of secondary flows due to the non-zero second normal stress difference are more useful than the simple viscometric flows traditionally adopted in the determination of rheological parameters. The inverse problem of determining the rheological parameters from a set of velocity measurements is solved using a conjugate gradient method. When applied to a general constitutive equation encompassing the UCM model, the Oldroyd-B model and the PTT model, the present method is found to yield a reasonably accurate estimation of five rheological parameters simultaneously even with noisy velocity measurements.  相似文献   
70.
Members of health social networks may be susceptible to privacy leaks by the amount of information they leave behind. The threat to privacy increases when members of these networks reuse their pseudonyms in other social networks. The risk of re‐identifying users from such networks requires quantitative estimates to evaluate its magnitude. The estimates will enable managers and members of health social communities to take corrective measures. We introduce a new re‐identification attack, the social network attack, that takes advantage of the fact that users reuse their pseudonyms. To demonstrate the attack, we establish links between MedHelp and Twitter (two popular social networks) based on matching pseudonyms. We used Bayesian networks to model the re‐identification risk and used stylometric techniques to identify the strength of the links. On the basis of our model 7‐11. 8% of the MedHelp members in the sample population who reused their pseudonyms in Twitter were re‐identifiable compared with 1% who did not. The risk estimates were measured at the 5% risk threshold. Our model was able to re‐identify users with a sensitivity of 41% and specificity of 96%. The potential for re‐identification increases as more data is accumulated from these profiles, which makes the threat of re‐identification more serious.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号