首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9843篇
  免费   1270篇
  国内免费   901篇
电工技术   822篇
综合类   1952篇
化学工业   256篇
金属工艺   202篇
机械仪表   539篇
建筑科学   677篇
矿业工程   171篇
能源动力   223篇
轻工业   191篇
水利工程   171篇
石油天然气   267篇
武器工业   108篇
无线电   1254篇
一般工业技术   1270篇
冶金工业   114篇
原子能技术   166篇
自动化技术   3631篇
  2024年   30篇
  2023年   97篇
  2022年   157篇
  2021年   204篇
  2020年   305篇
  2019年   299篇
  2018年   302篇
  2017年   296篇
  2016年   357篇
  2015年   396篇
  2014年   577篇
  2013年   664篇
  2012年   758篇
  2011年   737篇
  2010年   617篇
  2009年   624篇
  2008年   635篇
  2007年   743篇
  2006年   614篇
  2005年   519篇
  2004年   440篇
  2003年   400篇
  2002年   340篇
  2001年   254篇
  2000年   254篇
  1999年   214篇
  1998年   187篇
  1997年   151篇
  1996年   141篇
  1995年   131篇
  1994年   110篇
  1993年   91篇
  1992年   76篇
  1991年   65篇
  1990年   60篇
  1989年   47篇
  1988年   36篇
  1987年   18篇
  1986年   7篇
  1985年   6篇
  1984年   5篇
  1983年   9篇
  1982年   8篇
  1981年   9篇
  1978年   5篇
  1977年   4篇
  1976年   3篇
  1975年   2篇
  1959年   1篇
  1955年   2篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
31.
One of the most important issues in the theory of OWA operators is the determination of associated weights. This matter is essential in order to use the best-suited OWA operator in each aggregation process. Given that some aggregation processes can be seen as extensions of majority rules to the field of gradual preferences, it is possible to determine the OWA operator weights by taking into account the class of majority rule that we want to obtain when individuals do not grade their pairwise preferences. However, a difficulty with this approach is that the same majority rule can be obtained through a wide variety of OWA operators. For this reason, a model for selecting the best-suited OWA operators is proposed in this paper.  相似文献   
32.
In the area of image retrieval from data bases and for copyright protection of large image collections there is a growing demand for unique but easily computable fingerprints for images. These fingerprints can be used to quickly identify every image within a larger set of possibly similar images. This paper introduces a novel method to automatically obtain such fingerprints from an image. It is based on a reinterpretation of an image as a Riemannian manifold. This representation is feasible for gray value images and color images. We discuss the use of the spectrum of eigenvalues of different variants of the Laplace operator as a fingerprint and show the usability of this approach in several use cases. Contrary to existing works in this area we do not only use the discrete Laplacian, but also with a particular emphasis the underlying continuous operator. This allows better results in comparing the resulting spectra and deeper insights in the problems arising. We show how the well known discrete Laplacian is related to the continuous Laplace-Beltrami operator. Furthermore, we introduce the new concept of solid height functions to overcome some potential limitations of the method.  相似文献   
33.
For infinitely dimensional convex vector maximization problems, it is proved that there exists, under certain conditions, an arbitrarily small additive perturbation of the performance criterion by a linear continuous operator such that the perturbed problem has efficient solutions. The study was sponsored by the Ukrainian State Fund for Basic Research __________ Translated from Kibernetika i Sistemnyi Analiz, No. 2, pp. 105–114, March–April 2007.  相似文献   
34.
Mesh simplification is one of the most important links in the context of reverse engineering. It is also an important consideration in computer graphics. This paper presents a novel and original method of triangular mesh reduction. A new concept of super-face is defined. In order to construct a super-face, a way to calculate the scattered point curvature is discussed. The growth of a seed point and the combination of different regions are also necessary for the construction of a super-face. When the hole left by the deletion of super-face is retriangulated a genetic algorithm is used that has been modified for our specific problem. Then the different weights to balance the optimisation of the new triangular mesh can be adjusted.  相似文献   
35.
南水北调中线干线工程数字文档管理信息系统设计与实现   总被引:1,自引:1,他引:0  
结合南水北调中线干线工程文档一体化管理的需要,设计了数字文档管理信息系统的功能结构,包括文书管理、数字文件中心和数字档案馆3个部分,通过对文档资料的综合管理,能够极大提高文档信息的利用率和现代化管理程度。  相似文献   
36.
 基于波动方程的聚焦点控制照明叠前深度偏移技术借助于差分计算,把速度、密度等介质参数的影响体现在差分计算的矩阵方程中,能够自动适应速度场的任意变化,快速傅里叶变换的使用也加速了波场延拓的计算速度。因此此法兼具有限差分偏移方法和傅里叶偏移方法的优点,既可适应速度场的剧烈变化,又可保证对陡倾地层的成像效果,是目前针对复杂构造最有效的成像方法之一。对于单个聚焦点及其周围的成像步骤为:①采用矩形网格情况下绕射走时的有限差分计算方法生成合成算子;②应用合成算子来合成面炮震源和面波记录;③对合成的面炮震源和面波记录做傅里叶有限差分法波动方程叠前深度偏移,得到该聚焦点及其附近区域的成像结果。按照上述成像步骤,将震源波场和炮集记录依据相应的外推公式进行延拓,最终应用成像条件求取成像值。在地质目标处选取多个聚焦点,可以得到面向目标的控制照明偏移成像,在多个层位上选取多个聚焦点进行控制照明叠前深度偏移,可以得到整块区域的成像。通过对Marmousi模型的试算,取得了较好的效果。  相似文献   
37.
This paper investigates electrostatic voltage distributions around a surface-breaking flaw due to an injected current of known strength. The direct 3-D solution of the voltage behavior over the flawed surface is obtained numerically by the use of a boundary integral formulation. A novel iteration method is applied to solve the resulting electrostatic integral equation for the unknown surface voltage distribution. In addition to investigating the sensitivity of different flaw sizes to the observed surface voltage distribution, important issues such as suitable probe spacing and current flow orientation are studied. For sufficiently small surface-breaking flaws, a simple image source model is developed to evaluate the voltage response of hairline cracks. The model is tested by comparing it with the developed numerical solution. Experiments aimed at establishing the validity of the modeling approach show remarkable agreement with the theoretical model.  相似文献   
38.
随着通信和信息技术的跨越式发展,传统呼叫中心已经难以满足企业快速增长的需求,同时以客户为中心和以服务为导向的经营理念对新一代联络中心提出了更高的要求。在联络中心技术快速革新的背景下,文中以软交换、NGN和分布式技术为基础,深入研究了基于融合技术的新一代联络中心的系统架构和软交换平台的逻辑关系,构建了支持全媒体业务和标准化SIP的统一通信平台。文章以联络中心中实时和非实时业务为例,分析设计了适合联络中心典型的话务和多媒体业务的信令流程,提出了适应新一代联络中心的业务部署方式,利用模糊综合评价方法对不同部署方式的特点进行对比评估,为新一代联络中心在大型企业中推广和应用提供重要的理论和实践依据。  相似文献   
39.
In this paper we present a simple, general methodology for the generation of high-order operator decomposition (splitting) techniques for the solution of time-dependent problems arising in ordinary and partial differential equations. The new approach exploits operator integration factors to reduce multiple-operator equations to an associated series of single-operator initial-value subproblems. Two illustrations of the procedure are presented: the first, a second-order method in time applied to velocity-pressure decoupling in the incompressible Stokes problem; the second, a third-order method in time applied to convection-Stokes decoupling in the incompressible Navier-Stokes equations. Critical open questions are briefly described.  相似文献   
40.
This paper proposes a new method for calculating a bound on the gain of a system comprising a linear time invariant part and a static nonlinear part, which is odd, bounded, zero at zero and has a restriction on its slope. The nonlinear part is also assumed to be sector bounded, with the sector bound being (possibly) different from that implied by the slope restriction. The computation of the gain bound is found by solving a set of linear matrix inequalities, which arise from an integral quadratic constraint formulation of a multiplier problem involving both Zames‐Falb and Popov multipliers. Examples illustrate the effectiveness of the results, and comparisons are made against the state‐of‐the‐art. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号