首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   13191篇
  免费   903篇
  国内免费   854篇
电工技术   364篇
综合类   748篇
化学工业   1307篇
金属工艺   395篇
机械仪表   1420篇
建筑科学   1068篇
矿业工程   217篇
能源动力   545篇
轻工业   278篇
水利工程   279篇
石油天然气   398篇
武器工业   93篇
无线电   859篇
一般工业技术   689篇
冶金工业   344篇
原子能技术   139篇
自动化技术   5805篇
  2024年   84篇
  2023年   126篇
  2022年   181篇
  2021年   279篇
  2020年   241篇
  2019年   245篇
  2018年   241篇
  2017年   306篇
  2016年   394篇
  2015年   418篇
  2014年   749篇
  2013年   726篇
  2012年   750篇
  2011年   1071篇
  2010年   712篇
  2009年   729篇
  2008年   786篇
  2007年   942篇
  2006年   881篇
  2005年   759篇
  2004年   697篇
  2003年   722篇
  2002年   528篇
  2001年   431篇
  2000年   300篇
  1999年   308篇
  1998年   270篇
  1997年   219篇
  1996年   165篇
  1995年   166篇
  1994年   106篇
  1993年   71篇
  1992年   78篇
  1991年   51篇
  1990年   41篇
  1989年   45篇
  1988年   31篇
  1987年   9篇
  1986年   16篇
  1985年   22篇
  1984年   12篇
  1983年   10篇
  1982年   9篇
  1981年   6篇
  1980年   5篇
  1979年   2篇
  1978年   1篇
  1976年   3篇
  1973年   2篇
  1972年   1篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
21.
Correlation between a dithering signal and the prediction error has been used for detecting model mismatch in univariate model based control systems. This paper extends that approach to MIMO control systems. A closed-loop cross-correlation method is presented to detect which specific input-output pairings of a model-based controller are mismatched. This method may be used in screening the complete set of models and in selecting candidate models for re-identification. The method first finds the rows and columns of the transfer function matrix that contain mismatch, and then the candidates are found by the intersection of the said rows and columns. Placing the system under partial control, whereby one or more of the manipulated variables are held constant, can be used to further reduce the set of candidate models.  相似文献   
22.
基于MVC模式的Struts框架研究   总被引:5,自引:0,他引:5  
Struts框架是当前Web应用开发中最流行的开发框架之一。在介绍了MVC模式的基础上对Struts框架的体系结构和工作流程作了介绍,并结合数据库连接池实现了一个电子商务网站的客户登录系统。  相似文献   
23.
目前,制约竞争情报发展的一个关键问题就是情报的收集与分析手段比较落后,远远不能胜任竞争情报系统所蕴含的特点和功效。本文将竞争情报作为一种特殊的知识,吸纳知识发现理论成果和方法,提升现有竞争情报系统的构造技术,真正做到快速、全面、准确和智能化的竞争情报生成和利用。  相似文献   
24.
Certain behavioral properties of distributed systems are difficult to express in interleaving semantics, whereas they are naturally expressed in terms of partial orders of events or, equivalently, Mazurkiewicz traces. Two examples of such properties are serializability of a database and global snapshots of concurrent systems. Recently, a modest extension for LTL by an operator that expresses snapshots, has been proposed. It combines the ease of linear (interleaving) specification with this useful partial order concept. The new construct allows one to assert that a global snapshot appeared in the past, perhaps not in the observed execution sequence, but possibly in an equivalent one.  相似文献   
25.
Modeling wine preferences by data mining from physicochemical properties   总被引:4,自引:0,他引:4  
We propose a data mining approach to predict human wine taste preferences that is based on easily available analytical tests at the certification step. A large dataset (when compared to other studies in this domain) is considered, with white and red vinho verde samples (from Portugal). Three regression techniques were applied, under a computationally efficient procedure that performs simultaneous variable and model selection. The support vector machine achieved promising results, outperforming the multiple regression and neural network methods. Such model is useful to support the oenologist wine tasting evaluations and improve wine production. Furthermore, similar techniques can help in target marketing by modeling consumer tastes from niche markets.  相似文献   
26.
In this paper we present a word-level model checking method that attempts to speed up safety property checking of industrial netlists. Our aim is to construct an algorithm that allows us to check both bounded and unbounded properties using standard bit-level model checking methods as back-end decision procedures, while incurring minimum runtime penalties for designs that are unsuited to our analysis. We do this by combining modifications of several previously known techniques into a static abstraction algorithm which is guaranteed to produce bit-level netlists that are as small or smaller than the original bitblasted designs. We evaluate our algorithm on several challenging hardware components.  相似文献   
27.
Model reference control design methods fail when the plant has one or more non-minimum phase zeros that are not included in the reference model, leading possibly to an unstable closed loop. This is a very serious problem for data-based control design methods, where the plant is typically unknown. In this paper, we extend the Virtual Reference Feedback Tuning method to non-minimum phase plants. This extension is based on the idea proposed in Lecchini and Gevers (2002) for Iterative Feedback Tuning. We present a simple two-step procedure that can cope with the situation where the unknown plant may or may not have non-minimum phase zeros.  相似文献   
28.
This paper addresses the model reduction problem for a class of stiff chemical Langevin equations that arise as models of biomolecular networks with fast and slow reactions and can be described as continuous Markov processes. Initially, a coordinate transformation is sought that allows the decoupling of fast and slow variables in the model equations. Necessary and sufficient conditions are derived for such a linear transformation to exist, along with an explicit change of variables which achieves the desired decoupling. For the systems for which this step is applicable, the method of adiabatic elimination is applied to determine a representation of the slow dynamics. Theoretical concepts and results are illustrated with simple examples.  相似文献   
29.
Flash memory efficient LTL model checking   总被引:1,自引:0,他引:1  
As the capacity and speed of flash memories in form of solid state disks grow, they are becoming a practical alternative for standard magnetic drives. Currently, most solid-state disks are based on NAND technology and much faster than magnetic disks in random reads, while in random writes they are generally not.So far, large-scale LTL model checking algorithms have been designed to employ external memory optimized for magnetic disks. We propose algorithms optimized for flash memory access. In contrast to approaches relying on the delayed detection of duplicate states, in this work, we design and exploit appropriate hash functions to re-invent immediate duplicate detection.For flash memory efficient on-the-fly LTL model checking, which aims at finding any counter-example to the specified LTL property, we study hash functions adapted to the two-level hierarchy of RAM and flash memory. For flash memory efficient off-line LTL model checking, which aims at generating a minimal counterexample and scans the entire state space at least once, we analyze the effect of outsourcing a memory-based perfect hash function from RAM to flash memory.Since the characteristics of flash memories are different to magnetic hard disks, the existing I/O complexity model is no longer sufficient. Therefore, we provide an extended model for the computation of the I/O complexity adapted to flash memories that has a better fit to the observed behavior of our algorithms.  相似文献   
30.
论文介绍了文本分类技术的研究进展及发展方向,给出了中英文文本分类系统构建的一般模型和过程,分析总结了中英文文本分类过程中的异同,并介绍了针对这些异同因素常用的处理方法。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号