首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   65582篇
  免费   18727篇
  国内免费   389篇
电工技术   3381篇
综合类   880篇
化学工业   22316篇
金属工艺   836篇
机械仪表   2293篇
建筑科学   2895篇
矿业工程   168篇
能源动力   1861篇
轻工业   7667篇
水利工程   469篇
石油天然气   194篇
武器工业   91篇
无线电   11960篇
一般工业技术   17670篇
冶金工业   1816篇
原子能技术   72篇
自动化技术   10129篇
  2024年   23篇
  2023年   73篇
  2022年   137篇
  2021年   544篇
  2020年   2965篇
  2019年   5584篇
  2018年   5090篇
  2017年   5697篇
  2016年   5526篇
  2015年   5437篇
  2014年   5602篇
  2013年   5788篇
  2012年   5126篇
  2011年   4732篇
  2010年   3883篇
  2009年   3423篇
  2008年   3439篇
  2007年   3247篇
  2006年   3056篇
  2005年   2542篇
  2004年   2307篇
  2003年   2322篇
  2002年   2239篇
  2001年   1934篇
  2000年   1679篇
  1999年   1040篇
  1998年   191篇
  1997年   213篇
  1996年   143篇
  1995年   111篇
  1994年   73篇
  1993年   75篇
  1992年   47篇
  1991年   43篇
  1990年   27篇
  1989年   30篇
  1988年   17篇
  1987年   12篇
  1986年   16篇
  1985年   27篇
  1984年   32篇
  1983年   31篇
  1982年   17篇
  1964年   23篇
  1961年   19篇
  1959年   9篇
  1958年   8篇
  1957年   8篇
  1956年   10篇
  1955年   13篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
991.
An accurate impedance matrix interpolation technique based on the surface integral equation (SIE) is presented for the analysis of wireless communication antennas over wide frequency bands. The first‐order derivative of the impedance matrix at the internal frequency is considered in the cubic polynomial‐based interpolation scheme, thus the novel impedance matrix interpolation scheme will provide high accuracy and high efficiency over a frequency band. To demonstrate the efficiency and accuracy of the proposed method, numerical results for planar inverted F antennas (PIFA) and a wideband E‐shaped patch antenna are presented. Good agreement among the interpolation results, exact MoM solutions, finite element method (FEM) solutions, and measured data is observed over the bandwidth. Besides, dimensions of the feeding probe are also studied to investigate their effect on the input impedance and radiation patterns. © 2010 Wiley Periodicals, Inc. Int J RF and Microwave CAE, 2010.  相似文献   
992.
In this article, a novel method has been proposed to optimize the electromagnetic shielding rooms. This method is based on using minimum electromagnetic absorbing materials on the inner surface of the rooms. The positions of the absorbing materials are found optimally to produce a “best” performance for the shielding rooms. The ray‐tracing method is used to predict the shielding effectiveness (SE) of the electromagnetic shielding rooms with apertures. The performance of the proposed method is verified by a comprehensive example. © 2009 Wiley Periodicals, Inc. Int J RF and Microwave CAE 2010.  相似文献   
993.
A modified design approach for compact ultra‐wideband microstrip filters with cascaded/folded stepped‐impedance resonators is described. The key feature of the proposed method is to facilitate stronger coupling between stepped‐impedance resonators and, at the same time, eliminate the requirement of extremely small gaps in coupled‐line sections, as found in traditional designs. Simulations and measurements demonstrate that the filters designed with this technique exhibit good reflection, insertion‐loss, and group‐delay performance within the 3.1–10.6 GHz band. © 2009 Wiley Periodicals, Inc. Int J RF and Microwave CAE 2010.  相似文献   
994.
This paper presents a novel observer‐based controller design method for discrete‐time piecewise affine (PWA) systems. The basic idea is as follows: at first, a piecewise linear (without affine terms) state feedback controller and a PWA observer are designed separately, and then it is proved that the output feedback controller constructed by the resulting observer and state feedback controller gains can guarantee the stability of the closed‐loop system. During the controller design, the piecewise‐quadratic Lyapunov function technique is used. Moreover, the region information is taken into account to treat the affine terms, so the controller gains can be obtained by solving a set of linear matrix inequalities, which are numerically feasible with commercially available software. Three simulation examples are given finally to verify the proposed theoretical results. Copyright © 2010 John Wiley and Sons Asia Pte Ltd and Chinese Automatic Control Society  相似文献   
995.
针对现有钢丝绳检测系统实时性与适应性差、自动化程度低的问题,提出了一种基于ARM-Linux的高性能钢丝绳损伤检测系统的设计方案,详细介绍了该系统的硬件组成、工作原理、软件实现方法及实时采样曲线绘制的设计与实现。该系统结合嵌入式Linux技术和漏磁无损检测技术,可独立完成检测任务,实时显示检测波形,提高了检测效率。  相似文献   
996.
Kinematics, pattern recognition, and motion control methods are investigated as an integrated approach for a mask-panel visual alignment system, which consists of the vision system to extract the mask-panel misalignment and the stage control system to compensate for it. First, a 4PPR alignment mechanism is considered and the inverse kinematic solution is found out to define the relationship between the mask-panel misalignment and the displacements of active joints. Then, a fast alignment mark recognition algorithm is proposed in terms of the geometric template matching (GTM), which is specific to simply shaped patterns but computationally much efficient compared with general correlation-based matchings. Finally, the kinematic solution and the developed vision algorithm are incorporated to implement a two-stage position-based visual servo, where both original fine images and reduced coarse ones are utilized together and the GTM plays a crucial role in achieving a near real-time visual feedback. Experimental results are shown to demonstrate the effectiveness of the GTM-based two-stage alignment control.  相似文献   
997.
Interior gateway routing protocols like Open Shortest Path First (OSPF) and Distributed Exponentially Weighted Flow Splitting (DEFT) send flow through forward links toward the destination node. OSPF routes only on shortest‐weight paths, whereas DEFT sends flow on all forward links, but with an exponential penalty on longer paths. Finding suitable weights for these protocols is known as the weight setting problem (WSP). In this paper, we present a biased random‐key genetic algorithm for WSP using both protocols. The algorithm uses dynamic flow and dynamic shortest path computations. We report computational experiments that show that DEFT achieves less network congestion when compared with OSPF, while, however, yielding larger delays.  相似文献   
998.
The field of computer vision has experienced rapid growth over the past 50 years. Many computer vision problems have been solved using theory and ideas from algebraic projective geometry. In this paper, we look at a previously unsolved problem from object recognition, namely object recognition when the correspondences between the object and image data are not known a priori. We formulate this problem as a mixed‐integer non‐linear optimization problem in terms of the unknown projection relating the object and image, as well as the unknown assignments of object points and lines to those in the image. The global optimum of this problem recovers the relationship between the object points and lines with those in the image. When certain assumptions are enforced on the allowable projections mapping the object into the image, a proof is provided which permits one to solve the optimization problem via a simple decomposition. We illustrate this decomposition approach on some example scenarios.  相似文献   
999.
为了满足半潜船作业人员学习和培训的需要,有必要在航海模拟器大环境下研发半潜船操作模拟器仿真系统。以船舶静力学为基础,实现了半潜船装载重大件货物的过程的动态稳性计算,以Visual C++6.0和OpenGVS场景管理软件为开发平台,研制开发了半潜船操作模拟器应具备的视景系统。该仿真系统实现了视点的转移和跟踪,通过设置在半潜船的驾驶台、甲板及外部三个虚拟相机,实时动态显示半潜船各种运动的状态,同时实现了半潜船操作模拟器几个模块间的相互通信,取得了很好的效果。  相似文献   
1000.
Trust mechanisms are used in peer‐to‐peer (P2P) networks to help well‐behaving peers find other well‐behaving peers with which to trade. Unfortunately, these trust mechanisms often do little to keep badly behaving peers from entering and taking advantage of the network, which makes the resulting network difficult or impossible to use for legitimate purposes such as e‐commerce. We propose trust by association, a way of tying peers together in invitation‐only P2P networks in such a way as to encourage the removal of badly behaving peers. We use invitations to create a structure within the otherwise ad hoc P2P network. Using this structure, we create a meta‐reputation system where we measure a peer’s trustworthiness not only by its own behavior, but also by the behavior of the peers it has invited to join. The connection created between the peers takes advantage of the external social relationship that must exist before a peer can be invited into the network. The result is a P2P network where, rather than just trying to marginalize badly behaving peers, there is incentive to kick them out of the network. We present results from a simple simulation showing that our approach works well in general when combined with and compared to an existing trust mechanism.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号