首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   428272篇
  免费   44219篇
  国内免费   36973篇
电工技术   59387篇
技术理论   32篇
综合类   39598篇
化学工业   50966篇
金属工艺   15984篇
机械仪表   32854篇
建筑科学   28089篇
矿业工程   11640篇
能源动力   14576篇
轻工业   19478篇
水利工程   9146篇
石油天然气   11444篇
武器工业   5901篇
无线电   56375篇
一般工业技术   34443篇
冶金工业   11315篇
原子能技术   5558篇
自动化技术   102678篇
  2024年   1924篇
  2023年   5838篇
  2022年   10751篇
  2021年   12913篇
  2020年   13125篇
  2019年   10780篇
  2018年   10067篇
  2017年   13702篇
  2016年   15385篇
  2015年   17720篇
  2014年   24648篇
  2013年   25405篇
  2012年   32145篇
  2011年   34797篇
  2010年   25842篇
  2009年   25783篇
  2008年   26848篇
  2007年   32163篇
  2006年   29567篇
  2005年   25838篇
  2004年   21486篇
  2003年   18245篇
  2002年   13951篇
  2001年   11371篇
  2000年   9429篇
  1999年   7775篇
  1998年   6056篇
  1997年   4924篇
  1996年   4155篇
  1995年   3486篇
  1994年   2977篇
  1993年   2105篇
  1992年   1742篇
  1991年   1321篇
  1990年   1093篇
  1989年   884篇
  1988年   627篇
  1987年   371篇
  1986年   292篇
  1985年   359篇
  1984年   313篇
  1983年   238篇
  1982年   279篇
  1981年   160篇
  1980年   150篇
  1979年   70篇
  1978年   52篇
  1977年   53篇
  1976年   40篇
  1959年   38篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
1.
针对现有混合入侵检测模型仅定性选取特征而导致检测精度较低的问题,同时为了充分结合误用检测模型和异常检测模型的优势,提出一种采用信息增益率的混合入侵检测模型.首先,利用信息增益率定量地选择特征子集,最大程度地保留样本信息;其次,采用余弦时变粒子群算法确定支持向量机参数构建误用检测模型,使其更好地平衡粒子在全局和局部的搜索能力,然后,选取灰狼算法确定单类支持向量机参数构建异常检测模型,以此来提高对最优参数的搜索效率和精细程度,综合提高混合入侵检测模型对攻击的检测效果;最后,通过两种数据集进行仿真实验,验证了所提混合入侵检测模型具有较好的检测性能.  相似文献   
2.
针对传统的小区内开环功率控制算法通常以提升本小区的吞吐量性能为目标,忽略了当前小区用户对邻小区用户同频干扰的问题,为提升边缘用户性能的同时兼顾系统整体性能,提出了一种LTE系统小区间上行联合功率控制(UJPC)算法。该算法采用单基站三扇区为系统模型,以最优化系统吞吐量比例公平函数为目标,首先根据最小信干噪比(SINR)约束值和用户最大发射功率这两个约束条件得到相应的数学优化模型,然后采用连续凸近似的方法求解优化问题得出各个基站所管辖的小区内所有用户的最优发射功率。仿真结果表明,与基准的开环功控方案相比,联合功控方案在保证系统平均频谱利用率的情况下能够较大幅度地提高小区边缘频谱利用率,其最佳性能增益能达到50%。  相似文献   
3.
This paper introduces two novel nonlinear stochastic attitude estimators developed on the Special Orthogonal Group with the tracking error of the normalized Euclidean distance meeting predefined transient and steady‐state characteristics. The tracking error is confined to initially start within a predetermined large set such that the transient performance is guaranteed to obey dynamically reducing boundaries and decrease smoothly and asymptotically to the origin in probability from almost any initial condition. The proposed estimators produce accurate attitude estimates with remarkable convergence properties using measurements obtained from low‐cost inertial measurement units. The estimators proposed in continuous form are complemented by their discrete versions for the implementation purposes. The simulation results illustrate the effectiveness and robustness of the proposed estimators against uncertain measurements and large initialization error, whether in continuous or discrete form.  相似文献   
4.
分析了冶炼烟气制酸工艺的特点,介绍了由PROFIBUS-DP现场总线构建的冶炼厂烟气制酸监控系统,详细介绍了其硬件配置及相应的软件设计。  相似文献   
5.
提出了对暴露在任意外场中的传输线进行时频分析的新方法,这种方法非常稳定,它能够与任意的传输线模型和电路仿真方法兼容,并且使用这种方法得到的仿真值和实际值之间的差别小于1%。  相似文献   
6.
Frequency Insertion Strategy for Channel Assignment Problem   总被引:1,自引:0,他引:1  
This paper presents a new heuristic method for quickly finding a good feasible solution to the channel assignment problem (CAP). Like many other greedy-type heuristics for CAP, the proposed method also assigns a frequency to a call, one at a time. Hence, the method requires computational time that increases only linear to the number of calls. However, what distinguishes the method from others is that it starts with a narrow enough frequency band so as to provoke violations of constraints that we need to comply with in order to avoid radio interference. Each violation is then resolved by inserting frequencies at the most appropriate positions so that the band of frequencies expands minimally. An extensive computational experiment using a set of randomly generated problems as well as the Philadelphia benchmark instances shows that the proposed method perform statistically better than existing methods of its kind and even yields optimum solutions to most of Philadelphia benchmark instances among which two cases are reported for the first time ever, in this paper. Won-Young Shin was born in Busan, Korea in 1978. He received B.S. in industrial engineering from Pohang University of Science and Technology (POSTECH) in 2001 and M.S in operation research and applied statistics from POSTECH in 2003. Since 2003 he has been a researcher of Agency for Defense Development (ADD) in Korea. He is interested in optimization of communication system and applied statistics. Soo Y. Chang is an associate professor in the Department of Industrial Engineering at Pohang University of Science and Technology (POSTECH), Pohang, Korea. He teaches linear programming, discrete optimization, network flows and operations research courses. His research interests include mathematical programming and scheduling. He has published in several journals including Discrete Applied Mathematics, Computers and Mathematics with Application, IIE Transactions, International Journal of Production Research, and so on. He is a member of Korean IIE, and ORMSS. Jaewook Lee is an assistant professor in the Department of Industrial Engineering at Pohang University of Science and Technology (POSTECH), Pohang, Korea. He received the B.S. degree in mathematics with honors from Seoul National University, and the Ph.D. degree from Cornell University in applied mathematics in 1993 and 1999, respectively. He is currently an assistant professor in the department of industrial engineering at the Pohang University of Science and Technology (POSTECH). His research interests include nonlinear systems, neural networks, nonlinear optimization, and their applications to data mining and financial engineering. Chi-Hyuck Jun was born in Seoul, Korea in 1954. He received B.S. in mineral and petroleum engineering from Seoul National University in 1977, M.S. in industrial engineering from Korea Advanced Institute of Science and Technology in 1979 and Ph.D. in operations research from University of California, Berkeley, in 1986. Since 1987 he has been with the department of industrial engineering, Pohang University of Science and Technology (POSTECH) and he is now a professor and the department head. He is interested in performance analysis of communication and production systems. He has published in several journals including IIE Transactions, IEEE Transactions, Queueing Systems and Chemometrics and Intelligent Laboratory Systems. He is a member of IEEE, INFORMS and ASQ.  相似文献   
7.
稠油微生物开采技术现状及进展   总被引:2,自引:0,他引:2  
邓勇  易绍金 《油田化学》2006,23(3):289-292
综述了用微生物方法开采稠油的技术现状与进展,论题如下。①概述。②基本方法:异源微生物采油,包括微生物吞吐和微生物驱;本源微生物采油压大港孔店油田的实例。③主要机理,包括产表面活性剂,降解稠油中重质组分及其他。④技术研究,包括机理性、可行性及经济效益研究,列举了国内外6个实例。⑤现场应用,包括国外1个、国内6个实例。⑥该技术的优势及问题。参22。  相似文献   
8.
马钢二烧结配料计算机控制系统   总被引:1,自引:0,他引:1  
阐明了马钢二烧结配科计算机控制系统的目的、控制形式、控制原理;根据烧结配料控制对象的特点对信号采样和控制算法进行了探讨;提供了系统的主要硬件结构,软件功能和程序框图。  相似文献   
9.
指纹考勤管理软件的研究与实现   总被引:2,自引:0,他引:2  
齐金平  孟建军  蒋兆远 《信息技术》2003,27(10):70-72,76
针对企、事业单位原有的考勤系统,如打卡钟、磁卡、IC卡等考勤方式存在代打卡、卡丢失等不足和缺陷的实际,结合指纹识别技术,建立一套考勤、薪资、人事管理于一体的软件系统。给出了系统的体系结构和功能实现,能使企业考勤管理更加简便快捷、客观公正。并提出了进一步的发展方向和展望。  相似文献   
10.
In this article we consider the performance of the 3.84 Mcpstime-division duplex (TDD) mode of UTRA (Universal TerrestrialRadio Access) network. We emphasize two of the radio resourcemanagement algorithms, handover and uplink power control, whoserole in the overall system performance is studied extensively.First, a handover algorithm used in WCDMA (Wideband Code DivisionMultiple Access) standard is considered in a TDD-mode operation.This gives rise to a careful setting of different handoverparameters, and the evaluation of the effects to the systemperformance. Secondly, the specified uplink power controlalgorithm is considered. Since it is based on several user-mademeasurements which may involve both random and systematic errors acareful study about the suitability of the power control scheme iscarried out.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号