首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   34826篇
  免费   2867篇
  国内免费   1365篇
工业技术   39058篇
  2024年   119篇
  2023年   571篇
  2022年   816篇
  2021年   1409篇
  2020年   1068篇
  2019年   888篇
  2018年   1061篇
  2017年   1159篇
  2016年   982篇
  2015年   1303篇
  2014年   1663篇
  2013年   2064篇
  2012年   2177篇
  2011年   2423篇
  2010年   2072篇
  2009年   1881篇
  2008年   1818篇
  2007年   1697篇
  2006年   1870篇
  2005年   1694篇
  2004年   1146篇
  2003年   967篇
  2002年   896篇
  2001年   762篇
  2000年   888篇
  1999年   1030篇
  1998年   795篇
  1997年   714篇
  1996年   694篇
  1995年   558篇
  1994年   458篇
  1993年   347篇
  1992年   262篇
  1991年   191篇
  1990年   145篇
  1989年   127篇
  1988年   109篇
  1987年   65篇
  1986年   48篇
  1985年   23篇
  1984年   16篇
  1983年   15篇
  1982年   30篇
  1981年   12篇
  1980年   11篇
  1979年   2篇
  1977年   6篇
  1976年   2篇
  1975年   1篇
  1951年   2篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
用于三维图像恢复的广义点扩展函数   总被引:3,自引:0,他引:3  
采用传统的摄像系统点扩展函数恢复三维图像,往往不能得到满意的结果。文中提出一种新的概念-广义点扩展函数,取代传统的摄像系统点扩展函数,用于三维图像恢复。首先给出广义点扩展函数的定义,它等于物体和场景到摄像系统的点扩展函数与摄像系统的点扩展函数的券积。然后给出物体和场景到摄像系统的点扩展函数估计。最后还给出采用广义点扩展函数恢复三维图像的实验结果。实验结果表明,采用广义点扩展函数恢复三维图像,比采用  相似文献   
992.
基于虚拟模糊集的PID参数整定器的仿真研究   总被引:1,自引:0,他引:1  
该文中给出的模糊整定器是在虚拟模糊集概念的基础上实现的。该方法首先根据Z-N整规则,按照过程的开环阶跃响应设置初始参数,然后基于闭环控制系统的响应特性,利用模糊系统精确整定控制器参数。模糊控制规则知识库由整定知识和专家经验规则构成。其中整定知识可通过对一典型过程的参数整定来自动提取。最后给出的数字仿真结果证明该方法的有效性。  相似文献   
993.
研究了以25-(硫代烷基烷氧基)-对叔丁基杯[4]芳烃自组装分子作为声表面波(SAW)化学传感器敏感膜材料的SAW双通道延迟线传感器对DMMP检测的敏感特性.实验结果表明杯芳烃-SAW传感器对DMMP有高的灵敏度、好的响应特性和重复性.  相似文献   
994.
本文设计与实现了局域网防火墙。首先阐述了防火墙的原理,然后分析防火墙系统总体设计,最后论述防火墙的设计与实现,并详述其具体实现的各个模块。  相似文献   
995.
本文简析了基于网络环境下新课程高中英语阅读教学实践研究的理论基础与必要性,运用任务型教学途径,从网络英语课堂教学与课外阅读教学两方面进行探索,并进行了效能与问题分析。  相似文献   
996.
以ARM9和嵌入式Linux为平台,采用光电码盘,解决了在ARM中无高速I/O外部脉冲计数寄存器情况下轮式移动机器人的速度检测问题,并利用积分分离的PID算法实现了速度调制。在嵌入式Linux操作系统中完成整个控制过程驱动的编写,并在测速和动态调速等关键实现上给出详细的介绍,最终实现智能机器人的闭环控制。  相似文献   
997.
Discrete surface Ricci flow   总被引:1,自引:0,他引:1  
This work introduces a unified framework for discrete surface Ricci flow algorithms, including spherical, Euclidean, and hyperbolic Ricci flows, which can design Riemannian metrics on surfaces with arbitrary topologies by user-defined Gaussian curvatures. Furthermore, the target metrics are conformal (angle-preserving) to the original metrics. A Ricci flow conformally deforms the Riemannian metric on a surface according to its induced curvature, such that the curvature evolves like a heat diffusion process. Eventually, the curvature becomes the user defined curvature. Discrete Ricci flow algorithms are based on a variational framework. Given a mesh, all possible metrics form a linear space, and all possible curvatures form a convex polytope. The Ricci energy is defined on the metric space, which reaches its minimum at the desired metric. The Ricci flow is the negative gradient flow of the Ricci energy. Furthermore, the Ricci energy can be optimized using Newton's method more efficiently. Discrete Ricci flow algorithms are rigorous and efficient. Our experimental results demonstrate the efficiency, accuracy and flexibility of the algorithms. They have the potential for a wide range of applications in graphics, geometric modeling, and medical imaging. We demonstrate their practical values by global surface parameterizations.  相似文献   
998.
There is a potential server bottleneck problem when the Kerberos model is applied in large-scale networks because the model uses centralized management. To enlarge its application scope, researchers must consider how to build a trust relation among those Kerberos servers located on different isolated domains, but have not provided a way to prevent the potential bottleneck that can occur with Kerberos servers. With the development of across-domain authentication techniques, the local server bottleneck problem has not been alleviated; in fact, it has become more serious.Adopting the rigorous binary tree code algorithm, we present an authentication model based on Kerberos. Compared with similar models, our model has several advantages. First, it overcomes the potential server bottleneck problem and can balance the load automatically. Second, it can process across-domain authentication and enlarge the authentication boundary. Finally, its authentication path is short, with no more than two Kerberos servers being involved when authenticating a user.  相似文献   
999.
In this paper, a parameterization approach is presented for structural shape and topology optimization of compliant mechanisms using a moving boundary representation. A level set model is developed to implicitly describe the structural boundary by embedding into a scalar function of higher dimension as zero level set. The compactly supported radial basis function of favorable smoothness and accuracy is used to interpolate the level set function. Thus, the temporal and spatial initial value problem is now converted into a time-separable parameterization problem. Accordingly, the more difficult shape and topology optimization of the Hamilton–Jacobi equation is then transferred into a relatively easy size optimization with the expansion coefficients as design variables. The design boundary is therefore advanced by applying the optimality criteria method to iteratively evaluate the size optimization so as to update the level set function in accordance with expansion coefficients of the interpolation. The optimization problem of the compliant mechanism is established by including both the mechanical efficiency as the objective function and the prescribed material usage as the constraint. The design sensitivity analysis is performed by utilizing the shape derivative. It is noted that the present method is not only capable of simultaneously addressing shape fidelity and topology changes with a smooth structural boundary but also able to avoid some of the unfavorable numerical issues such as the Courant–Friedrich–Levy condition, the velocity extension algorithm, and the reinitialization procedure in the conventional level set method. In particular, the present method can generate new holes inside the material domain, which makes the final design less insensitive to the initial guess. The compliant inverter is applied to demonstrate the availability of the present method in the framework of the implicit free boundary representation.  相似文献   
1000.
结合光电干扰武器系统的工作过程,对影响目标威胁评估的各种因素进行了分析,讨论了常用威胁评估方法的缺点和不足,提出了基于神经网络的空中目标的威胁估计算法,利用神经网络良好的自适应能力和自学习能力,通过样本数据训练,确定各个因素之间的非线性复杂关系,并通过示例介绍了目标威胁值的解算过程;与层次分析法进行了比较,结果表明,神经网络可以很好地逼近各个因素之间的权重关系,提高了空中目标威胁估计算法的准确性和适应性。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号