首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   41872篇
  免费   5583篇
  国内免费   3368篇
工业技术   50823篇
  2024年   143篇
  2023年   531篇
  2022年   1035篇
  2021年   1206篇
  2020年   1524篇
  2019年   1435篇
  2018年   1259篇
  2017年   1667篇
  2016年   1854篇
  2015年   1948篇
  2014年   2603篇
  2013年   3057篇
  2012年   3039篇
  2011年   3173篇
  2010年   2355篇
  2009年   2485篇
  2008年   2380篇
  2007年   2806篇
  2006年   2590篇
  2005年   2150篇
  2004年   1773篇
  2003年   1656篇
  2002年   1434篇
  2001年   1224篇
  2000年   1049篇
  1999年   807篇
  1998年   622篇
  1997年   560篇
  1996年   423篇
  1995年   352篇
  1994年   307篇
  1993年   249篇
  1992年   171篇
  1991年   160篇
  1990年   119篇
  1989年   100篇
  1988年   65篇
  1987年   70篇
  1986年   48篇
  1985年   58篇
  1984年   41篇
  1983年   30篇
  1982年   33篇
  1981年   30篇
  1980年   26篇
  1979年   23篇
  1978年   12篇
  1964年   12篇
  1956年   12篇
  1955年   11篇
排序方式: 共有10000条查询结果,搜索用时 93 毫秒
991.
针对IEBLP模型中客体安全等级在整个寿命周期中固定不变的不足,提出了一种添加了时间限制元素的TBLP模型,主要在主客体安全标签中加入了时间限制元素,并对其安全公理进行了相对应的改进.最后,利用XACML实现了TBLP模型对XML文档的强制访问控制.  相似文献   
992.
From the perspective of data security, which has always been an important aspect of quality of service, cloud computing focuses a new challenging security threats. Therefore, a data security model must solve the most challenges of cloud computing security. The proposed data security model provides a single default gateway as a platform. It used to secure sensitive user data across multiple public and private cloud applications, including Salesforce, Chatter, Gmail, and Amazon Web Services, without influencing functionality or performance. Default gateway platform encrypts sensitive data automatically in a real time before sending to the cloud storage without breaking cloud application. It did not effect on user functionality and visibility. If an unauthorized person gets data from cloud storage, he only sees encrypted data. If authorized person accesses successfully in his cloud, the data is decrypted in real time for your use. The default gateway platform must contain strong and fast encryption algorithm, file integrity, malware detection, firewall, tokenization and more. This paper interested about authentication, stronger and faster encryption algorithm, and file integrity.  相似文献   
993.
This article considers stabilization of a one‐dimensional Schrödinger equation with variable coefficient and boundary observation which suffers from an arbitrary given time delay. We design an observer and predictor to stabilize the system. The state is estimated in the time span where the observation is available, and also predicted in the time interval where the observation is not available. It is shown that the estimated state feedback stabilizes the system exponentially. A numerical simulation is presented to illustrate the effect of the stabilizing controller.  相似文献   
994.
Consensus analysis and design problems of high‐dimensional discrete‐time swarm systems in directed networks with time delays and uncertainties are dealt with by using output information. Two subspaces are introduced, namely a consensus subspace and a complement consensus subspace. By projecting the state of a swarm system onto the two subspaces, a necessary and sufficient condition for consensus is presented, and based on different influences of time delays and uncertainties, an explicit expression of the consensus function is given which is very important in applications of swarm systems. A method to determine gain matrices of consensus protocols is proposed. Numerical simulations are presented to demonstrate theoretical results.  相似文献   
995.
It is well known that many industrial manipulators use an embedded linear proportional‐integral (PI) joint velocity controller to guarantee motion control through proper velocity commands. However, although this control scheme has been very successful in practice, not much attention has been paid to designing new PI velocity control structures. The problem of analyzing a saturated PI velocity joint velocity controller is addressed in this paper. By using the theory of singularly perturbed systems, the closed‐loop system is studied. The robot dynamics assumed in this paper take into account bounded time–varying disturbances which may include the friction at the joints. An experimental study in a planar two degrees‐of‐freedom direct‐drive robot is also presented, confirming the advantage of the new saturated PI joint velocity controller.  相似文献   
996.
This paper mainly studies the notions of detectability and observability for discrete‐time stochastic Markov jump systems with state‐dependent noise. Two concepts, called “W‐detectability” and “W‐observability,” for such systems are introduced, and are shown to coincide with the other concepts on detectability and observability reported recently in literature. Moreover, some criteria and interesting properties for both W‐detectability and W‐observability are obtained.  相似文献   
997.
In the present paper we obtain an explicit closed‐form solution for the discrete‐time algebraic Riccati equation (DTARE) with vanishing state weight, whenever the unstable eigenvalues are distinct. We discuss links to current algorithmic solutions and observe that the AREs in such a class solve on one hand the infimal signal‐to‐noise ratio (SNR) problem, whilst on the other hand, in their dual form they solve a Kalman filter problem. We then extend the main result to an example case of the optimal linear quadratic regulator gain. We relax some of the assumptions behind the main result and conclude with possible future directions for the present work.  相似文献   
998.
In this paper, the consensus problem is investigated via bounded controls for the multi‐agent systems with or without communication. Based on the nested saturation method, the saturated control laws are designed to solve the consensus problem. Under the designed saturated control laws, the transient performance of the closed‐loop system can be improved by tuning the saturation level. First of all, asymptotical consensus algorithms with bounded control inputs are proposed for the multi‐agent systems with or without communication delays. Under these consensus algorithms, the states’ consensus can be achieved asymptotically. Then, based on a kind of novel nonlinear saturation functions, bounded finite‐time consensus algorithms are further developed. It is shown that the states’ consensus can be achieved in finite time. Finally, two examples are given to verify the efficiency of the proposed methods.  相似文献   
999.
The problem of quantized H control for networked control systems (NCSs) subject to time‐varying delay and multiple packet dropouts is investigated in this paper. Both the control input and the measurement output signals are quantized before being transmitted and the quantized errors are described as sector bound uncertainties. The measurement channel and the control channel packet dropouts are considered simultaneously, and the stochastic variables satisfying Bernoulli random binary distribution are utilized to model the random multiple packet dropouts. Sufficient conditions for the existence of an observer‐based controller are established to ensure the exponential mean‐square stablility of the closed‐loop system and achieve the optimal H disturbance attenuation level. By using a globally convergent algorithm involving convex optimization, the nonconvex feasibility can be solved successfully. Finally, a numerical example is given to illustrate the effectiveness and applicability of the proposed method.  相似文献   
1000.
根据实际工作需要,为克服采用传统手段利用上下游洪峰水位相关图法来进行洪水预报所带来的不精确性和任意性,笔者利用数学函数方程和回归分析计算软件,使用excel的图形功能,先绘制样本数据散点图,然后在图上添加趋势线,确定了回归方程类型。根据回归方程类型进行了方程系数率定分析,最终推求出预报黑龙江乌云站洪峰水位和洪峰传播时间的数学回归方程,经实例拟合验证,方程计算结果通过检验,基本满足实际应用要求。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号