首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2182篇
  免费   150篇
  国内免费   26篇
电工技术   30篇
综合类   14篇
化学工业   452篇
金属工艺   40篇
机械仪表   80篇
建筑科学   88篇
矿业工程   4篇
能源动力   164篇
轻工业   241篇
水利工程   51篇
石油天然气   33篇
武器工业   2篇
无线电   233篇
一般工业技术   489篇
冶金工业   107篇
原子能技术   12篇
自动化技术   318篇
  2024年   6篇
  2023年   52篇
  2022年   85篇
  2021年   170篇
  2020年   116篇
  2019年   142篇
  2018年   158篇
  2017年   115篇
  2016年   134篇
  2015年   76篇
  2014年   115篇
  2013年   186篇
  2012年   110篇
  2011年   163篇
  2010年   109篇
  2009年   96篇
  2008年   93篇
  2007年   69篇
  2006年   53篇
  2005年   33篇
  2004年   26篇
  2003年   27篇
  2002年   19篇
  2001年   21篇
  2000年   14篇
  1999年   10篇
  1998年   20篇
  1997年   16篇
  1996年   12篇
  1995年   15篇
  1994年   10篇
  1993年   5篇
  1992年   6篇
  1991年   3篇
  1990年   5篇
  1989年   6篇
  1988年   5篇
  1987年   5篇
  1986年   11篇
  1985年   7篇
  1984年   7篇
  1983年   2篇
  1982年   3篇
  1981年   3篇
  1980年   4篇
  1979年   2篇
  1978年   2篇
  1974年   2篇
  1973年   2篇
  1972年   2篇
排序方式: 共有2358条查询结果,搜索用时 15 毫秒
31.
In this research, a novel extension of the passivity‐based output feedback trajectory tracking controller is developed for internally damped Euler‐Lagrange systems with input saturation. Compared with the previous output feedback controllers, this new design of a combined adaptive controller‐observer system will reduce the risk of actuator saturation effectively via generalized saturation functions. Semi‐global uniform ultimate boundedness stability of the tracking errors and state estimation errors is guaranteed by Lyapunov stability analysis. An application of the proposed saturated output feedback controller is the stabilization of a nonholonomic wheeled mobile robot with saturated actuators towards desired trajectories. Simulation results are provided to illustrate the efficiency of the proposed controller in dealing with the actuator saturation.  相似文献   
32.
This paper deals with the problem of forbidden states in safe Petri nets to obtain a maximally permissive controller. To prevent the system from entering the forbidden states, assigning some constraints to them is possible. The constraints can be enforced on the system using control places. When the number of forbidden states is large, a large number of constraints should be assigned to them. This results in a large number of control places being added to the model of the system, which causes a complicated model. Some methods have been proposed to reduce the number of constraints. Nevertheless, they do not always give the best results. In this paper, two ideas are offered to reduce the number of constraints, giving a more simplified controller.  相似文献   
33.
Many software systems would significantly improve performance if they could adapt to the emotional state of the user, for example if Intelligent Tutoring Systems (ITSs), ATM’s, ticketing machines could recognise when users were confused, frustrated or angry they could guide the user back to remedial help systems so improving the service. Many researchers now feel strongly that ITSs would be significantly enhanced if computers could adapt to the emotions of students. This idea has spawned the developing field of affective tutoring systems (ATSs): ATSs are ITSs that are able to adapt to the affective state of students. The term “affective tutoring system” can be traced back as far as Rosalind Picard’s book Affective Computing in 1997.This paper presents research leading to the development of Easy with Eve, an ATS for primary school mathematics. The system utilises a network of computer systems, mainly embedded devices to detect student emotion and other significant bio-signals. It will then adapt to students and displays emotion via a lifelike agent called Eve. Eve’s tutoring adaptations are guided by a case-based method for adapting to student states; this method uses data that was generated by an observational study of human tutors. This paper presents the observational study, the case-based method, the ATS itself and its implementation on a distributed computer systems for real-time performance, and finally the implications of the findings for Human Computer Interaction in general and e-learning in particular. Web-based applications of the technology developed in this research are discussed throughout the paper.  相似文献   
34.
Detection and classification of road signs in natural environments   总被引:5,自引:2,他引:3  
An automatic road sign recognition system first locates road signs within images captured by an imaging sensor on-board of a vehicle, and then identifies the detected road signs. This paper presents an automatic neural-network-based road sign recognition system. First, a study of the existing road sign recognition research is presented. In this study, the issues associated with automatic road sign recognition are described, the existing methods developed to tackle the road sign recognition problem are reviewed, and a comparison of the features of these methods is given. Second, the developed road sign recognition system is described. The system is capable of analysing live colour road scene images, detecting multiple road signs within each image, and classifying the type of road signs detected. The system consists of two modules: detection and classification. The detection module segments the input image in the hue-saturation-intensity colour space, and then detects road signs using a Multi-layer Perceptron neural-network. The classification module determines the type of detected road signs using a series of one to one architectural Multi-layer Perceptron neural networks. Two sets of classifiers are trained using the Resillient-Backpropagation and Scaled-Conjugate-Gradient algorithms. The two modules of the system are evaluated individually first. Then the system is tested as a whole. The experimental results demonstrate that the system is capable of achieving an average recognition hit-rate of 95.96% using the scaled-conjugate-gradient trained classifiers.  相似文献   
35.
当前处理器由于较高的能量消耗,导致处理器热量散发的提高及系统可靠性的降低,同时任务实际运行中的错误也降低了系统的可靠性.因此同时满足节能性及容错性已经成为目前计算机领域较为关心的问题.提出的调度算法针对实时多处理器计算环境,以执行时间最短的任务优先调度为基础,结合其他有效技术(共享空闲时间回收及检查点技术),使得实时任务在其截止期内完成的同时,能够动态地降低整个系统的能量消耗及动态容错.针对独立任务集及具有依赖关系的任务集,提出两种算法:STFBA1及STFBA2(shortest task first based algorithm).通过实验与目前所知的有效算法相比,算法具有更好的性能(调度长度及能量消耗)及较低的通信时间复杂度.  相似文献   
36.
Base station's location privacy in a wireless sensor network (WSN) is critical for information security and operational availability of the network. A key part of securing the base station from potential compromise is to secure the information about its physical location. This paper proposes a technique called base station location privacy via software-defined networking (SDN) in wireless sensor networks (BSLPSDN). The inspiration comes from the architecture of SDN, where the control plane is separated from the data plane, and where control plane decides the policy for the data plane. BSLPSDN uses three categories of nodes, namely, a main controller to instruct the overall operations, a dedicated node to buffer and forward data, and lastly, a common node to sense and forward the packet. We employ three kinds of nodes to collaborate and achieve stealth for the base station and thus protecting it against the traffic-analysis attacks. Different traits of the WSN including energy status and traffic density can actively be monitored by BSLPSDN, which positively affects the energy goals, expected life of the network, load on common nodes, and the possibility of creating diversion in the wake of an attack on the base station. We incorporated multiple experiments to analyze and evaluate the performance of our proposed algorithm. We use single controller with multiple sensor nodes and multiple controllers with multiple sensor nodes to show the level of anonymity of BS. Experiments show that providing BS anonymity via multiple controllers is the best method both in terms of energy and privacy.  相似文献   
37.
Wireless Networks - Orthogonal frequency division multiplexing (OFDM) has been investigated for the high-speed transmission of data in radio frequency and optical wireless communications. The OFDM...  相似文献   
38.

Software design patterns are well-known solutions for solving commonly occurring problems in software design. Detecting design patterns used in the code can help to understand the structure and behavior of the software, evaluate the quality of the software, and trace important design decisions. To develop and maintain a software system, we need sufficient knowledge of design decisions and software implementation processes. However, the acquisition of knowledge related to design patterns used in complex software systems is a challenging, time-consuming, and costly task. Therefore, using a suitable method to detect the design patterns used in the code reduces software development and maintenance costs. In this paper, we proposed a new method based on conceptual signatures to improve the accuracy of design pattern detection. So we used the conceptual signatures based on the purpose of patterns to detect the patterns’ instances that conform to the standard structure of patterns, and cover more instances of patterns’ variants and implementation versions of the patterns and improve the accuracy of pattern detection. The proposed method is a specific process in two main phases. In the first phase, the conceptual signature and detection formula for each pattern is determined manually. Then in the second phase, each pattern in the code is detected in a semi-automatic process using the conceptual signature and pattern detection formula. To implement the proposed method, we focused on GoF design patterns and their variants. We evaluated the accuracy of our proposed method on five open-source projects, namely, Junit v3.7, JHotDraw v5.1, QuickUML 2001, JRefactory v2.6.24, and MapperXML v1.9.7. Also, we performed our experiments on a set of source codes containing the instances of GoF design patterns’ variants for a comprehensive and fair evaluation. The evaluation results indicate that the proposed method has improved the accuracy of design pattern detection in the code.

  相似文献   
39.

The world has been challenged since late 2019 by COVID-19. Higher education institutions have faced various challenges in adapting online education to control the pandemic spread of COVID-19. The present study aims to conduct a survey study through the interview and scrutinizing the literature to find the key challenges. Subsequently, an integrated MCDM framework, including Stepwise Weight Assessment Ratio Analysis (SWARA) and Multiple Objective Optimization based on Ratio Analysis plus Full Multiplicative Form (MULTIMOORA), is developed. The SWARA procedure is applied to the analysis and assesses the challenges to adapt the online education during the COVID-19 outbreak, and the MULTIMOORA approach is utilized to rank the higher education institutions on hesitant fuzzy sets. Further, an illustrative case study is considered to express the proposed idea's feasibility and efficacy in real-world decision-making. Finally, the obtained result is compared with other existing approaches, confirming the proposed framework's strength and steadiness. The identified challenges were systemic, pedagogical, and psychological challenges, while the analysis results found that the pedagogical challenges, including the lack of experience and student engagement, were the main essential challenges to adapting online education in higher education institutions during the COVID-19 outbreak.

  相似文献   
40.
Neural Computing and Applications - Progress is being made to deploy convolutional neural networks (CNNs) into the Internet of Things (IoT) edge devices for handling image analysis tasks locally....  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号