首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2459篇
  免费   99篇
  国内免费   9篇
电工技术   26篇
综合类   9篇
化学工业   516篇
金属工艺   92篇
机械仪表   90篇
建筑科学   49篇
矿业工程   8篇
能源动力   167篇
轻工业   268篇
水利工程   18篇
石油天然气   5篇
无线电   195篇
一般工业技术   535篇
冶金工业   205篇
原子能技术   15篇
自动化技术   369篇
  2024年   7篇
  2023年   33篇
  2022年   100篇
  2021年   107篇
  2020年   82篇
  2019年   100篇
  2018年   110篇
  2017年   109篇
  2016年   104篇
  2015年   44篇
  2014年   107篇
  2013年   204篇
  2012年   116篇
  2011年   152篇
  2010年   120篇
  2009年   102篇
  2008年   93篇
  2007年   92篇
  2006年   57篇
  2005年   60篇
  2004年   42篇
  2003年   44篇
  2002年   48篇
  2001年   26篇
  2000年   28篇
  1999年   28篇
  1998年   41篇
  1997年   38篇
  1996年   32篇
  1995年   23篇
  1994年   22篇
  1993年   24篇
  1992年   15篇
  1991年   20篇
  1990年   20篇
  1989年   20篇
  1988年   19篇
  1987年   21篇
  1986年   14篇
  1985年   11篇
  1984年   9篇
  1983年   10篇
  1982年   7篇
  1981年   16篇
  1980年   14篇
  1979年   9篇
  1976年   16篇
  1974年   9篇
  1973年   10篇
  1969年   5篇
排序方式: 共有2567条查询结果,搜索用时 46 毫秒
41.
Number of software applications demands various levels of security at the time of scheduling in Computational Grid. Grid may offer these securities but may result in the performance degradation due to overhead in offering the desired security. Scheduling performance in a Grid is affected by the heterogeneities of security and computational power of resources. Customized Genetic Algorithms have been effectively used for solving complex optimization problems (NP Hard) and various heuristics have been suggested for solving Multi-objective optimization problems. In this paper a security driven, elitist non-dominated sorting genetic algorithm, Optimal Security with Optimal Overhead Scheduling (OSO2S), based on NSGA-II, is proposed. The model considers dual objectives of minimizing the security overhead and maximizing the total security achieved. Simulation results exhibit that the proposed algorithm delivers improved makespan and lesser security overhead in comparison to other such algorithms viz. MinMin, MaxMin, SPMinMin, SPMaxMin and SDSG.  相似文献   
42.
In this paper, an Adaptive Hierarchical Ant Colony Optimization (AHACO) has been proposed to resolve the traditional machine loading problem in Flexible Manufacturing Systems (FMS). Machine loading is one of the most important issues that is interlinked with the efficiency and utilization of FMS. The machine loading problem is formulated in order to minimize the system unbalance and maximize the throughput, considering the job sequencing, optional machines and technological constraints. The performance of proposed AHACO has been tested over a number of benchmark problems taken from the literature. Computational results indicate that the proposed algorithm is more effective and produces promising results as compared to the existing solution methodologies in the literature. The evaluation and comparison of system efficiency and system utilization justifies the supremacy of the algorithm. Further, results obtained from the proposed algorithm have been compared with well known random search algorithm viz. genetic algorithm, simulated annealing, artificial Immune system, simple ant colony optimization, tabu search etc. In addition, the algorithm has been tested over a randomly generated problem set of varying complexities; the results validate the robustness and scalability of the algorithm utilizing the concepts of ‘heuristic gap’ and ANOVA analysis.  相似文献   
43.
Model predictive control (MPC) schemes are now widely used in process industries for the control of key unit operations. Linear model predictive control (LMPC) schemes which make use of linear dynamic model for prediction, limit their applicability to a narrow range of operation (or) to systems which exhibit mildly nonlinear dynamics.

In this paper, a nonlinear observer based model predictive controller (NMPC) for nonlinear system has been proposed. An approach to design NMPC based on fuzzy Kalman filter (FKF) and augmented state fuzzy Kalman filter (ASFKF) has been presented. The efficacy of the proposed NMPC schemes have been demonstrated by conducting simulation studies on the continuous stirred tank reactor (CSTR). The analysis of the extensive dynamic simulation studies revealed that, the NMPC schemes formulated produces satisfactory performance for both servo and regulatory problems. Simulation results also include an inferential control case, where the reactor concentration is not measured but estimated from temperature measurement and used in the NMPC based on FKF and ASFKF formulations.  相似文献   

44.
To preserve client privacy in the data mining process, a variety of techniques based on random perturbation of individual data records have been proposed recently. In this paper, we present FRAPP, a generalized matrix-theoretic framework of random perturbation, which facilitates a systematic approach to the design of perturbation mechanisms for privacy-preserving mining. Specifically, FRAPP is used to demonstrate that (a) the prior techniques differ only in their choices for the perturbation matrix elements, and (b) a symmetric positive-definite perturbation matrix with minimal condition number can be identified, substantially enhancing the accuracy even under strict privacy requirements. We also propose a novel perturbation mechanism wherein the matrix elements are themselves characterized as random variables, and demonstrate that this feature provides significant improvements in privacy at only a marginal reduction in accuracy. The quantitative utility of FRAPP, which is a general-purpose random-perturbation-based privacy-preserving mining technique, is evaluated specifically with regard to association and classification rule mining on a variety of real datasets. Our experimental results indicate that, for a given privacy requirement, either substantially lower modeling errors are incurred as compared to the prior techniques, or the errors are comparable to those of direct mining on the true database. A partial and preliminary version of this paper appeared in the Proc. of the 21st IEEE Intl. Conf. on Data Engineering (ICDE), Tokyo, Japan, 2005, pgs. 193–204.  相似文献   
45.
Configuring and enhancing measurement systems for damage identification   总被引:2,自引:0,他引:2  
Engineers often decide to measure structures upon signs of damage to determine its extent and its location. Measurement locations, sensor types and numbers of sensors are selected based on judgment and experience. Rational and systematic methods for evaluating structural performance can help make better decisions. This paper proposes strategies for supporting two measurement tasks related to structural health monitoring - (1) installing an initial measurement system and (2) enhancing measurement systems for subsequent measurements once data interpretation has occurred. The strategies are based on previous research into system identification using multiple models. A global optimization approach is used to design the initial measurement system. Then a greedy strategy is used to select measurement locations with maximum entropy among candidate model predictions. Two bridges are used to illustrate the proposed methodology. First, a railway truss bridge in Zangenberg, Germany, is examined. For illustration purposes, the model space is reduced by assuming only a few types of possible damage in the truss bridge. The approach is then applied to the Schwandbach bridge in Switzerland, where a broad set of damage scenarios is evaluated. For the truss bridge, the approach correctly identifies the damage that represents the behaviour of the structure. For the Schwandbach bridge, the approach is able to significantly reduce the number of candidate models. Values of candidate model parameters are also useful for planning inspection and eventual repair.  相似文献   
46.

Wireless communication networks have much data to sense, process, and transmit. It tends to develop a security mechanism to care for these needs for such modern-day systems. An intrusion detection system (IDS) is a solution that has recently gained the researcher’s attention with the application of deep learning techniques in IDS. In this paper, we propose an IDS model that uses a deep learning algorithm, conditional generative adversarial network (CGAN), enabling unsupervised learning in the model and adding an eXtreme gradient boosting (XGBoost) classifier for faster comparison and visualization of results. The proposed method can reduce the need to deploy extra sensors to generate fake data to fool the intruder 1.2–2.6%, as the proposed system generates this fake data. The parameters were selected to give optimal results to our model without significant alterations and complications. The model learns from its dataset samples with the multiple-layer network for a refined training process. We aimed that the proposed model could improve the accuracy and thus, decrease the false detection rate and obtain good precision in the cases of both the datasets, NSL-KDD and the CICIDS2017, which can be used as a detector for cyber intrusions. The false alarm rate of the proposed model decreases by about 1.827%.

  相似文献   
47.
Wireless Personal Communications - Scheduling in computing environments such as homogeneous and heterogonous is very challenging and faces various difficulties computationally. This computing needs...  相似文献   
48.
Microsystem Technologies - In this paper synthesis of two wideband Metamaterial Cross Polarizer (MCPs) is proposed. The synthesis of proposed MCPs is done by using Binary Wind Driven Optimization...  相似文献   
49.
The present research is the first type of study in which the application of powder mixed electrical discharge machining (PMEDM) for the machining of β-phase titanium (β-Ti) alloy has been proposed. β-Ti alloys are new range of titanium alloys, which has a wide-spread application in dental, orthopedics, shape memory, and stents. The aim of the present study is to fabricate submicro- and nanoscale topography by PMEDM process to enhance the biocompatibility without affecting machining efficiency. The effect of Si powder concentration along with pulse current and duration on the surface and machining characteristics has been investigated. A significant decrease in surface crack density on the machined surface with 4 g/l Si powder concentration was observed. When β-Ti alloy was modified at 15 A pulse current, longer pulse interval with 8 g/l concentration of Si powder particles, the interconnected surface porosities with pore size 200–500 nm was observed. Moreover, at Si powder concentrations of 2 g/l and 4 g/l, the recast layer thickness is 8 µm and 2–3 µm, respectively. Elemental mapping analysis confirmed that PMEDM also generated carbides and oxides enriched surface, a favorable surface chemistry to enhance the biocompatibility of β-Ti alloy. Furthermore, PMEDM also enhances the machining performance by improving material removal rate and reducing tool wear rate.  相似文献   
50.
This article explains production of nickel nanoparticles through a micro-electrical discharge machining (EDM) process with a combination of different process parameters. The production of nickel nanoparticles was carried out in a dielectric medium (deionized water) with developed micro-EDM while polyvinyl alcohol worked as the stabilizing agent. The characterization of nickel nanoparticle was done by scanning electron microscope (SEM), Energy-dispersive X-ray spectroscopy (EDS), X-ray diffraction (XRD), UV–Vis spectroscopy, and Fourier transform infrared (FTIR) analysis. From this investigation, the mean crystal size of the nickel nanoparticles was found to be in the range of 15–20?mm for a pulse-on time variation of 2–0.3?µs and the crystal size was found to decrease with the decrease of pulse-on time. It was also observed that with this decrease, the shape and size of nickel nanoparticles change from spherical to needle-like. The dispersion stability of nickel nanofluid was determined by viscosity measurements and the dynamic viscosity was noted to decrease by decreasing the pulse duration. From the FTIR spectrum results, it was confirmed that the synthesized nickel nanoparticles in deionized water were pure and monolithic. UV–Vis–NIR spectroscopy depicted that the band gap energy increases with a reduction in the pulse-on time and obtains a higher band gap (5.31?eV) for 0.3?µs pulse-on time.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号