首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   730篇
  免费   56篇
电工技术   11篇
化学工业   134篇
金属工艺   2篇
机械仪表   7篇
建筑科学   28篇
矿业工程   1篇
能源动力   3篇
轻工业   108篇
水利工程   1篇
石油天然气   1篇
无线电   67篇
一般工业技术   137篇
冶金工业   39篇
原子能技术   1篇
自动化技术   246篇
  2024年   2篇
  2023年   6篇
  2022年   3篇
  2021年   24篇
  2020年   10篇
  2019年   24篇
  2018年   20篇
  2017年   26篇
  2016年   31篇
  2015年   26篇
  2014年   41篇
  2013年   63篇
  2012年   57篇
  2011年   66篇
  2010年   51篇
  2009年   62篇
  2008年   47篇
  2007年   42篇
  2006年   33篇
  2005年   23篇
  2004年   31篇
  2003年   26篇
  2002年   18篇
  2001年   11篇
  2000年   6篇
  1999年   3篇
  1998年   4篇
  1997年   5篇
  1996年   5篇
  1995年   4篇
  1994年   5篇
  1993年   3篇
  1992年   1篇
  1990年   2篇
  1989年   2篇
  1986年   1篇
  1984年   1篇
  1974年   1篇
排序方式: 共有786条查询结果,搜索用时 15 毫秒
21.
Parallel operation of distributed generation is an important topic for microgrids,which can provide a highly reliable electric supply service and good power quality to end customers when the utility is unavailable.However,there is a well-known limitation:the power sharing accuracy between distributed generators in a parallel operation.Frequency and voltage droop is a well-established control method for improving power sharing performance.In this method,the active and reactive power calculations are used to adjust the frequency and amplitude of the output voltage.This paper describes the digital implementation of a droop method,and analyzes the influence of power calculation on droop method performance.According to the analysis,the performance of droop control in a digital control system is limited by the accuracy and speed of the power calculation method.We propose an improved power calculation method based on p-q theory to improve the performance of the droop control method,and we compare our new method with two traditional power calculation methods.Finally,simulation results and experimental results from a three single-phase 1-kW-inverter system are presented,which validate the performance of our proposed method.  相似文献   
22.
We study the fixed parameter tractability of the counting version of a parameterization of the restrictive list H-coloring problem. The parameterization is defined by fixing the number of preimages of a subset C of the vertices in H through a weight assignment K on C. We show the fixed parameter tractability of counting the number of list (H,C,K)-colorings, for the case in which (H,C,K) is simple. We introduce the concept of compactor and a new algorithmic technique, compactor enumeration, that allow us to design fixed parameter algorithms for parameterized counting problems.  相似文献   
23.
This research introduces a new optimality criterion for motion planning of wheeled mobile robots based on a cost index that assesses the nearness to singularity of forward and inverse kinematic models. Slip motions, infinite estimation error and impossible control actions are avoided escaping from singularities. In addition, high amplification of wheel velocity errors and high wheel velocity values are also avoided by moving far from the singularity. The proposed cost index can be used directly to complement path-planning and motion-planning techniques (e.g. tree graphs, roadmaps, etc.) in order to select the optimal collision-free path or trajectory among several possible solutions. To illustrate the applications of the proposed approach, an industrial forklift, equivalent to a tricycle-like mobile robot, is considered in a simulated environment. In particular, several results are validated for the proposed optimality criterion, which are extensively compared to those obtained with other classical optimality criteria, such as shortest-path, time-optimal and minimum-energy.  相似文献   
24.
A Secure Elliptic Curve-Based RFID Protocol   总被引:3,自引:0,他引:3       下载免费PDF全文
Nowadays, the use of Radio Frequency Identification (RFID) systems in industry and stores has increased. Nevertheless, some of these systems present privacy problems that may discourage potential users. Hence, high confidence and effient privacy protocols are urgently needed. Previous studies in the literature proposed schemes that are proven to be secure, but they have scalability problems. A feasible and scalable protocol to guarantee privacy is presented in this paper. The proposed protocol uses elliptic curve cryptography combined with a zero knowledge-based authentication scheme. An analysis to prove the system secure, and even forward secure is also provided. This work is supported by the Generalitat de Catalunya under Grant No. FIC 2007FIC 00880, and the projects of the Spanish MCyT MTM2007-66842-C02-02 and TIN2006-15662-C02-02.  相似文献   
25.
We present the design of a predictive load shedding scheme for a network monitoring platform that supports multiple and competing traffic queries. The proposed scheme can anticipate overload situations and minimize their impact on the accuracy of the traffic queries. The main novelty of our approach is that it considers queries as black boxes, with arbitrary (and highly variable) input traffic and processing cost. Our system only requires a high-level specification of the accuracy requirements of each query to guide the load shedding procedure and assures a fair allocation of computing resources to queries in a non-cooperative environment. We present an implementation of our load shedding scheme in an existing network monitoring system and evaluate it with a diverse set of traffic queries. Our results show that, with the load shedding mechanism in place, the monitoring system can preserve the accuracy of the queries within predefined error bounds even during extreme overload conditions.  相似文献   
26.
In the Internet, where millions of users are a click away from your site, being able to dynamically classify the workload in real time, and predict its short term behavior, is crucial for proper self-management and business efficiency. As workloads vary significantly according to current time of day, season, promotions and linking, it becomes impractical for some ecommerce sites to keep over-dimensioned infrastructures to accommodate the whole load. When server resources are exceeded, session-based admission control systems allow maintaining a high throughput in terms of properly finished sessions and QoS for a limited number of sessions; however, by denying access to excess users, the website looses potential customers.In the present study we describe the architecture of AUGURES, a system that learns to predict Web user’s intentions for visiting the site as well its resource usage. Predictions are made from information known at the time of their first request and later from navigational clicks. For this purpose we use machine learning techniques and Markov-chain models. The system uses these predictions to automatically shape QoS for the most profitable sessions, predict short-term resource needs, and dynamically provision servers according to the expected revenue and the cost to serve it. We test the AUGURES prototype on access logs from a high-traffic, online travel agency, obtaining promising results.  相似文献   
27.
The combination of lithography and ion implantation is demonstrated to be a suitable method to prepare lateral multilayers. A laterally, compositionally, and magnetically modulated microscale pattern consisting of alternating Co (1.6 µm wide) and Co‐CoO (2.4 µm wide) lines has been obtained by oxygen ion implantation into a lithographically masked Au‐sandwiched Co thin film. Magnetoresistance along the lines (i.e., current and applied magnetic field are parallel to the lines) reveals an effective positive giant magnetoresistance (GMR) behavior at room temperature. Conversely, anisotropic magnetoresistance and GMR contributions are distinguished at low temperature (i.e., 10 K) since the O‐implanted areas become exchange coupled. This planar GMR is principally ascribed to the spatial modulation of coercivity in a spring‐magnet‐type configuration, which results in 180° Néel extrinsic domain walls at the Co/Co‐CoO interfaces. The versatility, in terms of pattern size, morphology, and composition adjustment, of this method offers a unique route to fabricate planar systems for, among others, spintronic research and applications.  相似文献   
28.
We present three velocity‐based updated Lagrangian formulations for standard and quasi‐incompressible hypoelastic‐plastic solids. Three low‐order finite elements are derived and tested for non‐linear solid mechanics problems. The so‐called V‐element is based on a standard velocity approach, while a mixed velocity–pressure formulation is used for the VP and the VPS elements. The two‐field problem is solved via a two‐step Gauss–Seidel partitioned iterative scheme. First, the momentum equations are solved in terms of velocity increments, as for the V‐element. Then, the constitutive relation for the pressure is solved using the updated velocities obtained at the previous step. For the VPS‐element, the formulation is stabilized using the finite calculus method in order to solve problems involving quasi‐incompressible materials. All the solid elements are validated by solving two‐dimensional and three‐dimensional benchmark problems in statics as in dynamics. Copyright © 2016 John Wiley & Sons, Ltd.  相似文献   
29.
30.
Simulatable certificateless two-party authenticated key agreement protocol   总被引:1,自引:0,他引:1  
Key agreement (KA) allows two or more users to negotiate a secret session key among them over an open network. Authenticated key agreement (AKA) is a KA protocol enhanced to prevent active attacks. AKA can be achieved using a public-key infrastructure (PKI) or identity-based cryptography. However, the former suffers from a heavy certificate management burden while the latter is subject to the so-called key escrow problem. Recently, certificateless cryptography was introduced to mitigate these limitations. In this paper, we first propose a security model for AKA protocols using certificateless cryptography. Following this model, we then propose a simulatable certificateless two-party AKA protocol. Security is proven under the standard computational Diffie-Hellman (CDH) and bilinear Diffie-Hellman (BDH) assumptions. Our protocol is efficient and practical, because it requires only one pairing operation and five multiplications by each party.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号