首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2194篇
  免费   386篇
  国内免费   11篇
电工技术   50篇
综合类   8篇
化学工业   690篇
金属工艺   62篇
机械仪表   41篇
建筑科学   93篇
矿业工程   15篇
能源动力   171篇
轻工业   237篇
水利工程   26篇
石油天然气   63篇
无线电   268篇
一般工业技术   420篇
冶金工业   106篇
原子能技术   27篇
自动化技术   314篇
  2023年   61篇
  2022年   55篇
  2021年   112篇
  2020年   103篇
  2019年   119篇
  2018年   142篇
  2017年   125篇
  2016年   159篇
  2015年   127篇
  2014年   149篇
  2013年   213篇
  2012年   113篇
  2011年   118篇
  2010年   97篇
  2009年   95篇
  2008年   84篇
  2007年   75篇
  2006年   55篇
  2005年   67篇
  2004年   57篇
  2003年   34篇
  2002年   28篇
  2001年   39篇
  2000年   35篇
  1999年   36篇
  1998年   41篇
  1997年   24篇
  1996年   23篇
  1995年   9篇
  1994年   11篇
  1993年   17篇
  1992年   8篇
  1991年   9篇
  1990年   15篇
  1989年   15篇
  1988年   6篇
  1987年   6篇
  1986年   7篇
  1985年   5篇
  1984年   10篇
  1983年   8篇
  1982年   7篇
  1980年   5篇
  1979年   4篇
  1978年   6篇
  1977年   8篇
  1976年   11篇
  1975年   8篇
  1974年   8篇
  1973年   5篇
排序方式: 共有2591条查询结果,搜索用时 18 毫秒
41.
In this paper, the robust input covariance constraint (ICC) control problem with polytopic uncertainty is solved using convex optimization with linear matrix inequality (LMI) approach. The ICC control problem is an optimal control problem that optimizes the output performance subjected to multiple constraints on the input covariance matrices. This control problem has significant practical implications when hard constraints need to be satisfied on control actuators. The contribution of this paper is the characterization of the control synthesis LMIs used to solve the robust ICC control problem for polytopic uncertain systems. Both continuous‐ and discrete‐time systems are considered. Parameter‐dependent and independent Lyapunov functions have been used for robust ICC controller synthesis. Numerical design examples are presented to illustrate the effectiveness of the proposed approach.  相似文献   
42.
The game problem of pursuit is studied for dynamic processes evolving under uncertainty and counteraction. The terminal set is supposed to be a cylindrical set-valued mapping. The method of resolving functions is used to establish the sufficient conditions for the game termination in the class of quasi- and stroboscopic strategies for various schemes of the method. The guaranteed times are compared. The results are illustrated using the model with integral control unit and game problems with simple motion.  相似文献   
43.
Even though a lot of researches have been conducted in order to solve the problem of unconstrained handwriting recognition, an effective solution is still a serious challenge. In this article, we address two Arabic handwriting recognition-related issues. Firstly, we present IESK-arDB, a new multi-propose off-line Arabic handwritten database. It is publicly available and contains more than 4,000 word images, each equipped with binary version, thinned version as well as a ground truth information stored in separate XML file. Additionally, it contains around 6,000 character images segmented from the database. A letter frequency analysis showed that the database exhibits letter frequencies similar to that of large corpora of digital text, which proof the database usefulness. Secondly, we proposed a multi-phase segmentation approach that starts by detecting and resolving sub-word overlaps, then hypothesizing a large number of segmentation points that are later reduced by a set of heuristic rules. The proposed approach has been successfully tested on IESK-arDB. The results were very promising, indicating the efficiency of the suggested approach.  相似文献   
44.
In this paper, a fuzzy logic controller (FLC) based variable structure control (VSC) is presented. The main objective is to obtain an improved performance of highly non‐linear unstable systems. New functions for chattering reduction and error convergence without sacrificing invariant properties are proposed. The main feature of the proposed method is that the switching function is added as an additional fuzzy variable and will be introduced in the premise part of the fuzzy rules; together with the state variables. In this work, a tuning of the well known weighting parameters approach is proposed to optimize local and global approximation and modelling capability of the Takagi‐Sugeno (T‐S) fuzzy model to improve the choice of the performance index and minimize it. The main problem encountered is that the T‐S identification method can not be applied when the membership functions are overlapped by pairs. This in turn restricts the application of the T‐S method because this type of membership function has been widely used in control applications. The approach developed here can be considered as a generalized version of the T‐S method. An inverted pendulum mounted on a cart is chosen to evaluate the robustness, effectiveness, accuracy and remarkable performance of the proposed estimation approach in comparison with the original T‐S model. Simulation results indicate the potential, simplicity and generality of the estimation method and the robustness of the chattering reduction algorithm. In this paper, we prove that the proposed estimation algorithm converge the very fast, thereby making it very practical to use. The application of the proposed FLC‐VSC shows that both alleviation of chattering and robust performance are achieved.  相似文献   
45.
The Internet of Things (IoT) has gained more popularity in research because of its large-scale challenges and implementation. But security was the main concern when witnessing the fast development in its applications and size. It was a dreary task to independently set security systems in every IoT gadget and upgrade them according to the newer threats. Additionally, machine learning (ML) techniques optimally use a colossal volume of data generated by IoT devices. Deep Learning (DL) related systems were modelled for attack detection in IoT. But the current security systems address restricted attacks and can be utilized outdated datasets for evaluations. This study develops an Artificial Algae Optimization Algorithm with Optimal Deep Belief Network (AAA-ODBN) Enabled Ransomware Detection in an IoT environment. The presented AAA-ODBN technique mainly intends to recognize and categorize ransomware in the IoT environment. The presented AAA-ODBN technique follows a three-stage process: feature selection, classification, and parameter tuning. In the first stage, the AAA-ODBN technique uses AAA based feature selection (AAA-FS) technique to elect feature subsets. Secondly, the AAA-ODBN technique employs the DBN model for ransomware detection. At last, the dragonfly algorithm (DFA) is utilized for the hyperparameter tuning of the DBN technique. A sequence of simulations is implemented to demonstrate the improved performance of the AAA-ODBN algorithm. The experimental values indicate the significant outcome of the AAA-ODBN model over other models.  相似文献   
46.
With the increased advancements of smart industries, cybersecurity has become a vital growth factor in the success of industrial transformation. The Industrial Internet of Things (IIoT) or Industry 4.0 has revolutionized the concepts of manufacturing and production altogether. In industry 4.0, powerful Intrusion Detection Systems (IDS) play a significant role in ensuring network security. Though various intrusion detection techniques have been developed so far, it is challenging to protect the intricate data of networks. This is because conventional Machine Learning (ML) approaches are inadequate and insufficient to address the demands of dynamic IIoT networks. Further, the existing Deep Learning (DL) can be employed to identify anonymous intrusions. Therefore, the current study proposes a Hunger Games Search Optimization with Deep Learning-Driven Intrusion Detection (HGSODL-ID) model for the IIoT environment. The presented HGSODL-ID model exploits the linear normalization approach to transform the input data into a useful format. The HGSO algorithm is employed for Feature Selection (HGSO-FS) to reduce the curse of dimensionality. Moreover, Sparrow Search Optimization (SSO) is utilized with a Graph Convolutional Network (GCN) to classify and identify intrusions in the network. Finally, the SSO technique is exploited to fine-tune the hyper-parameters involved in the GCN model. The proposed HGSODL-ID model was experimentally validated using a benchmark dataset, and the results confirmed the superiority of the proposed HGSODL-ID method over recent approaches.  相似文献   
47.
Next-generation cellular networks are expected to provide users with innovative gigabits and terabits per second speeds and achieve ultra-high reliability, availability, and ultra-low latency. The requirements of such networks are the main challenges that can be handled using a range of recent technologies, including multi-access edge computing (MEC), artificial intelligence (AI), millimeter-wave communications (mmWave), and software-defined networking. Many aspects and design challenges associated with the MEC-based 5G/6G networks should be solved to ensure the required quality of service (QoS). This article considers developing a complex MEC structure for fifth and sixth-generation (5G/6G) cellular networks. Furthermore, we propose a seamless migration technique for complex edge computing structures. The developed migration scheme enables services to adapt to the required load on the radio channels. The proposed algorithm is analyzed for various use cases, and a test bench has been developed to emulate the operator’s infrastructure. The obtained results are introduced and discussed.  相似文献   
48.
Active matrix prestressed microelectromechanical shutter displays enable outstanding optical properties as well as robust operating performance. The microelectromechanical systems (MEMS) shutter elements have been optimized for higher light outcoupling efficiency with lower operation voltage and higher pixel density. The MEMS elements have been co-fabricated with self-aligned metal-oxide thin-film transistors (TFTs). Several optimizations were required to integrate MEMS process without hampering the performance of both elements. The optimized display process requires only seven photolithographic masks with ensuring proper compatibility between MEMS shutter and metal-oxide TFT process.  相似文献   
49.
50.
We present the results of experimental study of the electric discharge between metal electrodes of various geometry and technical water within the pressure range of 8 × 103–105 Pa at the saw-tooth voltage generator frequency, f = 40 MHz, and the interelectrode distance, l = 3–30 mm. We consider transfer of the streamer discharge into spark one depending on the geometry of the metal electrode and its material. We investigate the electrical characteristics of the discharge between the plate electrode and the technical water within a wide pressure range. The essential influence of the streamer discharge type on the ozone release within the investigated parameters range is discovered.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号