首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   371篇
  免费   0篇
  国内免费   1篇
电工技术   6篇
综合类   4篇
化学工业   42篇
金属工艺   7篇
机械仪表   8篇
建筑科学   85篇
矿业工程   8篇
能源动力   47篇
无线电   22篇
一般工业技术   40篇
冶金工业   6篇
自动化技术   97篇
  2023年   18篇
  2022年   28篇
  2021年   8篇
  2020年   17篇
  2019年   12篇
  2018年   14篇
  2017年   16篇
  2016年   27篇
  2015年   29篇
  2014年   43篇
  2013年   31篇
  2012年   10篇
  2011年   3篇
  2010年   13篇
  2009年   6篇
  2008年   2篇
  2007年   12篇
  2006年   14篇
  2005年   11篇
  2004年   2篇
  2003年   3篇
  2002年   12篇
  2001年   12篇
  2000年   2篇
  1999年   1篇
  1998年   3篇
  1996年   2篇
  1995年   3篇
  1992年   1篇
  1991年   1篇
  1990年   1篇
  1989年   1篇
  1988年   2篇
  1987年   7篇
  1986年   3篇
  1985年   2篇
排序方式: 共有372条查询结果,搜索用时 15 毫秒
1.
2.
Economic contribution rate of education (ECRE) is the key factor of education economics. This article selected China, South Korea, United States and other countries for a total of 15 samples, and put the data of the same period under the framework of soft computing, to simulate the production chain of “education–potential human capital–actual human capital–economic growth”. The basic idea is: Firstly, 15 countries are softly categorized according to the level of science and technology (S&T) progress. Secondly, potential human capital and actual human capital establish the internal correlation (fuzzy mapping) in the same classification, and we conceptualize actual human capital as one production factor, joined with the other two production factors, fixed asset and land, to set up the fuzzy mapping to economic growth., and then calculate economic contribution rate of education of China and foreign by two fuzzy mapping of them. Thirdly, this paper analyzes the present state and differences in the development of education between China and foreign according to different ECRE, and offers proposals for promoting the education in China.  相似文献   
3.
In the proposed advanced computing environment, known as the HoneyBee Platform, various computing devices using single or multiple interfaces and technologies/standards need to communicate and cooperate efficiently with a certain level of security and safety measures. These computing devices may be supported by different types of operating systems with different features and levels of security support. In order to ensure that all operations within the environment can be carried out seamlessly in an ad-hoc manner, there is a need for a common mobile platform to be developed. The purpose of this long-term project is to investigate and implement a new functional layered model of the common mobile platform with secured and trusted ensemble computing architecture for an innovative Digital Economic Environment in the Malaysian context. This mobile platform includes a lightweight operating system to provide a common virtual environment, a middleware for providing basic functionalities of routing, resource and network management, as well as to provide security, privacy and a trusted environment. A generic application programming interface is provided for application developers to access underlying resources. The aim is for the developed platform to act as the building block for an ensemble environment, upon which higher level applications could be built. Considered as the most essential project in a series of related projects towards a more digital socio-economy in Malaysia, this article presents the design of the target computational platform as well as the conceptual framework for the HoneyBee project.  相似文献   
4.
A nonlinear multiobjective model-predictive control (NMMPC) scheme, consisting of self-organizing radial basis function (SORBF) neural network prediction and multiobjective gradient optimization, is proposed for wastewater treatment process (WWTP) in this paper. The proposed NMMPC comprises a SORBF neural network identifier and a multiple objectives controller via the multi-gradient method (MGM). The SORBF neural network with concurrent structure and parameter learning is developed as a model identifier for approximating on-line the states of WWTP. Then, this NMMPC optimizes the multiple objectives under different operating functions, where all the objectives are minimized simultaneously. The solution of optimal control is based on the MGM which can shorten the solution time. Moreover, the stability and control performance of the closed-loop control system are well studied. Numerical simulations reveal that the proposed control strategy gives satisfactory tracking and disturbance rejection performance for WWTP. Experimental results show the efficacy of the proposed method.  相似文献   
5.
For construction safety and health, continuous monitoring of unsafe conditions and action is essential in order to eliminate potential hazards in a timely manner. As a robust and automated means of field observation, computer vision techniques have been applied for the extraction of safety related information from site images and videos, and regarded as effective solutions complementary to current time-consuming and unreliable manual observational practices. Although some research efforts have been directed toward computer vision-based safety and health monitoring, its application in real practice remains premature due to a number of technical issues and research challenges in terms of reliability, accuracy, and applicability. This paper thus reviews previous attempts in construction applications from both technical and practical perspectives in order to understand the current status of computer vision techniques, which in turn suggests the direction of future research in the field of computer vision-based safety and health monitoring. Specifically, this paper categorizes previous studies into three groups—object detection, object tracking, and action recognition—based on types of information required to evaluate unsafe conditions and acts. The results demonstrate that major research challenges include comprehensive scene understanding, varying tracking accuracy by camera position, and action recognition of multiple equipment and workers. In addition, we identified several practical issues including a lack of task-specific and quantifiable metrics to evaluate the extracted information in safety context, technical obstacles due to dynamic conditions at construction sites and privacy issues. These challenges indicate a need for further research in these areas. Accordingly, this paper provides researchers insights into advancing knowledge and techniques for computer vision-based safety and health monitoring, and offers fresh opportunities and considerations to practitioners in understanding and adopting the techniques.  相似文献   
6.
With the increase of multimedia traffic over the Internet, current network protocols are largely concerned with the QoS requirements of delay-sensitive applications. In Mobile Ad-hoc Networks (MANETs), the majority of protocols developed to date provide QoS mechanisms by assigning high priority to delay-sensitive applications. While today’s Internet traffic is still dominated by TCP-based applications, the negative effects of the IEEE 802.11e service differentiation scheme on TCP performance in the presence of high priority traffic have not been adequately addressed in the literature. In this paper we first evaluate the performance of TCP in 802.11e MANETs when competing with high priority VoIP traffic. We then propose a novel TCP-friendly scheme, called IEDCA, to improve IEEE 802.11e EDCA mechanism. Our simulation-based performance study demonstrates that our proposed scheme IEDCA not only improves the performance of TCP significantly, it also facilitates the voice traffic transmission.  相似文献   
7.
This paper presents the analytical models of power consumption in macrocell, microcell, picocell and femtocell based networks. Five case studies are presented in this paper where macrocells, microcells, picocells and femtocells are deployed based on the number of mobile subscribers present in a region, mobile user traffic in that region and the area of the region where cellular coverage has to be provided. A comparative study is performed between the power consumption by the base stations in each of these five cases and that of the only macrocell based network. The simulation results demonstrate that using each of these five strategies the power consumption by the base stations can be minimized than that of only macrocell based network. Based on the power consumption by the base stations in these five schemes, we have categorized the networks into five classes, A, B, C, D and E, each of which contains cells of different types to reduce power consumption to achieve green cellular network.  相似文献   
8.
Earthwork operations are crucial parts of most construction projects. Heavy construction equipment and workers are often required to work in limited workspaces simultaneously. Struck-by accidents resulting from poor worker and equipment interactions account for a large proportion of accidents and fatalities on construction sites. The emerging technologies based on computer vision and artificial intelligence offer an opportunity to enhance construction safety through advanced monitoring utilizing site cameras. A crucial pre-requisite to the development of safety monitoring applications is the ability to identify accurately and localize the position of the equipment and its critical components in 3D space. This study proposes a workflow for excavator 3D pose estimation based on deep learning using RGB images. In the proposed workflow, an articulated 3D digital twin of an excavator is used to generate the necessary data for training a 3D pose estimation model. In addition, a method for generating hybrid datasets (simulation and laboratory) for adapting the 3D pose estimation model for various scenarios with different camera parameters is proposed. Evaluations prove the capability of the workflow in estimating the 3D pose of excavators. The study concludes by discussing the limitations and future research opportunities.  相似文献   
9.
In this paper, we study a single-product inventory system which involves a supplier, a retailer, and differentiated customers. The supplier provides products to the retailer which in turn sells products to its customers. The supplier is unreliable and is subject to random disruptions. The retailer adopts a periodic-review inventory policy, under which the retailer reviews its inventory position every a fixed period of time and decides whether a replenishment is needed or not. Partial backordering is applied when a stockout occurs. That is, under the situations of stockouts, customers can choose either to backorder products or to abandon the purchase. Customers are segmented into two classes according to their backordering probabilities. The customer class with high backordering probability is provided with high priority to receive backorders. In this paper we allow more than one outstanding orders to exist, which is not the case in the previous literature. We develop a simulation model for such an inventory system and investigate the impacts of supply disruptions and customer differentiation on this inventory system.  相似文献   
10.
Remote user authentication scheme is a procedure which allows a server to authenticate a remote user through insecure channel. Recently, Yoon, Ryu and Yoo made an enhancement based on Ku–Chen’s remote user authentication scheme by using smart cards. The scheme has the merits of providing mutual authentication, no verification table, freely choosing password, involving only few hashing operations and parallel session attack resistance. In this paper, we point out security flaws of Yoon–Ryu–Yoo’s protocols against masquerading attack, off-line password guessing attacks and parallel session attack. An improvement to enhance Yoon–Ryu–Yoo’s security scheme is proposed.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号