全文获取类型
收费全文 | 261篇 |
免费 | 42篇 |
国内免费 | 12篇 |
专业分类
电工技术 | 5篇 |
综合类 | 40篇 |
化学工业 | 11篇 |
金属工艺 | 16篇 |
机械仪表 | 13篇 |
建筑科学 | 8篇 |
能源动力 | 32篇 |
轻工业 | 2篇 |
武器工业 | 1篇 |
无线电 | 57篇 |
一般工业技术 | 65篇 |
冶金工业 | 14篇 |
原子能技术 | 1篇 |
自动化技术 | 50篇 |
出版年
2022年 | 5篇 |
2021年 | 4篇 |
2020年 | 3篇 |
2019年 | 6篇 |
2018年 | 4篇 |
2017年 | 11篇 |
2016年 | 10篇 |
2015年 | 10篇 |
2014年 | 19篇 |
2013年 | 11篇 |
2012年 | 12篇 |
2011年 | 15篇 |
2010年 | 14篇 |
2009年 | 24篇 |
2008年 | 10篇 |
2007年 | 20篇 |
2006年 | 25篇 |
2005年 | 20篇 |
2004年 | 2篇 |
2003年 | 10篇 |
2002年 | 13篇 |
2001年 | 18篇 |
2000年 | 10篇 |
1999年 | 5篇 |
1998年 | 5篇 |
1997年 | 6篇 |
1996年 | 5篇 |
1995年 | 5篇 |
1994年 | 2篇 |
1993年 | 2篇 |
1992年 | 1篇 |
1991年 | 1篇 |
1987年 | 5篇 |
1985年 | 2篇 |
排序方式: 共有315条查询结果,搜索用时 31 毫秒
1.
High dimensionality in real-world multi-reservoir systems greatly hinders the application and popularity of evolutionary algorithms, especially for systems with heterogeneous units. An efficient hierarchical optimization framework is presented for search space reduction, determining the best water distributions, not only between cascade reservoirs, but also among different types of hydropower units. The framework is applied to the Three Gorges Project (TGP) system and the results demonstrate that the difficulties of multi-reservoir optimization caused by high dimensionality can be effectively solved by the proposed hierarchical method. For the day studied, power output could be increased by 6.79 GWh using an optimal decision with the same amount of water actually used; while the same amount of power could be generated with 2.59 × 107 m3 less water compared to the historical policy. The methodology proposed is general in that it can be used for other reservoir systems and other types of heterogeneous unit generators. 相似文献
2.
3.
《Composites Part B》2007,38(5-6):509-522
Recent world events such as bombings in London, Madrid and Istanbul have highlighted the susceptibility of many civilian structures to terrorist attack. Explosives directed towards vulnerable structures may cause considerable damage and loss of life. As a result, there is now a desire to increase the blast resistance of many types of existing structures. This has led to experimental and finite element (FE) research in retrofitting concrete and masonry structures with fibre reinforced polymer (FRP) composites for blast protection. This paper presents a review of the publicly available literature and highlights areas where research is lacking. 相似文献
4.
《International Journal of Hydrogen Energy》2005,30(11):1259-1264
Based on the water gas shift (WGS) catalytic mechanism on precious metal catalyst, a Langmuir–Hinshelwood (LH) kinetics model was derived for the operating conditions of syngas from natural gas reforming at near-ambient pressure. A power law kinetics model was also presented for comparative purpose. These two kinetics models were integrated in a dynamic distributed reactor model for design of full-scale WGS reactors for a natural gas fuel processing system. Modeling results indicated that the LH kinetics model gives predictions of reactor performance closer to the experimental data. Using the LH kinetics model, optimization of operating conditions for the high-temperature shift (HTS) and low-temperature shift (LTS) reactors was also attempted. 相似文献
5.
《Computer Standards & Interfaces》2014,36(3):577-584
A mobile ad hoc network (MANET) is a special type of wireless network in which a collection of mobile nodes with wireless network interfaces may form a temporary network, without the aids of any fixed infrastructure. Security has become a hot research topic in mobile ad hoc networks. In 1998, Volker and Mehrdad proposed a tree-based key management and access control scheme for the mobile agents to manage rights to access its own resources for the visited mobile nodes. Latter, Huang et al. showed that Volker and Mehrdad's scheme needs a large amount of storage and costs for managing and storing secret keys. Huang et al. further proposed a new and efficient scheme based on the elliptic curve cryptosystems to reduce costs and gain better efficiency. However, there is a security leak inherent in Huang et al.'s scheme that the malicious node can overstep his authority to access unauthorized information. This paper will propose a secure, robust, and efficient hierarchical key management scheme for MANETs. Some practical issues and solutions about dynamic key management are also considered and proposed. As compared with Huang et al.'s scheme, our proposed scheme can provide better security assurance, while requiring smaller key-size, lower computational complexities, and constant key management costs which is independent on the number of the confidential files and the visited nodes. 相似文献
6.
《Computer Standards & Interfaces》2014,36(3):513-523
One of the critical security issues of Vehicular Ad Hoc Networks (VANETs) is the revocation of misbehaving vehicles. While essential, revocation checking can leak potentially sensitive information. Road Side Units (RSUs) receiving the certificate status queries could infer the identity of the vehicles posing the query. An important loss of privacy results from the RSUs ability to tie the checking vehicle with the query's target. We propose a Privacy Preserving Revocation mechanism (PPREM) based on a universal one-way accumulator. PPREM provides explicit, concise, authenticated and unforgeable information about the revocation status of each certificate while preserving the users' privacy. 相似文献
7.
In order to satisfy the requirement of realtime gait programming of humanoid walking with foot rotation,a kind of modified Nonlinear Model Predictive Control (NMPC) scheme was proposed. Based on setting suitable kinetic and kinematic virtual constraints of Single Support Phase (SSP) and three subphases of Double Support Phase (DSP) ,complex realtime gait programming problem was simplified to four online NMPC dynamic optimization problems. A numerical approach was proposed to transform the dynamical optimization problem to the finite dimensional static optimization problem which can be solved by Sequential Quadratic Programming (SQP) . It can be concluded from simulation that using this method on BIP model can realize online gait programming of dynamic walking with foot rotation and the biped stability can be satisfied such that there is no sliding during walking. 相似文献
8.
To reduce the fragility encountered in controller implementation, which is a measure of extent to describe small perturbations in controller parameters caused by rounding-off errors or component tolerances, and keep the system stability and performance, approaches of weighted eigenvalue sensitivity and stability radii comparison were used for computation and reduction of controller fragility. An algorithm has been derived for the efficient reduction of controller fragility, which used eigenstructure decomposition to obtain the suboptimal solution. The algorithm was tested for different control problems through reducing their fragility by a large margin. Different canonical forms were analyzed for fragility, including controllable canonical form, observable canonical form, modal canonical form, balanced realization and optimal (non-fragile) form. Different realizations were implemented through C language Matlab EXecutable (CMEX) S-function discrete state space block. Double precision calculations were performed. Open and closed loop controller realizations were compared with simulink state space (optimal) block. Results of comparison indicate that the optimal non-fragile controller realization shows better results both in open loop and closed loop realization. 相似文献
9.
PCNN模型在彩色图像分割中的应用 总被引:1,自引:0,他引:1
针对脉冲耦合神经网络(PCNN)模型主要应用于灰度图像处理的局限性,利用脉冲发生器将颜色信息引入模型作为输入,与灰度信息共同控制神经元的内部行为,控制等灰度值的不同颜色区域分期点火,实现彩色图像的精确分割.双输入PCNN模型实现了彩色图像的分割,同时保持了PCNN模型对噪声的鲁棒性,从简单的仿真图像和实际图像两方面验证了此分割方法的有效性. 相似文献
10.
Agustinus Borgy Waluyo David Taniar Wenny Rahayu Bala Srinivasan 《Journal of Network and Computer Applications》2009,32(2):434-447
The ever-increasing number of mobile device users has also raised the users’ expectation of mobile services accordingly. This phenomenon has given pressures to the mobile service providers to improve their services in order to stay competitive in the market. The service oriented approach is seen to be a promising scheme for mobile services. This paper presents mobile service oriented architectures for Nearest-Neighbor (NN) queries that are classified into five categories, namely (i) intermittent query mobile services, (ii) continuous query mobile services, (iii) context-aware mobile services, (iv) continuous moving object query mobile services, and (v) data broadcast mobile services. These services incorporate query, location and context-aware services, ontological context model, and broadcast. The proposed architectures are concerned with mobile services for clients on the move requesting services based on their current location, which is arguably the most important feature in a wireless environment. Furthermore, we also discuss the Quality-of-Service (QoS) requirement for mobile services in which request latency time is one of the most important parameters to consider. Some analytical models for query latency measurement are presented and the results are compared with the simulation experiments. 相似文献