首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   898篇
  免费   21篇
  国内免费   26篇
电工技术   13篇
综合类   18篇
化学工业   19篇
金属工艺   16篇
机械仪表   53篇
建筑科学   22篇
矿业工程   8篇
能源动力   13篇
轻工业   4篇
水利工程   2篇
石油天然气   7篇
武器工业   6篇
无线电   90篇
一般工业技术   83篇
冶金工业   16篇
原子能技术   37篇
自动化技术   538篇
  2024年   1篇
  2023年   3篇
  2022年   8篇
  2021年   14篇
  2020年   10篇
  2019年   6篇
  2018年   1篇
  2017年   22篇
  2016年   19篇
  2015年   24篇
  2014年   47篇
  2013年   33篇
  2012年   34篇
  2011年   66篇
  2010年   50篇
  2009年   43篇
  2008年   56篇
  2007年   87篇
  2006年   84篇
  2005年   57篇
  2004年   42篇
  2003年   39篇
  2002年   27篇
  2001年   22篇
  2000年   33篇
  1999年   19篇
  1998年   20篇
  1997年   20篇
  1996年   6篇
  1995年   7篇
  1994年   11篇
  1993年   3篇
  1992年   8篇
  1991年   3篇
  1989年   5篇
  1988年   1篇
  1987年   1篇
  1985年   1篇
  1984年   1篇
  1983年   4篇
  1982年   3篇
  1981年   1篇
  1980年   1篇
  1979年   1篇
  1978年   1篇
排序方式: 共有945条查询结果,搜索用时 31 毫秒
1.
Manufacturers of automated systems and their components have been allocating an enormous amount of time and effort in R&D activities, which led to the availability of prototypes demonstrating new capabilities as well as the introduction of such systems to the market within different domains. Manufacturers need to make sure that the systems function in the intended way and according to specifications. This is not a trivial task as system complexity rises dramatically the more integrated and interconnected these systems become with the addition of automated functionality and features to them. This effort translates into an overhead on the V&V (verification and validation) process making it time-consuming and costly. In this paper, we present VALU3S, an ECSEL JU (joint undertaking) project that aims to evaluate the state-of-the-art V&V methods and tools, and design a multi-domain framework to create a clear structure around the components and elements needed to conduct the V&V process. The main expected benefit of the framework is to reduce time and cost needed to verify and validate automated systems with respect to safety, cyber-security, and privacy requirements. This is done through identification and classification of evaluation methods, tools, environments and concepts for V&V of automated systems with respect to the mentioned requirements. VALU3S will provide guidelines to the V&V community including engineers and researchers on how the V&V of automated systems could be improved considering the cost, time and effort of conducting V&V processes. To this end, VALU3S brings together a consortium with partners from 10 different countries, amounting to a mix of 25 industrial partners, 6 leading research institutes, and 10 universities to reach the project goal.  相似文献   
2.
This paper introduces a novel approach for identity authentication system based on metacarpophalangeal joint patterns (MJPs). A discriminative common vector (DCV) based method is utilized for feature selection. In the literature, there is no study using whole MJP for identity authentication, exceptionally a work (Ferrer et al., 2005) using the hand knuckle pattern which is some part of the MJP draws the attention as a similar study. The originality of this approach is that: whole MJP is firstly used as a biometric identifier and DCV method is firstly applied for extracting the feature set of MJP. The developed system performs some basic tasks like image acquisition, image pre-processing, feature extraction, matching, and performance evaluation. The feasibility and effectiveness of this approach is rigorously evaluated using the k-fold cross validation technique on two different databases: a publicly available database and a specially established database. The experimental results indicate that the MJPs are very distinctive biometric identifiers and can be securely used in biometric identification and verification systems, DCV method is successfully employed for obtaining the feature set of MJPs and proposed MJP based authentication approach is very successful according to state of the art techniques with a recognition rate of between 95.33% and 100.00%.  相似文献   
3.
Thermo-electric modules (TEMs) can be used to convert heat into electricity by utilizing the Seeback effect. It is now possible to buy BiTe thermo-electric modules that can operate up to temperatures of around 300 °C. However, many applications, such as the harvesting of excess gas turbine heat, may occur at higher temperatures. Therefore, new materials and manufacturing processes need to be developed to produce packaged TEMs that can operate at a maximum operating temperature of 650 °C. Two critical areas in the manufacture of a SiGe TEM are the choice and strength of materials used to both sintered joint the TE material to the rest of the module and the metal used for the interconnects. The interconnection material needs to be sufficiently strong to withstand large temperature fluctuations while maintaining a low contact resistance, as well as being compatible with the nano-Ag sintered joint. Shear force tests of the sintered thermo electrical leg material showed that the joints are brittle when sintered to W metallized AlN substrates are used and ductile fracture behavior when sintered to Cu metallized AlN substrates using the NanoTach K nano silver paste. Almost all of the joints were found to be brittle when using the NachTach X nano silver paste. Shear testing of the sintered joints showed that the X paste joints were variable in strength and stiffness, having a typical Young’s modulus between 10 and 100 MPa at room temperature. The K paste joints were stiffer, but had a similar strength as compared to the X paste joints.  相似文献   
4.
Though modeling and verifying Multi-Agent Systems (MASs) have long been under study, there are still challenges when many different aspects need to be considered simultaneously. In fact, various frameworks have been carried out for modeling and verifying MASs with respect to knowledge and social commitments independently. However, considering them under the same framework still needs further investigation, particularly from the verification perspective. In this article, we present a new technique for model checking the logic of knowledge and commitments (CTLKC+). The proposed technique is fully-automatic and reduction-based in which we transform the problem of model checking CTLKC+ into the problem of model checking an existing logic of action called ARCTL. Concretely, we construct a set of transformation rules to formally reduce the CTLKC+ model into an ARCTL model and CTLKC+ formulae into ARCTL formulae to get benefit from the extended version of NuSMV symbolic model checker of ARCTL. Compared to a recent approach that reduces the problem of model checking CTLKC+ to another logic of action called GCTL1, our technique has better scalability and efficiency. We also analyze the complexity of the proposed model checking technique. The results of this analysis reveal that the complexity of our reduction-based procedure is PSPACE-complete for local concurrent programs with respect to the size of these programs and the length of the formula being checked. From the time perspective, we prove that the complexity of the proposed approach is P-complete with regard to the size of the model and length of the formula, which makes it efficient. Finally, we implement our model checking approach on top of extended NuSMV and report verification results for the verification of the NetBill protocol, taken from business domain, against some desirable properties. The obtained results show the effectiveness of our model checking approach when the system scales up.  相似文献   
5.
As the SARS-CoV-2 (COVID-19) pandemic has run rampant worldwide, the dissemination of misinformation has sown confusion on a global scale. Thus, understanding the propagation of fake news and implementing countermeasures has become exceedingly important to the well-being of society. To assist this cause, we produce a valuable dataset called FibVID (Fake news information-broadcasting dataset of COVID-19), which addresses COVID-19 and non-COVID news from three key angles. First, we provide truth and falsehood (T/F) indicators of news items, as labeled and validated by several fact-checking platforms (e.g., Snopes and Politifact). Second, we collect spurious-claim-related tweets and retweets from Twitter, one of the world’s largest social networks. Third, we provide basic user information, including the terms and characteristics of “heavy fake news” user to present a better understanding of T/F claims in consideration of COVID-19. FibVID provides several significant contributions. It helps to uncover propagation patterns of news items and themes related to identifying their authenticity. It further helps catalog and identify the traits of users who engage in fake news diffusion. We also provide suggestions for future applications of FibVID with a few exploratory analyses to examine the effectiveness of the approaches used.  相似文献   
6.
As blockchain technology is gaining popularity in industry and society, solutions for Verification and Validation (V&V) of blockchain-based software applications (BC-Apps) have started gaining equal attention. To ensure that BC-Apps are properly developed before deployment, it is paramount to apply systematic V&V to verify their functional and non-functional requirements. While existing research aims at addressing the challenges of engineering BC-Apps by providing testing techniques and tools, blockchain-based software development is still an emerging research discipline, and therefore, best practices and tools for the V&V of BC-Apps are not yet sufficiently developed. In this paper, we provide a comprehensive survey on V&V solutions for BC-Apps. Specifically, using a layered approach, we synthesize V&V tools and techniques addressing different components at various layers of the BC-App stack, as well as across the whole stack. Next, we provide a discussion on the challenges associated with BC-App V&V, and summarize a set of future research directions based on the challenges and gaps identified in existing research work. Our study aims to highlight the importance of BC-App V&V and pave the way for a disciplined, testable, and verifiable BC development.  相似文献   
7.
数值模拟了某小型高效汽轮机主调阀内的全三维复杂蒸汽流场,给出了阀门的整体流量特性曲线,分析了阀门内部流场细节,指出调节阀的喉道附近流场分布不均匀是造成阀门损失的主要原因。接着对阀碟型线进行优化,优化后的阀门通流量减小,流场内部涡流区大大减小,速度分布不均匀性得到改善,湍动能范围和幅值大幅度下降,这一切表明阀门的效率和稳定性得到很大的提高。最后,实验验证了阀门的通流特性和安全性,为阀门的结构优化设计提供了重要依据。  相似文献   
8.
在互联网数据中心(IDC)交付使用前,对IDC的基础设施运行环境质量开展全面的第三方验证测试,通过多层级测试、模拟多种场景、模拟故障来发现系统可能存在的问题,并针对薄弱环节进行整改,可有效减少实际运行的故障隐患,提高系统可靠性,保证项目前期投资。对IDC第三方验证测试的主要内容、步骤、方案进行了较为详细的介绍,并罗列了验证测试中出现的常见问题和整改建议。  相似文献   
9.
运用有限元技术模拟了两辊斜轧穿孔法制备Ti80合金无缝管坯的三维热力耦合过程。仿真结果能动态显示坯料从咬入到稳定穿孔再到穿出3个阶段复杂的塑性成形过程,并能辅助分析中心孔腔的形成机理以及坯料在穿孔阶段各物理场量的分布。结果表明:坯料刚接触顶头时,中心金属存在明显塑性变形,结合轧制中心线上不同方向的正应力状态为(+,-,+),判断中心孔腔的形成为拉应力作用下的塑性开裂。在穿孔过程中,坯料的应变分布沿轴向呈U1+W+2U2形态,沿径向为片层状,最终穿制毛管等效应变可达5~11;坯料的外表面与导盘接触区应变速率为0.71~3.6s~(-1),而与轧辊接触区高达4.6~26s~(-1),大的应变速率有助于毛管的塑性成形过程;顶头前坯料的温度最高,与穿孔工具接触的区域温度略有降低,但绝大部分变形区温度都处于单相区。模拟所得全流程顶头轴向力与轧制力的变化呈现典型的3阶段分布,其中稳定穿孔阶段力能参数的均值接近试验所得,从而验证了模型的准确性。基于有限元模拟的工艺条件,在实验轧机上一火次顺利穿制出Ti80合金无缝管坯,其显微组织展现为单一的魏氏组织形态,且由于变形剧烈,从外表面到中间层再到内表面均为等轴细小的β动态再结晶晶粒;力学性能测试表明该组织状态下的毛管的强度和塑性均满足指标要求。  相似文献   
10.
Verification recently has become a challenging topic for business process languages. Verification techniques like model checking allow to ensure that a process complies with domain-specific requirements, prior to the execution. To execute full-state verification techniques like model checking, the state space of the process needs to be constructed. This tends to increase exponentially with the size of the process schema, or it can even be infinite. We address this issue by means of requirements-specific reduction techniques, i.e., reducing the size of the state space without changing the result of the verification. We present an approach that, for a given requirement the system must fulfill, identifies the tasks relevant for the verification. Our approach then uses these relevant tasks for a reduction that confines the process to regions of interest for the verification. To evaluate our new technique, we use real-world industrial processes and requirements. Mainly because these processes make heavy use of parallelization, full-state-search verification algorithms are not able to verify them. With our reduction in turn, even complex processes with many parallel branches can be verified in less than 10 s.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号