首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1070篇
  免费   192篇
  国内免费   162篇
电工技术   81篇
技术理论   1篇
综合类   148篇
化学工业   13篇
金属工艺   14篇
机械仪表   43篇
建筑科学   32篇
矿业工程   5篇
能源动力   8篇
轻工业   8篇
水利工程   4篇
石油天然气   3篇
武器工业   4篇
无线电   125篇
一般工业技术   63篇
冶金工业   58篇
原子能技术   1篇
自动化技术   813篇
  2024年   3篇
  2023年   28篇
  2022年   43篇
  2021年   64篇
  2020年   70篇
  2019年   73篇
  2018年   67篇
  2017年   57篇
  2016年   72篇
  2015年   64篇
  2014年   52篇
  2013年   74篇
  2012年   49篇
  2011年   68篇
  2010年   59篇
  2009年   43篇
  2008年   54篇
  2007年   53篇
  2006年   49篇
  2005年   47篇
  2004年   50篇
  2003年   40篇
  2002年   38篇
  2001年   25篇
  2000年   35篇
  1999年   20篇
  1998年   13篇
  1997年   17篇
  1996年   5篇
  1995年   17篇
  1994年   15篇
  1993年   13篇
  1992年   14篇
  1991年   5篇
  1990年   5篇
  1989年   3篇
  1988年   4篇
  1987年   1篇
  1986年   2篇
  1985年   2篇
  1982年   1篇
  1981年   2篇
  1980年   1篇
  1975年   2篇
  1962年   2篇
  1961年   3篇
排序方式: 共有1424条查询结果,搜索用时 15 毫秒
1.
To design robust interval observers for uncertain continuous‐time linear systems, a new set‐integration approach is proposed to compute trajectory tubes for the estimation error. Because this approach, the order‐preserving condition on the dynamics of the estimation error is no longer required. Therefore, synthesis methods can be used to compute observer gains that reduce the impact of the system uncertainties on the accuracy of the estimated state enclosures. The performance of the proposed approach is showcased through illustrative numerical examples.  相似文献   
2.
3.
Distributed denial of service (DDoS) attacks launch more and more frequently and are more destructive. Feature representation as an important part of DDoS defense technology directly affects the efficiency of defense. Most DDoS feature extraction methods cannot fully utilize the information of the original data, resulting in the extracted features losing useful features. In this paper, a DDoS feature representation method based on deep belief network (DBN) is proposed. We quantify the original data by the size of the network flows, the distribution of IP addresses and ports, and the diversity of packet sizes of different protocols and train the DBN in an unsupervised manner by these quantified values. Two feedforward neural networks (FFNN) are initialized by the trained deep belief network, and one of the feedforward neural networks continues to be trained in a supervised manner. The canonical correlation analysis (CCA) method is used to fuse the features extracted by two feedforward neural networks per layer. Experiments show that compared with other methods, the proposed method can extract better features.  相似文献   
4.
铁路在交通运输行业有着举足轻重的地位,一旦列车发生故障将会导致严重的生命财产损失。由于列车发生故障的概率相对较低,因此难以捕获列车的故障样本。针对上述问题,提出了一种无监督学习的列车故障识别方法,通过检测列车音频信号来识别列车故障。该方法基于深度信念网络(DBN),利用小波包分解提取检测信号的特征向量并将其作为DBN的输入,待网络充分训练后,由训练好的DBN识别当前列车的运行状况。现场监测实验结果表明,该方法能够在无监督的条件下有效识别列车故障,保障了列车的运行安全。  相似文献   
5.
As a powerful analysis tool of Petri nets, reachability trees are fundamental for systematically investigating many characteristics such as boundedness, liveness and reversibility. This work proposes a method to generate a reachability tree, called ωRT for short, for a class of unbounded generalized nets called ω-independent nets based on new modified reachability trees (NMRTs). ωRT can effectively decrease the number of nodes by removing duplicate and ω-duplicate nodes in the tree, and verify properties such as reachability, liveness and deadlocks. Two examples are provided to show its superiority over NMRTs in terms of tree size.   相似文献   
6.
The process of elaboration of the symbolic universe leads to exciting insights regarding the search for human emotional security. The symbols end up as explanatory axes of universal reality and on them are constructed myths that form a superstructure for belief systems. Human society is a multi-level system with a material structure (society), an ideological superstructure (belief systems, values, etc.) and a super superstructure with two parts: mythical (origin and justification) and utopic (final goal). All mythical belief systems have a numinous-religious nature.  相似文献   
7.
Belief change and spread have been studied in many disciplines—from psychology, sociology, economics and philosophy, to biology, computer science and statistical physics—but we still do not have a firm grasp on why some beliefs change more easily and spread faster than others. To fully capture the complex social-cognitive system that gives rise to belief dynamics, we first review insights about structural components and processes of belief dynamics studied within different disciplines. We then outline a unifying quantitative framework that enables theoretical and empirical comparisons of different belief dynamic models. This framework uses a statistical physics formalism, grounded in cognitive and social theory, as well as empirical observations. We show how this framework can be used to integrate extant knowledge and develop a more comprehensive understanding of belief dynamics.  相似文献   
8.
The recent trend of aging population, not to mention the unprecedented pandemic, draws great attention from the general public about health concerns. Since healthcare information technology is different from non-healthcare information technology, additional contexts should be properly incorporated into technology acceptance research to accurately identify influential factors affecting the acceptance of wearable healthcare technology. Thus, we selectively reconfigured factors from health, privacy, and socio-demographic contexts to formulate a health-aware acceptance model. Then, it was empirically analyzed using structural equation modeling. Based on the results, whereas privacy concerns were directly associated with intention to use wearable healthcare technology, health concerns were not. Moreover, age had a moderating effect on social influence and facilitating conditions. These findings suggest valuable insights that the adoption rate of healthcare technology is increased by 1) keeping personal information securely, 2) facilitating social interaction among users, and 3) offering intuitive user experience for elderly people.  相似文献   
9.
In model‐based refinery scheduling, the varying composition of the crude being refined is a major challenge, especially for those reaction processes. A classification based, multimodel approach is proposed to handle the frequently varying crude. The idea is to build a scheduling model for each type of feed crude, and the type can be determined using an online classifier. The recently emerged deep belief network is introduced to develop the classifier, which provides more accurate classification than the traditional neural network. The proposed method is demonstrated through modeling a fluidized catalytic cracking unit (the mostly affected by varying crude), and then the scheduling of a refinery that was carefully simulated to mimic the actual operation of a refinery in northern China. The results reveal that the multimodel approach is effective in handling varying crude. © 2014 American Institute of Chemical Engineers AIChE J, 60: 2525–2532, 2014  相似文献   
10.
针对复杂机电装备故障诊断中存在的数据量大、提取故障特征困难等问题,结合深度学习理论强大的感知与自我学习能力,提出一种基于深度信念网络和多信息融合的复杂机电装备故障诊断方法。将多个传感器的原始时域信号数据输入深度信念网络进行训练,通过反向微调学习对深度信念网络进行整体微调,提高分类准确性,同时在训练过程采用ReLu激活函数和加入Batch Normalization,减少过拟合出现概率的同时提高了网络收敛的速度。将此方法运用到复杂数控加工中心刀具的故障诊断中,结果表明该方法相比传统BPNN算法和采用Sigmoid激活函数的深度神经网络算法准确率更高。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号