首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4754篇
  免费   712篇
  国内免费   560篇
电工技术   391篇
综合类   569篇
化学工业   109篇
金属工艺   59篇
机械仪表   233篇
建筑科学   150篇
矿业工程   106篇
能源动力   83篇
轻工业   67篇
水利工程   88篇
石油天然气   47篇
武器工业   58篇
无线电   549篇
一般工业技术   318篇
冶金工业   264篇
原子能技术   9篇
自动化技术   2926篇
  2024年   7篇
  2023年   90篇
  2022年   126篇
  2021年   127篇
  2020年   167篇
  2019年   149篇
  2018年   102篇
  2017年   165篇
  2016年   200篇
  2015年   196篇
  2014年   297篇
  2013年   283篇
  2012年   327篇
  2011年   387篇
  2010年   322篇
  2009年   361篇
  2008年   349篇
  2007年   392篇
  2006年   298篇
  2005年   275篇
  2004年   219篇
  2003年   184篇
  2002年   154篇
  2001年   119篇
  2000年   113篇
  1999年   80篇
  1998年   78篇
  1997年   65篇
  1996年   62篇
  1995年   49篇
  1994年   58篇
  1993年   39篇
  1992年   27篇
  1991年   22篇
  1990年   14篇
  1989年   11篇
  1988年   10篇
  1987年   10篇
  1986年   5篇
  1985年   6篇
  1984年   11篇
  1983年   4篇
  1982年   4篇
  1981年   5篇
  1980年   5篇
  1979年   6篇
  1978年   4篇
  1965年   4篇
  1964年   7篇
  1961年   3篇
排序方式: 共有6026条查询结果,搜索用时 15 毫秒
1.
Side-channel attacks have shown to be efficient tools in breaking cryptographic hardware. Many conventional algorithms have been proposed to perform side-channel attacks exploiting the dynamic power leakage. In recent years, with the development of processing technology, static power has emerged as a new potential source for side-channel leakage. Both types of power leakage have their advantages and disadvantages. In this work, we propose to use the deep neural network technique to combine the benefits of both static and dynamic power. This approach replaces the classifier in template attacks with our proposed long short-term memory network schemes. Hence, instead of deriving a specific probability density model for one particular type of power leakage, we gain the ability of combining different leakage sources using a structural algorithm. In this paper, we propose three schemes to combine the static and dynamic power leakage. The performance of these schemes is compared using simulated test circuits designed with a 45-nm library.  相似文献   
2.
The motivation of this work is to address real-time sequential inference of parameters with a full Bayesian formulation. First, the proper generalized decomposition (PGD) is used to reduce the computational evaluation of the posterior density in the online phase. Second, Transport Map sampling is used to build a deterministic coupling between a reference measure and the posterior measure. The determination of the transport maps involves the solution of a minimization problem. As the PGD model is quasi-analytical and under a variable separation form, the use of gradient and Hessian information speeds up the minimization algorithm. Eventually, uncertainty quantification on outputs of interest of the model can be easily performed due to the global feature of the PGD solution over all coordinate domains. Numerical examples highlight the performance of the method.  相似文献   
3.
4.
A Takagi-Sugeno adaptive neuro-fuzzy inference system (TSFIS) model is developed and applied to a dataset of wellhead flow-test data for the Resalat oil field located offshore southern Iran, the objective is to assist in the prediction and control of multi-phase flow rates of oil and gas through the wellhead chokes. For this purpose, 182 test data points (Appendix 1) related to the Resalat field are evaluated. In order to predict production flow rate (QL) expressed as stock-tank barrels per day (STB/D), this dataset includes four selected input variables: upstream pressure (Pwh); wellhead choke sizes (D64); gas to liquid ratio (GLR); and, base solids and water including some water-soluble oil emulsion (BS&W). The test data points evaluated include a wide range of oil flow rate conditions and values for the four input variables recorded. The TSFIS algorithm applied involves five data processing steps: a) pre-processing, b) fuzzification, c) rules base and adaptive neuro-fuzzy inference engine, d) defuzzification, and e) post-processing of the fuzzy model. The developed TSFIS model for the Resalat oil field database predicted oil flow rate to a high degree of accuracy (root mean square error = 247 STB/D, correlation coefficient = 0.9987), which improves substantially on the commonly used empirical algorithms used for such predictions. TSFIS can potentially be applied in wellhead choke fuzzy controllers to stabilize flow in specific wells based on real-time input data records.  相似文献   
5.
Overlapping community detection has become a very hot research topic in recent decades, and a plethora of methods have been proposed. But, a common challenge in many existing overlapping community detection approaches is that the number of communities K must be predefinedmanually. We propose a flexible nonparametric Bayesian generative model for count-value networks, which can allow K to increase as more and more data are encountered instead of to be fixed in advance. The Indian buffet process was used to model the community assignment matrix Z, and an uncollapsed Gibbs sampler has been derived.However, as the community assignment matrix Z is a structured multi-variable parameter, how to summarize the posterior inference results and estimate the inference quality about Z, is still a considerable challenge in the literature. In this paper, a graph convolutional neural network based graph classifier was utilized to help to summarize the results and to estimate the inference quality about Z. We conduct extensive experiments on synthetic data and real data, and find that empirically, the traditional posterior summarization strategy is reliable.  相似文献   
6.
Autonomous systems are rapidly becoming an integrated part of the modern life. Safe and secure navigation and control of these systems present significant challenges in the presence of uncertainties, physical failures, and cyber attacks. In this paper, we formulate a navigation and control problem for autonomous systems using a multilevel control structure, in which the high‐level reference commands are limited by a saturation function, whereas the low‐level controller tracks the reference by compensating for disturbances and uncertainties. For this purpose, we consider a class of nested, uncertain, multiple‐input–multiple‐output systems subject to reference command saturation, possibly with nonminimum phase zeros. A multirate output‐feedback adaptive controller is developed as the low‐level controller. The sampled‐data (SD) design of this controller facilitates the direct implementation on digital computers, where the input/output signals are available at discrete time instances with different sampling rates. In addition, stealthy zero‐dynamics attacks become detectable by considering a multirate SD formulation. Robust stability and performance of the overall closed‐loop system with command saturation and multirate adaptive control are analyzed. Simulation scenarios for navigation and control of a fixed‐wing drone under failures/attacks are provided to validate the theoretical findings.  相似文献   
7.
This paper presents a new method for copy-move forgery detection of duplicated objects. A bounding rectangle is drawn around the detected object to form a sub-image. Morphological operator is used to remove the unnecessary small objects. Highly accurate polar complex exponential transform moments are used as features for the detected objects. Euclidian distance and correlation coefficient between the feature vectors are calculated and used for searching the similar objects. A set of 20 forged images with duplicated objects is carefully selected from previously published works. Additional 80 non-forged images are edited by the authors and forged by duplicating different kinds of objects. Numerical simulation is performed where the results show that the proposed method successfully detect different kinds of duplicated objects. The proposed method is much faster than the previously existing methods. Also, it exhibits high robustness to various attacks such as additive white Gaussian noise, JPEG compression, rotation, and scaling.  相似文献   
8.
为了使7075铝合金薄壁件表面喷丸加工应力得到松弛和均化,运用ANSYS建立平台式振动时效有限元模型,通过振动模态和谐响应分析,获得最佳激振频率和试样装夹位置。在此基础上,将薄壁框架件置于平台上进行振动时效处理,以验证仿真分析结果,评价其对试样表面应力作用效果。结果表明:在亚共振频率为112 Hz时,试样在平台零振幅和最大弯曲位置处分别对称布置,时效后表面均形成应力松弛,松弛率分别为29.5%和33.3%,不均匀波动分别为20.3%和20.7%,而沿振动方向松弛程度不均匀,说明激振力造成了材料表面组织屈服,且屈服程度与应力强度有关。提出再时效-位置交叠方法,使应力松弛不均匀度分别下降到9.9%和15.9%,应力均化得到改善,该研究工作为薄壁类零件表面应力均匀化提供了参考。  相似文献   
9.
In this paper, the development of the models for the prediction of rock mass P wave velocity is presented. For model development, the database of 53 cases including widely used and recorded drilling parameters and P wave velocity was constructed from the field studies conducted in 13 open pit lignite mines. Both conventional linear, non-linear multiple regression and Adaptive Neuro Fuzzy Inference System (ANFIS) were used for model development. Prediction performance indicators showed that ANFIS model presented the best performance and it can successfully be used for the preliminary prediction of P wave velocities of rock masses.  相似文献   
10.
Interval goal programming (IGP) with a marginal penalty function (PF) was first proposed by Charnes and Collomb in 1972, and further improved by Kvanli and other researchers. Recently, Lu and Chen proposed an efficient logarithmic method to formulate IGP with an S‐shaped PF. However, their method requires adding many binary variables when the problem size becomes large, which increases the computational burden in the solution process. This study proposes an efficient approach for the S‐shaped PF. The arbitrary PF frequently appears in the fields of business and industry. However, none of the previous approaches have addressed arbitrary PFs without adding binary variables. The proposed approach can be easily extended to formulate an arbitrary PF in which binary variables are no longer required, regardless of the number of break points. The proposed method can improve the efficiency of IGP for solving large size management and decision problems in considering PFs. In order to demonstrate the correctness, usefulness of the proposed model, illustrative examples are provided.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号