全文获取类型
收费全文 | 4754篇 |
免费 | 712篇 |
国内免费 | 560篇 |
专业分类
电工技术 | 391篇 |
综合类 | 569篇 |
化学工业 | 109篇 |
金属工艺 | 59篇 |
机械仪表 | 233篇 |
建筑科学 | 150篇 |
矿业工程 | 106篇 |
能源动力 | 83篇 |
轻工业 | 67篇 |
水利工程 | 88篇 |
石油天然气 | 47篇 |
武器工业 | 58篇 |
无线电 | 549篇 |
一般工业技术 | 318篇 |
冶金工业 | 264篇 |
原子能技术 | 9篇 |
自动化技术 | 2926篇 |
出版年
2024年 | 7篇 |
2023年 | 90篇 |
2022年 | 126篇 |
2021年 | 127篇 |
2020年 | 167篇 |
2019年 | 149篇 |
2018年 | 102篇 |
2017年 | 165篇 |
2016年 | 200篇 |
2015年 | 196篇 |
2014年 | 297篇 |
2013年 | 283篇 |
2012年 | 327篇 |
2011年 | 387篇 |
2010年 | 322篇 |
2009年 | 361篇 |
2008年 | 349篇 |
2007年 | 392篇 |
2006年 | 298篇 |
2005年 | 275篇 |
2004年 | 219篇 |
2003年 | 184篇 |
2002年 | 154篇 |
2001年 | 119篇 |
2000年 | 113篇 |
1999年 | 80篇 |
1998年 | 78篇 |
1997年 | 65篇 |
1996年 | 62篇 |
1995年 | 49篇 |
1994年 | 58篇 |
1993年 | 39篇 |
1992年 | 27篇 |
1991年 | 22篇 |
1990年 | 14篇 |
1989年 | 11篇 |
1988年 | 10篇 |
1987年 | 10篇 |
1986年 | 5篇 |
1985年 | 6篇 |
1984年 | 11篇 |
1983年 | 4篇 |
1982年 | 4篇 |
1981年 | 5篇 |
1980年 | 5篇 |
1979年 | 6篇 |
1978年 | 4篇 |
1965年 | 4篇 |
1964年 | 7篇 |
1961年 | 3篇 |
排序方式: 共有6026条查询结果,搜索用时 15 毫秒
1.
Jiming Xu Howard M. Heys 《International Journal of Circuit Theory and Applications》2019,47(6):971-990
Side-channel attacks have shown to be efficient tools in breaking cryptographic hardware. Many conventional algorithms have been proposed to perform side-channel attacks exploiting the dynamic power leakage. In recent years, with the development of processing technology, static power has emerged as a new potential source for side-channel leakage. Both types of power leakage have their advantages and disadvantages. In this work, we propose to use the deep neural network technique to combine the benefits of both static and dynamic power. This approach replaces the classifier in template attacks with our proposed long short-term memory network schemes. Hence, instead of deriving a specific probability density model for one particular type of power leakage, we gain the ability of combining different leakage sources using a structural algorithm. In this paper, we propose three schemes to combine the static and dynamic power leakage. The performance of these schemes is compared using simulated test circuits designed with a 45-nm library. 相似文献
2.
Paul-Baptiste Rubio François Louf Ludovic Chamoin 《International journal for numerical methods in engineering》2019,120(4):447-472
The motivation of this work is to address real-time sequential inference of parameters with a full Bayesian formulation. First, the proper generalized decomposition (PGD) is used to reduce the computational evaluation of the posterior density in the online phase. Second, Transport Map sampling is used to build a deterministic coupling between a reference measure and the posterior measure. The determination of the transport maps involves the solution of a minimization problem. As the PGD model is quasi-analytical and under a variable separation form, the use of gradient and Hessian information speeds up the minimization algorithm. Eventually, uncertainty quantification on outputs of interest of the model can be easily performed due to the global feature of the PGD solution over all coordinate domains. Numerical examples highlight the performance of the method. 相似文献
3.
4.
A Takagi-Sugeno adaptive neuro-fuzzy inference system (TSFIS) model is developed and applied to a dataset of wellhead flow-test data for the Resalat oil field located offshore southern Iran, the objective is to assist in the prediction and control of multi-phase flow rates of oil and gas through the wellhead chokes. For this purpose, 182 test data points (Appendix 1) related to the Resalat field are evaluated. In order to predict production flow rate (QL) expressed as stock-tank barrels per day (STB/D), this dataset includes four selected input variables: upstream pressure (Pwh); wellhead choke sizes (D64); gas to liquid ratio (GLR); and, base solids and water including some water-soluble oil emulsion (BS&W). The test data points evaluated include a wide range of oil flow rate conditions and values for the four input variables recorded. The TSFIS algorithm applied involves five data processing steps: a) pre-processing, b) fuzzification, c) rules base and adaptive neuro-fuzzy inference engine, d) defuzzification, and e) post-processing of the fuzzy model. The developed TSFIS model for the Resalat oil field database predicted oil flow rate to a high degree of accuracy (root mean square error = 247 STB/D, correlation coefficient = 0.9987), which improves substantially on the commonly used empirical algorithms used for such predictions. TSFIS can potentially be applied in wellhead choke fuzzy controllers to stabilize flow in specific wells based on real-time input data records. 相似文献
5.
Qianchen YU Zhiwen YU Zhu WANG Xiaofeng WANG Yongzhi WANG 《Frontiers of Computer Science》2020,14(6):146323
Overlapping community detection has become a very hot research topic in recent decades, and a plethora of methods have been proposed. But, a common challenge in many existing overlapping community detection approaches is that the number of communities K must be predefinedmanually. We propose a flexible nonparametric Bayesian generative model for count-value networks, which can allow K to increase as more and more data are encountered instead of to be fixed in advance. The Indian buffet process was used to model the community assignment matrix Z, and an uncollapsed Gibbs sampler has been derived.However, as the community assignment matrix Z is a structured multi-variable parameter, how to summarize the posterior inference results and estimate the inference quality about Z, is still a considerable challenge in the literature. In this paper, a graph convolutional neural network based graph classifier was utilized to help to summarize the results and to estimate the inference quality about Z. We conduct extensive experiments on synthetic data and real data, and find that empirically, the traditional posterior summarization strategy is reliable. 相似文献
6.
Hamidreza Jafarnejadsani Neng Wan Naira Hovakimyan Petros G. Voulgaris 《国际强度与非线性控制杂志
》2020,30(3):1071-1097
》2020,30(3):1071-1097
Autonomous systems are rapidly becoming an integrated part of the modern life. Safe and secure navigation and control of these systems present significant challenges in the presence of uncertainties, physical failures, and cyber attacks. In this paper, we formulate a navigation and control problem for autonomous systems using a multilevel control structure, in which the high‐level reference commands are limited by a saturation function, whereas the low‐level controller tracks the reference by compensating for disturbances and uncertainties. For this purpose, we consider a class of nested, uncertain, multiple‐input–multiple‐output systems subject to reference command saturation, possibly with nonminimum phase zeros. A multirate output‐feedback adaptive controller is developed as the low‐level controller. The sampled‐data (SD) design of this controller facilitates the direct implementation on digital computers, where the input/output signals are available at discrete time instances with different sampling rates. In addition, stealthy zero‐dynamics attacks become detectable by considering a multirate SD formulation. Robust stability and performance of the overall closed‐loop system with command saturation and multirate adaptive control are analyzed. Simulation scenarios for navigation and control of a fixed‐wing drone under failures/attacks are provided to validate the theoretical findings. 相似文献
7.
This paper presents a new method for copy-move forgery detection of duplicated objects. A bounding rectangle is drawn around the detected object to form a sub-image. Morphological operator is used to remove the unnecessary small objects. Highly accurate polar complex exponential transform moments are used as features for the detected objects. Euclidian distance and correlation coefficient between the feature vectors are calculated and used for searching the similar objects. A set of 20 forged images with duplicated objects is carefully selected from previously published works. Additional 80 non-forged images are edited by the authors and forged by duplicating different kinds of objects. Numerical simulation is performed where the results show that the proposed method successfully detect different kinds of duplicated objects. The proposed method is much faster than the previously existing methods. Also, it exhibits high robustness to various attacks such as additive white Gaussian noise, JPEG compression, rotation, and scaling. 相似文献
8.
为了使7075铝合金薄壁件表面喷丸加工应力得到松弛和均化,运用ANSYS建立平台式振动时效有限元模型,通过振动模态和谐响应分析,获得最佳激振频率和试样装夹位置。在此基础上,将薄壁框架件置于平台上进行振动时效处理,以验证仿真分析结果,评价其对试样表面应力作用效果。结果表明:在亚共振频率为112 Hz时,试样在平台零振幅和最大弯曲位置处分别对称布置,时效后表面均形成应力松弛,松弛率分别为29.5%和33.3%,不均匀波动分别为20.3%和20.7%,而沿振动方向松弛程度不均匀,说明激振力造成了材料表面组织屈服,且屈服程度与应力强度有关。提出再时效-位置交叠方法,使应力松弛不均匀度分别下降到9.9%和15.9%,应力均化得到改善,该研究工作为薄壁类零件表面应力均匀化提供了参考。 相似文献
9.
In this paper, the development of the models for the prediction of rock mass P wave velocity is presented. For model development, the database of 53 cases including widely used and recorded drilling parameters and P wave velocity was constructed from the field studies conducted in 13 open pit lignite mines. Both conventional linear, non-linear multiple regression and Adaptive Neuro Fuzzy Inference System (ANFIS) were used for model development. Prediction performance indicators showed that ANFIS model presented the best performance and it can successfully be used for the preliminary prediction of P wave velocities of rock masses. 相似文献
10.
Ching‐Ter Chang 《International Transactions in Operational Research》2021,28(1):493-511
Interval goal programming (IGP) with a marginal penalty function (PF) was first proposed by Charnes and Collomb in 1972, and further improved by Kvanli and other researchers. Recently, Lu and Chen proposed an efficient logarithmic method to formulate IGP with an S‐shaped PF. However, their method requires adding many binary variables when the problem size becomes large, which increases the computational burden in the solution process. This study proposes an efficient approach for the S‐shaped PF. The arbitrary PF frequently appears in the fields of business and industry. However, none of the previous approaches have addressed arbitrary PFs without adding binary variables. The proposed approach can be easily extended to formulate an arbitrary PF in which binary variables are no longer required, regardless of the number of break points. The proposed method can improve the efficiency of IGP for solving large size management and decision problems in considering PFs. In order to demonstrate the correctness, usefulness of the proposed model, illustrative examples are provided. 相似文献