首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1209篇
  免费   117篇
  国内免费   5篇
电工技术   9篇
化学工业   427篇
金属工艺   35篇
机械仪表   36篇
建筑科学   35篇
能源动力   75篇
轻工业   197篇
水利工程   25篇
石油天然气   13篇
无线电   86篇
一般工业技术   181篇
冶金工业   27篇
原子能技术   7篇
自动化技术   178篇
  2024年   5篇
  2023年   24篇
  2022年   49篇
  2021年   120篇
  2020年   110篇
  2019年   93篇
  2018年   123篇
  2017年   120篇
  2016年   96篇
  2015年   52篇
  2014年   102篇
  2013年   120篇
  2012年   85篇
  2011年   67篇
  2010年   52篇
  2009年   35篇
  2008年   26篇
  2007年   14篇
  2006年   8篇
  2005年   9篇
  2004年   4篇
  2003年   1篇
  2002年   2篇
  2001年   1篇
  1998年   1篇
  1997年   1篇
  1995年   1篇
  1993年   1篇
  1992年   1篇
  1991年   1篇
  1990年   2篇
  1988年   1篇
  1985年   2篇
  1984年   1篇
  1982年   1篇
排序方式: 共有1331条查询结果,搜索用时 15 毫秒
1.
2.
This paper deals with the problem of designing a robust static output feedback controller for polytopic systems. The current research that tackled this problem is mainly based on LMI method, which is conservative by nature. In this paper, a novel approach is proposed, which considers the design space of the controller parameters and iteratively partitions the space to small simplexes. Then, by assessing the stability in each simplex, the solution space for design parameters is directly determined. It has been theoretically proved that, if there exists a feasible solution in the design space, the algorithm can find it. To validate the result of the proposed approach, comparative simulation examples are given to illustrate the performance of the design methodology as compared to those of previous approaches.  相似文献   
3.
4.
A new, efficient and recoverable heterogeneous catalyst was successfully synthesized by functionalization of mesoporous silica FSM-16. The FSM-16/CPTMS-Rh-  相似文献   
5.
Salehi  Maryam  Zavarian  Ali Asghar  Arman  Ali  Hafezi  Fatemeh  Rad  Ghasem Amraee  Mardani  Mohsen  Hamze  Kooros  Luna  Carlos  Naderi  Sirvan  Ahmadpourian  Azin 《SILICON》2018,10(6):2743-2749
Silicon - The characterization of ion beam current density distribution and beam uniformity is crucial for improving broad-beam ion source technologies. The design of the broad ion beam extraction...  相似文献   
6.
Vicious codes, especially viruses, as a kind of impressive malware have caused many disasters and continue to exploit more vulnerabilities. These codes are injected inside benign programs in order to abuse their hosts and ease their propagation. The offsets of injected virus codes are unknown and their targets usually are latent until they are executed and activated, what in turn makes viruses very hard to detect. In this paper enriched control flow graph miner, ECFGM in short, is presented to detect infected files corrupted by unknown viruses. ECFGM uses enriched control flow graph model to represent the benign and vicious codes. This model has more information than traditional control flow graph (CFG) by utilizing statistical information of dependent assembly instructions and API calls. To the best of our knowledge, the presented approach in this paper, for the first time, can recognize the offset of infected code of unknown viruses in the victim files. The main contributions of this paper are two folds: first, the presented model is able to detect unknown vicious code using ECFG model with reasonable complexity and desirable accuracy. Second, our approach is resistant against metamorphic viruses which utilize dead code insertion, variable renaming and instruction reordering methods.  相似文献   
7.

Most of the commonly used hydrological models do not account for the actual evapotranspiration (ETa) as a key contributor to water loss in semi-arid/arid regions. In this study, the HEC-HMS (Hydrologic Engineering Center Hydrologic Modeling System) model was calibrated, modified, and its performance in simulating runoff resulting from short-duration rainfall events was evaluated. The model modifications included integrating spatially distributed ETa, calculated using the surface energy balance system (SEBS), into the model. Evaluating the model’s performance in simulating runoff showed that the default HEC-HMS model underestimated the runoff with root mean squared error (RMSE) of 0.14 m3/s (R2?=?0.92) while incorporating SEBS ETa into the model reduced RMSE to 0.01 m3/s (R2?=?0.99). The integration of HECHMS and SEBS resulted in smaller and more realistic latent heat flux estimates translated into a lower water loss rate and a higher magnitude of runoff simulated by the HECHMS model. The difference between runoff simulations using the default and modified model translated into an average of 95,000 m3 runoff per rainfall event (equal to seasonal water requirement of ten-hectare winter wheat) that could be planned and triggered for agricultural purposes, flood harvesting, and groundwater recharge in the region. The effect of ETa on the simulated runoff volume is expected to be more pronounced during high evaporative demand periods, longer rainfall events, and larger catchments. The outcome of this study signifies the importance of implementing accurate estimates of evapotranspiration into a hydrological model.

  相似文献   
8.
Nowadays malware is one of the serious problems in the modern societies. Although the signature based malicious code detection is the standard technique in all commercial antivirus softwares, it can only achieve detection once the virus has already caused damage and it is registered. Therefore, it fails to detect new malwares (unknown malwares). Since most of malwares have similar behavior, a behavior based method can detect unknown malwares. The behavior of a program can be represented by a set of called API's (application programming interface). Therefore, a classifier can be employed to construct a learning model with a set of programs' API calls. Finally, an intelligent malware detection system is developed to detect unknown malwares automatically. On the other hand, we have an appealing representation model to visualize the executable files structure which is control flow graph (CFG). This model represents another semantic aspect of programs. This paper presents a robust semantic based method to detect unknown malwares based on combination of a visualize model (CFG) and called API's. The main contribution of this paper is extracting CFG from programs and combining it with extracted API calls to have more information about executable files. This new representation model is called API-CFG. In addition, to have fast learning and classification process, the control flow graphs are converted to a set of feature vectors by a nice trick. Our approach is capable of classifying unseen benign and malicious code with high accuracy. The results show a statistically significant improvement over n-grams based detection method.  相似文献   
9.
The three-component reaction between amine, carbonyl compound and thioglycolic acid is now considered as a major strategy for synthesis of 1,3-thiazolidin-4-ones, which consists of the following steps: (i) condensation of aldehyde and amine which results the formation of an imine; (ii) the reaction between thioglycolic acid and the imine which is followed by an intramolecular cyclization reaction, which leads to the formation of the final product. In this way, if no suitable catalyst is employed, the completion of the reaction will not be achieved. Hence, it is of great importance to select an appropriate catalyst so that these compounds can be successfully synthesized. Herein, we employed LDHs@PpPDA as a versatile catalyst for the fabrication of novel derivatives of 1,3-thiazolidin-4-one.  相似文献   
10.
With the high availability of digital video contents on the internet, users need more assistance to access digital videos. Various researches have been done about video summarization and semantic video analysis to help to satisfy these needs. These works are developing condensed versions of a full length video stream through the identification of the most important and pertinent content within the stream. Most of the existing works in these areas are mainly focused on event mining. Event mining from video streams improves the accessibility and reusability of large media collections, and it has been an active area of research with notable recent progress. Event mining includes a wide range of multimedia domains such as surveillance, meetings, broadcast, news, sports, documentary, and films, as well as personal and online media collections. Due to the variety and plenty of Event mining techniques, in this paper we suggest an analytical framework to classify event mining techniques and to evaluate them based on important functional measures. This framework could lead to empirical and technical comparison of event mining methods and development of more efficient structures at future.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号