首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   782篇
  免费   44篇
  国内免费   35篇
电工技术   17篇
综合类   43篇
化学工业   53篇
金属工艺   43篇
机械仪表   121篇
建筑科学   28篇
矿业工程   11篇
能源动力   18篇
轻工业   12篇
水利工程   6篇
石油天然气   3篇
武器工业   12篇
无线电   108篇
一般工业技术   80篇
冶金工业   13篇
原子能技术   22篇
自动化技术   271篇
  2024年   1篇
  2023年   13篇
  2022年   12篇
  2021年   15篇
  2020年   19篇
  2019年   13篇
  2018年   13篇
  2017年   13篇
  2016年   24篇
  2015年   26篇
  2014年   38篇
  2013年   44篇
  2012年   55篇
  2011年   54篇
  2010年   45篇
  2009年   51篇
  2008年   48篇
  2007年   56篇
  2006年   45篇
  2005年   39篇
  2004年   34篇
  2003年   22篇
  2002年   43篇
  2001年   18篇
  2000年   24篇
  1999年   15篇
  1998年   12篇
  1997年   13篇
  1996年   9篇
  1995年   7篇
  1994年   6篇
  1993年   5篇
  1992年   8篇
  1991年   6篇
  1990年   4篇
  1988年   1篇
  1987年   3篇
  1986年   3篇
  1984年   2篇
  1982年   1篇
  1975年   1篇
排序方式: 共有861条查询结果,搜索用时 140 毫秒
1.
Optimal capacitor placement in distribution systems solved by the hybrid method of CODEQ (called HCODEQ method) is proposed in this work. The concepts of chaotic search, opposition-based learning, and quantum mechanics are used in the CODEQ method to overcome the drawback of parameters selection in the differential evolution (DE). However, a larger population size must be used in the CODEQ method. That is a drawback for all evolutionary algorithms (EAs). To overcome this drawback, acceleration operation and migrating operation are embedded into the CODEQ method, i.e. HCODEQ method. The use of these two operations can increase the convergence speed without decreasing the diversity among individuals. One benchmark function and various-scale capacitor placement systems are used to compare the performance of the proposed method, CODEQ method, DE, simulated annealing (SA), and ant system (AS). Numerical results show that the performance of the HCODEQ method is better than the other methods.  相似文献   
2.
Search algorithms for solving Numeric CSPs (Constraint Satisfaction Problems) make an extensive use of filtering techniques. In this paper1 we show how those filtering techniques can be accelerated by discovering and exploiting some regularities during the filtering process. Two kinds of regularities are discussed, cyclic phenomena in the propagation queue and numeric regularities of the domains of the variables. We also present in this paper an attempt to unify numeric CSPs solving methods from two distinct communities, that of CSP in artificial intelligence, and that of interval analysis.  相似文献   
3.
一种快速跟踪机动目标的并行算法   总被引:1,自引:0,他引:1  
针对机动目标的跟踪问题,采用一种完全解耦的卡尔曼滤波跟踪算法,即速度滤波器和加速度滤波器并行独立运算,加速度滤波器的输出用于校正速度滤波器的结果。根据探测到的目标机动性情况,加速度滤波器可实时切换。降低了滤波维数,从而使计算量和存贮量减少,提高实时性。仿真结果表明,该算法具有很好的跟踪性能。  相似文献   
4.
Algebraic properties of cryptosystem PGM   总被引:2,自引:0,他引:2  
In the late 1970s Magliveras invented a private-key cryptographic system calledPermutation Group Mappings (PGM). PGM is based on the prolific existence of certain kinds of factorization sets, calledlogarithmic signatures, for finite permutation groups. PGM is an endomorphic system with message space ℤ|G| for a given finite permutation groupG. In this paper we prove several algebraic properties of PGM. We show that the set of PGM transformations ℐ G is not closed under functional composition and hence not a group. This set is 2-transitive on ℤ|G| if the underlying groupG is not hamiltonian and not abelian. Moreover, if the order ofG is not a power of 2, then the set of transformations contains an odd permutation. An important consequence of these results is that the group generated by the set of transformations is nearly always the symmetric group ℒ|G|. Thus, allowing multiple encryption, any permutation of the message space is attainable. This property is one of the strongest security conditions that can be offered by a private-key encryption system. S. S. Magliveras was supported in part by NSF/NSA Grant Number MDA904-82-H0001, by U.S. West Communications, and by the Center for Communication and Information Science of the University of Nebraska.  相似文献   
5.
High acceleration of radar targets is analyzed using Acceleration Ambiguity Function(AAF). The acceleration resolution based on AAF is defined. The AAF and acceleration resolution of rectangle pulse signal are derivated and the conclusion that its acceleration resolution is in inverse proportion with the square of its duration is drawn. In the end, these conclusions are applied to the parameter designing and performance evaluation for a certain type of pulse Doppler radar.  相似文献   
6.
In an untraceable electronic cash protocol based on blind signatures, an identified customer can withdraw a blinded electronic cash from the bank and the unblinding operation is adopted by the customer to transform the blinded electronic cash into a valid one. Before performing the operation, the blinded electronic cash is protected well since attackers cannot convert it into a valid electronic cash without the blinding factor corresponding to the operation. However, after unblinding, the electronic cash will suffer from the theft attacks since it is not protected by any security mechanism. This paper introduces a new unblinding operation called ownership-attached unblinding which attaches the identities of a designated payee and a specified transaction to the blinded electronic cash and then produces an ownership-attached electronic cash other than a bare one such that the cash can withstand the theft attacks during the entire transaction because it is valid for the designated payee and the specified transaction only. Furthermore, the proposed scheme does not largely increase the computation cost required for each customer so that it also is a customer efficient protection solution for untraceable electronic cash and especially suitable for mobile clients and smart-card users.  相似文献   
7.
Three studies investigated conditions in which perceivers view dispositions and situations as interactive, rather than independent, causal forces when making judgments about another's personality. Study 1 showed that perceivers associated 5 common trait terms (e.g., friendly and shy) with characteristic if...then... (if situation a, then the person does x, but if situation b, then the person does y) personality signatures. Study 2 demonstrated that perceivers used information about a target's stable if...then... signature to infer the target's motives and traits; dispositional judgments were mediated by inferences about the target's motivations. Study 3 tested whether perceivers draw on if...then... signatures when making judgments about Big Five trait dimensions. Together, the findings indicate that perceivers take account of person-situation interactions (reflected in if...then... signatures) in everyday explanations of social behavior and personality dispositions. Boundary conditions are also discussed. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
8.
宋延清  赵康  张强 《计算机仿真》2012,29(3):162-166
关于涡扇发动机最优加速控问题,由于状态系统存在较强的非线性,控制性能差,改善发动机加速性,传统非线性规划算法求解过程中因采用罚函数处理约束条件而无法充分搜索控制参数的可行域。为提高系统性能,并充分挖掘发动机的加速特性,采用Sigma方法的多目标粒子群算法求解。可以在带限制因子的粒子群算法的基础上,利用粒子群算法的快速寻优能力和Sigma方法沿约束边界的充分搜索方法,求解发动机加速过程中控制参数,并进行仿真。结果证明,采用多目标粒子群算法优化后,加速时间缩短了约2.01s,结果表明改进方法是可行的,能在确保发动机安全工作的前提下,进一步提升了发动机的加速性能。  相似文献   
9.
介绍一种利于书写、绘画的笔形无线鼠标的设计。该笔形无线鼠标不仅具有传统无线鼠标的所有功能,还在外形结构及定位方式上有了人性化的改进。首先将传统鼠标形状改为笔形设计更利于书写、绘画时使用,其次将光学定位改用加速度传感器定位设计,使其可以脱离桌面悬空使用。调查表明,笔形无线鼠标具有广泛的应用领域。  相似文献   
10.
在P2P网络中实现电子拍卖的功能对于P2P技术具有重要意义,这将意味着电子商务同样可以在P2P网络中广泛应用.然而,匿名性、投标价保密性、抗勾结性等安全问题一直是电子拍卖研究的难点问题,一种合理的解决方法是将盲签名、知识证明、可验证的数字签名加密算法引入到电子拍卖协议中.这样不仅可以很好地解决P2P网络无中心服务器的不足,还使得系统的安全性能得到显著提高.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号