全文获取类型
收费全文 | 782篇 |
免费 | 44篇 |
国内免费 | 35篇 |
专业分类
电工技术 | 17篇 |
综合类 | 43篇 |
化学工业 | 53篇 |
金属工艺 | 43篇 |
机械仪表 | 121篇 |
建筑科学 | 28篇 |
矿业工程 | 11篇 |
能源动力 | 18篇 |
轻工业 | 12篇 |
水利工程 | 6篇 |
石油天然气 | 3篇 |
武器工业 | 12篇 |
无线电 | 108篇 |
一般工业技术 | 80篇 |
冶金工业 | 13篇 |
原子能技术 | 22篇 |
自动化技术 | 271篇 |
出版年
2024年 | 1篇 |
2023年 | 13篇 |
2022年 | 12篇 |
2021年 | 15篇 |
2020年 | 19篇 |
2019年 | 13篇 |
2018年 | 13篇 |
2017年 | 13篇 |
2016年 | 24篇 |
2015年 | 26篇 |
2014年 | 38篇 |
2013年 | 44篇 |
2012年 | 55篇 |
2011年 | 54篇 |
2010年 | 45篇 |
2009年 | 51篇 |
2008年 | 48篇 |
2007年 | 56篇 |
2006年 | 45篇 |
2005年 | 39篇 |
2004年 | 34篇 |
2003年 | 22篇 |
2002年 | 43篇 |
2001年 | 18篇 |
2000年 | 24篇 |
1999年 | 15篇 |
1998年 | 12篇 |
1997年 | 13篇 |
1996年 | 9篇 |
1995年 | 7篇 |
1994年 | 6篇 |
1993年 | 5篇 |
1992年 | 8篇 |
1991年 | 6篇 |
1990年 | 4篇 |
1988年 | 1篇 |
1987年 | 3篇 |
1986年 | 3篇 |
1984年 | 2篇 |
1982年 | 1篇 |
1975年 | 1篇 |
排序方式: 共有861条查询结果,搜索用时 140 毫秒
1.
Optimal capacitor placement in distribution systems solved by the hybrid method of CODEQ (called HCODEQ method) is proposed in this work. The concepts of chaotic search, opposition-based learning, and quantum mechanics are used in the CODEQ method to overcome the drawback of parameters selection in the differential evolution (DE). However, a larger population size must be used in the CODEQ method. That is a drawback for all evolutionary algorithms (EAs). To overcome this drawback, acceleration operation and migrating operation are embedded into the CODEQ method, i.e. HCODEQ method. The use of these two operations can increase the convergence speed without decreasing the diversity among individuals. One benchmark function and various-scale capacitor placement systems are used to compare the performance of the proposed method, CODEQ method, DE, simulated annealing (SA), and ant system (AS). Numerical results show that the performance of the HCODEQ method is better than the other methods. 相似文献
2.
Yahia Lebbah 《Artificial Intelligence》2002,139(1):109-132
Search algorithms for solving Numeric CSPs (Constraint Satisfaction Problems) make an extensive use of filtering techniques. In this paper1 we show how those filtering techniques can be accelerated by discovering and exploiting some regularities during the filtering process. Two kinds of regularities are discussed, cyclic phenomena in the propagation queue and numeric regularities of the domains of the variables. We also present in this paper an attempt to unify numeric CSPs solving methods from two distinct communities, that of CSP in artificial intelligence, and that of interval analysis. 相似文献
3.
4.
Algebraic properties of cryptosystem PGM 总被引:2,自引:0,他引:2
In the late 1970s Magliveras invented a private-key cryptographic system calledPermutation Group Mappings (PGM). PGM is based on the prolific existence of certain kinds of factorization sets, calledlogarithmic signatures, for finite permutation groups. PGM is an endomorphic system with message space ℤ|G| for a given finite permutation groupG. In this paper we prove several algebraic properties of PGM. We show that the set of PGM transformations ℐ
G
is not closed under functional composition and hence not a group. This set is 2-transitive on ℤ|G| if the underlying groupG is not hamiltonian and not abelian. Moreover, if the order ofG is not a power of 2, then the set of transformations contains an odd permutation. An important consequence of these results
is that the group generated by the set of transformations is nearly always the symmetric group ℒ|G|. Thus, allowing multiple encryption, any permutation of the message space is attainable. This property is one of the strongest
security conditions that can be offered by a private-key encryption system.
S. S. Magliveras was supported in part by NSF/NSA Grant Number MDA904-82-H0001, by U.S. West Communications, and by the Center
for Communication and Information Science of the University of Nebraska. 相似文献
5.
ZhaoHongzhong ZhouJianxiong LiWeimin FuQiang 《电子科学学刊(英文版)》2003,20(6):401-406
High acceleration of radar targets is analyzed using Acceleration Ambiguity Function(AAF). The acceleration resolution based on AAF is defined. The AAF and acceleration resolution of rectangle pulse signal are derivated and the conclusion that its acceleration resolution is in inverse proportion with the square of its duration is drawn. In the end, these conclusions are applied to the parameter designing and performance evaluation for a certain type of pulse Doppler radar. 相似文献
6.
Chun-I Fan 《Information Sciences》2006,176(3):263-284
In an untraceable electronic cash protocol based on blind signatures, an identified customer can withdraw a blinded electronic cash from the bank and the unblinding operation is adopted by the customer to transform the blinded electronic cash into a valid one. Before performing the operation, the blinded electronic cash is protected well since attackers cannot convert it into a valid electronic cash without the blinding factor corresponding to the operation. However, after unblinding, the electronic cash will suffer from the theft attacks since it is not protected by any security mechanism. This paper introduces a new unblinding operation called ownership-attached unblinding which attaches the identities of a designated payee and a specified transaction to the blinded electronic cash and then produces an ownership-attached electronic cash other than a bare one such that the cash can withstand the theft attacks during the entire transaction because it is valid for the designated payee and the specified transaction only. Furthermore, the proposed scheme does not largely increase the computation cost required for each customer so that it also is a customer efficient protection solution for untraceable electronic cash and especially suitable for mobile clients and smart-card users. 相似文献
7.
Kammrath Lara K.; Mendoza-Denton Rodolfo; Mischel Walter 《Canadian Metallurgical Quarterly》2005,88(4):605
Three studies investigated conditions in which perceivers view dispositions and situations as interactive, rather than independent, causal forces when making judgments about another's personality. Study 1 showed that perceivers associated 5 common trait terms (e.g., friendly and shy) with characteristic if...then... (if situation a, then the person does x, but if situation b, then the person does y) personality signatures. Study 2 demonstrated that perceivers used information about a target's stable if...then... signature to infer the target's motives and traits; dispositional judgments were mediated by inferences about the target's motivations. Study 3 tested whether perceivers draw on if...then... signatures when making judgments about Big Five trait dimensions. Together, the findings indicate that perceivers take account of person-situation interactions (reflected in if...then... signatures) in everyday explanations of social behavior and personality dispositions. Boundary conditions are also discussed. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
8.
关于涡扇发动机最优加速控问题,由于状态系统存在较强的非线性,控制性能差,改善发动机加速性,传统非线性规划算法求解过程中因采用罚函数处理约束条件而无法充分搜索控制参数的可行域。为提高系统性能,并充分挖掘发动机的加速特性,采用Sigma方法的多目标粒子群算法求解。可以在带限制因子的粒子群算法的基础上,利用粒子群算法的快速寻优能力和Sigma方法沿约束边界的充分搜索方法,求解发动机加速过程中控制参数,并进行仿真。结果证明,采用多目标粒子群算法优化后,加速时间缩短了约2.01s,结果表明改进方法是可行的,能在确保发动机安全工作的前提下,进一步提升了发动机的加速性能。 相似文献
9.
10.