首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   630篇
  免费   31篇
  国内免费   35篇
电工技术   5篇
综合类   23篇
化学工业   30篇
金属工艺   18篇
机械仪表   18篇
建筑科学   41篇
矿业工程   11篇
能源动力   8篇
轻工业   2篇
水利工程   39篇
石油天然气   7篇
武器工业   3篇
无线电   120篇
一般工业技术   17篇
冶金工业   30篇
原子能技术   1篇
自动化技术   323篇
  2023年   3篇
  2022年   3篇
  2021年   4篇
  2020年   7篇
  2019年   5篇
  2018年   10篇
  2017年   16篇
  2016年   18篇
  2015年   12篇
  2014年   22篇
  2013年   29篇
  2012年   32篇
  2011年   47篇
  2010年   31篇
  2009年   50篇
  2008年   45篇
  2007年   61篇
  2006年   43篇
  2005年   42篇
  2004年   42篇
  2003年   40篇
  2002年   18篇
  2001年   17篇
  2000年   20篇
  1999年   8篇
  1998年   10篇
  1997年   12篇
  1996年   7篇
  1995年   6篇
  1994年   8篇
  1993年   4篇
  1992年   6篇
  1991年   1篇
  1990年   3篇
  1989年   8篇
  1988年   1篇
  1987年   2篇
  1986年   1篇
  1985年   1篇
  1977年   1篇
排序方式: 共有696条查询结果,搜索用时 46 毫秒
1.
Although rainfall input uncertainties are widely identified as being a key factor in hydrological models, the rainfall uncertainty is typically not included in the parameter identification and model output uncertainty analysis of complex distributed models such as SWAT and in maritime climate zones. This paper presents a methodology to assess the uncertainty of semi-distributed hydrological models by including, in addition to a list of model parameters, additional unknown factors in the calibration algorithm to account for the rainfall uncertainty (using multiplication factors for each separately identified rainfall event) and for the heteroscedastic nature of the errors of the stream flow. We used the Differential Evolution Adaptive Metropolis algorithm (DREAM(zs)) to infer the parameter posterior distributions and the output uncertainties of a SWAT model of the River Senne (Belgium). Explicitly considering heteroscedasticity and rainfall uncertainty leads to more realistic parameter values, better representation of water balance components and prediction uncertainty intervals.  相似文献   
2.
Stream ciphers based on linear feedback shift register (LFSR) are suitable for constrained environments, such as satellite communications, radio frequency identification devices tag, sensor networks and Internet of Things, due to its simple hardware structures, high speed encryption and lower power consumption. LFSR, as a cryptographic primitive, has been used to generate a maximum period sequence. Because the switching of the status bits is regular, the power consumption of the LFSR is correlated in a linear way. As a result, the power consumption characteristics of stream cipher based on LFSR are vulnerable to leaking initialization vectors under the power attacks. In this paper, a new design of LFSR against power attacks is proposed. The power consumption characteristics of LFSR can be masked by using an additional LFSR and confused by adding a new filter Boolean function and a flip-flop. The design method has been implemented easily by circuits in this new design in comparison with the others.  相似文献   
3.
There is widespread application of indicators to the assessment of environmental condition of streams. These indicators are intended for use by managers in making various comparative and absolute assessments and often have a role in resource allocation and performance assessment. Therefore, the problem of formally defining confidence in the results is important but difficult because the sampling strategies used are commonly based on a compromise between the requirements of statistical rigour and the pragmatic issues of access and resources. It is rare to see this compromise explicitly considered and consequently there is seldom quantification of the uncertainty that could affect the confidence a manager has in an indicator. In this paper, we present a method for quantitatively assessing the tradeoffs between sampling density and uncertainty in meeting various monitoring objectives. Assessments using judgement‐based representative reaches are shown to be unreliable; instead a sampling approach is recommended based on the random selection of measuring sites. A detailed dataset was collected along two streams in Victoria, Australia, and the effect of sampling density was assessed by subsampling from this dataset with precision related to the number of sites assessed per reach length and the intensity of the sampling at each site. The sampling scheme to achieve a given precision is shown to depend on the monitoring objective. In particular, three objectives were considered: (1) making a baseline assessment of current condition; (2) change detection; and (3) detection of a critical threshold in condition. Change detection is shown to be more demanding than assessing baseline condition with additional sampling effort required to achieve the same precision. Sampling to detect a critical threshold depends on nominating acceptable values of Type I and II error and the size of the effect to be detected. Copyright © 2006 John Wiley & Sons, Ltd.  相似文献   
4.
For pseudo-random generators where one or several LFSRs are combined by a memoryless function, it is known that the output sequences are correlated to certain LFSR-sequences whose correlation coefficients c t satisfy the equation i c 2 i = 1. In this paper it is proved that a corresponding result also holds for generators whose LFSRs are connected to a combiner with memory.If correlation probabilities are conditioned on side information, e.g., on known output digits, it is shown that new or stronger correlations may occur. This is exemplified for the summation cipher with only two LFSRs where such correlations can be exploited in a known plaintext attack. A cryptanalytic algorithm is given which is shown to be successful for LFSRs of considerable length and with arbitrary feedback connection.A preliminary version of this paper was presented at Eurocrypt '90, May 21–24, Århus, Denmark, and has appeared in the proceedings, pp. 204–213.  相似文献   
5.
本文介绍了SIEMENS FM357多轴驱动模块的特点及在超薄快速铸钇铸咀布流控制系统中的应用,并对FM357的参数调协、各功能模块及数据模块的应用做了阐述。  相似文献   
6.
Previous research on scheduling and solar power issues of wireless sensor networks (WSNs) assumes that the sensors are deployed in a general environment. While monitoring the stream environment, sensors are attached to the stream side to collect the sensed data and transmit the data back to the sink. The stream environment can be scaled in several similar environments. This type of geographic limitation not only exists in a stream environment but also on streets, roads, and trails. This study presents an effective node-selection scheme to enhance the efficiency of saving power and coverage of solar-powered WSNs in a stream environment. Analysis of the sensor deployment in the stream environment permits sensors to be classified into different segments, and then allows the selection of active nodes for building inter-stream connections, inter-segment connections, and intra-segment connections. Based on these connections, the number of active nodes and transmitted packets is minimized. Simulation results show that this scheme can significantly increase the energy efficiency and maintain the monitoring area in solar-powered WSNs.  相似文献   
7.
Most stream data classification algorithms apply the supervised learning strategy which requires massive labeled data.Such approaches are impractical since labeled data are usually hard to obtain in re...  相似文献   
8.
介绍城市计算的技术内涵、数学模型及研究方法。包括数据流、图数据模型和排队论以及传感技术、城市数据管理、城市环境异构数据可视化等技术。并指出当前国内外的研究热点课题以及城市计算的应用和面临的挑战。  相似文献   
9.
10.
A survey on algorithms for mining frequent itemsets over data streams   总被引:9,自引:8,他引:1  
The increasing prominence of data streams arising in a wide range of advanced applications such as fraud detection and trend learning has led to the study of online mining of frequent itemsets (FIs). Unlike mining static databases, mining data streams poses many new challenges. In addition to the one-scan nature, the unbounded memory requirement and the high data arrival rate of data streams, the combinatorial explosion of itemsets exacerbates the mining task. The high complexity of the FI mining problem hinders the application of the stream mining techniques. We recognize that a critical review of existing techniques is needed in order to design and develop efficient mining algorithms and data structures that are able to match the processing rate of the mining with the high arrival rate of data streams. Within a unifying set of notations and terminologies, we describe in this paper the efforts and main techniques for mining data streams and present a comprehensive survey of a number of the state-of-the-art algorithms on mining frequent itemsets over data streams. We classify the stream-mining techniques into two categories based on the window model that they adopt in order to provide insights into how and why the techniques are useful. Then, we further analyze the algorithms according to whether they are exact or approximate and, for approximate approaches, whether they are false-positive or false-negative. We also discuss various interesting issues, including the merits and limitations in existing research and substantive areas for future research.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号