首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   971篇
  免费   51篇
  国内免费   15篇
电工技术   19篇
综合类   4篇
化学工业   246篇
金属工艺   23篇
机械仪表   22篇
建筑科学   23篇
矿业工程   2篇
能源动力   111篇
轻工业   82篇
水利工程   6篇
石油天然气   6篇
无线电   111篇
一般工业技术   177篇
冶金工业   53篇
原子能技术   14篇
自动化技术   138篇
  2024年   1篇
  2023年   34篇
  2022年   60篇
  2021年   93篇
  2020年   53篇
  2019年   76篇
  2018年   57篇
  2017年   32篇
  2016年   60篇
  2015年   39篇
  2014年   53篇
  2013年   88篇
  2012年   67篇
  2011年   44篇
  2010年   38篇
  2009年   30篇
  2008年   22篇
  2007年   22篇
  2006年   14篇
  2005年   14篇
  2004年   17篇
  2003年   14篇
  2002年   7篇
  2001年   5篇
  2000年   11篇
  1999年   10篇
  1998年   11篇
  1997年   7篇
  1996年   7篇
  1995年   9篇
  1994年   5篇
  1993年   5篇
  1992年   2篇
  1991年   1篇
  1990年   7篇
  1989年   6篇
  1988年   1篇
  1987年   1篇
  1985年   2篇
  1984年   1篇
  1983年   1篇
  1980年   2篇
  1979年   1篇
  1977年   1篇
  1976年   1篇
  1974年   2篇
  1973年   1篇
  1972年   2篇
排序方式: 共有1037条查询结果,搜索用时 15 毫秒
1.
Lubricating oil base stocks differ greatly in their chemical composition and consequently in their physical properties and applications. Influence of waxes and various hydrocarbon type constituents viz saturates and aromatic components on the viscosity and shear stress as a function of temperature in different lube oil base stocks has been studied in the present paper.  相似文献   
2.
Neural Computing and Applications - Detecting and correcting misspelled words in a written text are of great importance in many natural language processing applications. Errors can be broadly...  相似文献   
3.
In this paper, we present an interactive edutainment system for the children that leverages multimedia and RFID technologies in a seamless manner. The proposed system allows children to learn about new objects/entities by tapping on physical objects through a specially designed RFID-Bluetooth based Tangible User Interface (TUI) tool. The output of the system is delivered as a set of appropriate multimedia representations related to the objects being tapped. The TUI uses RFID technology for object identification and Bluetooth communication to transmit data to the computer where the system??s software is running. We incorporated our system in three games that allow children of different ages to benefit from the system??s functionalities and encourage them to interact with it.  相似文献   
4.
Significant growth of multimedia content on the World Wide Web (or simply ??Web??) has made it an essential part of peoples lives. The web provides enormous amount of information, however, it is very important for the users to be able to gauge the trustworthiness of web information. Users normally access content from the first few links provided to them by search engines such as Google or Yahoo!. This is assuming that these search engines provide factual information, which may be popular due to criteria such as page rank but may not always be trustworthy from the factual aspects. This paper presents a mechanism to determine trust of websites based on the semantic similarity of their multimedia content with already established and trusted websites. The proposed method allows for dynamic computation of the trust level of websites of different domains and hence overcomes the dependency on traditional user feedback methods for determining trust. In fact, our method attempts to emulate the evolving process of trust that takes place in a user??s mind. The experimental results have been provided to demonstrate the utility and practicality of the proposed method.  相似文献   
5.
A mobile ad hoc network (MANET) is dynamic in nature and is composed of wirelessly connected nodes that perform hop-by-hop routing without the help of any fixed infrastructure. One of the important requirements of a MANET is the efficiency of energy, which increases the lifetime of the network. Several techniques have been proposed by researchers to achieve this goal and one of them is clustering in MANETs that can help in providing an energy-efficient solution. Clustering involves the selection of cluster-heads (CHs) for each cluster and fewer CHs result in greater energy efficiency as these nodes drain more power than noncluster-heads. In the literature, several techniques are available for clustering by using optimization and evolutionary techniques that provide a single solution at a time. In this paper, we propose a multi-objective solution by using multi-objective particle swarm optimization (MOPSO) algorithm to optimize the number of clusters in an ad hoc network as well as energy dissipation in nodes in order to provide an energy-efficient solution and reduce the network traffic. In the proposed solution, inter-cluster and intra-cluster traffic is managed by the cluster-heads. The proposed algorithm takes into consideration the degree of nodes, transmission power, and battery power consumption of the mobile nodes. The main advantage of this method is that it provides a set of solutions at a time. These solutions are achieved through optimal Pareto front. We compare the results of the proposed approach with two other well-known clustering techniques; WCA and CLPSO-based clustering by using different performance metrics. We perform extensive simulations to show that the proposed approach is an effective approach for clustering in mobile ad hoc networks environment and performs better than the other two approaches.  相似文献   
6.
In the design phase of business and IT system development, it is desirable to predict the properties of the system-to-be. A number of formalisms to assess qualities such as performance, reliability and security have therefore previously been proposed. However, existing prediction systems do not allow the modeler to express uncertainty with respect to the design of the considered system. Yet, in contemporary business, the high rate of change in the environment leads to uncertainties about present and future characteristics of the system, so significant that ignoring them becomes problematic. In this paper, we propose a formalism, the Predictive, Probabilistic Architecture Modeling Framework (P2AMF), capable of advanced and probabilistically sound reasoning about business and IT architecture models, given in the form of Unified Modeling Language class and object diagrams. The proposed formalism is based on the Object Constraint Language (OCL). To OCL, P2AMF adds a probabilistic inference mechanism. The paper introduces P2AMF, describes its use for system property prediction and assessment and proposes an algorithm for probabilistic inference.  相似文献   
7.
Multimedia Tools and Applications - The advancement in communication and computation technologies has paved a way for connecting large number of heterogeneous devices to offer specified services....  相似文献   
8.

Visual Cryptography (VC) is gaining attraction during the past few years to secure the visual information in the transmission network. It enables the visual data i.e. handwritten notes, photos, printed text, etc. to encrypt in such a way that their decryption can be done through the human visual framework. Hence, no computational assistance is required for the decryption of the secret images they can be seen through naked eye. In this paper, a novel enhanced halftoning-based VC scheme is proposed that works for both binary and color images. Fake share is generated by the combination of random black and white pixels. The proposed algorithm consists of 3 stages i.e., detection, encryption, and decryption. Halftoning, Encryption, (2, 2) visual cryptography and the novel idea of fake share, make it even more secure and improved. As a result, it facilitates the original restored image to the authentic user, however, the one who enters the wrong password gets the combination of fake share with any real share. Both colored and black images can be processed with minimal capacity using the proposed scheme.

  相似文献   
9.

Neural networks (NNs) are extensively used in modelling, optimization, and control of nonlinear plants. NN-based inverse type point prediction models are commonly used for nonlinear process control. However, prediction errors (root mean square error (RMSE), mean absolute percentage error (MAPE) etc.) significantly increase in the presence of disturbances and uncertainties. In contrast to point forecast, prediction interval (PI)-based forecast bears extra information such as the prediction accuracy. The PI provides tighter upper and lower bounds with considering uncertainties due to the model mismatch and time dependent or time independent noises for a given confidence level. The use of PIs in the NN controller (NNC) as additional inputs can improve the controller performance. In the present work, the PIs are utilized in control applications, in particular PIs are integrated in the NN internal model-based control framework. A PI-based model that developed using lower upper bound estimation method (LUBE) is used as an online estimator of PIs for the proposed PI-based controller (PIC). PIs along with other inputs for a traditional NN are used to train the PIC to predict the control signal. The proposed controller is tested for two case studies. These include, a chemical reactor, which is a continuous stirred tank reactor (case 1) and a numerical nonlinear plant model (case 2). Simulation results reveal that the tracking performance of the proposed controller is superior to the traditional NNC in terms of setpoint tracking and disturbance rejections. More precisely, 36% and 15% improvements can be achieved using the proposed PIC over the NNC in terms of IAE for case 1 and case 2, respectively for setpoint tracking with step changes.

  相似文献   
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号