首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1285篇
  免费   97篇
电工技术   22篇
综合类   1篇
化学工业   335篇
金属工艺   17篇
机械仪表   32篇
建筑科学   47篇
矿业工程   1篇
能源动力   38篇
轻工业   142篇
水利工程   6篇
石油天然气   2篇
武器工业   1篇
无线电   103篇
一般工业技术   209篇
冶金工业   76篇
原子能技术   6篇
自动化技术   344篇
  2023年   6篇
  2022年   41篇
  2021年   66篇
  2020年   39篇
  2019年   37篇
  2018年   43篇
  2017年   28篇
  2016年   55篇
  2015年   48篇
  2014年   44篇
  2013年   91篇
  2012年   67篇
  2011年   101篇
  2010年   70篇
  2009年   75篇
  2008年   60篇
  2007年   58篇
  2006年   46篇
  2005年   46篇
  2004年   36篇
  2003年   39篇
  2002年   31篇
  2001年   22篇
  2000年   12篇
  1999年   19篇
  1998年   21篇
  1997年   14篇
  1996年   14篇
  1995年   21篇
  1994年   21篇
  1993年   8篇
  1992年   7篇
  1991年   4篇
  1990年   3篇
  1989年   7篇
  1988年   5篇
  1987年   2篇
  1986年   6篇
  1985年   9篇
  1984年   9篇
  1983年   6篇
  1982年   6篇
  1981年   7篇
  1980年   7篇
  1979年   4篇
  1978年   4篇
  1977年   2篇
  1976年   8篇
  1975年   2篇
  1974年   2篇
排序方式: 共有1382条查询结果,搜索用时 15 毫秒
21.
Existing density-based data stream clustering algorithms use a two-phase scheme approach consisting of an online phase, in which raw data is processed to gather summary statistics, and an offline phase that generates the clusters by using the summary data. In this article we propose a data stream clustering method based on a multi-agent system that uses a decentralized bottom-up self-organizing strategy to group similar data points. Data points are associated with agents and deployed onto a 2D space, to work simultaneously by applying a heuristic strategy based on a bio-inspired model, known as flocking model. Agents move onto the space for a fixed time and, when they encounter other agents into a predefined visibility range, they can decide to form a flock if they are similar. Flocks can join to form swarms of similar groups. This strategy allows to merge the two phases of density-based approaches and thus to avoid the computing demanding offline cluster computation, since a swarm represents a cluster. Experimental results show that the bio-inspired approach can obtain very good results on real and synthetic data sets.  相似文献   
22.
Mobile network providers have developed a variety of location-based services (LBSs), such as friend-finder, point of interest services, emergency rescue and many other safety and security services. The protection of location-privacy has consequently become a key aspect to the success of LBSs, since users consider their own physical location and movements highly privacy-sensitive, and demand for solutions able to protect such an information in a variety of environments. The idea behind location-privacy protection is that the individual should be able to set the level at which the location information is released to avoid undesired exploitation by a potential attacker: one of the approaches to this problem is given by the application of spatial obfuscation techniques, actuated by a trusted agent, and consisting in artificial perturbations of the location information collected by sensing technologies, before its disclosure to third parties. In many situations, however, landscape/map information can help a third party to perform Bayesian inference over spatially obfuscated data and to refine the user’s location estimate up to a violation of the original user’s location-privacy requirements. The goal of this paper is to provide a map-dependent obfuscation procedure that enables the release of the maximum possible user’s location information, that does not lead to a violation of the original user’s location-privacy requirements, even when refined through map-based inference.  相似文献   
23.
The Internet is currently experiencing one of the most important challenges in terms of content distribution since its first uses as a medium for content delivery: users from passive downloaders and browsers are moving towards content producers and publishers. They often distribute and retrieve multimedia contents establishing network communities. This is the case of peer-to-peer IPTV communities.In this work we present a detailed study of P2P IPTV traffic, providing useful insights on both transport- and packet-level properties as well as on the behavior of the peers inside the network. In particular, we provide novel results on the (i) ports and protocols used; (ii) differences between signaling and video traffic; (iii) behavior of the traffic at different time scales; (iv) differences between TCP and UDP traffic; (v) traffic generated and received by peers; (vi) peers neighborhood and session duration. The knowledge gained thanks to this analysis is useful for several tasks, e.g. traffic identification, understanding the performance of different P2P IPTV technologies and the impact of such traffic on network nodes and links, and building more realistic models for simulations.1  相似文献   
24.
Pseudoxanthoma elasticum (PXE) is a genetic disorder associated to mutations in the ABCC6 gene; however, the pathogenetic mechanisms leading to elastic fibre calcifications and to clinical manifestations are still unknown. Dermal fibroblasts, directly involved in the production of the extracellular milieu, have been isolated from healthy subjects and from patients affected by PXE, cultured in vitro and characterized for their ability to produce reactive oxygen species, for structural and functional properties of their cell membranes, for changes in their protein profile. Data demonstrate that oxidative stress has profound and endurable consequences on PXE fibroblast phenotype being responsible for: reduced levels of global DNA methylation, increased amount of carbonylated proteins and of lipid peroxidation products, altered structural properties of cell membranes, modified protein expression. Data shed new light on the pathogenetic pathways in PXE, by identifying a network of proteins affecting elastic fibre calcification through inefficient vitamin K recycling, and highlight the role of differentially expressed proteins as targets for validating the efficacy of future therapeutic strategies aiming to delay and/or revert the pathologic phenotype of PXE fibroblasts. Moreover, data open new perspectives for investigating PXE-like phenotypes in the absence of ABCC6 mutations.  相似文献   
25.
The paper defines the identification problem for Discrete Event Systems (DES) as the problem of inferring a Petri Net () model using the observation of the events and the available output vectors, that correspond to the markings of the measurable places. Two cases are studied considering different levels of the system knowledge. In the first case the place and transition sets are assumed known. Hence, an integer linear programming problem is defined in order to determine a modelling the DES. In the second case the transition and place sets are assumed unknown and only an upper bound of the number of places is given. Hence, the identification problem is solved by an identification algorithm that observes in real time the occurred events and the corresponding output vectors. The integer linear programming problem is defined at each observation so that the can be recursively identified. Some results and examples characterize the identified systems and show the flexibility and simplicity of the proposed technique. Moreover, an application to the synthesis of supervisory control of systems via monitor places is proposed.  相似文献   
26.
We introduce a new methodology to construct a Gaussian mixture approximation to the true filter density in hybrid Markovian switching systems. We relax the assumption that the mode transition process is a Markov chain and allow it to depend on the actual and unobservable state of the system. The main feature of the method is that the Gaussian densities used in the approximation are selected as the solution of a convex programming problem which trades off sparsity of the solution with goodness of fit. A meaningful example shows that the proposed method can outperform the widely used interacting multiple model (IMM) filter and GPB2 in terms of accuracy at the expenses of an increase in computational time.  相似文献   
27.
In this work we address the tracking control problems for autonomous underwater vehicles (AUVs). The proposed solution is based on the variable structure systems (VSS) theory and, in particular, on the second‐order sliding‐mode (2‐SM) methodology. The tuning of the controller is carried out via black‐box approach, dispensing with the knowledge of the actual AUV parameters, by simply progressively increasing a single gain parameter. The presented stability analysis includes explicitly the unmodelled actuator dynamics and the presence of external uncertain disturbances. The good performance of the proposed scheme is verified by means of simulations on a 6‐DOF AUV. Copyright © 2009 John Wiley & Sons, Ltd.  相似文献   
28.
This article reports the findings of a user study conducted in the context of the TELplus project to gain insights about user needs and preferences for the digital library services offered by The European Library Web portal. The user requirements collection for the Web portal was designed by adopting a comprehensive survey approach. This combined explicit user feedback with implicit usage data so as to provide a more in-depth analysis of user experience with the portal. The analysis conducted shed light on likely motivations for both participant usage and reluctance to use the services provided, leading to more informed decisions on how to refine, improve, and present Web portal services to their future users. The lessons learnt from this case study also contributed to the development of an integrated methodological framework which provided insights for the future design and evaluation of digital library Web portals and services.  相似文献   
29.
The Italian SMAT project is a civilian program supported by Piemonte Region developed for the territorial monitoring and surveillance and for the prevention of natural hazards. In a different way from the previous surveillance programs, the SMAT project is based on the use of several unmanned platforms that are able to cooperate through ground coordination and control station. The flight in non-segregated airspace, needed in order to accomplish the territorial monitoring mission, is a main issue to be investigated and defined, because of the current lack of a common consensus and agreement on the regulations of UAS. The present work outlines the international initiatives that deal with the development of the regulatory framework on airworthiness and certification of UAS and their potential impact on the SMAT project.  相似文献   
30.
This note deals with the implementation of a second-order sliding mode control algorithm for a class of nonlinear systems in which the sign of the high-frequency gain, though constant, is unknown. A specific second-order sliding mode control algorithm, the “Suboptimal” algorithm, is properly modified in order to face the uncertainty in the control direction. It is shown that after a finite time the uncertain sign is identified and the standard finite time convergence takes place from that time on. Simulation results are provided.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号