首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1961篇
  免费   102篇
  国内免费   15篇
电工技术   44篇
综合类   7篇
化学工业   441篇
金属工艺   40篇
机械仪表   69篇
建筑科学   75篇
矿业工程   6篇
能源动力   152篇
轻工业   196篇
水利工程   17篇
石油天然气   26篇
无线电   240篇
一般工业技术   317篇
冶金工业   109篇
原子能技术   17篇
自动化技术   322篇
  2024年   9篇
  2023年   45篇
  2022年   89篇
  2021年   110篇
  2020年   95篇
  2019年   93篇
  2018年   109篇
  2017年   117篇
  2016年   103篇
  2015年   52篇
  2014年   101篇
  2013年   177篇
  2012年   125篇
  2011年   137篇
  2010年   96篇
  2009年   101篇
  2008年   77篇
  2007年   62篇
  2006年   36篇
  2005年   26篇
  2004年   22篇
  2003年   26篇
  2002年   23篇
  2001年   23篇
  2000年   16篇
  1999年   17篇
  1998年   23篇
  1997年   23篇
  1996年   20篇
  1995年   20篇
  1994年   16篇
  1993年   5篇
  1992年   10篇
  1991年   4篇
  1990年   7篇
  1989年   4篇
  1988年   5篇
  1987年   2篇
  1986年   5篇
  1985年   11篇
  1984年   7篇
  1983年   9篇
  1982年   4篇
  1981年   1篇
  1980年   1篇
  1978年   4篇
  1977年   4篇
  1976年   5篇
  1970年   1篇
排序方式: 共有2078条查询结果,搜索用时 15 毫秒
51.
Vehicle-to-grid technology is an emerging field that allows unused power from Electric Vehicles (EVs) to be used by the smart grid through the central aggregator. Since the central aggregator is connected to the smart grid through a wireless network, it is prone to cyber-attacks that can be detected and mitigated using an intrusion detection system. However, existing intrusion detection systems cannot be used in the vehicle-to-grid network because of the special requirements and characteristics of the vehicle-to-grid network. In this paper, the effect of denial-of-service attacks of malicious electric vehicles on the central aggregator of the vehicle-to-grid network is investigated and an intrusion detection system for the vehicle-to-grid network is proposed. The proposed system, central aggregator–intrusion detection system (CA-IDS), works as a security gateway for EVs to analyze and monitor incoming traffic for possible DoS attacks. EVs are registered with a Central Aggregator (CAG) to exchange authenticated messages, and malicious EVs are added to a blacklist for violating a set of predefined policies to limit their interaction with the CAG. A denial of service (DoS) attack is simulated at CAG in a vehicle-to-grid (V2G) network manipulating various network parameters such as transmission overhead, receiving capacity of destination, average packet size, and channel availability. The proposed system is compared with existing intrusion detection systems using different parameters such as throughput, jitter, and accuracy. The analysis shows that the proposed system has a higher throughput, lower jitter, and higher accuracy as compared to the existing schemes.  相似文献   
52.
The number of mobile devices accessing wireless networks is skyrocketing due to the rapid advancement of sensors and wireless communication technology. In the upcoming years, it is anticipated that mobile data traffic would rise even more. The development of a new cellular network paradigm is being driven by the Internet of Things, smart homes, and more sophisticated applications with greater data rates and latency requirements. Resources are being used up quickly due to the steady growth of smartphone devices and multimedia apps. Computation offloading to either several distant clouds or close mobile devices has consistently improved the performance of mobile devices. The computation latency can also be decreased by offloading computing duties to edge servers with a specific level of computing power. Device-to-device (D2D) collaboration can assist in processing small-scale activities that are time-sensitive in order to further reduce task delays. The task offloading performance is drastically reduced due to the variation of different performance capabilities of edge nodes. Therefore, this paper addressed this problem and proposed a new method for D2D communication. In this method, the time delay is reduced by enabling the edge nodes to exchange data samples. Simulation results show that the proposed algorithm has better performance than traditional algorithm.  相似文献   
53.
One of the most pressing concerns for the consumer market is the detection of adulteration in meat products due to their preciousness. The rapid and accurate identification mechanism for lard adulteration in meat products is highly necessary, for developing a mechanism trusted by consumers and that can be used to make a definitive diagnosis. Fourier Transform Infrared Spectroscopy (FTIR) is used in this work to identify lard adulteration in cow, lamb, and chicken samples. A simplified extraction method was implied to obtain the lipids from pure and adulterated meat. Adulterated samples were obtained by mixing lard with chicken, lamb, and beef with different concentrations (10%–50% v/v). Principal component analysis (PCA) and partial least square (PLS) were used to develop a calibration model at 800–3500 cm−1. Three-dimension PCA was successfully used by dividing the spectrum in three regions to classify lard meat adulteration in chicken, lamb, and beef samples. The corresponding FTIR peaks for the lard have been observed at 1159.6, 1743.4, 2853.1, and 2922.5 cm−1, which differentiate chicken, lamb, and beef samples. The wavenumbers offer the highest determination coefficient R2 value of 0.846 and lowest root mean square error of calibration (RMSEC) and root mean square error prediction (RMSEP) with an accuracy of 84.6%. Even the tiniest fat adulteration up to 10% can be reliably discovered using this methodology.  相似文献   
54.
A novel and robust pitch estimation method is presented in this paper. The basic idea is to reshape the speech signal using a combination of the dominant harmonic modification (DHM) and data adaptive time domain filtering techniques. The noisy speech signal is filtered within the ranges of fundamental frequencies to obtain the pre-filtered signal (PFS). The dominant harmonic (DH) of the PFS is determined and enhanced its amplitude. Normalized autocorrelation function (NACF) is applied to that modified signal. Then empirical mode decomposition (EMD) based data adaptive time domain filtering is applied to the NACF signal. Partial reconstruction is performed in EMD domain. The pitch period is determined from the partially reconstructed signal. The experimental results show that the proposed method performs better than the other recently developed methods for noisy and clean speech signals in terms of gross and fine pitch errors.  相似文献   
55.
This paper presents a new algorithm for de-noising global positioning system (GPS) and inertial navigation system (INS) data and estimates the INS error using wavelet multi-resolution analysis algorithm (WMRA)-based genetic algorithm (GA) with a well-designed structure appropriate for practical and real time implementations because of its very short training time and elevated accuracy. Different techniques have been implemented to de-noise and estimate the INS and GPS errors. Wavelet de-noising is one of th...  相似文献   
56.
In wireless communication reception, the reliability of orthogonal frequency division multiplexing (OFDM) is limited because of the time-varying nature of the channel. This causes inter-carrier interference (ICI) and increases inaccuracies in channel tracking. This can effectively be avoided at the cost of power loss and bandwidth expansion by inserting a cyclic prefix guard interval before each block of parallel data symbols. However, this guard interval decreases the spectral efficiency of the OFDM system as the corresponding amount. Recently, it was found that based on Haar-orthonormal wavelets, discrete wavelet-based OFDM (DWT-OFDM) is capable of reducing the inter symbol interference (ISI) and ICI, which are caused by the loss in orthogonality between the carriers. DWT-OFDM can also support much higher spectrum efficiency than discrete Fourier-based OFDM (DFT-OFDM). In this paper the DFT-OFDM is replaced by Multiwavelets OFDM (DMWT-OFDM) in order to further reduce the level of interference and increase spectral efficiency. It is found that proposed Multiwavelet design achieves much lower bit error rates, increases signal to noise power ratio (SNR), and can be used as an alternative to the conventional OFDM. The proposed OFDM system was modeled tested, and its performance was found under different channel conditions.  相似文献   
57.
In this paper we introduce a goal programming formulation for the multi-group classification problem. Although a great number of mathematical programming models for two-group classification problems have been proposed in the literature, there are few mathematical programming models for multi-group classification problems. Newly proposed multi-group mathematical programming model is compared with other conventional multi-group methods by using different real data sets taken from the literature and simulation data. A comparative analysis on the real data sets and simulation data shows that our goal programming formulation may suggest efficient alternative to traditional statistical methods and mathematical programming formulations for the multi-group classification problem.  相似文献   
58.
Cellular automata are used to model dynamical phenomena by focusing on their local behavior which depends on the neighboring cells in order to express their global behavior. The geometrical structure of the models suggests the algebraic structure of cellular automata. After modeling the dynamical phenomena, it is sometimes an important problem to be able to move backwards in order to understand it better. This is only possible if cellular automata is reversible. In this paper, 2D finite cellular automata defined by local rules based on hexagonal cell structure are studied. Rule matrix of the hexagonal finite cellular automaton is obtained. The rank of rule matrices representing the 2D hexagonal finite cellular automata via an algorithm is computed. It is a well known fact that determining the reversibility of a 2D cellular automata is a very difficult problem in general. Here, the reversibility problem of this family of 2D hexagonal cellular automata is also resolved completely.  相似文献   
59.
To conserve space and power as well as to harness high performance in embedded systems, high utilization of the hardware is required. This can be facilitated through dynamic adaptation of the silicon resources in reconfigurable systems in order to realize various customized kernels as execution proceeds. Fortunately, the encountered reconfiguration overheads can be estimated. Therefore, if the scheduling of time-consuming kernels considers also the reconfiguration overheads, an overall performance gain can be obtained. We present our policy, experiments, and performance results of customizing and reconfiguring Field-Programmable Gate Arrays (FPGAs) for embedded kernels. Experiments involving EEMBC (EDN Embedded Microprocessor Benchmarking Consortium) and MiBench embedded benchmark kernels show high performance using our main policy, when considering reconfiguration overheads. Our policy reduces the required reconfigurations by more than 50% as compared to brute-force solutions, and performs within 25% of the ideal execution time while conserving 60% of the FPGA resources. Alternative strategies to reduce the reconfiguration overhead are also presented and evaluated.  相似文献   
60.
In this study, structured singular values are used in a different way from those commonly used in the robust control literature. It is shown that subject to conditions based on structured singular values, each local area controller can be designed independently. A MATLAB? program is developed to plot inverse structured singular values of multi input multi output (MIMO) system relative error matrix. This plot can be used to predict the stability of the global system with decentralised controller. Therefore decentralised controller design problem can be translated into an equivalent problem of decentralized controller design for a MIMO control system.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号