首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2568篇
  免费   115篇
  国内免费   10篇
电工技术   28篇
综合类   9篇
化学工业   543篇
金属工艺   94篇
机械仪表   95篇
建筑科学   47篇
矿业工程   15篇
能源动力   169篇
轻工业   278篇
水利工程   13篇
石油天然气   11篇
无线电   215篇
一般工业技术   590篇
冶金工业   206篇
原子能技术   34篇
自动化技术   346篇
  2024年   11篇
  2023年   35篇
  2022年   120篇
  2021年   116篇
  2020年   94篇
  2019年   106篇
  2018年   108篇
  2017年   123篇
  2016年   115篇
  2015年   60篇
  2014年   116篇
  2013年   220篇
  2012年   125篇
  2011年   159篇
  2010年   132篇
  2009年   109篇
  2008年   93篇
  2007年   92篇
  2006年   55篇
  2005年   59篇
  2004年   36篇
  2003年   40篇
  2002年   46篇
  2001年   23篇
  2000年   27篇
  1999年   29篇
  1998年   40篇
  1997年   38篇
  1996年   38篇
  1995年   21篇
  1994年   21篇
  1993年   20篇
  1992年   15篇
  1991年   22篇
  1990年   18篇
  1989年   18篇
  1988年   17篇
  1987年   19篇
  1986年   13篇
  1985年   13篇
  1984年   11篇
  1983年   12篇
  1982年   11篇
  1981年   14篇
  1980年   9篇
  1979年   9篇
  1976年   17篇
  1975年   6篇
  1974年   8篇
  1973年   9篇
排序方式: 共有2693条查询结果,搜索用时 25 毫秒
41.
Finding fault elements in linear antenna arrays using bacteria foraging optimization (BFO) is presented. One of the better options of array diagnosis is to perform it by measuring the radiated field, because in this case, removal of the array from its working site is not required and thereby not interrupting its normal operation. This task of fault finding from far‐field data is designed as an optimization problem where the difference between the far‐field power pattern obtained for a given configuration of failed element(s) and the measured one is minimized w. r. t. the excitations of the array elements. This set of excitations on comparison with the excitations of the original array gives the idea of the fault position and their type, such as either complete fault or partial fault. BFO being relatively new to microwave community when compared with other soft‐computing techniques, its performance was observed w. r. t. time of computation and convergence of the iterative process. Possibility of finding the faults from random sample points and use of minimum number of sample points for array fault finding are the novelties of the present work. © 2012 Wiley Periodicals, Inc. Int J RF and Microwave CAE, 2013.  相似文献   
42.
We propose an optical scheme for quantum key distribution in which bits are encoded in relative phases of four bipartite weak coherent states ${|\alpha, \alpha\rangle, |-\alpha, -\alpha\rangle, |-\alpha, \alpha\rangle}$ and ${|\alpha, -\alpha \rangle}$ , with respect to a strong reference pulse. We discuss security of the scheme against eavesdropping strategies like, photon number splitting, photon beam splitting and intercept-resend attacks. It is found that present scheme is more sensitive against these eavesdropping strategies than the two-dimensional non-orthogonal state based protocol and BB84 protocol. Our scheme is very simple, requires only passive optical elements like beam splitters, phase shifters and photon detectors, hence is at the reach of presently available technology.  相似文献   
43.
Number of software applications demands various levels of security at the time of scheduling in Computational Grid. Grid may offer these securities but may result in the performance degradation due to overhead in offering the desired security. Scheduling performance in a Grid is affected by the heterogeneities of security and computational power of resources. Customized Genetic Algorithms have been effectively used for solving complex optimization problems (NP Hard) and various heuristics have been suggested for solving Multi-objective optimization problems. In this paper a security driven, elitist non-dominated sorting genetic algorithm, Optimal Security with Optimal Overhead Scheduling (OSO2S), based on NSGA-II, is proposed. The model considers dual objectives of minimizing the security overhead and maximizing the total security achieved. Simulation results exhibit that the proposed algorithm delivers improved makespan and lesser security overhead in comparison to other such algorithms viz. MinMin, MaxMin, SPMinMin, SPMaxMin and SDSG.  相似文献   
44.
In this paper, an Adaptive Hierarchical Ant Colony Optimization (AHACO) has been proposed to resolve the traditional machine loading problem in Flexible Manufacturing Systems (FMS). Machine loading is one of the most important issues that is interlinked with the efficiency and utilization of FMS. The machine loading problem is formulated in order to minimize the system unbalance and maximize the throughput, considering the job sequencing, optional machines and technological constraints. The performance of proposed AHACO has been tested over a number of benchmark problems taken from the literature. Computational results indicate that the proposed algorithm is more effective and produces promising results as compared to the existing solution methodologies in the literature. The evaluation and comparison of system efficiency and system utilization justifies the supremacy of the algorithm. Further, results obtained from the proposed algorithm have been compared with well known random search algorithm viz. genetic algorithm, simulated annealing, artificial Immune system, simple ant colony optimization, tabu search etc. In addition, the algorithm has been tested over a randomly generated problem set of varying complexities; the results validate the robustness and scalability of the algorithm utilizing the concepts of ‘heuristic gap’ and ANOVA analysis.  相似文献   
45.
Model predictive control (MPC) schemes are now widely used in process industries for the control of key unit operations. Linear model predictive control (LMPC) schemes which make use of linear dynamic model for prediction, limit their applicability to a narrow range of operation (or) to systems which exhibit mildly nonlinear dynamics.

In this paper, a nonlinear observer based model predictive controller (NMPC) for nonlinear system has been proposed. An approach to design NMPC based on fuzzy Kalman filter (FKF) and augmented state fuzzy Kalman filter (ASFKF) has been presented. The efficacy of the proposed NMPC schemes have been demonstrated by conducting simulation studies on the continuous stirred tank reactor (CSTR). The analysis of the extensive dynamic simulation studies revealed that, the NMPC schemes formulated produces satisfactory performance for both servo and regulatory problems. Simulation results also include an inferential control case, where the reactor concentration is not measured but estimated from temperature measurement and used in the NMPC based on FKF and ASFKF formulations.  相似文献   

46.
Configuring and enhancing measurement systems for damage identification   总被引:2,自引:0,他引:2  
Engineers often decide to measure structures upon signs of damage to determine its extent and its location. Measurement locations, sensor types and numbers of sensors are selected based on judgment and experience. Rational and systematic methods for evaluating structural performance can help make better decisions. This paper proposes strategies for supporting two measurement tasks related to structural health monitoring - (1) installing an initial measurement system and (2) enhancing measurement systems for subsequent measurements once data interpretation has occurred. The strategies are based on previous research into system identification using multiple models. A global optimization approach is used to design the initial measurement system. Then a greedy strategy is used to select measurement locations with maximum entropy among candidate model predictions. Two bridges are used to illustrate the proposed methodology. First, a railway truss bridge in Zangenberg, Germany, is examined. For illustration purposes, the model space is reduced by assuming only a few types of possible damage in the truss bridge. The approach is then applied to the Schwandbach bridge in Switzerland, where a broad set of damage scenarios is evaluated. For the truss bridge, the approach correctly identifies the damage that represents the behaviour of the structure. For the Schwandbach bridge, the approach is able to significantly reduce the number of candidate models. Values of candidate model parameters are also useful for planning inspection and eventual repair.  相似文献   
47.
Wireless Personal Communications - This paper presents Carbon Nanotube FET (CNFET) based ultra-low-power Schmitt trigger SRAM designs which can operate at voltage levels as low as 200 mV, with high...  相似文献   
48.

Wireless communication networks have much data to sense, process, and transmit. It tends to develop a security mechanism to care for these needs for such modern-day systems. An intrusion detection system (IDS) is a solution that has recently gained the researcher’s attention with the application of deep learning techniques in IDS. In this paper, we propose an IDS model that uses a deep learning algorithm, conditional generative adversarial network (CGAN), enabling unsupervised learning in the model and adding an eXtreme gradient boosting (XGBoost) classifier for faster comparison and visualization of results. The proposed method can reduce the need to deploy extra sensors to generate fake data to fool the intruder 1.2–2.6%, as the proposed system generates this fake data. The parameters were selected to give optimal results to our model without significant alterations and complications. The model learns from its dataset samples with the multiple-layer network for a refined training process. We aimed that the proposed model could improve the accuracy and thus, decrease the false detection rate and obtain good precision in the cases of both the datasets, NSL-KDD and the CICIDS2017, which can be used as a detector for cyber intrusions. The false alarm rate of the proposed model decreases by about 1.827%.

  相似文献   
49.
Wireless Personal Communications - Scheduling in computing environments such as homogeneous and heterogonous is very challenging and faces various difficulties computationally. This computing needs...  相似文献   
50.
Microsystem Technologies - In this paper synthesis of two wideband Metamaterial Cross Polarizer (MCPs) is proposed. The synthesis of proposed MCPs is done by using Binary Wind Driven Optimization...  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号