全文获取类型
收费全文 | 1968篇 |
免费 | 65篇 |
国内免费 | 4篇 |
专业分类
电工技术 | 31篇 |
综合类 | 2篇 |
化学工业 | 434篇 |
金属工艺 | 40篇 |
机械仪表 | 63篇 |
建筑科学 | 93篇 |
能源动力 | 141篇 |
轻工业 | 327篇 |
水利工程 | 15篇 |
石油天然气 | 11篇 |
无线电 | 109篇 |
一般工业技术 | 370篇 |
冶金工业 | 77篇 |
原子能技术 | 9篇 |
自动化技术 | 315篇 |
出版年
2024年 | 34篇 |
2023年 | 35篇 |
2022年 | 53篇 |
2021年 | 96篇 |
2020年 | 85篇 |
2019年 | 84篇 |
2018年 | 93篇 |
2017年 | 76篇 |
2016年 | 107篇 |
2015年 | 59篇 |
2014年 | 84篇 |
2013年 | 164篇 |
2012年 | 106篇 |
2011年 | 150篇 |
2010年 | 102篇 |
2009年 | 126篇 |
2008年 | 111篇 |
2007年 | 93篇 |
2006年 | 69篇 |
2005年 | 51篇 |
2004年 | 43篇 |
2003年 | 34篇 |
2002年 | 31篇 |
2001年 | 11篇 |
2000年 | 9篇 |
1999年 | 24篇 |
1998年 | 30篇 |
1997年 | 12篇 |
1996年 | 17篇 |
1995年 | 9篇 |
1994年 | 2篇 |
1993年 | 2篇 |
1992年 | 3篇 |
1991年 | 6篇 |
1990年 | 3篇 |
1989年 | 1篇 |
1988年 | 4篇 |
1987年 | 3篇 |
1986年 | 3篇 |
1985年 | 2篇 |
1984年 | 3篇 |
1982年 | 2篇 |
1981年 | 2篇 |
1976年 | 1篇 |
1974年 | 1篇 |
1972年 | 1篇 |
排序方式: 共有2037条查询结果,搜索用时 15 毫秒
101.
Mehmet Ulvi Şimşek Dilan Mert Suat Özdemir 《Information Security Journal: A Global Perspective》2018,27(2):102-118
Smart grid (SG) allows for two-way communication between the utility and its consumers and hence they are considered as an inevitable future of the traditional grid. Since consumers are the key component of SGs, providing security and privacy to their personal data is a critical problem. In this paper, a security protocol, namely TPS3, is based on Temporal Perturbation and Shamir’s Secret Sharing (SSS) schemes that are proposed to ensure the privacy of SG consumer’s data. Temporal perturbation is employed to provide temporal privacy, while the SSS scheme is used to ensure data confidentiality. Temporal perturbation adds random delays to the data collected by smart meters, whereas the SSS scheme fragments these data before transmitting them to the data collection server. Joint employment of both schemes makes it hard for attackers to obtain consumer data collected in the SG. The proposed protocol TPS3 is evaluated in terms of privacy, reliability, and communication cost using two different SG topologies. The performance evaluation results clearly show that the TPS3 protocol ensures the privacy and reliability of consumer data in SGs. The results also show that the tradeoff between the communication cost and security of TPS3 is negligible. 相似文献
102.
Abdulnasir Yildiz Mehmet Akın Mustafa Poyraz 《Expert systems with applications》2011,38(10):12880-12890
Obstructive sleep apnea (OSA) is a highly prevalent sleep disorder. The traditional diagnosis methods of the disorder are cumbersome and expensive. The ability to automatically identify OSA from electrocardiogram (ECG) recordings is important for clinical diagnosis and treatment. In this study, we proposed an expert system based on discrete wavelet transform (DWT), fast-Fourier transform (FFT) and least squares support vector machine (LS-SVM) for the automatic recognition of patients with OSA from nocturnal ECG recordings. Thirty ECG recordings collected from normal subjects and subjects with sleep apnea, each of approximately 8 h in duration, were used throughout the study. The proposed OSA recognition system comprises three stages. In the first stage, an algorithm based on DWT was used to analyze ECG recordings for the detection of heart rate variability (HRV) and ECG-derived respiration (EDR) changes. In the second stage, an FFT based power spectral density (PSD) method was used for feature extraction from HRV and EDR changes. Then, a hill-climbing feature selection algorithm was used to identify the best features that improve classification performance. In the third stage, the obtained features were used as input patterns of the LS-SVM classifier. Using the cross-validation method, the accuracy of the developed system was found to be 100% for using a subset of selected combination of HRV and EDR features. The results confirmed that the proposed expert system has potential for recognition of patients with suspected OSA by using ECG recordings. 相似文献
103.
Baysan Mehmet Sarac Kamil Chandrasekaran Ramaswamy Bereg Sergey 《Parallel and Distributed Systems, IEEE Transactions on》2009,20(7):913-924
Network-wide broadcast (simply broadcast) is a frequently used operation in wireless ad hoc networks (WANETs). One promising practical approach for energy-efficient broadcast is to use localized algorithms to minimize the number of nodes involved in the propagation of the broadcast messages. In this context, the minimum forwarding set problem (MFSP) (also known as multipoint relay (MPR) problem) has received a considerable attention in the research community. Even though the general form of the problem is shown to be NP-complete, the complexity of the problem has not been known under the practical application context of ad hoc networks. In this paper, we present a polynomial time algorithm to solve the MFSP for wireless network under unit disk coverage model. We prove the existence of some geometrical properties for the problem and then propose a polynomial time algorithm to build an optimal solution based on these properties. To the best of our knowledge, our algorithm is the first polynomial time solution to the MFSP under the unit disk coverage model. We believe that the work presented in this paper will have an impact on the design and development of new algorithms for several wireless network applications including energy-efficient multicast, broadcast, and topology control protocols for WANETs and sensor networks. 相似文献
104.
Utilizing Genetic Algorithms to Optimize Membership Functions for Fuzzy Weighted Association Rules Mining 总被引:1,自引:2,他引:1
It is not an easy task to know a priori the most appropriate fuzzy sets that cover the domains of quantitative attributes
for fuzzy association rules mining. In general, it is unrealistic that experts can always provide such sets. And finding the
most appropriate fuzzy sets becomes a more complex problem when items are not considered to have equal importance and the
support and confidence parameters required for the association rules mining process are specified as linguistic terms. Existing
clustering based automated methods are not satisfactory because they do not consider the optimization of the discovered membership
functions. In order to tackle this problem, we propose Genetic Algorithms (GAs) based clustering method, which dynamically
adjusts the fuzzy sets to provide maximum profit based on user specified linguistic minimum support and confidence terms.
This is achieved by tuning the base values of the membership functions for each quantitative attribute with respect to two
different evaluation functions maximizing the number of large itemsets and the average of the confidence intervals of the
generated rules. To the best of our knowledge, this is the first effort in this direction. Experiments conducted on 100 K
transactions from the adult database of United States census in year 2000 demonstrate that the proposed clustering method
exhibits good performance in terms of the number of produced large itemsets and interesting association rules. 相似文献
105.
A class of adaptive directional image smoothing filters 总被引:3,自引:0,他引:3
The gray level distribution around a pixel of an image usually tends to be more coherent in some directions compared to other directions. The idea of adaptive directional filtering is to estimate the direction of higher coherence around each pixel location and then to employ a window which approximates a line segment in that direction. Hence, the details of the image may be preserved while maintaining a satisfactory level of noise suppression performance. In this paper we describe a class of adaptive directional image smoothing filters based on generalized Gaussian distributions. We propose a measure of spread for the pixel values based on the maximum likelihood estimate of a scale parameter involved in the generalized Gaussian distribution. Several experimental results indicate a significant improvement compared to some standard filters. 相似文献
106.
Automatic recognition of vigilance state by using a wavelet-based artificial neural network 总被引:2,自引:0,他引:2
Abdulhamit?SubasiEmail author M.?Kemal?Kiymik Mehmet?Akin Osman?Erogul 《Neural computing & applications》2005,14(1):45-55
In this study, 5-s long sequences of full-spectrum electroencephalogram (EEG) recordings were used for classifying alert versus drowsy states in an arbitrary subject. EEG signals were obtained from 30 healthy subjects and the results were classified using a wavelet-based neural network. The wavelet-based neural network model, employing the multilayer perceptron (MLP), was used for the classification of EEG signals. A multilayer perceptron neural network (MLPNN) trained with the Levenberg–Marquardt algorithm was used to discriminate the alertness level of the subject. In order to determine the MLPNN inputs, spectral analysis of EEG signals was performed using the discrete wavelet transform (DWT) technique. The MLPNN was trained, cross-validated, and tested with training, cross-validation, and testing sets, respectively. The correct classification rate was 93.3% alert, 96.6% drowsy, and 90% sleep. The classification results showed that the MLPNN trained with the Levenberg–Marquardt algorithm was effective for discriminating the vigilance state of the subject. 相似文献
107.
The Use of Situation Theory in Context Modeling 总被引:2,自引:0,他引:2
At the heart of natural language processing is the understanding of context dependent meanings. This paper presents a preliminary model of formal contexts based on situation theory. It also gives a worked‐out example to show the use of contexts in lifting, i.e., how propositions holding in a particular context transform when they are moved to another context. This is useful in NLP applications where preserving meaning is a desideratum. 相似文献
108.
?erif Bahtiyar Mehmet Ufuk Ça?layan 《Journal of Network and Computer Applications》2012,35(1):480-490
The issue of trust is a research problem in emerging open environments, such as ubiquitous networks. Such environments are highly dynamic and they contain diverse number of services and autonomous entities. Entities in open environments have different security needs from services. Trust computations related to the security systems of services necessitate information that meets needs of each entity. Obtaining such information is a challenging issue for entities. In this paper, we propose a model for extracting trust information from the security system of a service based on the needs of an entity. We formally represent security policies and security systems to extract trust information according to needs of an entity. The formal representation ensures an entity to extract trust information about a security property of a service and trust information about whole security system of the service. The proposed model is applied to Dental Clinic Patient Service as a case study with two scenarios. The scenarios are analyzed experimentally with simulations. The experimental evaluation shows that the proposed model provides trust information related to the security system of a service based on the needs of an entity and it is applicable in emerging open environments. 相似文献
109.
Congestion is a challenging problem in wireless sensor networks, which exacerbates with the high volume of data traffic imposed by video applications such as video surveillance and target tracking. Deployment of multiple sinks is a candidate solution for congestion and is also promising in terms of reliability and energy-efficiency. In order to gain the maximum benefit from multiple sinks, it is essential to distribute the load among them evenly. In this paper, we propose a cross layer geographic forwarding scheme MLBRF (Multi-Sink Load Balanced Reliable Forwarding) which aims to provide reliable and energy efficient video delivery in a multi-sinked sensor network for target tracking. In order to provide load balancing among the sinks, MLBRF proposes a sink selection mechanism based on fuzzy logic for the frame forwarding which evaluates the traffic density in the direction of each sink by combining two dynamic criteria which are the number of contenders and the buffer occupancy levels in the neighborhood with the static distance criterion. The performance of the fuzzy sink selection mechanism is compared using simulation with various sink selection mechanisms. The results show that MLBRF gains the maximum benefit from deploying multiple sinks in terms of reliability, latency and energy efficiency by using the proposed fuzzy sink selection mechanism. 相似文献
110.
Mehmet Bozca Ata Muğan Hakan Temeltaş 《Structural and Multidisciplinary Optimization》2008,36(2):169-191
Integrated optimum design of structures and control systems is studied by using H
2 and robust control formulations. It is derived that conventional simultaneous optimization approach by using these robust control
laws can be approximated by a decoupled optimization approach in which the structures are optimized by shaping the structural
singular values and then the controllers can be designed, namely, decoupled, sequential or successive design approach. It
is shown that the proposed decoupled optimization approach can be used to design optimum robust structures and has certain
advantages over the conventional simultaneous optimization procedures such as it avoids the drawbacks of pure robust control
laws and faster, especially if the number of degrees of freedom (DOF) of the associated structure is large. The bounds for
achievable robustness measures are also obtained. Following, simultaneous and decoupled optimization approaches are applied
to active control of two structures. The optimization results are presented, and it is concluded that the proposed decoupled
optimization approach yields the achieved global minimum much faster than the simultaneous optimization approach. 相似文献