首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7225篇
  免费   396篇
  国内免费   52篇
电工技术   136篇
综合类   26篇
化学工业   1801篇
金属工艺   124篇
机械仪表   213篇
建筑科学   279篇
矿业工程   6篇
能源动力   481篇
轻工业   736篇
水利工程   78篇
石油天然气   117篇
无线电   677篇
一般工业技术   1216篇
冶金工业   355篇
原子能技术   84篇
自动化技术   1344篇
  2024年   19篇
  2023年   152篇
  2022年   300篇
  2021年   420篇
  2020年   304篇
  2019年   348篇
  2018年   429篇
  2017年   367篇
  2016年   366篇
  2015年   243篇
  2014年   331篇
  2013年   652篇
  2012年   367篇
  2011年   515篇
  2010年   361篇
  2009年   336篇
  2008年   293篇
  2007年   222篇
  2006年   205篇
  2005年   143篇
  2004年   113篇
  2003年   120篇
  2002年   93篇
  2001年   66篇
  2000年   75篇
  1999年   54篇
  1998年   82篇
  1997年   47篇
  1996年   54篇
  1995年   43篇
  1994年   38篇
  1993年   47篇
  1992年   37篇
  1991年   35篇
  1990年   31篇
  1989年   21篇
  1988年   36篇
  1987年   31篇
  1986年   22篇
  1985年   15篇
  1984年   28篇
  1983年   23篇
  1982年   26篇
  1981年   20篇
  1980年   23篇
  1979年   17篇
  1978年   18篇
  1976年   18篇
  1975年   19篇
  1974年   12篇
排序方式: 共有7673条查询结果,搜索用时 15 毫秒
81.
Neural Computing and Applications - Security is one of the primary concerns when designing wireless networks. Along detecting user identity, it is also important to detect the devices at the...  相似文献   
82.
Neural Computing and Applications - This paper presents an adaptive fuzzy fault-tolerant tracking control for a class of unknown multi-variable nonlinear systems, with external disturbances,...  相似文献   
83.

In the era of Industry 4.0, the ease of access to precise measurements in real-time and the existence of machine-learning (ML) techniques will play a vital role in building practical tools to isolate inefficiencies in energy-intensive processes. This paper aims at developing an abnormal event diagnosis (AED) tool based on ML techniques for monitoring the operation of industrial processes. This tool makes it easier for operators to accomplish their tasks and to make quick and accurate decisions to ensure highly efficient processes. One of the most popular ML techniques for AED is the multivariate statistical control (MSC) method; it only requires the dataset of the normal operating conditions (NOC) to detect and identify the variables that contribute to abnormal events (AEs). Despite the popularity of MSC, it is challenging to select the appropriate method for detecting and isolating all possible abnormalities a complex industrial process can experience. To address this limitation and improve efficiency, we have developed a generic methodology that integrates different ML techniques into a unified multiagent based approach, the selected ML techniques are supposed to be built using only the normal operating condition. For the sake of demonstration, we chose a combination of two ML methods: principal component analysis and k-nearest neighbors (k-NN). The k-NN was integrated into the proposed multiagent to take into account the nonlinearity and multimodality that frequently occur in industrial processes. In addition, we modified a k-NN method proposed in the literature to reduce computation time during real-time detection and isolation. Finally, the proposed methodology was successfully validated to monitor the energy efficiency of a reboiler located in a thermomechanical pulp mill.

  相似文献   
84.
One of the important aspects in achieving better performance for transient stability assessment (TSA) of power systems employing computational intelligence (CI) techniques is by incorporating feature reduction techniques. For small power system the number of features may be small but when larger systems are considered the number of features increased as the size of the systems increases. Apart from employing faster CI techniques to achieve faster and accurate TSA of power system, feature reduction techniques are needed in reducing the input features while preserving the needed information so as to make faster training of the CI technique. This paper presents feature reductions techniques used, namely correlation analysis and principle component analysis, in reducing number of input features presented to two CI techniques for TSA, namely probabilistic neural network (PNN) and least squares support vector machines (LS-SVM). The proposed feature reduction techniques are implemented and tested on the IEEE 39-bus test system and 87-bus Malaysia’s power system. Numerical results are presented to demonstrate the performance of the feature reduction techniques and its effects on the accuracies and time taken for training the two CI techniques.  相似文献   
85.
In this paper, we present an interactive edutainment system for the children that leverages multimedia and RFID technologies in a seamless manner. The proposed system allows children to learn about new objects/entities by tapping on physical objects through a specially designed RFID-Bluetooth based Tangible User Interface (TUI) tool. The output of the system is delivered as a set of appropriate multimedia representations related to the objects being tapped. The TUI uses RFID technology for object identification and Bluetooth communication to transmit data to the computer where the system??s software is running. We incorporated our system in three games that allow children of different ages to benefit from the system??s functionalities and encourage them to interact with it.  相似文献   
86.
Cookies are the primary means for web applications to authenticate HTTP requests and to maintain client states. Many web applications (such as those for electronic commerce) demand a secure cookie scheme. Such a scheme needs to provide the following four services: authentication, confidentiality, integrity, and anti-replay. Several secure cookie schemes have been proposed in previous literature; however, none of them are completely satisfactory. In this paper, we propose a secure cookie scheme that is effective, efficient, and easy to deploy. In terms of effectiveness, our scheme provides all of the above four security services. In terms of efficiency, our scheme does not involve any database lookup or public key cryptography. In terms of deployability, our scheme can be easily deployed on existing web services, and it does not require any change to the Internet cookie specification. We implemented our secure cookie scheme using PHP and conducted experiments. The experimental results show that our scheme is very efficient on both the client side and the server side.A notable adoption of our scheme in industry is that our cookie scheme has been used by Wordpress since version 2.4. Wordpress is a widely used open source content management system.  相似文献   
87.
88.
Cloud computing services have recently become a ubiquitous service delivery model, covering a wide range of applications from personal file sharing to being an enterprise data warehouse. Building green data center networks providing cloud computing services is an emerging trend in the Information and Communication Technology (ICT) industry, because of Global Warming and the potential GHG emissions resulting from cloud services. As one of the first worldwide initiatives provisioning ICT services entirely based on renewable energy such as solar, wind and hydroelectricity across Canada and around the world, the GreenStar Network (GSN) was developed to dynamically transport user services to be processed in data centers built in proximity to green energy sources, reducing Greenhouse Gas (GHG) emissions of ICT equipments. Regarding the current approach, which focuses mainly in reducing energy consumption at the micro-level through energy efficiency improvements, the overall energy consumption will eventually increase due to the growing demand from new services and users, resulting in an increase in GHG emissions. Based on the cooperation between Mantychore FP7 and the GSN, our approach is, therefore, much broader and more appropriate because it focuses on GHG emission reductions at the macro-level. This article presents some outcomes of our implementation of such a network model, which spans multiple green nodes in Canada, Europe and the USA. The network provides cloud computing services based on dynamic provision of network slices through relocation of virtual data centers.  相似文献   
89.
Over the last few decades, many different evolutionary algorithms have been introduced for solving constrained optimization problems. However, due to the variability of problem characteristics, no single algorithm performs consistently over a range of problems. In this paper, instead of introducing another such algorithm, we propose an evolutionary framework that utilizes existing knowledge to make logical changes for better performance. The algorithmic aspects considered here are: the way of using search operators, dealing with feasibility, setting parameters, and refining solutions. The combined impact of such modifications is significant as has been shown by solving two sets of test problems: (i) a set of 24 test problems that were used for the CEC2006 constrained optimization competition and (ii) a second set of 36 test instances introduced for the CEC2010 constrained optimization competition. The results demonstrate that the proposed algorithm shows better performance in comparison to the state-of-the-art algorithms.  相似文献   
90.
This paper deals with the H ?? filtering problem for a class of nonlinear systems. This class of nonlinear systems is composed of a bilinear part and of a lipschitzian one. The use of an unbiasedness condition for the bilinear part (called quasi unbiasedness condition) permits to parameterize the filter matrices through a single gain. Two LPV (Linear Parameter Varying) extensions of the bounded real lemma are used to solve the filtering problem. This approach reduces the conservatism inherent to the boundedness of the inputs. Then the filtering solution is expressed in terms of LMI (Linear Matrix Inequality) to be verified at the vertices of a polytope. A numerical example is finally given to illustrate our approach.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号