首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   285篇
  免费   22篇
  国内免费   1篇
电工技术   7篇
化学工业   51篇
金属工艺   6篇
机械仪表   23篇
建筑科学   5篇
能源动力   6篇
轻工业   25篇
水利工程   1篇
石油天然气   4篇
无线电   28篇
一般工业技术   62篇
冶金工业   24篇
原子能技术   8篇
自动化技术   58篇
  2024年   1篇
  2023年   6篇
  2022年   9篇
  2021年   22篇
  2020年   8篇
  2019年   20篇
  2018年   30篇
  2017年   16篇
  2016年   7篇
  2015年   16篇
  2014年   22篇
  2013年   21篇
  2012年   14篇
  2011年   9篇
  2010年   8篇
  2009年   13篇
  2008年   7篇
  2007年   5篇
  2006年   3篇
  2005年   5篇
  2004年   4篇
  2003年   5篇
  2002年   9篇
  2001年   1篇
  2000年   3篇
  1999年   6篇
  1998年   7篇
  1997年   4篇
  1996年   1篇
  1994年   2篇
  1991年   1篇
  1990年   1篇
  1989年   1篇
  1988年   1篇
  1987年   3篇
  1986年   4篇
  1985年   3篇
  1984年   3篇
  1982年   1篇
  1981年   2篇
  1980年   1篇
  1977年   1篇
  1976年   1篇
  1975年   1篇
排序方式: 共有308条查询结果,搜索用时 15 毫秒
51.
Feature selection is one of the most important techniques for data preprocessing in classification problems. In this paper, fuzzy grids–based association rules mining, as an effective data mining technique, is used for feature selection in misuse detection application in computer networks. The main idea of this algorithm is to find the relationships between items in large datasets so that it detects correlations between inputs of the system and then eliminates the redundant inputs. To classify the attacks, a fuzzy ARTMAP neural network is employed whose training parameters are optimized by gravitational search algorithm. The performance of the proposed system is compared with some other machine learning methods in the same application. Experimental results show that the proposed system, when choosing optimum “feature subset size-adjustment” parameter, performs better in terms of detection rate, false alarm rate, and cost per example in classification problems. In addition, employing the reduced-size feature set results in more than 8.4 percent reduction in computational complexity.  相似文献   
52.

With the growth of the internet, development of IP based services has increased. Voice over IP (VoIP) technology is one of the services which works based on the internet and packet switching networks and uses this structure to transfer the multimedia data e.g. voices and images. Recently, Chaudhry et al., Zhang et al. and Nikooghadam et al. have presented three authentication and key agreement protocols, separately. However, in this paper, it is proved that the presented protocols by Chaudhry et al. and also Nikooghadam et al. do not provide the perfect forward secrecy, and the presented protocol by Zhang et al. not only is vulnerable to replay attack, and known session-specific temporary information attack, but also does not provide user anonymity, re-registration and revocation, and violation of fast error detection. Therefore, a secure and efficient two-factor authentication and key agreement protocol is presented. The security analysis proves that our proposed protocol is secure against various attacks. Furthermore, security of proposed scheme is formally analyzed using BAN logic and simulated by means of the AVISPA tool. The simulation results demonstrate security of presented protocol against active and passive attacks. The communication and computation cost of the proposed scheme is compared with previously proposed authentication schemes and results confirm superiority of the proposed scheme.

  相似文献   
53.
54.
In this paper, a stand-alone photovoltaic (SAPV) power supply system for Microner sprayer is identified and proposed. The designed system was composed of three main parts: sprayer, solar power supply and control system. Initially, the control board and data acquisition system were designed and simulated by the Proteus software and then implemented using an AVR microcontroller and tested via LabVIEW in the laboratory. Next, a prototype system was fabricated for evaluation purposes. A PV panel size of 88.5?cm2, positioned horizontally above operator's head that generates 26.4?Wh/day was used as a solar energy source. A small 2?Ah (12?V) battery is installed in the system as a stabiliser. This sprayer can work seven to nine hours daily. It is calculated that the average loss of collected energy due to non-application of maximum power point tracker was approximately 25%.  相似文献   
55.
A method to generate a suite of artificial near‐fault ground motion time histories for specified earthquakes is presented. A wavelet‐based nonstationary (WB‐NS) model has been employed to effectively capture the time‐varying frequency content of a particular acceleration record and continuous wavelet transform has been used to simulate the largest velocity pulse. Furthermore, an iterative procedure using discrete wavelet transform is utilized to modify an earthquake ground motion and generate energy‐compatible ground motion. Eventually, the artificial near‐fault accelerogram is achieved via the superposition of a coherent extracted velocity pulse with a random acceleration record corresponding to a WB‐NS model and multiplied by a time‐modulating envelope function. The effectiveness of the method is demonstrated by comparing the spectral response and Arias intensity curves of the simulated accelerograms with those of the real records.  相似文献   
56.
In this paper, a new method for autotuning of a phase-lead controller for nonselfregulating or integrating systems is proposed. By connecting the system with a suitable high-order derivative filter and a relay with hysteresis, the frequency data of the system can be obtained and phase-lead controllers can be designed based on some phase margin specifications. Simulations and experimental studies are included in the paper to illustrate the performance of the proposed algorithm  相似文献   
57.
58.
This work was carried out to investigate the effect of different Ti concentrations as a modifying agent on the microstructure and tensile properties of an in-situ Al-15 pctMg2Si composite. Cast, modified, and homogenized small ingots were extruded at 753 K (480 °C) at the extrusion ratio of 18:1 and ram speed of 1 mm/s. Various techniques including metallography, tensile testing, and scanning electron microscopy were used to characterize the mechanical behavior, microstructural observations, and fracture mechanisms of this composite. The results showed that 0.5 pctTi addition and homogenizing treatment were highly effective in modifying Mg2Si particles. The results also exhibited that the addition of Ti up to 0.5 pct increases both ultimate tensile strength (UTS) and tensile elongation values. The highest UTS and elongation values were found to be 245 MPa and 9.5 pct for homogenized and extruded Al-15 pctMg2Si-0.5 pctTi composite, respectively. Fracture surface examinations revealed a transition from brittle fracture mode in the as-cast composite to ductile fracture in homogenized and extruded specimens. This can be attributed to the changes in size and morphology of Mg2Si intermetallic and porosity content.  相似文献   
59.
This paper addresses the problem of no-wait two-stage flexible flow shop scheduling problem (NWTSFFSSP) considering unrelated parallel machines, sequence-dependent setup times, probable reworks and different ready times to actualize the problem. The performance measure used in this study is minimizing maximum completion time (makespan). Because of the complexity of addressed problem, we propose a novel intelligent hybrid algorithm [called hybrid algorithm (HA)] based on imperialist competitive algorithm (ICA) which are combined with simulated annealing (SA), variable neighborhood search (VNS) and genetic algorithm (GA) for solving the mentioned problem. The hybridization is carried out to overcome some existing drawbacks of each of these three algorithms and also for increasing the capability of ICA. To achieve reliable results, Taguchi approach is used to define robust parameters' values for our proposed algorithm. A simulation model is developed to study the performance of our proposed algorithm against ICA, SA, VNS, GA and ant colony optimization (ACO). The results of the study reveal the relative superiority of HA studied. In addition, potential areas for further researches are highlighted.  相似文献   
60.
Adulteration in traded medicinal plants is a significant issue nowadays and use of these adulterated medicinal plants can impose harmful impact to end user. However, this problem can be overcome by ensuring the identification of traded medicinal plants which are used in making different herbal medicines. In this regard, palynological markers are considered to be an important taxonomic tool in the identification of original medicinal plant from its adulterant. Hence this study attempted to provide particular reliable palynological markers for distinguishing selected medicinal plants from their adulterants, that is, Cinnamomum verum versus Canella winterana, Cinnamomum tamala versus Cinnamomum obtusifolium, Gymnema sylvestre versus Gymnema lactiferum, Artemisia maritima versus Artemisia absinthium, Achillea millefolium versus Adhatoda vasaka, Sphaeranthus indicus versus Sphaeranthus africanus, Averrhoa carambola versus Butea monosperma, and Morus nigra versus Morus alba. Results demonstrated great variations in multiple palynological characters between original medicinal plant and its adulterant such as in pollen size, shape, colpi length, exine, intine thickness, and fertility. In equatorial view, circular to spheroidal shape of pollen was found in A. millefolium while oblate shape was observed in A. vasaka. Similarly B. monosperma pollen was 34 μm, whereas pollen of its adulterant A. carambola was 21 μm. Moreover, colpi length of A. maritima was 11.8 μm, whereas 4.5 μm in A. absinthium. Hence it can be concluded that palynological characters are commendably helpful in identification of genuine medicinal plant from its adulterant.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号