全文获取类型
收费全文 | 245篇 |
免费 | 5篇 |
国内免费 | 2篇 |
专业分类
电工技术 | 1篇 |
化学工业 | 38篇 |
金属工艺 | 3篇 |
机械仪表 | 25篇 |
建筑科学 | 14篇 |
能源动力 | 13篇 |
轻工业 | 3篇 |
水利工程 | 1篇 |
石油天然气 | 1篇 |
无线电 | 25篇 |
一般工业技术 | 47篇 |
冶金工业 | 8篇 |
原子能技术 | 1篇 |
自动化技术 | 72篇 |
出版年
2024年 | 1篇 |
2022年 | 4篇 |
2021年 | 5篇 |
2020年 | 8篇 |
2019年 | 5篇 |
2018年 | 11篇 |
2017年 | 11篇 |
2016年 | 6篇 |
2015年 | 9篇 |
2014年 | 16篇 |
2013年 | 25篇 |
2012年 | 10篇 |
2011年 | 14篇 |
2010年 | 13篇 |
2009年 | 15篇 |
2008年 | 12篇 |
2007年 | 11篇 |
2006年 | 15篇 |
2005年 | 7篇 |
2004年 | 9篇 |
2003年 | 5篇 |
2002年 | 3篇 |
2001年 | 2篇 |
2000年 | 2篇 |
1999年 | 1篇 |
1998年 | 1篇 |
1997年 | 4篇 |
1996年 | 3篇 |
1995年 | 4篇 |
1993年 | 3篇 |
1992年 | 1篇 |
1991年 | 4篇 |
1990年 | 1篇 |
1986年 | 1篇 |
1985年 | 1篇 |
1983年 | 2篇 |
1981年 | 1篇 |
1980年 | 2篇 |
1978年 | 1篇 |
1973年 | 1篇 |
1972年 | 2篇 |
排序方式: 共有252条查询结果,搜索用时 12 毫秒
151.
Yongmin Zhong Bijan Shirinzadeh Gursel Alici Julian Smith 《IEEE transactions on information technology in biomedicine》2006,10(4):749-762
This paper presents a new methodology to simulate soft object deformation by drawing an analogy between a cellular neural network (CNN) and elastic deformation. The potential energy stored in an elastic body as a result of a deformation caused by an external force is propagated among mass points by a nonlinear CNN. The novelty of the methodology is that: 1) CNN techniques are established to describe the potential energy distribution of the deformation for extrapolating internal forces and 2) nonlinear materials are modeled with nonlinear CNNs rather than geometric nonlinearity. Integration with a haptic device has been achieved for deformable object simulation with force feedback. The proposed methodology not only predicts the typical behaviors of living tissues, but it also accommodates isotropic, anisotropic, and inhomogeneous materials, as well as local and large-range deformation. 相似文献
152.
Yimin Zhang Bijan G. Mobasseri Behzad M. Dogahe Moeness G. Amin 《Signal, Image and Video Processing》2010,4(1):105-121
Linear chirps, a special case of polynomial phase exponentials, have recently been proposed for digital watermarking. In this work, we propose a known-host-state methodology for designing image watermarks that are robust to compression. We use a two-dimensional frequency-modulated chirp as a spreading function in a block-based spatial watermarking scheme. In each block, the chirp is used to embed binary phase information. Chirp parameters allow for spectral shaping of the watermark to match host content. Since host state is known to the embedder, it is possible to tune the chirp for optimum performance, particularly against compression. In contrast to existing chirp watermarking where only a single watermark is generally embedded, the proposed block chirp watermarking allows for a much higher payload. Detection is done using chirp transform subject to key exchange for security. We show that the proposed method significantly outperforms non-adaptive watermarking across all compression factors under variety of attacks. 相似文献
153.
Peer-to-Peer (P2P) applications generate streaming data in large volumes, where new communities of peers regularly attend and existing communities of peers regularly leave, requiring the classification techniques to consider concept drift, and update the model incrementally. Concept-adapting Very Fast Decision Tree (CVFDT) is one of the well-known streaming data mining techniques that can be applied to P2P traffic. However, we observe that P2P traffic data is class imbalanced, namely, only about 30 % of examples can be labeled as “P2P”, biasing the trained models (e.g. decision tree) towards the majority class (i.e. “NonP2P”). In this paper, we propose a new technique, the imbalanced CVFDT (iCVFDT), by integrating the CVFDT with an efficient resampling technique to address the issue of the class imbalanced data. The iCVFDT classification technique enjoys the advantages of CVFDT (such as stability), and at the same time, is not sensitive to imbalanced data. We captured the Internet traffic at a main gateway and prepared a real data stream with 3.5 million examples to which the iCVFDT classification technique was applied. The experimental results demonstrate a significant improvement in the performance of the iCVFDT compared to that of the CVFDT. 相似文献
154.
Damien Isebe Pascal Azerad Frederic Bouchette Benjamin Ivorra Bijan Mohammadi 《International journal for numerical methods in engineering》2008,74(8):1262-1277
This paper describes how to tackle new challenging coastal engineering problems related to beach erosion with a shape optimization approach. The method modifies the shape of the sea bottom in order to reduce beach erosion effects. Global optimization is shown to be necessary as the related functionals have several local minima. We describe the physical model used, the proposed protection devices against beach erosion and real case applications. Copyright © 2007 John Wiley & Sons, Ltd. 相似文献
155.
We are interested in optimal design of 3D complex geometries, such as radial turbomachines, in large control space. The calculation of the gradient of the cost function is a key point when a gradient based method is used. Finite difference method has a complexity proportional to the size of the control space and the adjoint method requires important extra coding. We propose to consider the incomplete sensitivities method for optimal design of radial turbomachinery blades. The central point of the paper is how to adapt some formulations in radial turbomachinery to the validity domain of incomplete sensitivities. Also, we discuss on how to improve the accuracy of incomplete sensitivities using reduced order models based on physical assumptions. Fine/Turbo flow solver is coupled with gradient based optimization algorithms based on CAD-connected frameworks. Newton methods together with incomplete expressions of gradients are used. The approach is validated through optimization of centrifugal pumps. Finally the results are considered and discussed. 相似文献
156.
In this paper we present invalid-curve attacks that apply to the Montgomery ladder elliptic curve scalar multiplication (ECSM)
algorithm. An elliptic curve over the binary field is defined using two parameters, a and b. We show that with a different “value” for curve parameter a, there exists a cryptographically weaker group in nine of the ten NIST-recommended elliptic curves over
\mathbbF2m\mathbb{F}_{2^{m}}. Thereafter, we present two attacks that are based on the observation that parameter a is not utilized for the Montgomery ladder algorithms proposed by López and Dahab (CHES 1999: Cryptographic Hardware and Embedded
Systems, LNCS, vol. 1717, pp. 316–327, Springer, Berlin, 1999). We also present the probability of success of such attacks for general and NIST-recommended elliptic curves. In addition
we give some countermeasures to resist these attacks. 相似文献
157.
Najafi B Aminian K Loew F Blanc Y Robert PA 《IEEE transactions on bio-medical engineering》2002,49(8):843-851
A new method of evaluating the characteristics of postural transition (PT) and their correlation with falling risk in elderly people is described. The time of sit-to-stand and stand-to-sit transitions and their duration were measured using a miniature gyroscope attached to the chest and a portable recorder placed on the waist. Based on a simple model and the discrete wavelet transform, three parameters related to the PT were measured, namely, the average and standard deviation of transition duration and the occurrence of abnormal successive transitions (number of attempts to have a successful transition). The comparison between two groups of elderly subjects (with high and low fall-risk) showed that the computed parameters were significantly correlated with the falling risk as determined by the record of falls during the previous year, balance and gait disorders (Tinetti score), visual disorders, and cognitive and depressive disorders (p < 0.01). In this study, the wavelet transform has provided a powerful technique for enhancing the pattern of PT, which was mainly concentrated into the frequency range of 0.04-0.68 Hz. The system is especially adapted for long-term ambulatory monitoring of elderly people. 相似文献
158.
Bijan Jabbari 《International Journal of Communication Systems》1990,3(4):351-356
This paper proposes an admission strategy for connection-oriented services at the access node of a broadband integrated packet network based on asynchronous transfer mode. Based on an estimate of the probability of cell loss and in the absence of buffering, we determine the number of sources from different classes of bursty traffic which can be accepted. The parameters which are used to describe the traffic sources are average bit rate and peak bit rate. We will evaluate the cell loss estimate for homogeneous and heterogeneous cases. Furthermore, we will examine the variation of this estimate as the average to peak ratio changes. The estimate is an upper bound for the probability of cell loss. Based on this upper bound simple and robust allocation of resources to bursty sources can be developed. The proposed strategy can be implemented using simple computations or via a look-up table to determine admission or denial of an incoming call and therefore allocating the required capacity. The procedure results in efficient use of the bandwidth, ensuring the desired service quality for connection-oriented services and results in proactive control of network congestion. 相似文献
159.
160.
Aziz Azimi Siamak Kazemzadeh Hannani Bijan Farhanieh 《Numerical Heat Transfer, Part B: Fundamentals》2013,63(6):571-590
ABSTRACT In this study a structured multiblock grid is used to solve two-dimensional transient inverse heat conduction problems. The multiblock method is implemented for geometric decomposition of the physical domain into regions with blocked interfaces. The finite-element method is employed for direct solution of the transient heat conduction equation in a Cartesian coordinate system. Inverse algorithms used in this research are iterative Levenberg-Marquardt and adjoint conjugate gradient techniques for parameter and function estimations. The measured transient temperature data needed in the inverse solution are given by exact or noisy data. Simultaneous estimation of unknown linear/nonlinear time-varying strengths of two heat sources in two joined surfaces with equal and different heights is obtained for the solution of the inverse problems, and the results of the present study for unknown heat source functions are compared to those of exact functions. This study is an attempt to challenge the goal of combining a multiblock technique with inverse analysis methods. In fact, the structured multiblock grid is capable of providing accurate solutions of inverse heat conduction problems (IHCPs) in industrial configurations, including composite structures. In addition, the multiblock IHCP solver is suitable to estimate unknown parameters and functions in these structures. 相似文献