首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1378篇
  免费   90篇
  国内免费   15篇
电工技术   28篇
综合类   5篇
化学工业   306篇
金属工艺   33篇
机械仪表   44篇
建筑科学   29篇
能源动力   113篇
轻工业   130篇
水利工程   3篇
石油天然气   5篇
武器工业   1篇
无线电   142篇
一般工业技术   349篇
冶金工业   71篇
原子能技术   27篇
自动化技术   197篇
  2024年   2篇
  2023年   39篇
  2022年   85篇
  2021年   127篇
  2020年   81篇
  2019年   77篇
  2018年   101篇
  2017年   70篇
  2016年   85篇
  2015年   47篇
  2014年   73篇
  2013年   104篇
  2012年   67篇
  2011年   79篇
  2010年   41篇
  2009年   51篇
  2008年   40篇
  2007年   41篇
  2006年   25篇
  2005年   31篇
  2004年   13篇
  2003年   9篇
  2002年   5篇
  2001年   7篇
  2000年   6篇
  1999年   7篇
  1998年   25篇
  1997年   14篇
  1996年   10篇
  1995年   8篇
  1994年   13篇
  1993年   8篇
  1992年   4篇
  1991年   7篇
  1990年   5篇
  1989年   6篇
  1988年   3篇
  1987年   6篇
  1986年   8篇
  1985年   4篇
  1984年   4篇
  1983年   7篇
  1982年   2篇
  1981年   2篇
  1980年   4篇
  1979年   6篇
  1978年   8篇
  1977年   5篇
  1976年   4篇
  1973年   2篇
排序方式: 共有1483条查询结果,搜索用时 31 毫秒
21.
Ahmed A  Rehan M  Iqbal N 《ISA transactions》2011,50(2):249-255
This paper proposes the design of anti-windup compensator gain for stability of actuator input constrained state delay systems using constrained pole-position of the closed-loop. Based on Delay-Dependent Lyapunov-Krasovskii functionals and local sector conditions, a new LMI characterization is derived that ensures closed-loop asymptotic stability of constrained state delay systems while accounting upper bound fixed state delay and largest lower bound of the system’s pole-position in the formulation of anti-windup gain. Besides, at saturation, the method significantly nullifies the inherent slow dynamics present in the system. It is shown in the comparative numerical examples that the LMI formulation draws stability with improved time-domain performance.  相似文献   
22.
ABSTRACT

The quality of user-generated content over World Wide Web media is a matter of serious concern for both creators and users. To measure the quality of content, webometric techniques are commonly used. In recent times, bibliometric techniques have been introduced to good effect for evaluation of the quality of user-generated content, which were originally used for scholarly data. However, the application of bibliometric techniques to evaluate the quality of YouTube content is limited to h-index and g-index considering only views. This paper advocates for and demonstrates the adaptation of existing Bibliometric indices including h-index, g-index and M-index exploiting both views and comments and proposes three indices hvc, gvc and mvc for YouTube video channel ranking. The empirical results prove that the proposed indices using views along with the comments outperform the existing approaches on a real-world dataset of YouTube.  相似文献   
23.
The Grover search algorithm is one of the two key algorithms in the field of quantum computing, and hence it is desirable to represent it in the simplest and most intuitive formalism possible. We show firstly, that Clifford’s geometric algebra, provides a significantly simpler representation than the conventional bra-ket notation, and secondly, that the basis defined by the states of maximum and minimum weight in the Grover search space, allows a simple visualization of the Grover search analogous to the precession of a spin- ${\frac{1}{2}}$ particle. Using this formalism we efficiently solve the exact search problem, as well as easily representing more general search situations. We do not claim the development of an improved algorithm, but show in a tutorial paper that geometric algebra provides extremely compact and elegant expressions with improved clarity for the Grover search algorithm. Being a key algorithm in quantum computing and one of the most studied, it forms an ideal basis for a tutorial on how to elucidate quantum operations in terms of geometric algebra—this is then of interest in extending the applicability of geometric algebra to more complicated problems in fields of quantum computing, quantum decision theory, and quantum information.  相似文献   
24.
Data clustering is a significant information retrieval technique in today’s data intensive society. Over the last few decades a vast variety of huge number of data clustering algorithms have been designed and implemented for all most all data types. The quality of results of cluster analysis mainly depends on the clustering algorithm used in the analysis. Architecture of a versatile, less user dependent, dynamic and scalable data clustering machine is presented. The machine selects for analysis, the best av...  相似文献   
25.
The multi-phase machines enables independent control of a few number of machines that are connected in series in a particular manner, and the supply is fed from a single voltage source inverter (VSI). The idea was first implemented for a five-phase series-connected two-motor drive system, but is now applicable to any number of phases. The number of series-connected machines is a function of the phase number of VSI. Variable speed induction motor drives without mechanical speed sensors at the motor shaft have the attractions of low cost and high reliability. To replace the sensor, information of the rotor speed is extracted from measured stator currents and voltages at motor terminals. Open-loop estimators or closed-loop observers are used for this purpose. They differ with respect to accuracy, robustness, and sensitivity against model parameter variations. This paper analyses operation of an EKF-based sensorless control of vector controlled series-connected two-motor five-phase drive system with current control in the stationary reference frame. Results, obtained with fixed voltage and fixed frequency supply fed and hysteresis current control, is presented for various operating conditions on the basis of simulation. The purpose of this paper is to report first time, the simulation results on a sensorless control of a five-phase two-motor series-connected drive system using EKF estimator.  相似文献   
26.
Neural Computing and Applications - A lot of different methods are being opted for improving the educational standards through monitoring of the classrooms. The developed world uses Smart...  相似文献   
27.
Base station's location privacy in a wireless sensor network (WSN) is critical for information security and operational availability of the network. A key part of securing the base station from potential compromise is to secure the information about its physical location. This paper proposes a technique called base station location privacy via software-defined networking (SDN) in wireless sensor networks (BSLPSDN). The inspiration comes from the architecture of SDN, where the control plane is separated from the data plane, and where control plane decides the policy for the data plane. BSLPSDN uses three categories of nodes, namely, a main controller to instruct the overall operations, a dedicated node to buffer and forward data, and lastly, a common node to sense and forward the packet. We employ three kinds of nodes to collaborate and achieve stealth for the base station and thus protecting it against the traffic-analysis attacks. Different traits of the WSN including energy status and traffic density can actively be monitored by BSLPSDN, which positively affects the energy goals, expected life of the network, load on common nodes, and the possibility of creating diversion in the wake of an attack on the base station. We incorporated multiple experiments to analyze and evaluate the performance of our proposed algorithm. We use single controller with multiple sensor nodes and multiple controllers with multiple sensor nodes to show the level of anonymity of BS. Experiments show that providing BS anonymity via multiple controllers is the best method both in terms of energy and privacy.  相似文献   
28.
Scalability is one of the most important quality attribute of software-intensive systems, because it maintains an effective performance parallel to the large fluctuating and sometimes unpredictable workload. In order to achieve scalability, thread pool system (TPS) (which is also known as executor service) has been used extensively as a middleware service in software-intensive systems. TPS optimization is a challenging problem that determines the optimal size of thread pool dynamically on runtime. In case of distributed-TPS (DTPS), another issue is the load balancing b/w available set of TPSs running at backend servers. Existing DTPSs are overloaded either due to an inappropriate TPS optimization strategy at backend servers or improper load balancing scheme that cannot quickly recover an overload. Consequently, the performance of software-intensive system is suffered. Thus, in this paper, we propose a new DTPS that follows the collaborative round robin load balancing that has the effect of a double-edge sword. On the one hand, it effectively performs the load balancing (in case of overload situation) among available TPSs by a fast overload recovery procedure that decelerates the load on the overloaded TPSs up to their capacities and shifts the remaining load towards other gracefully running TPSs. And on the other hand, its robust load deceleration technique which is applied to an overloaded TPS sets an appropriate upper bound of thread pool size, because the pool size in each TPS is kept equal to the request rate on it, hence dynamically optimizes TPS. We evaluated the results of the proposed system against state of the art DTPSs by a client-server based simulator and found that our system outperformed by sustaining smaller response times.  相似文献   
29.
Applied Intelligence - Online Social Networks (OSNs) have become inevitable for any new methodology both for viral promoting applications and instructing the creation of inciting information and...  相似文献   
30.
Proteins implicated in iron homeostasis are assumed to be also involved in the cellular processing of iron oxide nanoparticles. In this work, the role of an endogenous iron storage protein—namely the ferritin—is examined in the remediation and biodegradation of magnetic iron oxide nanoparticles. Previous in vivo studies suggest the intracellular transfer of the iron ions released during the degradation of nanoparticles to endogenous protein cages within lysosomal compartments. Here, the capacity of ferritin cages to accommodate and store the degradation products of nanoparticles is investigated in vitro in the physiological acidic environment of the lysosomes. Moreover, it is questioned whether ferritin proteins can play an active role in the degradation of the nanoparticles. The magnetic, colloidal, and structural follow‐up of iron oxide nanoparticles and proteins in lysosome‐like medium confirms the efficient remediation of potentially harmful iron ions generated by nanoparticles within ferritins. The presence of ferritins, however, delays the degradation of particles due to a complex colloidal behavior of the mixture in acidic medium. This study exemplifies the important implications of intracellular proteins in processes of degradation and metabolization of iron oxide nanoparticles.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号