首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   490篇
  免费   17篇
  国内免费   5篇
电工技术   12篇
化学工业   113篇
金属工艺   9篇
机械仪表   13篇
建筑科学   14篇
能源动力   22篇
轻工业   44篇
水利工程   1篇
石油天然气   2篇
无线电   58篇
一般工业技术   108篇
冶金工业   20篇
原子能技术   5篇
自动化技术   91篇
  2024年   2篇
  2023年   15篇
  2022年   38篇
  2021年   52篇
  2020年   25篇
  2019年   51篇
  2018年   36篇
  2017年   20篇
  2016年   19篇
  2015年   10篇
  2014年   19篇
  2013年   42篇
  2012年   26篇
  2011年   28篇
  2010年   11篇
  2009年   4篇
  2008年   7篇
  2007年   8篇
  2006年   3篇
  2005年   2篇
  2004年   5篇
  2003年   4篇
  2002年   4篇
  2001年   2篇
  2000年   1篇
  1999年   7篇
  1998年   10篇
  1997年   6篇
  1996年   6篇
  1995年   3篇
  1994年   4篇
  1993年   5篇
  1992年   7篇
  1991年   4篇
  1988年   1篇
  1987年   2篇
  1986年   4篇
  1985年   2篇
  1984年   2篇
  1982年   3篇
  1981年   2篇
  1980年   2篇
  1978年   2篇
  1977年   2篇
  1976年   3篇
  1973年   1篇
排序方式: 共有512条查询结果,搜索用时 15 毫秒
41.
The emergence of Internet of Things (IoT) has introduced smart objects as the fundamental building blocks for developing a smart cyber-physical universal environment. The IoTs have innumerable daily life applications. The healthcare industry particularly has been benefited due to the provision of ubiquitous health monitoring, emergency response services, electronic medical billing, etc. Since IoT devices possess limited storage and processing power, therefore these intelligent objects are unable to efficiently provide the e-health facilities, or process and store enormous amount of collected data. IoTs are merged with Cloud Computing technology in Multi-Cloud form that basically helps cover the limitations of IoTs by offering a secure and on-demand shared pool of resources i.e., networks, servers, storage, applications, etc., to deliver effective and well-organized e-health amenities. Although the framework based on the integration of IoT and Multi-Cloud is contributing towards better patient care, yet on the contrary, it is challenging the privacy and reliability of the patients’ information. The purpose of this systematic literature review is to identify the top security threat and to evaluate the existing security techniques used to combat this attack and their applicability in IoT and Multi-Cloud based e-Healthcare environment.  相似文献   
42.
Thyristor controlled series capacitor (TCSC) can regulate line impedance and therefore increase transferred power of the system. On the other hand power system stabilizer (PSS) increases dynamic stability of generator. To enhance the stability, combination of TCSC and PSS can be applied, and in such a case coordination of TCSC and PSS is essential. This paper applies this combined controller in order to enhance the stability of multi-machine system. Parameters of these controllers are optimized by velocity update relaxation particle swarm optimization (VURPSO) algorithm and Genetic algorithm (GA). The simulation results show that the combination of VURPSO algorithm and GA leads to a better design and stability.  相似文献   
43.
ABSTRACT

The quality of user-generated content over World Wide Web media is a matter of serious concern for both creators and users. To measure the quality of content, webometric techniques are commonly used. In recent times, bibliometric techniques have been introduced to good effect for evaluation of the quality of user-generated content, which were originally used for scholarly data. However, the application of bibliometric techniques to evaluate the quality of YouTube content is limited to h-index and g-index considering only views. This paper advocates for and demonstrates the adaptation of existing Bibliometric indices including h-index, g-index and M-index exploiting both views and comments and proposes three indices hvc, gvc and mvc for YouTube video channel ranking. The empirical results prove that the proposed indices using views along with the comments outperform the existing approaches on a real-world dataset of YouTube.  相似文献   
44.
This work presents a nonlinear adaptive dynamic surface air speed and a flight path angle control design procedure for the longitudinal dynamics of a generic hypersonic flight vehicle. The proposed design scheme takes into account the magnitude, rate, and bandwidth constraints on the actuator signals. A new approach is used to enhance tracking performance and avoid a large initial control signal. The uncertain nonlinear functions in the flight vehicle model are approximated by using radial basis function neural networks. A detailed stability analysis of the designed controllers shows that all the signals of the closed‐loop system are uniformly ultimately bounded. The robust performance of the design scheme is verified through numerical simulations of the flight vehicle model for various parameter variation test cases. Copyright © 2011 John Wiley and Sons Asia Pte Ltd and Chinese Automatic Control Society  相似文献   
45.
The Journal of Supercomputing - Power consumption is likely to remain a significant concern for exascale performance in the foreseeable future. In addition, graphics processing units (GPUs) have...  相似文献   
46.
A level set algorithm for tracking discontinuities in hyperbolic conservation laws is presented. The algorithm uses a simple finite difference approach, analogous to the method of lines scheme presented in [36]. The zero of a level set function is used to specify the location of the discontinuity. Since a level set function is used to describe the front location, no extra data structures are needed to keep track of the location of the discontinuity. Also, two solution states are used at all computational nodes, one corresponding to the real state, and one corresponding to a ghost node state, analogous to the Ghost Fluid Method of [12]. High order pointwise convergence was demonstrated for scalar linear and nonlinear conservation laws, even at discontinuities and in multiple dimensions in the first paper of this series [3]. The solutions here are compared to standard high order shock capturing schemes, when appropriate. This paper focuses on the issues involved in tracking discontinuities in systems of conservation laws. Examples will be presented of tracking contacts and hydrodynamic shocks in inert and chemically reacting compressible flow.  相似文献   
47.
Neural Computing and Applications - Content protection is considered as an important issue in today’s world. Therefore, encryption of such contents is a challenging task for researchers. They...  相似文献   
48.
Tolerancing decisions can profoundly impact the quality and cost of the mechanism. To evaluate the impact of tolerance on mechanism quality, designers need to simulate the influences of tolerances with respect to the functional requirements. This paper proposes a mathematical formulation of tolerance analysis which integrates the notion of quantifier: “For allacceptable deviations (deviations which are inside tolerances),there existsa gap configurationsuch asthe assembly requirements and the behavior constraints are verified” & “For allacceptable deviations (deviations which are inside tolerances), andfor alladmissible gap configurations, the assembly and functional requirements and the behavior constraints are verified”. The quantifiers provide a univocal expression of the condition corresponding to a geometrical product requirement. This opens a wide area for research in tolerance analysis. To solve the mechanical problem, an approach based on optimization is proposed. Monte Carlo simulation is implemented for the statistical analysis. The proposed approach is tested on an over-constrained mechanism.  相似文献   
49.
Due to the interesting nonlinear dynamic properties of chaotic maps, recently chaos-based encryption algorithms have gained much attention in cryptographic communities. However, many encryption schemes do not fulfil the minimum key space requirement, which is an essential concern in many secure data applications. In this paper, an efficient chaos-based image encryption scheme with higher key space is presented. Even with a single round of encryption, a significantly larger key space can be achieved. The proposed scheme removes correlation among image pixels via random chaotic sequences, simply by XOR and addition operations. In order to resist against numerous attacks, we apply the affine transformation to get the final ciphertext image. The security of the proposed scheme is proved through histogram, contrast, PSNR, entropy, correlation, key space, key sensitivity and differential attack analysis. Many significant properties of chaotic maps, sensitivity to initial condition and control parameters, structure and attack complexity, make the anticipated scheme very reliable, practical and robust in various secure communication applications.  相似文献   
50.
This article presents a 12‐bit frequency coded chipless RFID system in the frequency range of 3 to 6 GHz. The system consists of a fully printable chipless tag and a pair of high‐gain reader antennas. The tag also incorporates its own antennas to improve the read range. Information is encoded into frequency spectrum using a multi‐resonant circuit. The circuit consists of multiple microstrip U and L‐shaped open stub resonators patterned in a unique configuration. The proposed configuration aids in capturing more data in a reduced space as well as tunable frequency operation. Tag and reader antennas utilize techniques such as stepped impedance feeding line, defective partial ground plane, and stair‐step patch structure to achieve wide‐band impedance bandwidth in miniature size. The results of the wireless measurements in the non‐anechoic environment show that the proposed system has a reading range of more than 20 cm. The presented system possesses great potential for low‐cost short‐range inventory tracking.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号