首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4680篇
  免费   401篇
  国内免费   30篇
电工技术   61篇
综合类   25篇
化学工业   1280篇
金属工艺   153篇
机械仪表   242篇
建筑科学   188篇
矿业工程   11篇
能源动力   250篇
轻工业   407篇
水利工程   104篇
石油天然气   81篇
武器工业   3篇
无线电   410篇
一般工业技术   822篇
冶金工业   157篇
原子能技术   34篇
自动化技术   883篇
  2024年   17篇
  2023年   60篇
  2022年   104篇
  2021年   235篇
  2020年   258篇
  2019年   318篇
  2018年   406篇
  2017年   360篇
  2016年   335篇
  2015年   207篇
  2014年   359篇
  2013年   561篇
  2012年   388篇
  2011年   379篇
  2010年   243篇
  2009年   232篇
  2008年   134篇
  2007年   114篇
  2006年   69篇
  2005年   38篇
  2004年   32篇
  2003年   23篇
  2002年   25篇
  2001年   18篇
  2000年   22篇
  1999年   21篇
  1998年   18篇
  1997年   15篇
  1996年   12篇
  1995年   14篇
  1994年   10篇
  1993年   17篇
  1992年   7篇
  1991年   7篇
  1990年   9篇
  1989年   7篇
  1988年   7篇
  1987年   2篇
  1986年   4篇
  1985年   2篇
  1984年   9篇
  1983年   2篇
  1982年   5篇
  1980年   1篇
  1979年   1篇
  1978年   2篇
  1974年   1篇
  1967年   1篇
排序方式: 共有5111条查询结果,搜索用时 31 毫秒
41.

The aim of this paper is to develop a stochastic-parametric model for the generation of synthetic ground motions (GMs) which are in accordance with a real GM. In the proposed model, the dual-tree complex discrete wavelet transform (DT-CDWT) is applied to real GMs to decompose them into several frequency bands. Then, the gamma modulating function (GMF) is used to simulate the wavelet coefficients of each level. Consequently, synthetic wavelet coefficients are generated using extracted model parameters and then synthetic GM is extracted by applying the inverse DT-CDWT to synthetic wavelet coefficients. This model simulates the time–frequency distribution of both wide-frequency and narrow-frequency bandwidth GMs. Besides being less time consuming, it simulates several dominant frequency peaks at any moment in the time duration of GM, because each frequency band is separately simulated by the gamma function. Moreover, the inelastic response spectra of synthetic GMs generated by the proposed model are a good estimate of target ones. Using the random sign generator in the proposed model, it is possible to generate any number of synthetic GMs in accordance with a recorded one. Because of these advantages, the proposed model is suitable for using in performance-based earthquake engineering.

  相似文献   
42.
The Journal of Supercomputing - In wireless sensor networks (WSNs), designing a stable, low-power routing protocol is a major challenge because successive changes in links or breakdowns destabilize...  相似文献   
43.
Microsystem Technologies - A force sensor utilizing a transformer concept with a ferrofluid core was developed. A ferrofluid reservoir was machined out of Teflon and the open top of the reservoir...  相似文献   
44.
Nowadays malware is one of the serious problems in the modern societies. Although the signature based malicious code detection is the standard technique in all commercial antivirus softwares, it can only achieve detection once the virus has already caused damage and it is registered. Therefore, it fails to detect new malwares (unknown malwares). Since most of malwares have similar behavior, a behavior based method can detect unknown malwares. The behavior of a program can be represented by a set of called API's (application programming interface). Therefore, a classifier can be employed to construct a learning model with a set of programs' API calls. Finally, an intelligent malware detection system is developed to detect unknown malwares automatically. On the other hand, we have an appealing representation model to visualize the executable files structure which is control flow graph (CFG). This model represents another semantic aspect of programs. This paper presents a robust semantic based method to detect unknown malwares based on combination of a visualize model (CFG) and called API's. The main contribution of this paper is extracting CFG from programs and combining it with extracted API calls to have more information about executable files. This new representation model is called API-CFG. In addition, to have fast learning and classification process, the control flow graphs are converted to a set of feature vectors by a nice trick. Our approach is capable of classifying unseen benign and malicious code with high accuracy. The results show a statistically significant improvement over n-grams based detection method.  相似文献   
45.
A classifier combining strategy, virtual voting by random projection (VVRP), is presented. VVRP takes advantage from the bounded distortion incurred by random projection in order to improve accuracies of stable classifiers like discriminant analysis (DA) where existing classifier combining strategies are known to be failed. It uses the distortion to virtually generate different training sets from the total available training samples in a way that does not have the potential for overfitting. Then, a majority voting combines the base learners trained on these versions of the original problem. VVRP is very simple and just needs determining a proper dimensionality for the versions, an often very easy task. It is shown to be stable in a very large region of the hyperplane constructed by the dimensionality and the number of the versions. VVRP improves the best state-of-the-art DA algorithms in both small and large sample size problems in various classification fields.  相似文献   
46.
Combining accurate neural networks (NN) in the ensemble with negative error correlation greatly improves the generalization ability. Mixture of experts (ME) is a popular combining method which employs special error function for the simultaneous training of NN experts to produce negatively correlated NN experts. Although ME can produce negatively correlated experts, it does not include a control parameter like negative correlation learning (NCL) method to adjust this parameter explicitly. In this study, an approach is proposed to introduce this advantage of NCL into the training algorithm of ME, i.e., mixture of negatively correlated experts (MNCE). In this proposed method, the capability of a control parameter for NCL is incorporated in the error function of ME, which enables its training algorithm to establish better balance in bias-variance-covariance trade-off and thus improves the generalization ability. The proposed hybrid ensemble method, MNCE, is compared with their constituent methods, ME and NCL, in solving several benchmark problems. The experimental results show that our proposed ensemble method significantly improves the performance over the original ensemble methods.  相似文献   
47.
This paper investigates the delay‐dependent adaptive synchronization problem of the master and slave structure of linear systems with both constant neutral and time‐varying discrete time‐delays and nonlinear perturbations based on the Barbalat lemma and matching conditions. An adaption law which includes the master‐slave parameters is obtained by using the Lyapunov functional method and inequality techniques to synchronize the master‐slave systems without the knowledge of upper bounds of perturbation terms. Particularly, it is shown that the synchronization speed can be controlled by adjusting the update gain of the synchronization signal. A numerical example has been given to show the effectiveness of the method. Copyright © 2011 John Wiley and Sons Asia Pte Ltd and Chinese Automatic Control Society  相似文献   
48.
In this article, we consider the project critical path problem in an environment with hybrid uncertainty. In this environment, the duration of activities are considered as random fuzzy variables that have probability and fuzzy natures, simultaneously. To obtain a robust critical path with this kind of uncertainty a chance constraints programming model is used. This model is converted to a deterministic model in two stages. In the first stage, the uncertain model is converted to a model with interval parameters by alpha-cut method and distribution function concepts. In the second stage, the interval model is converted to a deterministic model by robust optimization and min-max regret criterion and ultimately a genetic algorithm with a proposed exact algorithm are applied to solve the final model. Finally, some numerical examples are given to show the efficiency of the solution procedure.  相似文献   
49.
In this study, Adaptive Neuro-Fuzzy Inference System (ANFIS) has been used to model local scouring depth and pattern scouring around concave and convex arch shaped circular bed sills. The experimental part of this research study includes seven sets of laboratory test cases which were performed in an experimental flume under different flow conditions. A data set consists of 2754 data points of scouring depth were collected to use in the ANFIS model. The ratio of arch diameter, D, to flume width, W, is used as a non dimensional variables in all test cases. The results from ANFIS model were compared with the results of ANN model obtained by Homayoon et al. [24] and previously presented models. The results indicated that for D/W equal to 1 and 1.2, the ANFIS models produced a good performance for convex and concave bed sills. As a result, the ANFIS models can be used as an alternative to ANN for estimation of scour depth and scour pattern around a concave bed sill installed with a bridge pier.  相似文献   
50.
Rigorous control synthesis for an unmanned aerial vehicle necessitates the availability of a good, reasonable model for such a vehicle. The work reported in this paper focuses on the modeling of a rotary unmanned aerial vehicle (RUAV) and the development of a robust controller that can handle parameter uncertainties and disturbances. The parameters of the plant model are obtained through the use of the prediction error method with real flight data. The response of the identified linear model shows a good match with the measured flight data. The H control scheme is applied to obtain a robustly stable controller using the identified model. The proposed controller is analyzed using frequency-domain analysis and time-domain simulations. The performance of the proposed H controller is better than that of the conventional proportional derivative controller in that the proposed controller has a shorter settling time and less overshoot. Furthermore, the degradation of the proposed controller performance is negligible and stability is maintained when the input gains to the plant are doubled, which demonstrates the good performance and robustness of the controller.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号