全文获取类型
收费全文 | 3374篇 |
免费 | 132篇 |
国内免费 | 22篇 |
专业分类
电工技术 | 59篇 |
综合类 | 18篇 |
化学工业 | 727篇 |
金属工艺 | 51篇 |
机械仪表 | 80篇 |
建筑科学 | 49篇 |
矿业工程 | 4篇 |
能源动力 | 177篇 |
轻工业 | 318篇 |
水利工程 | 18篇 |
石油天然气 | 18篇 |
无线电 | 367篇 |
一般工业技术 | 700篇 |
冶金工业 | 490篇 |
原子能技术 | 29篇 |
自动化技术 | 423篇 |
出版年
2023年 | 44篇 |
2022年 | 86篇 |
2021年 | 157篇 |
2020年 | 111篇 |
2019年 | 113篇 |
2018年 | 132篇 |
2017年 | 97篇 |
2016年 | 123篇 |
2015年 | 61篇 |
2014年 | 107篇 |
2013年 | 189篇 |
2012年 | 145篇 |
2011年 | 171篇 |
2010年 | 125篇 |
2009年 | 108篇 |
2008年 | 126篇 |
2007年 | 114篇 |
2006年 | 99篇 |
2005年 | 92篇 |
2004年 | 63篇 |
2003年 | 58篇 |
2002年 | 49篇 |
2001年 | 31篇 |
2000年 | 43篇 |
1999年 | 43篇 |
1998年 | 175篇 |
1997年 | 108篇 |
1996年 | 92篇 |
1995年 | 59篇 |
1994年 | 64篇 |
1993年 | 54篇 |
1992年 | 39篇 |
1991年 | 36篇 |
1990年 | 24篇 |
1989年 | 25篇 |
1988年 | 25篇 |
1987年 | 18篇 |
1986年 | 22篇 |
1985年 | 26篇 |
1984年 | 34篇 |
1983年 | 14篇 |
1982年 | 21篇 |
1981年 | 19篇 |
1980年 | 19篇 |
1978年 | 18篇 |
1977年 | 17篇 |
1976年 | 31篇 |
1975年 | 15篇 |
1974年 | 20篇 |
1972年 | 13篇 |
排序方式: 共有3528条查询结果,搜索用时 137 毫秒
91.
Sajjad Ahmad Imran Raza M. Hasan Jamal Sirojiddin Djuraev Soojung Hur Imran Ashraf 《计算机、材料和连续体(英文)》2023,74(2):2363-2377
Vehicle-to-grid technology is an emerging field that allows unused power from Electric Vehicles (EVs) to be used by the smart grid through the central aggregator. Since the central aggregator is connected to the smart grid through a wireless network, it is prone to cyber-attacks that can be detected and mitigated using an intrusion detection system. However, existing intrusion detection systems cannot be used in the vehicle-to-grid network because of the special requirements and characteristics of the vehicle-to-grid network. In this paper, the effect of denial-of-service attacks of malicious electric vehicles on the central aggregator of the vehicle-to-grid network is investigated and an intrusion detection system for the vehicle-to-grid network is proposed. The proposed system, central aggregator–intrusion detection system (CA-IDS), works as a security gateway for EVs to analyze and monitor incoming traffic for possible DoS attacks. EVs are registered with a Central Aggregator (CAG) to exchange authenticated messages, and malicious EVs are added to a blacklist for violating a set of predefined policies to limit their interaction with the CAG. A denial of service (DoS) attack is simulated at CAG in a vehicle-to-grid (V2G) network manipulating various network parameters such as transmission overhead, receiving capacity of destination, average packet size, and channel availability. The proposed system is compared with existing intrusion detection systems using different parameters such as throughput, jitter, and accuracy. The analysis shows that the proposed system has a higher throughput, lower jitter, and higher accuracy as compared to the existing schemes. 相似文献
92.
This paper studies the relationship between the two parameter fracture model and the size effect model. An equivalency between two models is first established based on infinitely large size specimens. Based on this equivalency, relationships between material fracture parameters (K Ic s , CTODc) and (G f, cf) are derived. Using these relationships, values of (K Ic s , CTODc) and (G f, cf) can be predicted from each other. It is found that the relationship betweenCTOD c andc f theoretically depends on both specimen geometry and initial crack length. However this dependency is numerically insignificant, except for tensile plate with a short center notch. The obtained results may explain why both the two parameter fracture model and the size effect model can reasonably predict fracture behavior of quasi-brittle materials. 相似文献
93.
Shah S. Levine M.D. 《IEEE transactions on systems, man, and cybernetics. Part B, Cybernetics》1996,26(2):259-274
At the retinal level, the strategies utilized by biological visual systems allow them to outperform machine vision systems, serving to motivate the design of electronic or "smart" sensors based on similar principles. Design of such sensors in silicon first requires a model of retinal information processing which captures the essential features exhibited by biological retinas. In this paper, a simple retinal model is presented, which qualitatively accounts for the achromatic information processing in the primate cone system. The computer retina model exhibits many of the properties found in biological retinas such as data reduction through nonuniform sampling, adaptation to a large dynamic range of illumination levels, variation of visual acuity with illumination level, and enhancement of spatiotemporal contrast information. The main emphasis of the model presented here is to demonstrate how different adaptation mechanisms play a role in extending the operating range of the primate retina. 相似文献
94.
Valve stiction is one of the most common causes of oscillations in industrial process control loops. Such oscillations can degrade the overall performance of the loop and eventually the final product quality. The detection and quantification of valve stiction in industrial process control loops is thus important. From previous studies in the literature, a sticky valve has been shown to have a distinct signature of the stiction phenomena in its valve positioner data. However, the position of the modulating control valves is seldom available. We consider the problem of estimating the valve position as an unknown input estimation problem. In this work, we propose a novel application of the unknown input estimator in order to estimate the valve position given the process model and the data of the process variable and controller output. Using the estimated valve position, we can detect and also quantify the amount of stiction. We demonstrate the efficacy of the method through simulation examples where a sticky valve is deliberately introduced in the closed loop using a two-parameter stiction model available in the literature. Application of the proposed methodology to a laboratory scale flow control loop is presented. An industrial case study is also presented in which the algorithm accurately detects and quantifies stiction in the level control loop of a power plant. 相似文献
95.
The LQG trade-off curve has been used as a benchmark for control loop performance assessment. The subspace approach to estimating the LQG benchmark has been proposed in the literature which requires certain intermediate matrices in subspace identification as well as the covariance matrix of the noise. It is shown in this paper that many existing closed-loop identification methods do not give a consistent estimate of the noise covariance matrix. As a result, we propose an alternative subspace formulation for the joint input–output closed-loop identification for which the consistency of the required subspace matrices and noise covariance is guaranteed. Simulation studies and experimental results are provided to demonstrate the utility of the proposed method. 相似文献
96.
S. Lakshminarayanan G. Emoto S. Ebara K. Tomida Sirish L. Shah 《Journal of Process Control》2001,11(5):1434
The results of a joint university–industry collaborative project for control loop reconfiguration using closed loop experimental data from a fuel gas pressure control system are described in this paper. The fuel gas pressure was being regulated using a butane stream. For economic reasons, it was necessary to switch control to the ethane stream. Previous attempts at effecting this changeover had proved unsuccessful. In this study, a powerful system identification technique namely Canonical Variate Analysis (CVA) was employed to obtain the empirical plant models. A PI controller was then designed using the direct synthesis method. Acceptable closed loop behavior was obtained with little online tuning. 相似文献
97.
S.J. Sherwin J. Peiró O. Shah G.-S. Karamanos D.J. Doorly 《Computing and Visualization in Science》2000,3(1-2):77-83
The increased availability of large scale computational facilities is enabling the use of computational modelling for the
treatment of complex problems of industrial interest. Computational haemodynamics is an area where improved computational
power and algorithmic development have permitted the application in biomechanics of techniques originally devised for direct
numerical simulations in others areas of scientific interest. In this paper we present a highly accurate algorithm for the
numerical solution of the incompressible Navier–Stokes equations which employs a spectral/hp element spatial discretisation
and a high-order time splitting. Two important developments discussed in this paper are the coupling of these techniques with
unstructured mesh generation, used in many everyday engineering applications, and the introduction of a non-Newtonian viscosity
model to account for the shear thinning properties of blood. The proposed method will be applied to the analysis of shear
stress distributions in flows of interest in haemodynamics.
Received: 5 May 1999 / Accepted: 21 september 1999 相似文献
98.
The present review has attempted to summarize the classic symptoms and signs of aortic valve stenosis, especially in an adult. It is emphasized that all the classic signs rarely are present and their absence may mislead an unwary clinician. The diagnostic help provided by noninvasive tests, including echocardiography and phonocardiography, has been emphasized. A need for cardiac catheterization and angiography in most patients prior to corrective surgery is stressed. The natural history of the disease without operative intervention is dim and a significant risk of sudden death exists. The current surgical approach with immediate and long-term results is summarized. Finally, attention has been drawn to the special clinical circumstances when the aortic valve stenosis provides a strinkingly different clinical picture. We cannot find a better way to end this review than by quoting a warning note given by Thomas Lewis in 1920: "It is the faint cry of an anguished and fast failing muscle, which, when it comes, all should strain to hear, for it is not long repeated. A few months, a few years at most, and the end comes." 相似文献
99.
Abstract The purpose of this study is to propose an alternative forecasting approach for improving the current water supply outlook in Korea. Using a rainfall-runoff model, the existing technique for the water supply outlook in Korea produces monthly low, average, and high runoff forecasts. The proposed technique is called Ensemble Streamflow Prediction (ESP), and is currently implemented by the National Weather Service in the U.S.A. ESP appears particularly valid in Korea where the historical rainfall record is much more comprehensive than the historical streamflow record. This study applies ESP to runoff forecasting for a river basin in Korea to examine its applicability. An ensemble of one-month ahead runoff forecasts at the Gongju gauging station in the Keum River basin, Korea, was generated for each month. The resulting ESP forecasts were compared with the corresponding observed runoff data as well as the existing forecasts. Although this study is limited to one case study, the following conclusions can be made: (1) the ESP technique dominates the existing forecasting techniques in terms of both systematic and random errors; and (2) ESP is more accurate when high flows occur. 相似文献
100.
In this paper we propose an adaptive part-based spatio-temporal model that characterizes person’s appearance using color and facial features. Face image selection based on low level cues is used to select usable face images to build a face model. Color features that capture the distribution of colors as well as the representative colors are used to build the color model. The model is built over a sequence of frames of an individual and hence captures the characteristic appearance as well as its variations over time. We also address the problem of multiple person re-identification in the absence of calibration data or prior knowledge about the camera layout. Multiple person re-identification is a open set matching problem with a dynamically evolving and open gallery set and an open probe set. Re-identification is posed as a rectangular assignment problem and is solved to find a bijection that minimizes the overall assignment cost. Open and closed set re-identification is tested on 30 videos collected with nine non-overlapping cameras spanning outdoor and indoor areas, with 40 subjects under observation. A false acceptance reduction scheme based on the developed model is also proposed. 相似文献