首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3374篇
  免费   132篇
  国内免费   22篇
电工技术   59篇
综合类   18篇
化学工业   727篇
金属工艺   51篇
机械仪表   80篇
建筑科学   49篇
矿业工程   4篇
能源动力   177篇
轻工业   318篇
水利工程   18篇
石油天然气   18篇
无线电   367篇
一般工业技术   700篇
冶金工业   490篇
原子能技术   29篇
自动化技术   423篇
  2023年   44篇
  2022年   86篇
  2021年   157篇
  2020年   111篇
  2019年   113篇
  2018年   132篇
  2017年   97篇
  2016年   123篇
  2015年   61篇
  2014年   107篇
  2013年   189篇
  2012年   145篇
  2011年   171篇
  2010年   125篇
  2009年   108篇
  2008年   126篇
  2007年   114篇
  2006年   99篇
  2005年   92篇
  2004年   63篇
  2003年   58篇
  2002年   49篇
  2001年   31篇
  2000年   43篇
  1999年   43篇
  1998年   175篇
  1997年   108篇
  1996年   92篇
  1995年   59篇
  1994年   64篇
  1993年   54篇
  1992年   39篇
  1991年   36篇
  1990年   24篇
  1989年   25篇
  1988年   25篇
  1987年   18篇
  1986年   22篇
  1985年   26篇
  1984年   34篇
  1983年   14篇
  1982年   21篇
  1981年   19篇
  1980年   19篇
  1978年   18篇
  1977年   17篇
  1976年   31篇
  1975年   15篇
  1974年   20篇
  1972年   13篇
排序方式: 共有3528条查询结果,搜索用时 137 毫秒
91.
Vehicle-to-grid technology is an emerging field that allows unused power from Electric Vehicles (EVs) to be used by the smart grid through the central aggregator. Since the central aggregator is connected to the smart grid through a wireless network, it is prone to cyber-attacks that can be detected and mitigated using an intrusion detection system. However, existing intrusion detection systems cannot be used in the vehicle-to-grid network because of the special requirements and characteristics of the vehicle-to-grid network. In this paper, the effect of denial-of-service attacks of malicious electric vehicles on the central aggregator of the vehicle-to-grid network is investigated and an intrusion detection system for the vehicle-to-grid network is proposed. The proposed system, central aggregator–intrusion detection system (CA-IDS), works as a security gateway for EVs to analyze and monitor incoming traffic for possible DoS attacks. EVs are registered with a Central Aggregator (CAG) to exchange authenticated messages, and malicious EVs are added to a blacklist for violating a set of predefined policies to limit their interaction with the CAG. A denial of service (DoS) attack is simulated at CAG in a vehicle-to-grid (V2G) network manipulating various network parameters such as transmission overhead, receiving capacity of destination, average packet size, and channel availability. The proposed system is compared with existing intrusion detection systems using different parameters such as throughput, jitter, and accuracy. The analysis shows that the proposed system has a higher throughput, lower jitter, and higher accuracy as compared to the existing schemes.  相似文献   
92.
This paper studies the relationship between the two parameter fracture model and the size effect model. An equivalency between two models is first established based on infinitely large size specimens. Based on this equivalency, relationships between material fracture parameters (K Ic s , CTODc) and (G f, cf) are derived. Using these relationships, values of (K Ic s , CTODc) and (G f, cf) can be predicted from each other. It is found that the relationship betweenCTOD c andc f theoretically depends on both specimen geometry and initial crack length. However this dependency is numerically insignificant, except for tensile plate with a short center notch. The obtained results may explain why both the two parameter fracture model and the size effect model can reasonably predict fracture behavior of quasi-brittle materials.  相似文献   
93.
At the retinal level, the strategies utilized by biological visual systems allow them to outperform machine vision systems, serving to motivate the design of electronic or "smart" sensors based on similar principles. Design of such sensors in silicon first requires a model of retinal information processing which captures the essential features exhibited by biological retinas. In this paper, a simple retinal model is presented, which qualitatively accounts for the achromatic information processing in the primate cone system. The computer retina model exhibits many of the properties found in biological retinas such as data reduction through nonuniform sampling, adaptation to a large dynamic range of illumination levels, variation of visual acuity with illumination level, and enhancement of spatiotemporal contrast information. The main emphasis of the model presented here is to demonstrate how different adaptation mechanisms play a role in extending the operating range of the primate retina.  相似文献   
94.
Valve stiction is one of the most common causes of oscillations in industrial process control loops. Such oscillations can degrade the overall performance of the loop and eventually the final product quality. The detection and quantification of valve stiction in industrial process control loops is thus important. From previous studies in the literature, a sticky valve has been shown to have a distinct signature of the stiction phenomena in its valve positioner data. However, the position of the modulating control valves is seldom available. We consider the problem of estimating the valve position as an unknown input estimation problem. In this work, we propose a novel application of the unknown input estimator in order to estimate the valve position given the process model and the data of the process variable and controller output. Using the estimated valve position, we can detect and also quantify the amount of stiction. We demonstrate the efficacy of the method through simulation examples where a sticky valve is deliberately introduced in the closed loop using a two-parameter stiction model available in the literature. Application of the proposed methodology to a laboratory scale flow control loop is presented. An industrial case study is also presented in which the algorithm accurately detects and quantifies stiction in the level control loop of a power plant.  相似文献   
95.
The LQG trade-off curve has been used as a benchmark for control loop performance assessment. The subspace approach to estimating the LQG benchmark has been proposed in the literature which requires certain intermediate matrices in subspace identification as well as the covariance matrix of the noise. It is shown in this paper that many existing closed-loop identification methods do not give a consistent estimate of the noise covariance matrix. As a result, we propose an alternative subspace formulation for the joint input–output closed-loop identification for which the consistency of the required subspace matrices and noise covariance is guaranteed. Simulation studies and experimental results are provided to demonstrate the utility of the proposed method.  相似文献   
96.
The results of a joint university–industry collaborative project for control loop reconfiguration using closed loop experimental data from a fuel gas pressure control system are described in this paper. The fuel gas pressure was being regulated using a butane stream. For economic reasons, it was necessary to switch control to the ethane stream. Previous attempts at effecting this changeover had proved unsuccessful. In this study, a powerful system identification technique namely Canonical Variate Analysis (CVA) was employed to obtain the empirical plant models. A PI controller was then designed using the direct synthesis method. Acceptable closed loop behavior was obtained with little online tuning.  相似文献   
97.
The increased availability of large scale computational facilities is enabling the use of computational modelling for the treatment of complex problems of industrial interest. Computational haemodynamics is an area where improved computational power and algorithmic development have permitted the application in biomechanics of techniques originally devised for direct numerical simulations in others areas of scientific interest. In this paper we present a highly accurate algorithm for the numerical solution of the incompressible Navier–Stokes equations which employs a spectral/hp element spatial discretisation and a high-order time splitting. Two important developments discussed in this paper are the coupling of these techniques with unstructured mesh generation, used in many everyday engineering applications, and the introduction of a non-Newtonian viscosity model to account for the shear thinning properties of blood. The proposed method will be applied to the analysis of shear stress distributions in flows of interest in haemodynamics. Received: 5 May 1999 / Accepted: 21 september 1999  相似文献   
98.
The present review has attempted to summarize the classic symptoms and signs of aortic valve stenosis, especially in an adult. It is emphasized that all the classic signs rarely are present and their absence may mislead an unwary clinician. The diagnostic help provided by noninvasive tests, including echocardiography and phonocardiography, has been emphasized. A need for cardiac catheterization and angiography in most patients prior to corrective surgery is stressed. The natural history of the disease without operative intervention is dim and a significant risk of sudden death exists. The current surgical approach with immediate and long-term results is summarized. Finally, attention has been drawn to the special clinical circumstances when the aortic valve stenosis provides a strinkingly different clinical picture. We cannot find a better way to end this review than by quoting a warning note given by Thomas Lewis in 1920: "It is the faint cry of an anguished and fast failing muscle, which, when it comes, all should strain to hear, for it is not long repeated. A few months, a few years at most, and the end comes."  相似文献   
99.
Abstract

The purpose of this study is to propose an alternative forecasting approach for improving the current water supply outlook in Korea. Using a rainfall-runoff model, the existing technique for the water supply outlook in Korea produces monthly low, average, and high runoff forecasts. The proposed technique is called Ensemble Streamflow Prediction (ESP), and is currently implemented by the National Weather Service in the U.S.A. ESP appears particularly valid in Korea where the historical rainfall record is much more comprehensive than the historical streamflow record. This study applies ESP to runoff forecasting for a river basin in Korea to examine its applicability. An ensemble of one-month ahead runoff forecasts at the Gongju gauging station in the Keum River basin, Korea, was generated for each month. The resulting ESP forecasts were compared with the corresponding observed runoff data as well as the existing forecasts. Although this study is limited to one case study, the following conclusions can be made: (1) the ESP technique dominates the existing forecasting techniques in terms of both systematic and random errors; and (2) ESP is more accurate when high flows occur.  相似文献   
100.
In this paper we propose an adaptive part-based spatio-temporal model that characterizes person’s appearance using color and facial features. Face image selection based on low level cues is used to select usable face images to build a face model. Color features that capture the distribution of colors as well as the representative colors are used to build the color model. The model is built over a sequence of frames of an individual and hence captures the characteristic appearance as well as its variations over time. We also address the problem of multiple person re-identification in the absence of calibration data or prior knowledge about the camera layout. Multiple person re-identification is a open set matching problem with a dynamically evolving and open gallery set and an open probe set. Re-identification is posed as a rectangular assignment problem and is solved to find a bijection that minimizes the overall assignment cost. Open and closed set re-identification is tested on 30 videos collected with nine non-overlapping cameras spanning outdoor and indoor areas, with 40 subjects under observation. A false acceptance reduction scheme based on the developed model is also proposed.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号