首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   545篇
  免费   32篇
  国内免费   4篇
电工技术   6篇
综合类   1篇
化学工业   147篇
金属工艺   12篇
机械仪表   19篇
建筑科学   16篇
矿业工程   3篇
能源动力   40篇
轻工业   77篇
水利工程   16篇
石油天然气   15篇
无线电   30篇
一般工业技术   62篇
冶金工业   34篇
原子能技术   7篇
自动化技术   96篇
  2023年   14篇
  2022年   24篇
  2021年   30篇
  2020年   22篇
  2019年   29篇
  2018年   19篇
  2017年   24篇
  2016年   28篇
  2015年   20篇
  2014年   21篇
  2013年   57篇
  2012年   40篇
  2011年   36篇
  2010年   21篇
  2009年   16篇
  2008年   13篇
  2007年   19篇
  2006年   14篇
  2005年   13篇
  2004年   5篇
  2003年   9篇
  2002年   9篇
  2001年   7篇
  2000年   4篇
  1999年   5篇
  1998年   12篇
  1997年   5篇
  1996年   4篇
  1993年   3篇
  1991年   3篇
  1989年   2篇
  1988年   3篇
  1987年   6篇
  1986年   3篇
  1985年   3篇
  1984年   2篇
  1982年   2篇
  1981年   2篇
  1980年   5篇
  1977年   2篇
  1976年   6篇
  1975年   4篇
  1974年   3篇
  1973年   1篇
  1972年   2篇
  1971年   1篇
  1969年   1篇
  1967年   1篇
  1966年   1篇
  1965年   1篇
排序方式: 共有581条查询结果,搜索用时 15 毫秒
61.
62.
An observer-based adaptive fuzzy control is presented for a class of nonlinear systems with unknown time delays. The state observer is first designed, and then the controller is designed via the adaptive fuzzy control method based on the observed states. Both the designed observer and controller are independent of time delays. Using an appropriate Lyapunov-Krasovskii functional, the uncertainty of the unknown time delay is compensated, and then the fuzzy logic system in Mamdani type is utilized to approximate the unknown nonlinear functions. Based on the Lyapunov stability theory, the constructed observer-based controller and the closed-loop system are proved to be asymptotically stable. The designed control law is independent of the time delays and has a simple form with only one adaptive parameter vector, which is to be updated on-line. Simulation results are presented to demonstrate the effectiveness of the proposed approach.  相似文献   
63.
This paper presents the chaos suppression problem in the class of Hopfield neural networks (HNNs) with input nonlinearity using inverse optimality approach. Using the inverse optimality technique and based on Lyapunov stability theory, a stabilizing control law, which is optimal with respect to meaningful cost functional, is determined to achieve global asymptotically stability in the closed-loop system. Numerical simulation is performed on a four-dimensional hyper-chaotic HNN to demonstrate the effectiveness of the proposed method.  相似文献   
64.
This study aims to review the related literature on operations research (OR)/management science (MS) in the Arab world published during the last three decades. Owing to the nature of this study, an extensive survey of the related literature was conducted and inferences were drawn. The inferences drawn from the literature survey on OR/MS in the Arab world were first, there is a paucity of published real‐world applications of OR/MS. Second, there is a lack of published survey‐type studies in most Arab countries, except in Jordan, Lebanon, Palestine, Syria, and the United Arab Emirates. Third, the majority of published works on OR/MS were of a conceptual nature. A few papers concerned with OR/MS in the Arab world were published during the 1980s, with a special emphasis on conceptual issues rather than on applied or survey‐type studies. The 1990s witnessed an increased number of publications on both survey‐type and conceptual studies. Since 2000, the number of publications has increased substantially, mainly through conceptual studies. This study has a number of implications for both practitioners and researchers. Practitioners will be made aware of the applications of OR/MS in the Arab world and the type of problems that have been addressed. This, in turn, might motivate the decision makers and the managers to adopt OR/MS approaches in solving their organizations' problems. As a result, this might increase the usage of OR/MS in this part of the world. Researchers will be able to identify the OR/MS research areas that need more attention in the Arab world. The study mainly covers the studies that are written in English and indexed in non‐Arabic databases. Although the Arabic works were not surveyed exhaustively, the author reviewed and included some available OR/MS works written in Arabic. This study is considered as the first work of its type in surveying the scholarly publications pertaining to OR/MS in the Arab world since the 1980s.  相似文献   
65.
The Journal of Supercomputing - Software-defined network (SDN) can ease the implementation of QoS concept by introducing a flexible and manageable mechanism to overcome the TCP pacing in the...  相似文献   
66.

Studies have shown that the major cause of the bridge failures is the local scour around the pier foundations or their abutments. The local scour around the bridge pier is occurred by changing the flow pattern and creating secondary vortices in the front and rear of the bridge piers. Until now, many researchers have proposed empirical equations to estimate the bridge pier scour based on laboratory and field datasets. However, scale impact, laboratory simplification, natural complexity of rivers and the personal judgement are among the main causes of inaccuracy in the empirical equations. Therefore, due to the deficiencies and disadvantages of existing equations and the complex nature of the local scour phenomenon, in this study, the adaptive network-based fuzzy inference system (ANFIS) and teaching–learning-based optimization (TLBO) method were combined and used. The parameters of the ANFIS were optimized by using TLBO optimization method. To develop the model and validate its performance, two datasets were used including laboratory dataset that consisted of experimental results from the current study and previous ones and the field dataset. In total, 27 scaled experiments of different types of pier groups with different cross sections and side slopes were carried out. To evaluate the model ability in prediction of scour depth, results were compared to the standard ANFIS and empirical equations using evaluation functions including Hec-18, Froehlich and Laursen and Toch equations. The results showed that adding TLBO to the standard ANFIS was efficient and can increase the model capability and reliability. Proposed model achieved better results than Laursen and Toch equation which had the best results among empirical relationships. For instance, proposed model in comparison with the Laursen and Toch equation, based on the RMSE function, yielded 50.4% and 71.8% better results in laboratory and field datasets, respectively.

  相似文献   
67.
This paper presents a novel image encryption/decryption algorithm based on chaotic neural network (CNN). The employed CNN is comprised of two 3-neuron layers called chaotic neuron layer (CNL) and permutation neuron layer (PNL). The values of three RGB (Red, Green and Blue) color components of image constitute inputs of the CNN and three encoded streams are the network outputs. CNL is a chaotic layer where, three well-known chaotic systems i.e. Chua, Lorenz and Lü systems participate in generating weights and biases matrices of this layer corresponding to each pixel RGB features. Besides, a chaotic tent map is employed as the activation function of this layer, and makes the relationship between the plain image and cipher image nonlinear. The output of CNL, i.e. the diffused information, is the input of PNL, where three-dimensional permutation is applied to the diffused information. The overall process is repeated several times to make the encryption process more robust and complex. A 160-bit-long authentication code has been used to generate the initial conditions and the parameters of the CNL and PNL. Some security analysis are given to demonstrate that the key space of the new algorithm is large enough to make brute-force attacks infeasible and simulations have been carried out with detailed numerical analysis, demonstrating the high security of the new image encryption scheme.  相似文献   
68.
ABSTRACT

Tree crown attributes are important parameters during the assessment and monitoring of forest ecosystems. Canopy height models (CHMs) derived from airborne laser scanning (ALS) data have proved to be a reliable source for extracting different biophysical characteristics of single trees and at stand level. However, ALS-derived tree measurements (e.g., mean crown diameter) can be negatively affected by pits that appear in the CHMs. Thus, we propose a novel method for generating pit-free CHMs from ALS point clouds for estimating crown attributes (i.e., area and mean diameter) at the species level. The method automatically calculates a threshold for a pixel based on the range of height values within neighbouring pixels; if the pixel falls below the threshold then it is recognized as a pitted pixel. The pit is then filled with the median of the values of the neighbouring pixels. Manually delineated individual tree crowns (ITC) of four deciduous and two coniferous species on Colour Infrared (CIR) stereo images were used as a reference in the analysis. In addition, a variety of different algorithms for constructing CHMs were compared to investigate the performance of different CHMs in similar forest conditions. Comparisons between the estimated and observed crown area (R2 = 0.95, RMSE% = 19.12% for all individuals) and mean diameter (R2 = 0.92, RMSE% = 12.16% for all individuals) revealed that ITC attributes were correctly estimated by segmentation of the pit-free CHM proposed in this study. The goodness of matching and geometry revealed that the delineated crowns correctly matched up to the reference data and had identical geometry in approximately 70% of cases. The results showed that the proposed method produced a CHM that estimates crown attributes more accurately than the other investigated CHMs. Furthermore, the findings suggest that the proposed algorithm used to fill pits with the median of height observed in surrounding pixels significantly improve the accuracy of the results the species level due to a higher correlation between the estimated and observed crown attributes. Based on these results, we concluded that the proposed pit filling method is capable of providing an automatic and objective solution for constructing pit-free CHMs for assessing individual crown attributes of mixed forest stands.  相似文献   
69.
This paper investigates the unique pharyngeal and uvular consonants of Arabic from the point of view of automatic speech recognition (ASR). Comparisons of the recognition error rates for these phonemes are analyzed in five experiments that involve different combinations of native and non-native Arabic speakers. The most three confusing consonants for every investigated consonant are discussed. All experiments use the Hidden Markov Model Toolkit (HTK) and the Language Data Consortium (LDC) WestPoint Modern Standard Arabic (MSA) database. Results confirm that these Arabic distinct consonants are a major source of difficulty for Arabic ASR. While the recognition rate for certain of these unique consonants such as // can drop below 35% when uttered by non-native speakers, there is advantage to include non-native speakers in ASR. Besides, regional differences in pronunciation of MSA by native Arabic speakers require the attention of Arabic ASR research.  相似文献   
70.
Intrusion detection systems that have emerged in recent decades can identify a variety of malicious attacks that target networks by employing several detection approaches. However, the current approaches have challenges in detecting intrusions, which may affect the performance of the overall detection system as well as network performance. For the time being, one of the most important creative technological advancements that plays a significant role in the professional world today is blockchain technology. Blockchain technology moves in the direction of persistent revolution and change. It is a chain of blocks that covers information and maintains trust between individuals no matter how far apart they are. Recently, blockchain was integrated into intrusion detection systems to enhance their overall performance. Blockchain has also been adopted in healthcare, supply chain management, and the Internet of Things. Blockchain uses robust cryptography with private and public keys, and it has numerous properties that have leveraged security’s performance over peer-to-peer networks without the need for a third party. To explore and highlight the importance of integrating blockchain with intrusion detection systems, this paper provides a comprehensive background of intrusion detection systems and blockchain technology. Furthermore, a comprehensive review of emerging intrusion detection systems based on blockchain technology is presented. Finally, this paper suggests important future research directions and trending topics in intrusion detection systems based on blockchain technology.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号