首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2072篇
  免费   94篇
  国内免费   20篇
电工技术   44篇
综合类   8篇
化学工业   460篇
金属工艺   46篇
机械仪表   62篇
建筑科学   77篇
矿业工程   6篇
能源动力   159篇
轻工业   208篇
水利工程   16篇
石油天然气   23篇
无线电   244篇
一般工业技术   348篇
冶金工业   111篇
原子能技术   14篇
自动化技术   360篇
  2024年   9篇
  2023年   44篇
  2022年   95篇
  2021年   112篇
  2020年   90篇
  2019年   91篇
  2018年   117篇
  2017年   110篇
  2016年   99篇
  2015年   59篇
  2014年   100篇
  2013年   190篇
  2012年   129篇
  2011年   150篇
  2010年   103篇
  2009年   110篇
  2008年   86篇
  2007年   67篇
  2006年   42篇
  2005年   33篇
  2004年   27篇
  2003年   27篇
  2002年   25篇
  2001年   29篇
  2000年   19篇
  1999年   21篇
  1998年   26篇
  1997年   28篇
  1996年   20篇
  1995年   21篇
  1994年   17篇
  1993年   5篇
  1992年   10篇
  1991年   4篇
  1990年   9篇
  1989年   5篇
  1988年   5篇
  1987年   2篇
  1986年   5篇
  1985年   10篇
  1984年   6篇
  1983年   9篇
  1982年   4篇
  1981年   1篇
  1980年   2篇
  1978年   4篇
  1977年   4篇
  1976年   4篇
  1970年   1篇
排序方式: 共有2186条查询结果,搜索用时 15 毫秒
41.
Vehicle-to-grid technology is an emerging field that allows unused power from Electric Vehicles (EVs) to be used by the smart grid through the central aggregator. Since the central aggregator is connected to the smart grid through a wireless network, it is prone to cyber-attacks that can be detected and mitigated using an intrusion detection system. However, existing intrusion detection systems cannot be used in the vehicle-to-grid network because of the special requirements and characteristics of the vehicle-to-grid network. In this paper, the effect of denial-of-service attacks of malicious electric vehicles on the central aggregator of the vehicle-to-grid network is investigated and an intrusion detection system for the vehicle-to-grid network is proposed. The proposed system, central aggregator–intrusion detection system (CA-IDS), works as a security gateway for EVs to analyze and monitor incoming traffic for possible DoS attacks. EVs are registered with a Central Aggregator (CAG) to exchange authenticated messages, and malicious EVs are added to a blacklist for violating a set of predefined policies to limit their interaction with the CAG. A denial of service (DoS) attack is simulated at CAG in a vehicle-to-grid (V2G) network manipulating various network parameters such as transmission overhead, receiving capacity of destination, average packet size, and channel availability. The proposed system is compared with existing intrusion detection systems using different parameters such as throughput, jitter, and accuracy. The analysis shows that the proposed system has a higher throughput, lower jitter, and higher accuracy as compared to the existing schemes.  相似文献   
42.
One of the most pressing concerns for the consumer market is the detection of adulteration in meat products due to their preciousness. The rapid and accurate identification mechanism for lard adulteration in meat products is highly necessary, for developing a mechanism trusted by consumers and that can be used to make a definitive diagnosis. Fourier Transform Infrared Spectroscopy (FTIR) is used in this work to identify lard adulteration in cow, lamb, and chicken samples. A simplified extraction method was implied to obtain the lipids from pure and adulterated meat. Adulterated samples were obtained by mixing lard with chicken, lamb, and beef with different concentrations (10%–50% v/v). Principal component analysis (PCA) and partial least square (PLS) were used to develop a calibration model at 800–3500 cm−1. Three-dimension PCA was successfully used by dividing the spectrum in three regions to classify lard meat adulteration in chicken, lamb, and beef samples. The corresponding FTIR peaks for the lard have been observed at 1159.6, 1743.4, 2853.1, and 2922.5 cm−1, which differentiate chicken, lamb, and beef samples. The wavenumbers offer the highest determination coefficient R2 value of 0.846 and lowest root mean square error of calibration (RMSEC) and root mean square error prediction (RMSEP) with an accuracy of 84.6%. Even the tiniest fat adulteration up to 10% can be reliably discovered using this methodology.  相似文献   
43.
A novel and robust pitch estimation method is presented in this paper. The basic idea is to reshape the speech signal using a combination of the dominant harmonic modification (DHM) and data adaptive time domain filtering techniques. The noisy speech signal is filtered within the ranges of fundamental frequencies to obtain the pre-filtered signal (PFS). The dominant harmonic (DH) of the PFS is determined and enhanced its amplitude. Normalized autocorrelation function (NACF) is applied to that modified signal. Then empirical mode decomposition (EMD) based data adaptive time domain filtering is applied to the NACF signal. Partial reconstruction is performed in EMD domain. The pitch period is determined from the partially reconstructed signal. The experimental results show that the proposed method performs better than the other recently developed methods for noisy and clean speech signals in terms of gross and fine pitch errors.  相似文献   
44.
This paper presents a new algorithm for de-noising global positioning system (GPS) and inertial navigation system (INS) data and estimates the INS error using wavelet multi-resolution analysis algorithm (WMRA)-based genetic algorithm (GA) with a well-designed structure appropriate for practical and real time implementations because of its very short training time and elevated accuracy. Different techniques have been implemented to de-noise and estimate the INS and GPS errors. Wavelet de-noising is one of th...  相似文献   
45.
In wireless communication reception, the reliability of orthogonal frequency division multiplexing (OFDM) is limited because of the time-varying nature of the channel. This causes inter-carrier interference (ICI) and increases inaccuracies in channel tracking. This can effectively be avoided at the cost of power loss and bandwidth expansion by inserting a cyclic prefix guard interval before each block of parallel data symbols. However, this guard interval decreases the spectral efficiency of the OFDM system as the corresponding amount. Recently, it was found that based on Haar-orthonormal wavelets, discrete wavelet-based OFDM (DWT-OFDM) is capable of reducing the inter symbol interference (ISI) and ICI, which are caused by the loss in orthogonality between the carriers. DWT-OFDM can also support much higher spectrum efficiency than discrete Fourier-based OFDM (DFT-OFDM). In this paper the DFT-OFDM is replaced by Multiwavelets OFDM (DMWT-OFDM) in order to further reduce the level of interference and increase spectral efficiency. It is found that proposed Multiwavelet design achieves much lower bit error rates, increases signal to noise power ratio (SNR), and can be used as an alternative to the conventional OFDM. The proposed OFDM system was modeled tested, and its performance was found under different channel conditions.  相似文献   
46.
In this paper we introduce a goal programming formulation for the multi-group classification problem. Although a great number of mathematical programming models for two-group classification problems have been proposed in the literature, there are few mathematical programming models for multi-group classification problems. Newly proposed multi-group mathematical programming model is compared with other conventional multi-group methods by using different real data sets taken from the literature and simulation data. A comparative analysis on the real data sets and simulation data shows that our goal programming formulation may suggest efficient alternative to traditional statistical methods and mathematical programming formulations for the multi-group classification problem.  相似文献   
47.
Cellular automata are used to model dynamical phenomena by focusing on their local behavior which depends on the neighboring cells in order to express their global behavior. The geometrical structure of the models suggests the algebraic structure of cellular automata. After modeling the dynamical phenomena, it is sometimes an important problem to be able to move backwards in order to understand it better. This is only possible if cellular automata is reversible. In this paper, 2D finite cellular automata defined by local rules based on hexagonal cell structure are studied. Rule matrix of the hexagonal finite cellular automaton is obtained. The rank of rule matrices representing the 2D hexagonal finite cellular automata via an algorithm is computed. It is a well known fact that determining the reversibility of a 2D cellular automata is a very difficult problem in general. Here, the reversibility problem of this family of 2D hexagonal cellular automata is also resolved completely.  相似文献   
48.
To conserve space and power as well as to harness high performance in embedded systems, high utilization of the hardware is required. This can be facilitated through dynamic adaptation of the silicon resources in reconfigurable systems in order to realize various customized kernels as execution proceeds. Fortunately, the encountered reconfiguration overheads can be estimated. Therefore, if the scheduling of time-consuming kernels considers also the reconfiguration overheads, an overall performance gain can be obtained. We present our policy, experiments, and performance results of customizing and reconfiguring Field-Programmable Gate Arrays (FPGAs) for embedded kernels. Experiments involving EEMBC (EDN Embedded Microprocessor Benchmarking Consortium) and MiBench embedded benchmark kernels show high performance using our main policy, when considering reconfiguration overheads. Our policy reduces the required reconfigurations by more than 50% as compared to brute-force solutions, and performs within 25% of the ideal execution time while conserving 60% of the FPGA resources. Alternative strategies to reduce the reconfiguration overhead are also presented and evaluated.  相似文献   
49.
We study the long-term generation capacity investment problem of an independent power generation company (GenCo) that functions in an environment where GenCos perform business with both bilateral contracts (BC) and transactions in the day-ahead market (DAM). A fuzzy mixed integer linear programming model with a fuzzy objective and fuzzy constraints is developed to incorporate the impacts of imprecision/uncertainty in the economic environment on the calculation of the optimal value of the GenCo’s objective function. In formulating the fuzzy objective function we also include the potential impacts of climate change on the energy output of hydroelectric power plants. In addition to formulating and solving the capacity planning/investment problem, we also performed scenario-based (sensitivity) analysis to explore how investment decisions of the GenCos change when fuzziness (tolerance) in the maximum energy output of hydroelectric units and/or drought expectation increases. The proposed model is novel and investigates the effects of factors like drought expectations of climate changes, hydroelectric power plant investments, and other power generation technology investment options.  相似文献   
50.
In this paper, a novel decentralized fault tolerant controller (DFTC) is proposed for interconnected nonlinear continuous-time systems by using local subsystem state vector alone in contrast with traditional distributed fault tolerant controllers or fault accommodation schemes where the measured or the estimated state vector of the overall system is needed. The proposed decentralized controller uses local state and input vectors and minimizes the fault effects on all the subsystems. The DFTC in each subsystem includes a traditional controller term and a neural network based online approximator term which is used to deal with the unknown parts of the system dynamics, such as fault and interconnection terms. The stability of the overall system with the proposed DFTC is investigated by using Lyapunov approach and the boundedness of all signals is guaranteed in the presence of a fault. Therefore, the proposed controller enables the system to continue its normal operation after the occurrence of a fault, as long as it does not cause failure or break down of a component. Although the decentralized fault tolerant controller is designed mainly for large-scale systems where continuous transmissions between subsystems is not possible, it can also be applied to small-scale systems where sensor measurements are available for use in all subsystems. Finally the proposed methods are verified and compared in simulation environment.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号