全文获取类型
收费全文 | 813篇 |
免费 | 28篇 |
国内免费 | 3篇 |
专业分类
电工技术 | 14篇 |
综合类 | 2篇 |
化学工业 | 210篇 |
金属工艺 | 15篇 |
机械仪表 | 28篇 |
建筑科学 | 28篇 |
能源动力 | 32篇 |
轻工业 | 72篇 |
水利工程 | 2篇 |
石油天然气 | 6篇 |
无线电 | 90篇 |
一般工业技术 | 137篇 |
冶金工业 | 17篇 |
原子能技术 | 2篇 |
自动化技术 | 189篇 |
出版年
2024年 | 5篇 |
2023年 | 11篇 |
2022年 | 39篇 |
2021年 | 49篇 |
2020年 | 28篇 |
2019年 | 32篇 |
2018年 | 28篇 |
2017年 | 30篇 |
2016年 | 26篇 |
2015年 | 29篇 |
2014年 | 21篇 |
2013年 | 65篇 |
2012年 | 49篇 |
2011年 | 69篇 |
2010年 | 43篇 |
2009年 | 39篇 |
2008年 | 38篇 |
2007年 | 24篇 |
2006年 | 32篇 |
2005年 | 14篇 |
2004年 | 29篇 |
2003年 | 16篇 |
2002年 | 12篇 |
2001年 | 6篇 |
2000年 | 14篇 |
1999年 | 5篇 |
1998年 | 10篇 |
1997年 | 7篇 |
1996年 | 6篇 |
1995年 | 3篇 |
1994年 | 7篇 |
1993年 | 6篇 |
1992年 | 6篇 |
1991年 | 4篇 |
1989年 | 6篇 |
1988年 | 4篇 |
1986年 | 5篇 |
1984年 | 2篇 |
1982年 | 1篇 |
1981年 | 2篇 |
1980年 | 4篇 |
1979年 | 2篇 |
1978年 | 1篇 |
1977年 | 1篇 |
1976年 | 3篇 |
1974年 | 2篇 |
1973年 | 1篇 |
1972年 | 2篇 |
1970年 | 1篇 |
1969年 | 1篇 |
排序方式: 共有844条查询结果,搜索用时 15 毫秒
71.
Mostafa Safdari Shadloo Amir Zainali Samir H. Sadek Mehmet Yildiz 《Computer Methods in Applied Mechanics and Engineering》2011,200(9-12):1008-1020
In this article, we present numerical solutions for flow over an airfoil and a square obstacle using Incompressible Smoothed Particle Hydrodynamics (ISPH) method with an improved solid boundary treatment approach, referred to as the Multiple Boundary Tangents (MBT) method. It was shown that the MBT boundary treatment technique is very effective for tackling boundaries of complex shapes. Also, we have proposed the usage of the repulsive component of the Lennard-Jones Potential (LJP) in the advection equation to repair particle fractures occurring in the SPH method due to the tendency of SPH particles to follow the stream line trajectory. This approach is named as the artificial particle displacement method. Numerical results suggest that the improved ISPH method which is consisting of the MBT method, artificial particle displacement and the corrective SPH discretization scheme enables one to obtain very stable and robust SPH simulations. The square obstacle and NACA airfoil geometry with the angle of attacks between 0° and 15° were simulated in a laminar flow field with relatively high Reynolds numbers. We illustrated that the improved ISPH method is able to capture the complex physics of bluff-body flows naturally such as the flow separation, wake formation at the trailing edge, and the vortex shedding. The SPH results are validated with a mesh-dependent Finite Element Method (FEM) and excellent agreements among the results were observed. 相似文献
72.
When ambulances are engaged in responding to emergency calls, the ability to respond quickly to future calls is considerably compromised. The available ambulances are typically relocated to reestablish maximal coverage. We present a two-stage stochastic optimization model for the ambulance redeployment problem that minimizes the number of relocations over a planning horizon while maintaining an acceptable service level. We conduct computational testing based on the real historical data from the Region of Waterloo Emergency Medical Services. The results show that the optimal relocation strategies can be computed within 40 s of computational time for a desired service level of 90%. 相似文献
73.
Cuong-Le Thanh Nghia-Nguyen Trong Khatir Samir Trong-Nguyen Phuoc Mirjalili Seyedali Nguyen Khuong D. 《Engineering with Computers》2022,38(4):3069-3084
Engineering with Computers - Structural health monitoring (SHM) and Non-destructive Damage Identification (NDI) using responses of structures under dynamic excitation have an imperative role in the... 相似文献
74.
This paper presents an application we developed for France Telecom R&D to solve a difficult real-life network problem. The problem takes place in an Asynchronous Transfer Mode (ATM) network administration context and consists in planning demands of connection over a period of 1 year. A new demand is accepted if both bandwidth and Quality of Service (QoS) requirements are satisfied. Demands are not known prior to the assignment and must be performed on-line according to their arrival. Moreover, the acceptance or the reject of a demand must be decided within a given time of 1 min. 相似文献
75.
Ledmi Makhlouf Zidat Samir Hamdi-Cherif Aboubekeur 《Knowledge and Information Systems》2021,63(7):1873-1908
Knowledge and Information Systems - Mining itemsets for association rule generation is a fundamental data mining task originally stemming from the traditional market basket analysis problem.... 相似文献
76.
The generalization ability of feedforward neural networks (NNs) depends on the size of training set and the feature of the training patterns. Theoretically the best classification property is obtained if all possible patterns are used to train the network, which is practically impossible. In this paper a new noise injection technique is proposed, that is noise injection into the hidden neurons at the summation level. Assuming that the test patterns are drawn from the same population used to generate the training set, we show that noise injection into hidden neurons is equivalent to training with noisy input patterns (i.e., larger training set). The simulation results indicate that the networks trained with the proposed technique and the networks trained with noisy input patterns have almost the same generalization and fault tolerance abilities. The learning time required by the proposed method is considerably less than that required by the training with noisy input patterns, and it is almost the same as that required by the standard backpropagation using normal input patterns. 相似文献
77.
Sinha Swati Shaw Siddharth Biswas Kunal De Debashis Das Samir Chandra Sarkar Angsuman Bandyopadhyay Jaya 《Microsystem Technologies》2021,27(11):4087-4100
Microsystem Technologies - Single-Walled Carbon Nanotubes (SWCNTs) are widely used as potential carriers in drug delivery systems. The objective of this work was to observe the effects of pristine,... 相似文献
78.
79.
The increasing architecture complexity of data converters makes it necessary to use behavioral models to simulate their electrical performance and to determine their relevant data features. For this purpose, a specific data converter simulation environment has been developed which allows designers to perform time-domain behavioral simulations of pipelined analog to digital converters (ADCs). All the necessary blocks of this specific simulation environment have been implemented using the popular Matlab simulink environment. The purpose of this paper is to present the behavioral models of these blocks taking into account most of the pipelined ADC non-idealities, such as sampling jitter, noise, and operational amplifier parameters (white noise, finite DC gain, finite bandwidth, slew rate, and saturation voltages). Simulations, using a 10-bit pipelined ADC as a design example, show that in addition to the limits analysis and the electrical features extraction, designers can determine the specifications of the basic blocks in order to meet the given data converter requirements. 相似文献
80.
Samir Chabbi Rachid Boudour Djalel Chefrour 《Information Security Journal: A Global Perspective》2020,29(6):327-340
ABSTRACT Near Field Communication (NFC) technology has been used recently for electronic payment between an Automated Teller Machine (ATM) and a Smartphone. It is threatened by several attacks that can steal the user personal data like the password or the Personal Identification Number (PIN). In this paper, we present Dynamic Array PIN (DAP), a novel approach for user authentication on a Smartphone that uses NFC electronic payment with an ATM. Our analysis and experimentation prove that this technique protects against thirteen different attacks and is cost-effective in terms of required hardware, authentication time, computing power and storage space. 相似文献