首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   813篇
  免费   28篇
  国内免费   3篇
电工技术   14篇
综合类   2篇
化学工业   210篇
金属工艺   15篇
机械仪表   28篇
建筑科学   28篇
能源动力   32篇
轻工业   72篇
水利工程   2篇
石油天然气   6篇
无线电   90篇
一般工业技术   137篇
冶金工业   17篇
原子能技术   2篇
自动化技术   189篇
  2024年   5篇
  2023年   11篇
  2022年   39篇
  2021年   49篇
  2020年   28篇
  2019年   32篇
  2018年   28篇
  2017年   30篇
  2016年   26篇
  2015年   29篇
  2014年   21篇
  2013年   65篇
  2012年   49篇
  2011年   69篇
  2010年   43篇
  2009年   39篇
  2008年   38篇
  2007年   24篇
  2006年   32篇
  2005年   14篇
  2004年   29篇
  2003年   16篇
  2002年   12篇
  2001年   6篇
  2000年   14篇
  1999年   5篇
  1998年   10篇
  1997年   7篇
  1996年   6篇
  1995年   3篇
  1994年   7篇
  1993年   6篇
  1992年   6篇
  1991年   4篇
  1989年   6篇
  1988年   4篇
  1986年   5篇
  1984年   2篇
  1982年   1篇
  1981年   2篇
  1980年   4篇
  1979年   2篇
  1978年   1篇
  1977年   1篇
  1976年   3篇
  1974年   2篇
  1973年   1篇
  1972年   2篇
  1970年   1篇
  1969年   1篇
排序方式: 共有844条查询结果,搜索用时 15 毫秒
71.
In this article, we present numerical solutions for flow over an airfoil and a square obstacle using Incompressible Smoothed Particle Hydrodynamics (ISPH) method with an improved solid boundary treatment approach, referred to as the Multiple Boundary Tangents (MBT) method. It was shown that the MBT boundary treatment technique is very effective for tackling boundaries of complex shapes. Also, we have proposed the usage of the repulsive component of the Lennard-Jones Potential (LJP) in the advection equation to repair particle fractures occurring in the SPH method due to the tendency of SPH particles to follow the stream line trajectory. This approach is named as the artificial particle displacement method. Numerical results suggest that the improved ISPH method which is consisting of the MBT method, artificial particle displacement and the corrective SPH discretization scheme enables one to obtain very stable and robust SPH simulations. The square obstacle and NACA airfoil geometry with the angle of attacks between 0° and 15° were simulated in a laminar flow field with relatively high Reynolds numbers. We illustrated that the improved ISPH method is able to capture the complex physics of bluff-body flows naturally such as the flow separation, wake formation at the trailing edge, and the vortex shedding. The SPH results are validated with a mesh-dependent Finite Element Method (FEM) and excellent agreements among the results were observed.  相似文献   
72.
When ambulances are engaged in responding to emergency calls, the ability to respond quickly to future calls is considerably compromised. The available ambulances are typically relocated to reestablish maximal coverage. We present a two-stage stochastic optimization model for the ambulance redeployment problem that minimizes the number of relocations over a planning horizon while maintaining an acceptable service level. We conduct computational testing based on the real historical data from the Region of Waterloo Emergency Medical Services. The results show that the optimal relocation strategies can be computed within 40 s of computational time for a desired service level of 90%.  相似文献   
73.
Engineering with Computers - Structural health monitoring (SHM) and Non-destructive Damage Identification (NDI) using responses of structures under dynamic excitation have an imperative role in the...  相似文献   
74.
This paper presents an application we developed for France Telecom R&D to solve a difficult real-life network problem. The problem takes place in an Asynchronous Transfer Mode (ATM) network administration context and consists in planning demands of connection over a period of 1 year. A new demand is accepted if both bandwidth and Quality of Service (QoS) requirements are satisfied. Demands are not known prior to the assignment and must be performed on-line according to their arrival. Moreover, the acceptance or the reject of a demand must be decided within a given time of 1 min.  相似文献   
75.
Knowledge and Information Systems - Mining itemsets for association rule generation is a fundamental data mining task originally stemming from the traditional market basket analysis problem....  相似文献   
76.
The generalization ability of feedforward neural networks (NNs) depends on the size of training set and the feature of the training patterns. Theoretically the best classification property is obtained if all possible patterns are used to train the network, which is practically impossible. In this paper a new noise injection technique is proposed, that is noise injection into the hidden neurons at the summation level. Assuming that the test patterns are drawn from the same population used to generate the training set, we show that noise injection into hidden neurons is equivalent to training with noisy input patterns (i.e., larger training set). The simulation results indicate that the networks trained with the proposed technique and the networks trained with noisy input patterns have almost the same generalization and fault tolerance abilities. The learning time required by the proposed method is considerably less than that required by the training with noisy input patterns, and it is almost the same as that required by the standard backpropagation using normal input patterns.  相似文献   
77.
Microsystem Technologies - Single-Walled Carbon Nanotubes (SWCNTs) are widely used as potential carriers in drug delivery systems. The objective of this work was to observe the effects of pristine,...  相似文献   
78.
79.
The increasing architecture complexity of data converters makes it necessary to use behavioral models to simulate their electrical performance and to determine their relevant data features. For this purpose, a specific data converter simulation environment has been developed which allows designers to perform time-domain behavioral simulations of pipelined analog to digital converters (ADCs). All the necessary blocks of this specific simulation environment have been implemented using the popular Matlab simulink environment. The purpose of this paper is to present the behavioral models of these blocks taking into account most of the pipelined ADC non-idealities, such as sampling jitter, noise, and operational amplifier parameters (white noise, finite DC gain, finite bandwidth, slew rate, and saturation voltages). Simulations, using a 10-bit pipelined ADC as a design example, show that in addition to the limits analysis and the electrical features extraction, designers can determine the specifications of the basic blocks in order to meet the given data converter requirements.  相似文献   
80.
ABSTRACT

Near Field Communication (NFC) technology has been used recently for electronic payment between an Automated Teller Machine (ATM) and a Smartphone. It is threatened by several attacks that can steal the user personal data like the password or the Personal Identification Number (PIN). In this paper, we present Dynamic Array PIN (DAP), a novel approach for user authentication on a Smartphone that uses NFC electronic payment with an ATM. Our analysis and experimentation prove that this technique protects against thirteen different attacks and is cost-effective in terms of required hardware, authentication time, computing power and storage space.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号