全文获取类型
收费全文 | 1274篇 |
免费 | 62篇 |
国内免费 | 2篇 |
专业分类
电工技术 | 29篇 |
综合类 | 7篇 |
化学工业 | 275篇 |
金属工艺 | 20篇 |
机械仪表 | 52篇 |
建筑科学 | 45篇 |
矿业工程 | 8篇 |
能源动力 | 50篇 |
轻工业 | 116篇 |
水利工程 | 6篇 |
石油天然气 | 7篇 |
无线电 | 161篇 |
一般工业技术 | 222篇 |
冶金工业 | 113篇 |
原子能技术 | 5篇 |
自动化技术 | 222篇 |
出版年
2024年 | 31篇 |
2023年 | 30篇 |
2022年 | 39篇 |
2021年 | 67篇 |
2020年 | 55篇 |
2019年 | 70篇 |
2018年 | 55篇 |
2017年 | 44篇 |
2016年 | 76篇 |
2015年 | 55篇 |
2014年 | 62篇 |
2013年 | 116篇 |
2012年 | 69篇 |
2011年 | 69篇 |
2010年 | 54篇 |
2009年 | 62篇 |
2008年 | 44篇 |
2007年 | 43篇 |
2006年 | 31篇 |
2005年 | 21篇 |
2004年 | 30篇 |
2003年 | 13篇 |
2002年 | 13篇 |
2001年 | 14篇 |
2000年 | 9篇 |
1999年 | 16篇 |
1998年 | 27篇 |
1997年 | 20篇 |
1996年 | 12篇 |
1995年 | 11篇 |
1994年 | 5篇 |
1993年 | 11篇 |
1992年 | 4篇 |
1991年 | 4篇 |
1990年 | 5篇 |
1989年 | 5篇 |
1987年 | 3篇 |
1986年 | 3篇 |
1985年 | 7篇 |
1983年 | 3篇 |
1982年 | 2篇 |
1981年 | 5篇 |
1980年 | 5篇 |
1977年 | 3篇 |
1976年 | 3篇 |
1974年 | 2篇 |
1971年 | 1篇 |
1968年 | 1篇 |
1967年 | 1篇 |
1966年 | 2篇 |
排序方式: 共有1338条查询结果,搜索用时 15 毫秒
101.
Milad Abdalrhman Hussein Sadaam Hadee Khekan Ahlam R. Rashid Mohammed Al-Msari Haitham Tran Tan Huy 《Engineering with Computers》2022,38(4):3625-3637
Engineering with Computers - Over the past few decades, it has been observed a remarkable progression in the development of computer aid models in the field of civil engineering. Machine learning... 相似文献
102.
Ngo Quang Hieu Nguyen Ngo Phong Truong Quoc Bao Kim Gyoung-Hahn 《International Journal of Control, Automation and Systems》2021,19(2):1133-1138
International Journal of Control, Automation and Systems - In this paper, we consider the fuzzy moving sliding surface anti-sway control problem for container cranes. We first introduce the dynamic... 相似文献
103.
104.
105.
Most underwater vehicles are nowadays equipped with vision sensors. However, it is very likely that underwater images captured using optic cameras have poor visual quality due to lighting conditions in real-life applications. In such cases it is useful to apply image enhancement methods to increase visual quality of the images as well as enhance interpretability and visibility. In this paper, an Empirical Mode Decomposition (EMD) based underwater image enhancement algorithm is presented for this purpose. In the proposed approach, initially each spectral component of an underwater image is decomposed into Intrinsic Mode Functions (IMFs) using EMD. Then the enhanced image is constructed by combining the IMFs of spectral channels with different weights in order to obtain an enhanced image with increased visual quality. The weight estimation process is carried out automatically using a genetic algorithm that computes the weights of IMFs so as to optimize the sum of the entropy and average gradient of the reconstructed image. It is shown that the proposed approach provides superior results compared to conventional methods such as contrast stretching and histogram equalizing. 相似文献
106.
Cemalettin Kubat Harun Taşkin Bayram Topal Safiye Turgay 《Journal of Intelligent Manufacturing》2004,15(4):517-526
Since 1950s the techniques of Operations Research (OR) and Optimization have been utilized to increase the efficiency of the production systems. With the widespread use of computers, it has even become easier to deal with industrial problems. However the complexity of the problems still reveals the difficulty in providing solutions. The use of artificial intelligence (AI) seems to attract the attention of the researcher to overcome to the difficulties. This has already been realized with several successful applications. In this study, the use of AI and OR techniques is compared using fuzzy logic. The progress of manufacturing systems, characteristics of production processes, system managements and system behavior are taken into account. The study is focussed on only discrete manufacturing. 相似文献
107.
Quang Huy Nguyen Claude Kirchner Hélène Kirchner 《Journal of Automated Reasoning》2002,29(3-4):309-336
This paper presents the design, the implementation, and experiments of the integration of syntactic, conditional possibly associative-commutative term rewriting into proof assistants based on constructive type theory. Our approach is called external because it consists in performing term rewriting in a specific and efficient environment and checking the computations later in a proof assistant. Two typical systems are considered in this work: ELAN, based on the rewriting calculus, as the term rewriting-based environment, and Coq, based on the calculus of inductive constructions as the proof assistant. We first formalize the proof terms for deduction by rewriting and strategies in ELAN using the rewriting calculus with explicit substitutions. We then show how these proof terms can soundly be translated into Coq syntax where they can be directly type checked. For the method to be applicable for rewriting modulo associativity and commutativity, we provide an effective method to prove equalities modulo these axioms in Coq using ELAN. These results have been integrated into an ELAN-based rewriting tactic in Coq. 相似文献
108.
This study is concerned with the integrated system of a robot and a machine tool. The major task of robot is loading the workpiece to the machine tool for contour cutting. An iterative learning control (ILC) algorithm is proposed to improve the accuracy of the finished product. The proposed ILC is to modify the input command of the next machining cycle for both robot and machine tool to iteratively enhance the output accuracy of the robot and machine tool. The modified command is computed based on the current tracking/contour error. For the ILC of the robot, tracking error is considered as the control objective to reduce the tracking error of motion path, in particular, the error at the endpoint. Meanwhile, for the ILC of the machine tool, contour error is considered as the control objective to improve the contouring accuracy, which determines the quality of machining. In view of the complicated contour error model, the equivalent contour error instead of the actual contour error is taken as the control objective in this study. One challenge for the integrated system is that there exists an initial state error for the machine tool dynamics, violating the basic assumption of ILC. It will be shown in this study that the effects of initial state error can be significantly reduced by the ILC of the robot. The proposed ILC algorithm is verified experimentally on an integrated system of commercial robot and machine tool. The experimental results show that the proposed ILC can achieve more than 90% of reduction on both the RMS tracking error of the robot and the RMS contour error of the machine tool within six learning iterations. The results clearly validate the effectiveness of the proposed ILC for the integrated system. 相似文献
109.
An Braeken Pardeep Kumar Madhusanka Liyanage Ta Thi Kim Hue 《The Journal of supercomputing》2018,74(4):1695-1714
In a multi-server authentication environment, a user only needs to register once at a central registration place before accessing the different services on the different registered servers. Both, from a user point of view as for the management and maintenance of the infrastructure, these types of environments become more and more popular. Smartcard- or smartphone-based approaches lead to more secure systems because they offer two- or three-factor authentication, based on the strict combination of the user’s password, the user’s biometrics and the possession of the device. In this paper, we propose an efficient anonymous authentication protocol in multiple server communication networks, called the EAAM protocol, which is able to establish user anonymity, mutual authentication, and resistance against known security attacks. The novelty of the proposed scheme is that it does not require a secure channel during the registration between the user and the registration center and is resistant to a curious but honest registration system. These features are established in a highly efficient way with the minimum amount of communication flows between user and server during the establishment of the secret shared key and by using light-weight cryptographic techniques such as Chebyshev chaotic map techniques and symmetric key cryptography. The performance and security of the protocol are analyzed and compared with the latest new proposals in this field. 相似文献
110.
Pham Huy Thong Florentin Smarandache Phung The Huan Tran Manh Tuan Tran Thi Ngan Vu Duc Thai Nguyen Long Giang Le Hoang Son 《计算机系统科学与工程》2023,46(2):1981-1997
Clustering is a crucial method for deciphering data structure and producing new information. Due to its significance in revealing fundamental connections between the human brain and events, it is essential to utilize clustering for cognitive research. Dealing with noisy data caused by inaccurate synthesis from several sources or misleading data production processes is one of the most intriguing clustering difficulties. Noisy data can lead to incorrect object recognition and inference. This research aims to innovate a novel clustering approach, named Picture-Neutrosophic Trusted Safe Semi-Supervised Fuzzy Clustering (PNTS3FCM), to solve the clustering problem with noisy data using neutral and refusal degrees in the definition of Picture Fuzzy Set (PFS) and Neutrosophic Set (NS). Our contribution is to propose a new optimization model with four essential components: clustering, outlier removal, safe semi-supervised fuzzy clustering and partitioning with labeled and unlabeled data. The effectiveness and flexibility of the proposed technique are estimated and compared with the state-of-art methods, standard Picture fuzzy clustering (FC-PFS) and Confidence-weighted safe semi-supervised clustering (CS3FCM) on benchmark UCI datasets. The experimental results show that our method is better at least 10/15 datasets than the compared methods in terms of clustering quality and computational time. 相似文献