首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1380篇
  免费   83篇
  国内免费   16篇
电工技术   27篇
综合类   6篇
化学工业   299篇
金属工艺   31篇
机械仪表   65篇
建筑科学   39篇
能源动力   96篇
轻工业   136篇
水利工程   4篇
石油天然气   4篇
武器工业   1篇
无线电   144篇
一般工业技术   329篇
冶金工业   76篇
原子能技术   27篇
自动化技术   195篇
  2024年   2篇
  2023年   42篇
  2022年   97篇
  2021年   106篇
  2020年   87篇
  2019年   86篇
  2018年   107篇
  2017年   65篇
  2016年   81篇
  2015年   50篇
  2014年   70篇
  2013年   104篇
  2012年   57篇
  2011年   82篇
  2010年   39篇
  2009年   54篇
  2008年   45篇
  2007年   45篇
  2006年   27篇
  2005年   33篇
  2004年   16篇
  2003年   8篇
  2002年   6篇
  2001年   10篇
  2000年   7篇
  1999年   11篇
  1998年   20篇
  1997年   12篇
  1996年   8篇
  1995年   7篇
  1994年   12篇
  1993年   7篇
  1992年   3篇
  1991年   9篇
  1990年   5篇
  1989年   6篇
  1988年   3篇
  1987年   4篇
  1986年   2篇
  1985年   5篇
  1984年   3篇
  1983年   4篇
  1982年   3篇
  1981年   2篇
  1980年   4篇
  1979年   5篇
  1978年   8篇
  1977年   3篇
  1976年   3篇
  1966年   1篇
排序方式: 共有1479条查询结果,搜索用时 15 毫秒
11.
The multi-phase machines enables independent control of a few number of machines that are connected in series in a particular manner, and the supply is fed from a single voltage source inverter (VSI). The idea was first implemented for a five-phase series-connected two-motor drive system, but is now applicable to any number of phases. The number of series-connected machines is a function of the phase number of VSI. Variable speed induction motor drives without mechanical speed sensors at the motor shaft have the attractions of low cost and high reliability. To replace the sensor, information of the rotor speed is extracted from measured stator currents and voltages at motor terminals. Open-loop estimators or closed-loop observers are used for this purpose. They differ with respect to accuracy, robustness, and sensitivity against model parameter variations. This paper analyses operation of an EKF-based sensorless control of vector controlled series-connected two-motor five-phase drive system with current control in the stationary reference frame. Results, obtained with fixed voltage and fixed frequency supply fed and hysteresis current control, is presented for various operating conditions on the basis of simulation. The purpose of this paper is to report first time, the simulation results on a sensorless control of a five-phase two-motor series-connected drive system using EKF estimator.  相似文献   
12.
Neural Computing and Applications - A lot of different methods are being opted for improving the educational standards through monitoring of the classrooms. The developed world uses Smart...  相似文献   
13.
Identity management is based on the creation and management of user identities for granting access to the cloud resources based on the user attributes. The cloud identity and access management (IAM) grants the authorization to the end-users to perform different actions on the specified cloud resources. The authorizations in the IAM are grouped into roles instead of granting them directly to the end-users. Due to the multiplicity of cloud locations where data resides and due to the lack of a centralized user authority for granting or denying cloud user requests, there must be several security strategies and models to overcome these issues. Another major concern in IAM services is the excessive or the lack of access level to different users with previously granted authorizations. This paper proposes a comprehensive review of security services and threats. Based on the presented services and threats, advanced frameworks for IAM that provide authentication mechanisms in public and private cloud platforms. A threat model has been applied to validate the proposed authentication frameworks with different security threats. The proposed models proved high efficiency in protecting cloud platforms from insider attacks, single sign-on failure, brute force attacks, denial of service, user privacy threats, and data privacy threats.  相似文献   
14.
Scalability is one of the most important quality attribute of software-intensive systems, because it maintains an effective performance parallel to the large fluctuating and sometimes unpredictable workload. In order to achieve scalability, thread pool system (TPS) (which is also known as executor service) has been used extensively as a middleware service in software-intensive systems. TPS optimization is a challenging problem that determines the optimal size of thread pool dynamically on runtime. In case of distributed-TPS (DTPS), another issue is the load balancing b/w available set of TPSs running at backend servers. Existing DTPSs are overloaded either due to an inappropriate TPS optimization strategy at backend servers or improper load balancing scheme that cannot quickly recover an overload. Consequently, the performance of software-intensive system is suffered. Thus, in this paper, we propose a new DTPS that follows the collaborative round robin load balancing that has the effect of a double-edge sword. On the one hand, it effectively performs the load balancing (in case of overload situation) among available TPSs by a fast overload recovery procedure that decelerates the load on the overloaded TPSs up to their capacities and shifts the remaining load towards other gracefully running TPSs. And on the other hand, its robust load deceleration technique which is applied to an overloaded TPS sets an appropriate upper bound of thread pool size, because the pool size in each TPS is kept equal to the request rate on it, hence dynamically optimizes TPS. We evaluated the results of the proposed system against state of the art DTPSs by a client-server based simulator and found that our system outperformed by sustaining smaller response times.  相似文献   
15.
With the recent developments in the Internet of Things (IoT), the amount of data collected has expanded tremendously, resulting in a higher demand for data storage, computational capacity, and real-time processing capabilities. Cloud computing has traditionally played an important role in establishing IoT. However, fog computing has recently emerged as a new field complementing cloud computing due to its enhanced mobility, location awareness, heterogeneity, scalability, low latency, and geographic distribution. However, IoT networks are vulnerable to unwanted assaults because of their open and shared nature. As a result, various fog computing-based security models that protect IoT networks have been developed. A distributed architecture based on an intrusion detection system (IDS) ensures that a dynamic, scalable IoT environment with the ability to disperse centralized tasks to local fog nodes and which successfully detects advanced malicious threats is available. In this study, we examined the time-related aspects of network traffic data. We presented an intrusion detection model based on a two-layered bidirectional long short-term memory (Bi-LSTM) with an attention mechanism for traffic data classification verified on the UNSW-NB15 benchmark dataset. We showed that the suggested model outperformed numerous leading-edge Network IDS that used machine learning models in terms of accuracy, precision, recall and F1 score.  相似文献   
16.
This study proposed a new royal crown-shaped polarisation insensitive double negative triple band microwave range electromagnetic metamaterial absorber (MA). The primary purpose of this study is to utilise the exotic characteristics of this perfect metamaterial absorber (PMA) for microwave wireless communications. The fundamental unit cell of the proposed MA consists of two pentagonal-shaped resonators and two inverse C-shaped metallic components surrounded by a split ring resonator (SRR). The bottom thin copper deposit and upper metallic resonator surface are disjoined by an FR-4 dielectric substrate with 1.6 mm thickness. The CST MW studio, a high-frequency electromagnetic simulator has been deployed for numerical simulation of the unit cell in the frequency range of 4 to 14 GHz. In the TE mode, the offered MA structure demonstrated three different absorption peaks at 6.85 GHz (C-band), 8.87 GHz (X-band), and 12.03 GHz (Ku-band), with 96.82%, 99.24%, and 99.43% absorptivity, respectively. The electric field, magnetic field, and surface current distribution were analysed using Maxwell’s-Curl equations, whereas the angle sensitivity was investigated to comprehend the absorption mechanism of the proposed absorber. The numerical results were verified using the Ansys HFSS (high-frequency structure simulator) and ADS (advanced design system) for equivalent circuit models. Moreover, the proposed MA is polarisation and incident angle independent. Hence, the application of this MA can be extended to a great extent, including airborne radar applications, defence, and stealth-coating technology.  相似文献   
17.
Continuous flow to send images via encrypted wireless channels may reduce the efficiency of transmission. This is due to the damage or loss of the numerous macro-blocks from these images. Therefore, it is difficult to rebuild these patches from the point of reception. Many algorithms have been proposed in the past decade, particularly error concealment (EC) algorithms. In this paper, we focus on the algorithms that have high efficiency to fill-in the corrupted patches. On the other hand, we also present a new way of detecting the horizontal and vertical gradients especially, in the un-smooth patches. This improves the edge detector filter. Ultimately, a novel scheme for vertical and horizontal interpolation between the corrupted pixels and the non-corrupted adjacent pixels is achieved by improving the efficiency of filling-in. We used a new technique known as the wave-net model. This model combines the wavelet with the neural network classifier (NNC). The neural network was trained in advance to reduce the error extent for the pixels that may occur in the error. The experimental results were convincing and close to the desired. The proposed method is able to enhance image quality in term of both visual perception and the blurriness effects (BE).  相似文献   
18.
The present study presents a methodology for detailed reliability analysis of nuclear containment without metallic liners against aircraft crash. For this purpose, a nonlinear limit state function has been derived using violation of tolerable crack width as failure criterion. This criterion has been considered as failure criterion because radioactive radiations may come out if size of crack becomes more than the tolerable crack width. The derived limit state uses the response of containment that has been obtained from a detailed dynamic analysis of nuclear containment under an impact of a large size Boeing jet aircraft. Using this response in conjunction with limit state function, the reliabilities and probabilities of failures are obtained at a number of vulnerable locations employing an efficient first-order reliability method (FORM). These values of reliability and probability of failure at various vulnerable locations are then used for the estimation of conditional and annual reliabilities of nuclear containment as a function of its location from the airport. To study the influence of the various random variables on containment reliability the sensitivity analysis has been performed. Some parametric studies have also been included to obtain the results of field and academic interest.  相似文献   
19.
Optimization of abrasive water jet cutting of ductile materials   总被引:1,自引:0,他引:1  
Full factorial design of experiments was developed in order to investigate the effects of jet pressure, abrasive mixing rate, cutting feed, and plate thickness upon three response variables, surface finish of cutting wear zone, percentage proportion of striation free area, and maximum width of cut. The set of sixteen experiments was performed on each of the following two ductile materials: AISI 4340 (high strength low alloy steel, hardened to 49HRc) and Aluminum 2219. Analysis of Variance (ANOVA) was performed on experimental data in order to determine the significance of effects of different parameters on the performance measures. It was found that cutting feed and thickness were highly influential parameters, while abrasive mixing rate is influential upon surface roughness only. Strong interaction was found between jet pressure and workpiece material. Multi-criteria numerical optimization was performed in order to simultaneously maximize/minimize different combinations of performance measures.  相似文献   
20.
Adsorption of industrially important dyes namely bromophenol blue, alizarine red-S, methyl blue, methylene blue, eriochrome black-T, malachite green, phenol red and methyl violet from aqueous media on activated charcoal has been investigated. The effect of shaking time, pH and temperature on the adsorption behaviour of these dyes has been studied. It was noted that adsorption of all the dyes on activated charcoal decreases with an increase in the pH and the temperature. The adsorption isotherms at different temperatures were found to be of L-type. Adsorption data was fitted to Freundlich, BET and Langmuir isotherms and various adsorption parameters have been calculated. The thermodynamic parameters such as DeltaG, DeltaH and DeltaS were calculated from the slopes and intercepts of the linear variation of lnK against 1/T, where K is the adsorption coefficient obtained from Langmuir equation, was used. The calculated values for the heat of adsorption and the free energy indicate that adsorption of dyes is favored at low temperatures and the dyes are chemisorbed on activated charcoal.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号