全文获取类型
收费全文 | 1219篇 |
免费 | 82篇 |
国内免费 | 12篇 |
专业分类
电工技术 | 22篇 |
综合类 | 5篇 |
化学工业 | 273篇 |
金属工艺 | 31篇 |
机械仪表 | 69篇 |
建筑科学 | 45篇 |
矿业工程 | 1篇 |
能源动力 | 82篇 |
轻工业 | 123篇 |
水利工程 | 16篇 |
石油天然气 | 22篇 |
无线电 | 124篇 |
一般工业技术 | 220篇 |
冶金工业 | 68篇 |
原子能技术 | 5篇 |
自动化技术 | 207篇 |
出版年
2024年 | 4篇 |
2023年 | 23篇 |
2022年 | 20篇 |
2021年 | 76篇 |
2020年 | 70篇 |
2019年 | 89篇 |
2018年 | 109篇 |
2017年 | 83篇 |
2016年 | 87篇 |
2015年 | 36篇 |
2014年 | 72篇 |
2013年 | 146篇 |
2012年 | 70篇 |
2011年 | 88篇 |
2010年 | 51篇 |
2009年 | 54篇 |
2008年 | 27篇 |
2007年 | 22篇 |
2006年 | 8篇 |
2005年 | 14篇 |
2004年 | 4篇 |
2003年 | 12篇 |
2002年 | 6篇 |
2001年 | 4篇 |
1999年 | 5篇 |
1998年 | 8篇 |
1997年 | 7篇 |
1996年 | 7篇 |
1995年 | 4篇 |
1994年 | 8篇 |
1993年 | 4篇 |
1992年 | 8篇 |
1991年 | 5篇 |
1990年 | 6篇 |
1989年 | 2篇 |
1987年 | 3篇 |
1986年 | 4篇 |
1985年 | 3篇 |
1984年 | 4篇 |
1983年 | 5篇 |
1982年 | 13篇 |
1981年 | 3篇 |
1979年 | 5篇 |
1977年 | 5篇 |
1976年 | 3篇 |
1975年 | 3篇 |
1973年 | 2篇 |
1970年 | 5篇 |
1966年 | 6篇 |
1961年 | 3篇 |
排序方式: 共有1313条查询结果,搜索用时 31 毫秒
21.
Predictive control for voltage collapse avoidance using a modified discrete multi-valued PSO algorithm 总被引:2,自引:0,他引:2
Voltage stability is one of the most challenging concerns that power utilities are confronted with, and this paper proposes a voltage control scheme based on Model Predictive Control (MPC) to overcome this kind of instability. Voltage instability has a close relation with the adequacy of reactive power and the response of Under Load Tap Changers (ULTCs) to the voltage drop after the occurrence of a contingency. Therefore, the proposed method utilizes reactive power injection and tap changing to avoid voltage collapse. Considering discrete nature of the changes in the tap ratio and also in the reactive power injected by capacitor banks, the search area for the optimizer of MPC will be an integer area; consequently, a modified discrete multi-valued Particle Swarm Optimization (PSO) is considered to perform this optimization. Simulation results of applying the proposed control scheme to a 4-bus system confirm its capability to prevent voltage collapse. 相似文献
22.
Fatemeh Ghods Hamed Yousefi Ali Mohammad Afshin Hemmatyar Ali Movaghar 《Computer Networks》2013,57(18):3812-3825
Data aggregation is a key, yet time-consuming functionality in wireless sensor networks (WSNs). Multi-channel design is a promising technique to alleviate interference as a primary reason for long latency of TDMA aggregation scheduling. Indeed, it provides more potential of parallel transmissions over different frequency channels, thus minimizing time latency. In this paper, we focus on designing a multi-channel minimum latency aggregation scheduling protocol, named MC-MLAS, using a new joint approach for tree construction, channel assignment, and transmission scheduling. To our best knowledge, this is the first work in the literature which combines orthogonal channels and partially overlapping channels to consider the total latency involved in data aggregation. Extensive simulations verify the superiority of MC-MLAS in WSNs. 相似文献
23.
DEHKORDI Behzad Ghadiri MOGHADDAM Hesam Sarvghad JAFARI Hamed Houri 《水动力学研究与进展(B辑)》2011,23(1):114-126
In this article,the 2-D unsteady viscous flow around two circular cylinders in a tandem arrangement is numerically simulated in order to study the characteristics of the flow in both laminar and turbulent regimes.The method applied alternatively is based on the finite volume method on a Cartesian-staggered grid.The great source term technique is employed to identify the cylinders placed in the flow field.To apply the boundary conditions,the ghost-cell technique is used.The implemented computational method is firstly validated through simulation of laminar and turbulent flows around a fixed circular cylinder.Finally,the flow around two circular cylinders in a tandem arrangement is simulated and analyzed.The flow visualization parameters,the Strouhal numbers,and drag and lift coefficients are comprehensively presented and compared for different cases in order to reveal the effect of the Reynolds number and gap spacing on the behavior of the flow.The obtained results have shown two completely distinct flow characteristics in laminar and turbulent regimes. 相似文献
24.
Anas El Husseini Abdallah M’Hamed Bachar El Hassan Mounir Mokhtari 《Personal and Ubiquitous Computing》2013,17(5):1013-1023
In smart environments, pervasive computing contributes in improving daily life activities for dependent people by providing personalized services. Nevertheless, those environments do not guarantee a satisfactory level for protecting the user privacy and ensuring the trust between communicating entities. In this study, we propose a trust evaluation model based on user past and present behavior. This model is associated with a lightweight authentication key agreement protocol (Elliptic Curve-based Simple Authentication Key Agreement). The aim is to enable the communicating entities to establish a level of trust and then succeed in a mutual authentication using a scheme suitable for low-resource devices in smart environments. An innovation in our trust model is that it uses an accurate approach to calculate trust in different situations and includes a human-based feature for trust feedback, which is user rating. Finally, we tested and implemented our scheme on Android mobile phones in a smart environment dedicated for handicapped people. 相似文献
25.
A NEW AGENT MATCHING SCHEME USING AN ORDERED FUZZY SIMILARITY MEASURE AND GAME THEORY 总被引:3,自引:0,他引:3
In this paper, an agent matching method for bilateral contracts in a multi-agent market is proposed. Each agent has a hierarchical representation of its trading commodity attributes by a tree structure of fuzzy attributes. Using this structure, the similarity between the trees of each pair of buyer and seller is computed using a new ordered fuzzy similarity algorithm. Then, using the concept of Stackelberg equilibrium in a leader–follower game, matchmaking is performed among the sellers and buyers. The fuzzy similarities of each agent with others in its personal viewpoint have been used as its payoffs in a bimatrix game. Through a case study for bilateral contracts of energy, the capabilities of the proposed agent-based system are illustrated. 相似文献
26.
In this paper, we propose a distributed congestion-aware channel assignment (DCACA) algorithm for multi-channel wireless mesh networks (MC–WMNs). The frequency channels are assigned according to the congestion measures which indicate the congestion status at each link. Depending on the selected congestion measure (e.g., queueing delay, packet loss probability, and differential backlog), various design objectives can be achieved. Our proposed distributed algorithm is simple to implement as it only requires each node to perform a local search. Unlike most of the previous channel assignment schemes, our proposed algorithm assigns not only the non-overlapped (i.e., orthogonal) frequency channels, but also the partially-overlapped channels. In this regard, we introduce the channel overlapping and mutual interference matrices which model the frequency overlapping among different channels. Simulation results show that in the presence of elastic traffic (e.g., TCP Vegas or TCP Reno) sources, our proposed DCACA algorithm increases the aggregate throughput and also decreases the average packet round-trip compared with the previously proposed Load-Aware channel assignment algorithm. Furthermore, in a congested IEEE 802.11b network setting, compared with the use of three non-overlapped channels, the aggregate network throughput can further be increased by 25% and the average round-trip time can be reduced by more than one half when all the 11 partially-overlapped channels are used. 相似文献
27.
Journal of Computational Electronics - In this study, the electronic transport properties of 4,6-bis(4-nitrophenyl)-2-phenyl-3,5-diaza-bicyclo[3.1.0]hex-2-ene (as a bicyclic aziridine) have been... 相似文献
28.
29.
Fatemeh Khoshbin Seyed Hamed Ashraf Talesh Isa Ebtehaj Amir Hossein Zaji Hamed Azimi 《工程优选》2016,48(6):933-948
In the present article, the adaptive neuro-fuzzy inference system (ANFIS) is employed to model the discharge coefficient in rectangular sharp-crested side weirs. The genetic algorithm (GA) is used for the optimum selection of membership functions, while the singular value decomposition (SVD) method helps in computing the linear parameters of the ANFIS results section (GA/SVD-ANFIS). The effect of each dimensionless parameter on discharge coefficient prediction is examined in five different models to conduct sensitivity analysis by applying the above-mentioned dimensionless parameters. Two different sets of experimental data are utilized to examine the models and obtain the best model. The study results indicate that the model designed through GA/SVD-ANFIS predicts the discharge coefficient with a good level of accuracy (mean absolute percentage error?=?3.362 and root mean square error?=?0.027). Moreover, comparing this method with existing equations and the multi-layer perceptron–artificial neural network (MLP-ANN) indicates that the GA/SVD-ANFIS method has superior performance in simulating the discharge coefficient of side weirs. 相似文献
30.
Khalid A. Alissa Mohammed Maray Areej A. Malibari Sana Alazwari Hamed Alqahtani Mohamed K. Nour Marwa Obbaya Mohamed A. Shamseldin Mesfer Al Duhayyim 《计算机、材料和连续体(英文)》2023,74(3):5349-5367
Emerging technologies such as edge computing, Internet of Things (IoT), 5G networks, big data, Artificial Intelligence (AI), and Unmanned Aerial Vehicles (UAVs) empower, Industry 4.0, with a progressive production methodology that shows attention to the interaction between machine and human beings. In the literature, various authors have focused on resolving security problems in UAV communication to provide safety for vital applications. The current research article presents a Circle Search Optimization with Deep Learning Enabled Secure UAV Classification (CSODL-SUAVC) model for Industry 4.0 environment. The suggested CSODL-SUAVC methodology is aimed at accomplishing two core objectives such as secure communication via image steganography and image classification. Primarily, the proposed CSODL-SUAVC method involves the following methods such as Multi-Level Discrete Wavelet Transformation (ML-DWT), CSO-related Optimal Pixel Selection (CSO-OPS), and signcryption-based encryption. The proposed model deploys the CSO-OPS technique to select the optimal pixel points in cover images. The secret images, encrypted by signcryption technique, are embedded into cover images. Besides, the image classification process includes three components namely, Super-Resolution using Convolution Neural Network (SRCNN), Adam optimizer, and softmax classifier. The integration of the CSO-OPS algorithm and Adam optimizer helps in achieving the maximum performance upon UAV communication. The proposed CSODL-SUAVC model was experimentally validated using benchmark datasets and the outcomes were evaluated under distinct aspects. The simulation outcomes established the supreme better performance of the CSODL-SUAVC model over recent approaches. 相似文献