全文获取类型
收费全文 | 2061篇 |
免费 | 196篇 |
国内免费 | 16篇 |
专业分类
电工技术 | 49篇 |
综合类 | 8篇 |
化学工业 | 574篇 |
金属工艺 | 82篇 |
机械仪表 | 83篇 |
建筑科学 | 96篇 |
矿业工程 | 7篇 |
能源动力 | 181篇 |
轻工业 | 200篇 |
水利工程 | 32篇 |
石油天然气 | 23篇 |
无线电 | 191篇 |
一般工业技术 | 303篇 |
冶金工业 | 78篇 |
原子能技术 | 20篇 |
自动化技术 | 346篇 |
出版年
2024年 | 5篇 |
2023年 | 36篇 |
2022年 | 73篇 |
2021年 | 127篇 |
2020年 | 109篇 |
2019年 | 132篇 |
2018年 | 181篇 |
2017年 | 172篇 |
2016年 | 180篇 |
2015年 | 116篇 |
2014年 | 146篇 |
2013年 | 239篇 |
2012年 | 153篇 |
2011年 | 122篇 |
2010年 | 107篇 |
2009年 | 77篇 |
2008年 | 62篇 |
2007年 | 45篇 |
2006年 | 25篇 |
2005年 | 11篇 |
2004年 | 10篇 |
2003年 | 13篇 |
2002年 | 15篇 |
2001年 | 11篇 |
2000年 | 9篇 |
1999年 | 4篇 |
1998年 | 13篇 |
1997年 | 3篇 |
1996年 | 5篇 |
1995年 | 12篇 |
1994年 | 5篇 |
1993年 | 4篇 |
1992年 | 6篇 |
1991年 | 5篇 |
1990年 | 4篇 |
1989年 | 6篇 |
1988年 | 3篇 |
1987年 | 2篇 |
1986年 | 4篇 |
1985年 | 3篇 |
1984年 | 1篇 |
1983年 | 3篇 |
1982年 | 5篇 |
1979年 | 3篇 |
1975年 | 1篇 |
1973年 | 2篇 |
1970年 | 2篇 |
1969年 | 1篇 |
排序方式: 共有2273条查询结果,搜索用时 31 毫秒
51.
Saeed Mohsen Sherif S. M. Ghoneim Mohammed S. Alzaidi Abdullah Alzahrani Ashraf Mohamed Ali Hassan 《计算机、材料和连续体(英文)》2023,75(3):5271-5286
Classification of electroencephalogram (EEG) signals for humans can be achieved via artificial intelligence (AI) techniques. Especially, the EEG signals associated with seizure epilepsy can be detected to distinguish between epileptic and non-epileptic regions. From this perspective, an automated AI technique with a digital processing method can be used to improve these signals. This paper proposes two classifiers: long short-term memory (LSTM) and support vector machine (SVM) for the classification of seizure and non-seizure EEG signals. These classifiers are applied to a public dataset, namely the University of Bonn, which consists of 2 classes –seizure and non-seizure. In addition, a fast Walsh-Hadamard Transform (FWHT) technique is implemented to analyze the EEG signals within the recurrence space of the brain. Thus, Hadamard coefficients of the EEG signals are obtained via the FWHT. Moreover, the FWHT is contributed to generate an efficient derivation of seizure EEG recordings from non-seizure EEG recordings. Also, a k-fold cross-validation technique is applied to validate the performance of the proposed classifiers. The LSTM classifier provides the best performance, with a testing accuracy of 99.00%. The training and testing loss rates for the LSTM are 0.0029 and 0.0602, respectively, while the weighted average precision, recall, and F1-score for the LSTM are 99.00%. The results of the SVM classifier in terms of accuracy, sensitivity, and specificity reached 91%, 93.52%, and 91.3%, respectively. The computational time consumed for the training of the LSTM and SVM is 2000 and 2500 s, respectively. The results show that the LSTM classifier provides better performance than SVM in the classification of EEG signals. Eventually, the proposed classifiers provide high classification accuracy compared to previously published classifiers. 相似文献
52.
Morteza Nikooghadam Author VitaeAuthor Vitae Mohsen Ebrahimi Moghaddam Author Vitae 《Journal of Systems and Software》2010,83(10):1917-1929
The elliptic curve cryptosystem (ECC) has recently received significant attention by researchers due to its high performance, low computational cost, and small key size. In this paper, an efficient key management and derivation scheme based on ECC is proposed to solve dynamic access problems in a user hierarchy. Compared to previous ECC based works, the proposed method does not require constructing interpolate polynomials, therefore, the computational complexity of key generation and key derivation is significantly reduced. At the same time, time complexity of adding/deleting security classes, modifying their relationships, and changing of secret keys is decreased in the proposed method. 相似文献
53.
Holger Maune Mohsen Sazegar Yuliang Zheng Xianghui Zhou Andre Giere Patrick Scheele Florian Paul Joachim R. Binder Rolf Jakoby 《Microsystem Technologies》2011,17(2):213-224
The research on materials and systems for tunable microwave devices has gained attraction within the last years. The radio
frequency characterization and the component design of tunable microwave components based on dielectric ceramics especially
barium-strontium-titanate (BST) are presented in this second part, whereas the basic material properties are discussed in
detail in the first part. After a short introduction to the processing technology used for the fabrication of tunable components
based on a BST thick film, the relations between microwave properties and material properties as well as the microstructure
are presented in detail. The design process for tunable microwave components based on BST thick films is described. Especially
the considerations related to micro- and macrostructure and their connection are highlighted. The paper closes with two different
application examples: a reconfigurable array antenna for satellite communication and varactors for high power applications. 相似文献
54.
Jalil Layegh Fariborz Jolai Mohsen Sadegh Amalnik 《Advances in Engineering Software》2009,40(10):1074-1077
In this paper, we consider minimizing total weighted completion time criteria on a single machine. Jobs processing times are step function of its starting time and all jobs have a common due date. First, we present some new lemmas and dominance properties for this NP-hard problem, and then a memetic algorithm using these properties is developed. We compare the solutions of the memetic algorithm with optimal solutions obtained from complete enumeration. The results show that the average percentage error of the proposed algorithm from optimal solutions is about 2% and as the variance of processing time increase, the percentage errors decrease. 相似文献
55.
Building extraction from high-resolution satellite images (HRSI) in urban areas is an intricate problem. Recent studies proposed different methods during 2005–2015. However, in HRSI, they have not investigated the effects of challenges altogether. This paper studies the effects of non-building features which are the main drawbacks in building extraction. To overcome each challenge, it reviews recent strategies between 2005 and 2015. The pros and cons of each strategy are discussed, and proper strategies are combined to generate hybrid methods. Lower cost and fewer strategies are efficient attributes to recognize the best hybrid methods. Hybrid methods can be useful for different case studies in the future. 相似文献
56.
Mohsen Eftekhari Evangelos Kranakis Danny Krizanc Oscar Morales-Ponce Lata Narayanan Jaroslav Opatrny Sunil Shende 《Distributed Computing》2016,29(5):361-376
We study the barrier coverage problem using relocatable sensor nodes. We assume each sensor can sense an intruder or event inside its sensing range. Sensors are initially located at arbitrary positions on the barrier and can move along the barrier. The goal is to find final positions for sensors so that the entire barrier is covered. In recent years, the problem has been studied extensively in the centralized setting. In this paper, we study a barrier coverage problem in the distributed and discrete setting. We assume that we have n identical sensors located at grid positions on the barrier, and that each sensor repeatedly executes a Look-Compute-Move cycle: based on what it sees in its vicinity, it makes a decision on where to move, and moves to its next position. We make two strong but realistic restrictions on the capabilities of sensors: they have a constant visibility range and can move only a constant distance in every cycle. In this model, we give the first two distributed algorithms that achieve barrier coverage for a line segment barrier when there are enough nodes in the network to cover the entire barrier. Our algorithms are synchronous, and local in the sense that sensors make their decisions independently based only on what they see within their constant visibility range. One of our algorithms is oblivious whereas the other uses two bits of memory at each sensor to store the type of move made in the previous step. We show that our oblivious algorithm terminates within \(\varTheta (n^2)\) steps with the barrier fully covered, while the constant-memory algorithm is shown to take \(\varTheta (n)\) steps to terminate in the worst case. Since any algorithm in which a sensor can only move a constant distance in one step requires \(\varOmega (n)\) steps on some inputs, our second algorithm is asymptotically optimal. 相似文献
57.
Danial Jahed Armaghani Edy Tonnizam Mohamad Mohsen Hajihassani Saffet Yagiz Hossein Motaghedi 《Engineering with Computers》2016,32(2):189-206
Uniaxial compressive strength (UCS) of rock is crucial for any type of projects constructed in/on rock mass. The test that is conducted to measure the UCS of rock is expensive, time consuming and having sample restriction. For this reason, the UCS of rock may be estimated using simple rock tests such as point load index (I s(50)), Schmidt hammer (R n) and p-wave velocity (V p) tests. To estimate the UCS of granitic rock as a function of relevant rock properties like R n, p-wave and I s(50), the rock cores were collected from the face of the Pahang–Selangor fresh water tunnel in Malaysia. Afterwards, 124 samples are prepared and tested in accordance with relevant standards and the dataset is obtained. Further an established dataset is used for estimating the UCS of rock via three-nonlinear prediction tools, namely non-linear multiple regression (NLMR), artificial neural network (ANN) and adaptive neuro-fuzzy inference system (ANFIS). After conducting the mentioned models, considering several performance indices including coefficient of determination (R 2), variance account for and root mean squared error and also using simple ranking procedure, the models were examined and the best prediction model was selected. It is concluded that the R 2 equal to 0.951 for testing dataset suggests the superiority of the ANFIS model, while these values are 0.651 and 0.886 for NLMR and ANN techniques, respectively. The results pointed out that the ANFIS model can be used for predicting UCS of rocks with higher capacity in comparison with others. However, the developed model may be useful at a preliminary stage of design; it should be used with caution and only for the specified rock types. 相似文献
58.
The structural properties of networked control systems with both bandwidth limitations and delays are investigated. Sufficient conditions are given for controllability (stabilizability) and reconstructibility (detectability). Our results enhance previous works by capturing bandwidth limitations and delays simultaneously. The adopted modeling framework could be readily used in control and estimation methods, including optimal and predictive schemes. It also facilitates the use of scheduling optimization algorithms in conjunction with the control scheme presented. 相似文献
59.
Sobhani AM Amini SR Tyndall JD Azizi E Daneshtalab M Khalaj A 《Journal of molecular graphics & modelling》2006,25(4):459-469
Azolylalkylquinolines (AAQs) are a family of quinolines with varying degrees of cytotoxic activity (comparable or moderately superior to adriamycin in some cases) developed in the past decade in our group where their exact mode of action is still unclear. In this study the most probable DNA binding mode of AAQs was investigated employing a novel flexible ligand docking approach by using AutoDock 3.0. Forty-nine AAQs with known experimental inhibitory activity were docked onto d(CGCAAATTTGCG)(2), d(CGATCG)(2) and d(CGCG)(2) oligonucleotides retrieved from the Protein Data Bank (PDB IDs: 102D, 1D12 and 1D32, respectively) as the representatives of the three plausible models of interactions between chemotherapeutic agents and DNA (groove binding, groove binding plus intercalation and bisintercalation, respectively). Good correlation (r(2)=0.64) between calculated binding energies and experimental inhibitory activities was obtained using groove binding plus intercalation model for phenyl-azolylalkylquinoline (PAAQ) series. Our findings show that the most probable mode of action of PAAQs as DNA binding agents is via intercalation of quinolinic moiety between CG base pairs with linker chain and azole moiety binding to the minor groove. 相似文献
60.
Mohsen Ebrahimi Moghaddam Mohammad Reza Bonyadi 《International journal of parallel programming》2012,40(2):225-257
Multiprocessor task scheduling is an important problem in parallel applications and distributed systems. In this way, solving
the multiprocessor task scheduling problem (MTSP) by heuristic, meta-heuristic, and hybrid algorithms have been proposed in literature. Although the problem has been addressed
by many researchers, challenges to improve the convergence speed and the reliability of methods for solving the problem are
still continued especially in the case that the communication cost is added to the problem frame work. In this paper, an Immune-based
Genetic algorithm (IGA), a meta-heuristic approach, with a new coding scheme is proposed to solve MTSP. It is shown that the proposed coding reduces the search space of MTSP in many practical problems, which effectively influences
the convergence speed of the optimization process. In addition to the reduced search space offered by the proposed coding
that eventuate in exploring better solutions at a shorter time frame, it guarantees the validity of solutions by using any
crossover and mutation operators. Furthermore, to overcome the regeneration phenomena in the proposed GA (generating similar
chromosomes) which leads to premature convergence, an affinity based approach inspired from Artificial Immune system is employed
which results in better exploration in the searching process. Experimental results showed that the proposed IGA surpasses related works in terms of found makespan (20% improvement in average) while it needs less iterations to find the
solutions (90% improvement in average) when it is applied to standard test benches. 相似文献