全文获取类型
收费全文 | 780篇 |
免费 | 70篇 |
国内免费 | 8篇 |
专业分类
电工技术 | 19篇 |
综合类 | 2篇 |
化学工业 | 234篇 |
金属工艺 | 26篇 |
机械仪表 | 38篇 |
建筑科学 | 34篇 |
矿业工程 | 3篇 |
能源动力 | 34篇 |
轻工业 | 51篇 |
水利工程 | 9篇 |
石油天然气 | 5篇 |
无线电 | 54篇 |
一般工业技术 | 137篇 |
冶金工业 | 29篇 |
原子能技术 | 12篇 |
自动化技术 | 171篇 |
出版年
2024年 | 1篇 |
2023年 | 10篇 |
2022年 | 18篇 |
2021年 | 45篇 |
2020年 | 54篇 |
2019年 | 52篇 |
2018年 | 92篇 |
2017年 | 49篇 |
2016年 | 58篇 |
2015年 | 41篇 |
2014年 | 66篇 |
2013年 | 86篇 |
2012年 | 61篇 |
2011年 | 69篇 |
2010年 | 45篇 |
2009年 | 28篇 |
2008年 | 24篇 |
2007年 | 11篇 |
2006年 | 10篇 |
2005年 | 6篇 |
2004年 | 5篇 |
2003年 | 4篇 |
2002年 | 3篇 |
2001年 | 2篇 |
1999年 | 1篇 |
1998年 | 3篇 |
1997年 | 1篇 |
1995年 | 2篇 |
1994年 | 1篇 |
1993年 | 1篇 |
1991年 | 3篇 |
1989年 | 1篇 |
1987年 | 1篇 |
1981年 | 2篇 |
1977年 | 1篇 |
1975年 | 1篇 |
排序方式: 共有858条查询结果,搜索用时 15 毫秒
11.
Hadi Shahriar Shahhoseini Ehsan Saleh Kandzi Morteza Mollajafari 《The Journal of supercomputing》2014,67(1):31-46
Parallel machines are extensively used to increase computational speed in solving different scientific problems. Various topologies with different properties have been proposed so far and each one is suitable for specific applications. Pyramid interconnection networks have potentially powerful architecture for many applications such as image processing, visualization, and data mining. The major advantage of pyramids which is important for image processing systems is hierarchical abstracting and transferring the data toward the apex node, just like the human being vision system, which reach to an object from an image. There are rapidly growing applications in which the multidimensional datasets should be processed simultaneously. For such a system, we need a symmetric and expandable interconnection network to process data from different directions and forward them toward the apex. In this paper, a new type of pyramid interconnection network called Non-Flat Surface Level (NFSL) pyramid is proposed. NFSL pyramid interconnection networks constructed by L-level A-lateral-base pyramids that are named basic-pyramids. So, the apex node is surrounded by the level-one surfaces of NFSL that are the first nearest level of nodes to apex in the basic pyramids. Two topologies which are called NFSL-T and NFSL-Q originated from Trilateral-base and Quadrilateral-base basic-pyramids are studied to exemplify the proposed structure. To evaluate the proposed architecture, the most important properties of the networks are determined and compared with those of the standard pyramid networks and its variants. 相似文献
12.
Morteza Sadeghi Arman Sadeghi Mohammad Hassan Saidi 《Microfluidics and nanofluidics》2014,16(1-2):207-224
Consideration is given to the buoyancy effects on the fully developed gaseous slip flow in a vertical rectangular microduct. Two different cases of the thermal boundary conditions are considered, namely uniform temperature at two facing duct walls with different temperatures and adiabatic other walls (case A) and uniform heat flux at two walls and uniform temperature at other walls (case B). The rarefaction effects are treated using the first-order slip boundary conditions. By means of finite Fourier transform method, analytical solutions are obtained for the velocity and temperature distributions as well as the Poiseuille number. Furthermore, the threshold value of the mixed convection parameter to start the flow reversal is evaluated. The results show that the Poiseuille number of case A is an increasing function of the mixed convection parameter and a decreasing function of the channel aspect ratio, whereas its functionality on the Knudsen number is not monotonic. For case B, the Poiseuille number is decreased by increasing each of the mixed convection parameter, the Knudsen number, and the channel aspect ratio. 相似文献
13.
Reserve estimation is a key to find the correct NPV in a mining project. The most important factor in reserve estimation is the metal price. Metal price fluctuations in recent years were exaggerated, and imposed a high degree of uncertainty to the re-serve estimation, and in consequence to the whole mine planning procedure. Real option approach is an efficient method of deci-sion making in the uncertain conditions. This approach has been used for evaluation of defined natural resources projects until now. This study considering the metal price uncertainty used real option approach to prepare a methodology for reserve estimation in open pit mines. This study was done on a copper cylindrical deposit, but the achieved methodology can be adjusted for all kinds of deposits. This methodology was comprehensively described through the examples in such a manner that can be used by the mine planners. 相似文献
14.
Belletier Clément Charkhabi Morteza Pires de Andrade Silva Gustavo Ametepe Kevin Lutz Mathieu Izaute Marie 《Cognition, Technology & Work》2021,23(1):103-116
Cognition, Technology & Work - Rapid technological innovations are constantly influencing the complexification and automatization of the work lines pushing human operators to use diverse... 相似文献
15.
In this paper, metamodeling and five well-known metaheuristic optimization algorithms were used to reduce the weight and improve crash and NVH attributes of a vehicle simultaneously. A high-fidelity full vehicle model is used to analyze peak acceleration, intrusion and component’s internal-energy under Full-Frontal, Offset-Frontal, and Side crash scenarios as well as vehicle natural frequencies. The radial basis functions method is used to approximate the structural responses. A nonlinear surrogate-based mass minimization was formulated and solved by five different optimization algorithms under crash-vibration constraints. The performance of these algorithms is investigated and discussed. 相似文献
16.
Hamid Noori Farhad Mehdipour Kazuaki Murakami Koji Inoue Morteza Saheb Zamani 《The Journal of supercomputing》2008,45(3):313-340
To improve the performance of embedded processors, an effective technique is collapsing critical computation subgraphs as
application-specific instruction set extensions and executing them on custom functional units. The problem with this approach
is the immense cost and the long times required to design a new processor for each application. As a solution to this issue,
we propose an adaptive extensible processor in which custom instructions (CIs) are generated and added after chip-fabrication.
To support this feature, custom functional units are replaced by a reconfigurable matrix of functional units (FUs). A systematic
quantitative approach is used for determining the appropriate structure of the reconfigurable functional unit (RFU). We also
introduce an integrated framework for generating mappable CIs on the RFU. Using this architecture, performance is improved
by up to 1.33, with an average improvement of 1.16, compared to a 4-issue in-order RISC processor. By partitioning the configuration
memory, detecting similar/subset CIs and merging small CIs, the size of the configuration memory is reduced by 40%. 相似文献
17.
In this paper, the pitch angle control of a lab model helicopter is discussed. This problem has some specific features. As a major unusual feature, it is observed that the steady state control command is completely dependent on the setpoint, and for different setpoints, different steady state control commands are needed to keep the error around zero. Moreover, the system is one with highly oscillating dynamics. In order to solve this control problem, two controllers are designed: an artificial neural network (ANN), whose input is the setpoint, is used to provide steady state control command, and a fuzzy inference system (FIS), whose input is error, is used to provide transient control command. The total control command is the sum of the two aforementioned control commands. It is proven that both ANN and FIS are boundary‐input boundary‐output (BIBO) systems. Using this fact and considering two experimental assumptions, the closed‐loop stability is also proven. Copyright © 2009 John Wiley and Sons Asia Pte Ltd and Chinese Automatic Control Society 相似文献
18.
There are many reasons to worry that the current congestion control schemes in the Internet may be reaching its limits. Since the nature is a source of excellent solutions for complex problems, this work attempts to solve the congestion control problem, by adopting some biological principles and mechanisms. The current work proposes that the congestion problem in the Internet can be addressed through an inspiration from the population control tactics in nature. Toward this idea, each flow (W ) in the networ... 相似文献
19.
In this paper, intelligent control of a particular Catalytic Continuous Stirred Tank Reactor (CSTR) is addressed. Control command is the sum of two components: steady state and transient commands. A fuzzy controller generates a transient control command that pushes the system towards the setpoint. A steady state control command is generated to maintain the steady state situation at the setpoint (based on the concept of ‘control equilibrium point’). For comparison, a case study was also controlled by the neuro‐predictive algorithm. The studied CSTR is known as a good example of a neuro‐predictive control application; however, the newly proposed hybrid intelligent method leads to much better setpoint tracking as well as less change in control command (which is very important in implementation of the control system). 相似文献
20.
Morteza Nikooghadam Author VitaeAuthor Vitae Mohsen Ebrahimi Moghaddam Author Vitae 《Journal of Systems and Software》2010,83(10):1917-1929
The elliptic curve cryptosystem (ECC) has recently received significant attention by researchers due to its high performance, low computational cost, and small key size. In this paper, an efficient key management and derivation scheme based on ECC is proposed to solve dynamic access problems in a user hierarchy. Compared to previous ECC based works, the proposed method does not require constructing interpolate polynomials, therefore, the computational complexity of key generation and key derivation is significantly reduced. At the same time, time complexity of adding/deleting security classes, modifying their relationships, and changing of secret keys is decreased in the proposed method. 相似文献