首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1433篇
  免费   43篇
  国内免费   8篇
电工技术   22篇
综合类   3篇
化学工业   245篇
金属工艺   44篇
机械仪表   70篇
建筑科学   32篇
能源动力   65篇
轻工业   41篇
水利工程   2篇
石油天然气   3篇
无线电   215篇
一般工业技术   336篇
冶金工业   155篇
原子能技术   10篇
自动化技术   241篇
  2024年   10篇
  2023年   21篇
  2022年   53篇
  2021年   77篇
  2020年   58篇
  2019年   48篇
  2018年   63篇
  2017年   40篇
  2016年   60篇
  2015年   34篇
  2014年   48篇
  2013年   80篇
  2012年   48篇
  2011年   73篇
  2010年   46篇
  2009年   64篇
  2008年   58篇
  2007年   42篇
  2006年   55篇
  2005年   39篇
  2004年   34篇
  2003年   24篇
  2002年   23篇
  2001年   17篇
  2000年   20篇
  1999年   21篇
  1998年   28篇
  1997年   25篇
  1996年   31篇
  1995年   27篇
  1994年   21篇
  1993年   11篇
  1992年   17篇
  1991年   20篇
  1990年   14篇
  1989年   16篇
  1988年   21篇
  1987年   9篇
  1986年   6篇
  1985年   11篇
  1984年   7篇
  1983年   6篇
  1982年   4篇
  1981年   7篇
  1979年   14篇
  1978年   4篇
  1976年   9篇
  1975年   4篇
  1974年   3篇
  1970年   3篇
排序方式: 共有1484条查询结果,搜索用时 15 毫秒
21.
Surface reconstruction for incremental forming   总被引:1,自引:0,他引:1  
In spite of extensive efforts being made with regard to virtual process optimization technology, the production of prototype parts is still a necessity. With respect to the production of sheet metal parts in low quantities, incremental sheet metal forming (ISMF) is a highly interesting process. ISMF allows the production of complex parts with drastically reduced costs in tooling and machinery compared to conventional processes like deep drawing. However, ISMF, with it’s incremental nature, introduces the need for generating a tool path considering both final geometry and process-induced deviations or constraints. Consequently, for the generation of the tool path a (tool path) surface, with an adequate offset, is necessary. That is why, within the scope of extensive research work at the Institute of Forming Technology and Lightweight Construction (IUL), a special correction module has been developed, determining this offset e.g. depending on the workpiece geometry. This paper presents the algorithm, the application, and the effect on the produced parts. Furthermore, a concept for an extension regarding further constraints like elastic workpiece behavior is presented.  相似文献   
22.
This paper investigates the exponential observer design problem for one‐sided Lipschitz nonlinear systems. A unified framework for designing both full‐order and reduced‐order exponential state observers is proposed. The developed design approach requires neither scaling of the one‐sided Lipschitz constant nor the additional quadratically inner‐bounded condition. It is shown that the synthesis conditions established include some known existing results as special cases and can reduce the intrinsic conservatism. For design purposes, we also formulate the observer synthesis conditions in a tractable LMI form or a Riccati‐type inequality with equality constraints. Simulation results on a numerical example are given to illustrate the advantages and effectiveness of the proposed design scheme. Copyright © 2016 John Wiley & Sons, Ltd.  相似文献   
23.
In-home technologies can support older adults' activities of daily living, provide physical safety and security, and connect elders to family and friends. They facilitate aging in place while reducing caregiver burden. One of older adults' primary concerns about in-home technologies is their potential to reduce human contact, particularly from cherished caregivers. In this exploratory in situ study, we provided an ecosystem of networked monitoring technologies to six older adults and their caregivers. We analyzed the amount and content of communication between them. The amount of noncomputer-mediated communication did not decrease through the 6-week study. The content of communication coalesced into four themes: communication about the technologies, communication facilitated by technologies, intrusiveness of technologies, and fun and playfulness with the technologies. Results suggest that in-home technologies, designed with sensitivity to older adults' primary motivations, have the potential to shape and tailor important relationships in later life.  相似文献   
24.
25.
In this paper, an Adaptive Hierarchical Ant Colony Optimization (AHACO) has been proposed to resolve the traditional machine loading problem in Flexible Manufacturing Systems (FMS). Machine loading is one of the most important issues that is interlinked with the efficiency and utilization of FMS. The machine loading problem is formulated in order to minimize the system unbalance and maximize the throughput, considering the job sequencing, optional machines and technological constraints. The performance of proposed AHACO has been tested over a number of benchmark problems taken from the literature. Computational results indicate that the proposed algorithm is more effective and produces promising results as compared to the existing solution methodologies in the literature. The evaluation and comparison of system efficiency and system utilization justifies the supremacy of the algorithm. Further, results obtained from the proposed algorithm have been compared with well known random search algorithm viz. genetic algorithm, simulated annealing, artificial Immune system, simple ant colony optimization, tabu search etc. In addition, the algorithm has been tested over a randomly generated problem set of varying complexities; the results validate the robustness and scalability of the algorithm utilizing the concepts of ‘heuristic gap’ and ANOVA analysis.  相似文献   
26.
This paper presents two types of nonlinear controllers for an autonomous quadrotor helicopter. One type, a feedback linearization controller involves high-order derivative terms and turns out to be quite sensitive to sensor noise as well as modeling uncertainty. The second type involves a new approach to an adaptive sliding mode controller using input augmentation in order to account for the underactuated property of the helicopter, sensor noise, and uncertainty without using control inputs of large magnitude. The sliding mode controller performs very well under noisy conditions, and adaptation can effectively estimate uncertainty such as ground effects. Recommended by Editorial Board member Hyo-Choong Bang under the direction of Editor Hyun Seok Yang. This work was supported by the Korea Research Foundation Grant (MOEHRD) KRF-2005-204-D00002, the Korea Science and Engineering Foundation(KOSEF) grant funded by the Korea government(MOST) R0A-2007-000-10017-0 and Engineering Research Institute at Seoul National University. Daewon Lee received the B.S. degree in Mechanical and Aerospace Engineering from Seoul National University (SNU), Seoul, Korea, in 2005, where he is currently working toward a Ph.D. degree in Mechanical and Aerospace Engineering. He has been a member of the UAV research team at SNU since 2005. His research interests include applications of nonlinear control and vision-based control of UAV. H. Jin Kim received the B.S. degree from Korea Advanced Institute of Technology (KAIST) in 1995, and the M.S. and Ph.D. degrees in Mechanical Engineering from University of California, Berkeley in 1999 and 2001, respectively. From 2002–2004, she was a Postdoctoral Researcher and Lecturer in Electrical Engineering and Computer Science (EECS), University of California, Berkeley (UC Berkeley). From 2004–2009, she was an Assistant Professor in the School of in Mechanical and Aerospace Engineering at Seoul National University (SNU), Seoul, Korea, where she is currently an Associate Professor. Her research interests include applications of nonlinear control theory and artificial intelligence for robotics, motion planning algorithms. Shankar Sastry received the B.Tech. degree from the Indian Institute of Technology, Bombay, in 1977, and the M.S. degree in EECS, the M.A. degree in mathematics, and the Ph.D. degree in EECS from UC Berkeley, in 1979, 1980, and 1981, respectively. He is currently Dean of the College of Engineering at UC Berkeley. He was formerly the Director of the Center for Information Technology Research in the Interest of Society (CITRIS). He served as Chair of the EECS Department from January, 2001 through June 2004. In 2000, he served as Director of the Information Technology Office at DARPA. From 1996 to 1999, he was the Director of the Electronics Research Laboratory at Berkeley (an organized research unit on the Berkeley campus conducting research in computer sciences and all aspects of electrical engineering). He is the NEC Distinguished Professor of Electrical Engineering and Computer Sciences and holds faculty appointments in the Departments of Bioengineering, EECS and Mechanical Engineering. Prior to joining the EECS faculty in 1983 he was a Professor with the Massachusetts Institute of Technology (MIT), Cambridge. He is a member of the National Academy of Engineering and Fellow of the IEEE.  相似文献   
27.
Internet of Things (IoT) security is the act of securing IoT devices and networks. IoT devices, including industrial machines, smart energy grids, and building automation, are extremely vulnerable. With the goal of shielding network systems from illegal access in cloud servers and IoT systems, Intrusion Detection Systems (IDSs) and Network-based Intrusion Prevention Systems (NBIPSs) are proposed in this study. An intrusion prevention system is proposed to realize NBIPS to safeguard top to bottom engineering. The proposed NBIPS inspects network activity streams to identify and counteract misuse instances. The NBIPS is usually located specifically behind a firewall, and it provides a reciprocal layer of investigation that adversely chooses unsafe substances. Network-based IPS sensors can be installed either in an inline or a passive model. An inline sensor is installed to monitor the traffic passing through it. The sensors are installed to stop attacks by blocking the traffic using an IoT signature-based protocol.  相似文献   
28.
Engineering with Computers - Plate structures are the integral parts of any maritime engineering platform. With the recent focus on composite structures, the need for optimizing their design and...  相似文献   
29.

In recent years, we face an increasing interest in protecting multimedia data and copyrights due to the high exchange of information. Attackers are trying to get confidential information from various sources, which brings the importance of securing the data. Many researchers implemented techniques to hide secret information to maintain the integrity and privacy of data. In order to protect confidential data, histogram-based reversible data hiding with other cryptographic algorithms are widely used. Therefore, in the proposed work, a robust method for securing digital video is suggested. We implemented histogram bit shifting based reversible data hiding by embedding the encrypted watermark in featured video frames. Histogram bit shifting is used for hiding highly secured watermarks so that security for the watermark symbol is also being achieved. The novelty of the work is that only based on the quality threshold a few unique frames are selected, which holds the encrypted watermark symbol. The optimal value for this threshold is obtained using the Firefly Algorithm. The proposed method is capable of hiding high-capacity data in the video signal. The experimental result shows the higher capacity and video quality compared to other reversible data hiding techniques. The recovered watermark provides better identity identification against various attacks. A high value of PSNR and a low value of BER and MSE is reported from the results.

  相似文献   
30.
The Journal of Supercomputing - In the Attribute-Based Encryption (ABE) scheme, patients encrypt their electronic health record (EHR), attach the appropriate attributes with it, and outsource them...  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号