全文获取类型
收费全文 | 1130篇 |
免费 | 36篇 |
国内免费 | 3篇 |
专业分类
电工技术 | 30篇 |
综合类 | 2篇 |
化学工业 | 241篇 |
金属工艺 | 19篇 |
机械仪表 | 40篇 |
建筑科学 | 39篇 |
矿业工程 | 1篇 |
能源动力 | 44篇 |
轻工业 | 43篇 |
水利工程 | 6篇 |
石油天然气 | 23篇 |
武器工业 | 1篇 |
无线电 | 123篇 |
一般工业技术 | 162篇 |
冶金工业 | 159篇 |
原子能技术 | 11篇 |
自动化技术 | 225篇 |
出版年
2023年 | 18篇 |
2022年 | 34篇 |
2021年 | 45篇 |
2020年 | 33篇 |
2019年 | 36篇 |
2018年 | 43篇 |
2017年 | 28篇 |
2016年 | 48篇 |
2015年 | 36篇 |
2014年 | 42篇 |
2013年 | 68篇 |
2012年 | 64篇 |
2011年 | 69篇 |
2010年 | 50篇 |
2009年 | 54篇 |
2008年 | 57篇 |
2007年 | 45篇 |
2006年 | 37篇 |
2005年 | 34篇 |
2004年 | 29篇 |
2003年 | 29篇 |
2002年 | 23篇 |
2001年 | 32篇 |
2000年 | 28篇 |
1999年 | 19篇 |
1998年 | 17篇 |
1997年 | 19篇 |
1996年 | 17篇 |
1995年 | 7篇 |
1994年 | 7篇 |
1993年 | 11篇 |
1992年 | 10篇 |
1991年 | 5篇 |
1990年 | 5篇 |
1989年 | 3篇 |
1988年 | 8篇 |
1987年 | 4篇 |
1986年 | 2篇 |
1985年 | 8篇 |
1983年 | 3篇 |
1982年 | 7篇 |
1981年 | 5篇 |
1980年 | 4篇 |
1979年 | 2篇 |
1976年 | 3篇 |
1975年 | 5篇 |
1974年 | 3篇 |
1971年 | 2篇 |
1970年 | 2篇 |
1966年 | 2篇 |
排序方式: 共有1169条查询结果,搜索用时 15 毫秒
21.
R. Gopi R. Sheeba K. Anguraj T. Chelladurai Haya Mesfer Alshahrani Nadhem Nemri Tarek Lamoudan 《计算机系统科学与工程》2023,44(2):1567-1582
Rapid increase in the large quantity of industrial data, Industry 4.0/5.0 poses several challenging issues such as heterogeneous data generation, data sensing and collection, real-time data processing, and high request arrival rates. The classical intrusion detection system (IDS) is not a practical solution to the Industry 4.0 environment owing to the resource limitations and complexity. To resolve these issues, this paper designs a new Chaotic Cuckoo Search Optimization Algorithm (CCSOA) with optimal wavelet kernel extreme learning machine (OWKELM) named CCSOA-OWKELM technique for IDS on the Industry 4.0 platform. The CCSOA-OWKELM technique focuses on the design of feature selection with classification approach to achieve minimum computation complexity and maximum detection accuracy. The CCSOA-OWKELM technique involves the design of CCSOA based feature selection technique, which incorporates the concepts of chaotic maps with CSOA. Besides, the OWKELM technique is applied for the intrusion detection and classification process. In addition, the OWKELM technique is derived by the hyperparameter tuning of the WKELM technique by the use of sunflower optimization (SFO) algorithm. The utilization of CCSOA for feature subset selection and SFO algorithm based hyperparameter tuning leads to better performance. In order to guarantee the supreme performance of the CCSOA-OWKELM technique, a wide range of experiments take place on two benchmark datasets and the experimental outcomes demonstrate the promising performance of the CCSOA-OWKELM technique over the recent state of art techniques. 相似文献
22.
23.
We present two new classifiers for two-class classification problems using a new Beta-SVM kernel transformation and an iterative
algorithm to concurrently select the support vectors for a support vector machine (SVM) and the hidden units for a single
hidden layer neural network to achieve a better generalization performance. To construct the classifiers, the contributing
data points are chosen on the basis of a thresholding scheme of the outputs of a single perceptron trained using all training
data samples. The chosen support vectors are used to construct a new SVM classifier that we call Beta-SVN. The number of chosen
support vectors is used to determine the structure of the hidden layer in a single hidden layer neural network that we call
Beta-NN. The Beta-SVN and Beta-NN structures produced by our method outperformed other commonly used classifiers when tested
on a 2-dimensional non-linearly separable data set. 相似文献
24.
Stabilization of uncertain sampled-data strict-feedback systems is addressed. The stability study is carried out on the Euler approximation of the exact discretized model of the plant. Firstly, a class of state-feedback controllers is developed that guarantees an input-to-state stability property for the closed-loop system. Additionally, assuming some hypotheses on the uncertain terms hold, a practical asymptotic stability property is ensured by designing an appropriate class of controllers. 相似文献
25.
Tarek Sheltami Anas Al-Roubaiey Elhadi Shakshuki Ashraf Mahmoud 《Multimedia Systems》2009,15(5):273-282
Mobile Ad-hoc NETworks (MANET) are infrastructureless networks where self-configuring mobile nodes are connected by wireless
links. Because of its decentralized operation, these nodes rely on each other to store and forward packets. Video transmission
over MANETs is more challenging than over conventional wireless networks due to rapid topology changes and lack of central
administration. Most of the proposed MANET protocols assume that all nodes are working within a cooperative and friendly network
context. However, misbehaving nodes that exhibit abnormal behaviors can disrupt the network operation and affect the network
availability by refusing to cooperate to route packets due to their selfish or malicious behavior. In this paper, we examine
the effect of packet dropping attacks on video transmission over MANETs. We also study the effects of mitigation using intrusion
detection systems to MANET in presence of video traffic. To the best of our knowledge, this is the first attempt to study
multimedia over such environments. We propose a novel intrusion detection system, which is an adaptive acknowledgment scheme
(AACK) with the ability to detect misbehaved nodes and avoid them in other transmissions. The aim of AACK scheme is to overcome
watchdog weaknesses due to collisions and limited transmission power and also to improve TWOACK scheme. To demonstrate the
performance of our proposed scheme, simulation experiments are performed. The results of our experiments show that MPEG4 is
more suitable for our simulation environment than H264 video traffic. The simulation results show that AACK scheme provides
better network performance with less overhead than other schemes; it also shows that AACK outperforms both TWOACK and watchdog
in video transmission applications in the presence of misbehaving nodes. 相似文献
26.
Mohammad Alshibli Ahmed El Sayed Elif Kongar Tarek M. Sobh Surendra M. Gupta 《Journal of Intelligent and Robotic Systems》2016,82(1):69-79
End-of-life disassembly has developed into a major research area within the sustainability paradigm, resulting in the emergence of several algorithms and structures proposing heuristics techniques such as Genetic Algorithm (GA), Ant Colony Optimization (ACO) and Neural Networks (NN). The performance of the proposed methodologies heavily depends on the accuracy and the flexibility of the algorithms to accommodate several factors such as preserving the precedence relationships during disassembly while obtaining near- optimal and optimal solutions. This paper improves a previously proposed Genetic Algorithm model for disassembly sequencing by utilizing a faster metaheuristic algorithm, Tabu search, to obtain the optimal solution. The objectives of the proposed algorithm are to minimize (1) the traveled distance by the robotic arm, (2) the number of disassembly method changes, and (3) the number of robotic arm travels by combining the identical-material components together and hence eliminating unnecessary disassembly operations. In addition to improving the quality of optimum sequence generation, a comprehensive statistical analysis comparing the previous Genetic Algorithm and the proposed Tabu Search Algorithm is also included 相似文献
27.
Mohammad Al Hasan Saeed Salem Mohammed J. Zaki 《Knowledge and Information Systems》2011,28(3):665-685
Clustering algorithms generally accept a parameter k from the user, which determines the number of clusters sought. However, in many application domains, like document categorization,
social network clustering, and frequent pattern summarization, the proper value of k is difficult to guess. An alternative clustering formulation that does not require k is to impose a lower bound on the similarity between an object and its corresponding cluster representative. Such a formulation chooses exactly one representative for
every cluster and minimizes the representative count. It has many additional benefits. For instance, it supports overlapping
clusters in a natural way. Moreover, for every cluster, it selects a representative object, which can be effectively used
in summarization or semi-supervised classification task. In this work, we propose an algorithm, SimClus, for clustering with lower bound on similarity. It achieves a O(log n) approximation bound on the number of clusters, whereas for the best previous algorithm the bound can be as poor as O(n). Experiments on real and synthetic data sets show that our algorithm produces more than 40% fewer representative objects,
yet offers the same or better clustering quality. We also propose a dynamic variant of the algorithm, which can be effectively
used in an on-line setting. 相似文献
28.
When multimedia information is transported over a packet-switched network, the quality of presentation can be degraded due
to network delay variation or jitter. This paper presents a dejittering scheme that can be used in the transport of MPEG-4
and MPEG-2 video to absorb any introduced network jitter, thus preserving the presentation quality of transported media streams.
The dejittering scheme is based on the statistical approximation of delay variation in the arrival times of video packets
carrying encoded clock reference values and a filtering and re-stamping mechanism. In addition, a brief overview of the MPEG-4
system is presented. 相似文献
29.
Tarek M. Sobh Abdelshakour A. Abuzneid Raul Mihali 《Journal of Intelligent and Robotic Systems》2001,31(4):355-377
General form application is a very important issue in industrial design. Prototyping a design helps in determining system parameters, ranges and in structuring better systems. Robotics is one of the industrial design fields in which prototyping is crucial for improved functionality. Developing an environment that enables optimal and flexible design using reconfigurable links, joints, actuators and sensors is essential for using robots in the education and industrial fields. We propose a PC-based software package to control, monitor, and simulate a generic 6-DOF (six degrees of freedom) robot including a spherical wrist. This package may be used as a black box for the design implementations or as a white (detailed) box for learning about the basics of robotics and simulation technology. 相似文献
30.
Tarek Benmiloud 《Neural computing & applications》2012,21(3):575-582
This paper introduces a new type of Adaptive Neuro-fuzzy System, denoted as IANFIS (Improved Adaptive Neuro-fuszzy Inference
System). The new structure is realized by the insertion of the error of training of ANFIS in the third layer of this system.
The recurrence of the error of training will increase the capability of convergence and the robustness of ANFIS. The proposed
IANFIS system is applied to make the identification of nonlinear functions, and the obtained results are compared with these
obtained by usual ANFIS to verify the effectiveness of the proposed adaptive neuro-fuzzy system. 相似文献