全文获取类型
收费全文 | 649篇 |
免费 | 22篇 |
国内免费 | 2篇 |
专业分类
电工技术 | 9篇 |
综合类 | 1篇 |
化学工业 | 115篇 |
金属工艺 | 18篇 |
机械仪表 | 14篇 |
建筑科学 | 29篇 |
能源动力 | 61篇 |
轻工业 | 47篇 |
水利工程 | 5篇 |
石油天然气 | 3篇 |
无线电 | 76篇 |
一般工业技术 | 127篇 |
冶金工业 | 33篇 |
原子能技术 | 6篇 |
自动化技术 | 129篇 |
出版年
2024年 | 3篇 |
2023年 | 9篇 |
2022年 | 20篇 |
2021年 | 43篇 |
2020年 | 25篇 |
2019年 | 29篇 |
2018年 | 35篇 |
2017年 | 43篇 |
2016年 | 28篇 |
2015年 | 15篇 |
2014年 | 29篇 |
2013年 | 52篇 |
2012年 | 27篇 |
2011年 | 23篇 |
2010年 | 33篇 |
2009年 | 28篇 |
2008年 | 22篇 |
2007年 | 18篇 |
2006年 | 12篇 |
2005年 | 19篇 |
2004年 | 15篇 |
2003年 | 12篇 |
2002年 | 6篇 |
2001年 | 5篇 |
2000年 | 4篇 |
1999年 | 5篇 |
1998年 | 10篇 |
1997年 | 10篇 |
1996年 | 12篇 |
1995年 | 3篇 |
1994年 | 5篇 |
1993年 | 5篇 |
1992年 | 3篇 |
1991年 | 2篇 |
1990年 | 2篇 |
1989年 | 7篇 |
1988年 | 4篇 |
1987年 | 3篇 |
1986年 | 4篇 |
1985年 | 4篇 |
1984年 | 1篇 |
1983年 | 2篇 |
1982年 | 5篇 |
1981年 | 4篇 |
1979年 | 4篇 |
1977年 | 7篇 |
1976年 | 9篇 |
1975年 | 1篇 |
1973年 | 3篇 |
1972年 | 3篇 |
排序方式: 共有673条查询结果,搜索用时 0 毫秒
41.
42.
43.
Ammar Belatreche Liam P. Maguire Martin McGinnity 《Soft Computing - A Fusion of Foundations, Methodologies and Applications》2007,11(3):239-248
This paper presents new findings in the design and application of biologically plausible neural networks based on spiking neuron models, which represent a more plausible model of real biological neurons where time is considered as an important feature for information encoding and processing in the brain. The design approach consists of an evolutionary strategy based supervised training algorithm, newly developed by the authors, and the use of different biologically plausible neuronal models. A dynamic synapse (DS) based neuron model, a biologically more detailed model, and the spike response model (SRM) are investigated in order to demonstrate the efficacy of the proposed approach and to further our understanding of the computing capabilities of the nervous system. Unlike the conventional synapse, represented as a static entity with a fixed weight, employed in conventional and SRM-based neural networks, a DS is weightless and its strength changes upon the arrival of incoming input spikes. Therefore its efficacy depends on the temporal structure of the impinging spike trains. In the proposed approach, the training of the network free parameters is achieved using an evolutionary strategy where, instead of binary encoding, real values are used to encode the static and DS parameters which underlie the learning process. The results show that spiking neural networks based on both types of synapse are capable of learning non-linearly separable data by means of spatio-temporal encoding. Furthermore, a comparison of the obtained performance with classical neural networks (multi-layer perceptrons) is presented. 相似文献
44.
Abdelhamied A. Ateya Amel Ali Alhussan Hanaa A. Abdallah Mona A. Al duailij Abdukodir Khakimov Ammar Muthanna 《计算机系统科学与工程》2023,45(2):1775-1787
Next-generation cellular networks are expected to provide users with innovative gigabits and terabits per second speeds and achieve ultra-high reliability, availability, and ultra-low latency. The requirements of such networks are the main challenges that can be handled using a range of recent technologies, including multi-access edge computing (MEC), artificial intelligence (AI), millimeter-wave communications (mmWave), and software-defined networking. Many aspects and design challenges associated with the MEC-based 5G/6G networks should be solved to ensure the required quality of service (QoS). This article considers developing a complex MEC structure for fifth and sixth-generation (5G/6G) cellular networks. Furthermore, we propose a seamless migration technique for complex edge computing structures. The developed migration scheme enables services to adapt to the required load on the radio channels. The proposed algorithm is analyzed for various use cases, and a test bench has been developed to emulate the operator’s infrastructure. The obtained results are introduced and discussed. 相似文献
45.
Ammar Amran Manmeet Kaur Mahinderjit Singh 《Information Security Journal: A Global Perspective》2018,27(2):119-131
Security warning is a form of computer dialog communication used to inform the users on the risks of allowing random applications to run on a computer system. Accordingly, it is specifically designed to impersonate a legitimate security alerting function (e.g., notify, warn, and advice) to a user about the consequence effect of an action. However, most of the computer users tend to ignore those security warnings conveying the same message over and over again. This eventually leads to habituation. Considering the fact that there is a significant lack of focus paid to address this issue, the main objective of this article is to describe and summarize the related studies on users’ habituation to the security warnings. This article presents a systematic literature review to explore the current key issues, challenges, and the possible solutions related to habituation effects in security warnings. It is expected that this article could contribute to a more complete understanding of the habituation effects in security warnings and eventually bring benefits to the research communities or general publics. 相似文献
46.
Solving shortest path problem using particle swarm optimization 总被引:6,自引:0,他引:6
This paper presents the investigations on the application of particle swarm optimization (PSO) to solve shortest path (SP) routing problems. A modified priority-based encoding incorporating a heuristic operator for reducing the possibility of loop-formation in the path construction process is proposed for particle representation in PSO. Simulation experiments have been carried out on different network topologies for networks consisting of 15–70 nodes. It is noted that the proposed PSO-based approach can find the optimal path with good success rates and also can find closer sub-optimal paths with high certainty for all the tested networks. It is observed that the performance of the proposed algorithm surpasses those of recently reported genetic algorithm based approaches for this problem. 相似文献
47.
In this paper, an adaptive type-2 fuzzy sliding mode control to tolerate actuator faults of unknown nonlinear systems with external disturbances is presented. Based on a redundant actuation structure, a novel type-2 adaptive fuzzy fault tolerant control scheme is proposed using sliding mode control. Two adaptive type-2 fuzzy logic systems are used to approximate the unknown functions, whose adaptation laws are deduced from the stability analysis. The proposed approach allows to ensure good tracking performance despite the presence of actuator failures and external disturbances, as illustrated through a simulation example. 相似文献
48.
In this paper we study the convergence of the well-known Greedy Rank-One Update Algorithm. It is used to construct the rank-one series solution for full-rank linear systems. The existence of the rank one approximations is also not new, but surprisingly the focus there has been more on the applications side more that in the convergence analysis. Our main contribution is to prove the convergence of the algorithm and also we study the required rank one approximation in each step. We also give some numerical examples and describe its relationship with the Finite Element Method for High-Dimensional Partial Differential Equations based on the tensorial product of one-dimensional bases. We illustrate this situation taking as a model problem the multidimensional Poisson equation with homogeneous Dirichlet boundary condition. 相似文献
49.
Ammar Daskin 《Quantum Information Processing》2016,15(10):4013-4027
Principal component analysis is a multivariate statistical method frequently used in science and engineering to reduce the dimension of a problem or extract the most significant features from a dataset. In this paper, using a similar notion to the quantum counting, we show how to apply the amplitude amplification together with the phase estimation algorithm to an operator in order to procure the eigenvectors of the operator associated to the eigenvalues defined in the range \(\left[ a, b\right] \), where a and b are real and \(0 \le a \le b \le 1\). This makes possible to obtain a combination of the eigenvectors associated with the largest eigenvalues and so can be used to do principal component analysis on quantum computers. 相似文献
50.
M. H. El-Fouly A. M. Morsy A. H. Ammar A. F. Maged H. H. Amer 《Journal of Materials Science》1989,24(7):2444-2448
The effect of composition on amorphous chalcogenide threshold switches of the system Si
x
Te60-x
As30Ge10, wherex = 5, 10, 12 and 20, has been studied. The compositionx = 5 shows the best switching characteristics, e.g. the smallest holding voltage (V
h = 0.4V), the highest ON state current (I
h = 45A) and smallest threshold voltage (V
s = 1.5V). Applying the three mechanisms of conductance of Mottet al. (Phil. Mag.
37 (1975) 961), it is found that for a particular composition
2 <
1 <
0 (the pre-exponential factors) andW
2 < (E
a –E
1 +W
1) < (E
c –E
f) (whereE
a,E
c andE
e = activation energies at band edge, fermi level and conduction band;W
1 andW
2 = activation energy for hopping). It was found that the density of states at the fermi levelN(E
f) increases with the decrease of silicon content. The results provided further evidence against thermal interpretations and thereby support electronic models of threshold switching for these glass systems. 相似文献