全文获取类型
收费全文 | 398篇 |
免费 | 22篇 |
国内免费 | 1篇 |
专业分类
电工技术 | 7篇 |
综合类 | 25篇 |
化学工业 | 82篇 |
金属工艺 | 13篇 |
机械仪表 | 22篇 |
建筑科学 | 19篇 |
能源动力 | 30篇 |
轻工业 | 20篇 |
水利工程 | 1篇 |
无线电 | 47篇 |
一般工业技术 | 52篇 |
冶金工业 | 18篇 |
原子能技术 | 3篇 |
自动化技术 | 82篇 |
出版年
2024年 | 2篇 |
2023年 | 9篇 |
2022年 | 5篇 |
2021年 | 10篇 |
2020年 | 15篇 |
2019年 | 9篇 |
2018年 | 14篇 |
2017年 | 14篇 |
2016年 | 10篇 |
2015年 | 13篇 |
2014年 | 17篇 |
2013年 | 31篇 |
2012年 | 25篇 |
2011年 | 31篇 |
2010年 | 24篇 |
2009年 | 37篇 |
2008年 | 20篇 |
2007年 | 19篇 |
2006年 | 14篇 |
2005年 | 8篇 |
2004年 | 14篇 |
2003年 | 28篇 |
2002年 | 4篇 |
2001年 | 3篇 |
2000年 | 3篇 |
1999年 | 5篇 |
1998年 | 5篇 |
1997年 | 5篇 |
1996年 | 9篇 |
1995年 | 2篇 |
1994年 | 2篇 |
1993年 | 2篇 |
1991年 | 1篇 |
1990年 | 1篇 |
1988年 | 1篇 |
1985年 | 1篇 |
1982年 | 1篇 |
1980年 | 1篇 |
1978年 | 2篇 |
1974年 | 3篇 |
1973年 | 1篇 |
排序方式: 共有421条查询结果,搜索用时 15 毫秒
11.
Tufan Kumbasar Ibrahim EksinMujde Guzelkaya Engin Yesil 《Engineering Applications of Artificial Intelligence》2011,24(6):996-1005
In the recent years it has been demonstrated that type-2 fuzzy logic systems are more effective in modeling and control of complex nonlinear systems compared to type-1 fuzzy logic systems. An inverse controller based on type-2 fuzzy model can be proposed since inverse model controllers provide an efficient way to control nonlinear processes. Even though various fuzzy inversion methods have been devised for type-1 fuzzy logic systems up to now, there does not exist any method for type-2 fuzzy logic systems. In this study, a systematic method has been proposed to form the inverse of the interval type-2 Takagi-Sugeno fuzzy model based on a pure analytical method. The calculation of inverse model is done based on simple manipulations of the antecedent and consequence parts of the fuzzy model. Moreover, the type-2 fuzzy model and its inverse as the primary controller are embedded into a nonlinear internal model control structure to provide an effective and robust control performance. Finally, the proposed control scheme has been implemented on an experimental pH neutralization process where the beneficial sides are shown clearly. 相似文献
12.
Nilgün Fığlalı Celal Özkale Orhan Engin Alpaslan Fığlalı 《Computers & Industrial Engineering》2009,56(2):538-559
In recent years, one of the most important and promising research fields has been metaheuristics to find optimal or near-optimal solutions for NP-hard combinatorial optimization problems. Improving the quality of the solution or the solution time is basic research area on metaheuristics. Modifications of the existing ones or creation of hybrid approaches are the focus of these efforts. Another area of improving the solution quality of metaheuristics is finding the optimal combination of algorithm control parameters. This is usually done by design of experiments or one-at-a-time approach in genetic algorithms, simulated annealing and similar metaheuristics. We observe that, in studies which use Ant Colonies Optimization (ACO) as an optimization technique; the levels of control parameters are determined by some non-systematic initial experiments and the interactions of the parameters are not studied yet.In this study, the parameters of Ant System have been investigated on different sized and randomly generated job-shop scheduling problems by using design of experiments. The effects and interactions of the parameters have been interpreted with the outputs of the experiments. Referring to the statistical analysis it is observed that none of the interactions between the Ant System parameters has a significant effect on makespan value. A specific fractional experimental design is suggested instead of the full factorial design. Depending on the findings from the benchmark problems it will be a reliable approach to use the suggested design for saving time and effort in experiments without sacrificing the solution quality. 相似文献
13.
In this paper, an intelligent speaker identification system is presented for speaker identification by using speech/voice signal. This study includes both combination of the adaptive feature extraction and classification by using optimum wavelet entropy parameter values. These optimum wavelet entropy values are obtained from measured Turkish speech/voice signal waveforms using speech experimental set. It is developed a genetic wavelet adaptive network based on fuzzy inference system (GWANFIS) model in this study. This model consists of three layers which are genetic algorithm, wavelet and adaptive network based on fuzzy inference system (ANFIS). The genetic algorithm layer is used for selecting of the feature extraction method and obtaining the optimum wavelet entropy parameter values. In this study, one of the eight different feature extraction methods is selected by using genetic algorithm. Alternative feature extraction methods are wavelet decomposition, wavelet decomposition – short time Fourier transform, wavelet decomposition – Born–Jordan time–frequency representation, wavelet decomposition – Choi–Williams time–frequency representation, wavelet decomposition – Margenau–Hill time–frequency representation, wavelet decomposition – Wigner–Ville time–frequency representation, wavelet decomposition – Page time–frequency representation, wavelet decomposition – Zhao–Atlas–Marks time–frequency representation. The wavelet layer is used for optimum feature extraction in the time–frequency domain and is composed of wavelet decomposition and wavelet entropies. The ANFIS approach is used for evaluating to fitness function of the genetic algorithm and for classification speakers. It has been evaluated the performance of the developed system by using noisy Turkish speech/voice signals. The test results showed that this system is effective in detecting real speech signals. The correct classification rate is about 91% for speaker classification. 相似文献
14.
Özden Engin Çak?c? Harry Groenevelt Abraham SeidmannAuthor vitae 《Decision Support Systems》2011,51(4):842-852
Motivated by a case study at a radiology practice, we analyze the incremental benefits of RFID technology over barcodes for managing pharmaceutical inventories. Unlike barcode technology, RFID enables accurate real-time visibility, which in turn enables several process improvements. We analyze the impact of automatic counting and discuss the system redesign critical to optimizing the inventory policy and eliminating shrinkage. We show that continuous review is superior to periodic review whenever accurate real-time information is available at no additional cost. We explain how RFID-enabled strategies vary with inventory parameters and provide a cost-benefit analysis for the implementation of RFID for the radiology practice. 相似文献
15.
Jong-Min Kim Yoon-Sung JungTaeryon Choi Engin A. Sungur 《Computational statistics & data analysis》2011,55(3):1357-1366
We propose a new partial correlation approach using Gaussian copula. Our empirical study found that the Gaussian copula partial correlation has the same value as that which is obtained by performing a Pearson’s partial correlation. With the proposed method, based on canonical vine and d-vine, we captured direct interactions among eight histone genes. 相似文献
16.
一株丝状真菌发酵法产红色素培养基的研究 总被引:1,自引:0,他引:1
研究了一株丝状真菌Miug-2.7发酵法生产红色素的液体培养基最佳组分,以及液体发酵培养基最佳配方.结果表明,本试验范围内最佳质量配比是淀粉3%,蛋白胨1.0%,诱导物1%,起始pH7.5. 相似文献
17.
王为 《湖北工业大学学报》2003,18(4):23-26
介绍了先进制造技术的发展历程及其系统体系,重点阐述了现代制造系统工程设计技术的重要地位,并对我国加入世贸组织后制造业前景作了简要展望. 相似文献
18.
基于快速原型制造技术的产品开发 总被引:2,自引:0,他引:2
介绍了适应市场的快速响应设计技术的内容,关键技术和具体实施策略,快速响应设计在企业竞争中的作用.同时说明了快速原型制造技术在快速制造中的作用. 相似文献
19.
20.
The Internet not only facilitates our daily activities, such as communication, entertainment and shopping but also serves as the enabling technology for many critical services, including finance, manufacturing, healthcare and transportation. On the other hand, a wide spectrum of attacks targets its communication infrastructure to disable or disrupt the network connectivity and traffic flow until recovery processes take place. Attacking all autonomous systems (ASes) in the Internet is typically beyond the capability of an adversary. Therefore, targeting a small number of ASes which results in the highest impact is the best strategy for attackers. Similarly, it is important for network practitioners to identify, fortify and secure those critical ASes to mitigate the impact of the attacks. In this study we introduce an intuitive and effective measure, IP address spatial path stress centrality, to assess and identify the critical ASes in the Internet. We compare IP address spatial path stress centrality to the three well-known and widely used centrality measures, namely customer-cone size, node degree and betweenness. We demonstrate that the proposed measure incorporates business relations and IP address spaces to achieve a better measure for identifying the critical ASes in the Internet. 相似文献