首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1216篇
  免费   82篇
  国内免费   12篇
电工技术   19篇
综合类   5篇
化学工业   271篇
金属工艺   35篇
机械仪表   72篇
建筑科学   48篇
矿业工程   1篇
能源动力   91篇
轻工业   122篇
水利工程   18篇
石油天然气   23篇
无线电   107篇
一般工业技术   227篇
冶金工业   66篇
原子能技术   5篇
自动化技术   200篇
  2024年   5篇
  2023年   24篇
  2022年   20篇
  2021年   75篇
  2020年   72篇
  2019年   87篇
  2018年   113篇
  2017年   84篇
  2016年   90篇
  2015年   38篇
  2014年   71篇
  2013年   140篇
  2012年   66篇
  2011年   86篇
  2010年   55篇
  2009年   56篇
  2008年   30篇
  2007年   23篇
  2006年   10篇
  2005年   13篇
  2004年   4篇
  2003年   12篇
  2002年   6篇
  2001年   4篇
  2000年   3篇
  1999年   3篇
  1998年   8篇
  1997年   7篇
  1996年   3篇
  1995年   4篇
  1994年   6篇
  1993年   4篇
  1992年   5篇
  1991年   5篇
  1990年   5篇
  1987年   3篇
  1986年   3篇
  1985年   3篇
  1984年   4篇
  1983年   5篇
  1982年   14篇
  1981年   3篇
  1979年   5篇
  1977年   4篇
  1976年   3篇
  1975年   3篇
  1973年   2篇
  1970年   5篇
  1966年   6篇
  1961年   3篇
排序方式: 共有1310条查询结果,搜索用时 0 毫秒
951.
Achieving business-IT alignment (BITA) as a long-term and appraising management issue can be accomplished in a few ways, enterprise architecture (EA) being one of them. This paper attempts to give a critical understanding of the effects of performing EA on different aspects of BITA maturity through a global survey. A total of 236 respondents from 60 countries, a relatively large response for a survey, were selected. The main purpose of the research is to examine these impacts and to identify directions for innovative practices in the future, the unique contributions of this work. A questionnaire designed on the Luftman’s maturity model as well as various other statistical methods, including PLS path modeling, Wilcoxon matched-pairs signed-ranks test and Mann–Whitney U test, are applied to understand how the EA can deliver benefits. The implications of our findings in this study as well as its limitations are discussed from different viewpoints to enable both academics and practitioners to detect the flaws in the existing EA frameworks and propose improvements.  相似文献   
952.
This paper presents the results of formation keeping control of a group of nonholonomic wheeled robots within the port‐Hamiltonian framework and in the presence of matched input disturbances. Two scenarios on the internal damping of the dynamics of the robots are considered: strictly output passive and loss less robots. For strictly output passive robots, the distributed formation keeping controllers drive the robots towards a desired formation, while internal‐model‐based controllers locally compensate the harmonic input disturbance for each of the robots. Moreover, the effect of constant input disturbances is studied considering internal‐model‐based controllers. For lossless robots, results on formation keeping control are presented. Simulation results illustrate the effectiveness of the approach. Copyright © 2016 John Wiley & Sons, Ltd.  相似文献   
953.
This paper offers a sociological perspective on data protection regulation and its relevance to design. From this perspective, proposed regulation in Europe and the USA seeks to create a new economic actor—the consumer as personal data trader—through new legal frameworks that shift the locus of agency and control in data processing towards the individual consumer or “data subject”. The sociological perspective on proposed data regulation recognises the reflexive relationship between law and the social order, and the commensurate needs to balance the demand for compliance with the design of computational tools that enable this new economic actor. We present the Databox model as a means of providing data protection and allowing the individual to exploit personal data to become an active player in the emerging data economy.  相似文献   
954.
Recently, there has been a considerable amount of interest and practice in solving many problems of several applied fields by fuzzy polynomials. In this paper, we have designed an artificial fuzzified feed-back neural network. With this design, we are able to find a solution of fully fuzzy polynomial with degree n. This neural network can get a fuzzy vector as an input, and calculates its corresponding fuzzy output. It is clear that the input–output relation for each unit of fuzzy neural network is defined by the extension principle of Zadeh. In this work, a cost function is also defined for the level sets of fuzzy output and fuzzy target. Next a learning algorithm based on the gradient descent method will be defined that can adjust the fuzzy connection weights. Finally, our approach is illustrated by computer simulations on numerical examples. It is worthwhile to mention that application of this method in fluid mechanics has been shown by an example.  相似文献   
955.
Consumer expectations for automobile seat comfort continue to rise. With this said, it is evident that the current automobile seat comfort development process, which is only sporadically successful, needs to change. In this context, there has been growing recognition of the need for establishing theoretical and methodological automobile seat comfort. On the other hand, seat producer need to know the costumer’s required comfort to produce based on their interests. The current research methodologies apply qualitative approaches due to anthropometric specifications. The most significant weakness of these approaches is the inexact extracted inferences. Despite the qualitative nature of the consumer’s preferences there are some methods to transform the qualitative parameters into numerical value which could help seat producer to improve or enhance their products. Nonetheless this approach would help the automobile manufacturer to provide their seats from the best producer regarding to the consumers idea. In this paper, a heuristic multi criteria decision making technique is applied to make consumers preferences in the numeric value. This Technique is combination of Analytical Hierarchy Procedure (AHP), Entropy method, and Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS). A case study is conducted to illustrate the applicability and the effectiveness of the proposed heuristic approach.  相似文献   
956.
Recently, the development of various remote sensing sensors has provided more reliable information and data for identification of different ground classes. Accordingly, multisensory fusion techniques are applied to enhance the process of information extraction from complementary airborne and spaceborne remote sensing data. Most of previous research in the literature has focused on the extraction of shallow features from a specific sensor and on classification of the resulted feature space using decision fusion systems. In recent years, Deep Learning (DL) algorithms have drawn a lot of attention in the machine learning area and have had different remote sensing applications, especially on data fusion. This study presents two different feature-learning strategies for the fusion of hyperspectral thermal infrared (HTIR) and visible remote sensing data. First, a Deep Convolutional Neural Network (DCNN)-Support Vector Machine (SVM) was utilized on the features of two datasets to provide the class labels. To validate the results with other learning strategies, a shallow feature model was used, as well. This model was based on feature fusion and decision fusion that classified and fused the two datasets. A co-registered thermal infrared hyperspectral (HTIR) and Fine Resolution Visible (Vis) RGB imagery was available from Quebec of Canada to examine the effectiveness of the proposed method. Experimental results showed that, except for the computational time, the proposed deep learning model outperformed shallow feature-based strategies in the classification performance that was based on its accuracy.  相似文献   
957.

Wave propagation simulation in a multi-hybrid nanocomposite (MHC)-reinforced doubly curved open shell covered with piezoelectric actuator is examined for the first time. The third-order shear deformation theory (third-order SDT) is applied to formulate the stress–strain relations. Rule of the mixture and modified Halpin–Tsai model are engaged to provide the effective material constants of the MHC-reinforced open shell. By employing Hamilton’s principle, the governing equations of the structure are derived. Via the compatibility rule, the bonding between the smart layer and sandwich open shell is modeled. Also, with the aid of Maxwell's equation, the mechanics of the piezoelectric layer are formulated. Afterward, a parametric study is carried out to investigate the effects of the CNTs’ weight fraction, various FG face sheet patterns, small radius to total thickness ratio, the thickness of the smart layer, externally applied voltage, and carbon fiber angle on the phase velocity of the MHC-reinforced open shell. Another necessary consequence is that as the externally applied voltage to the piezoelectric layer of the smart open shell increases, there will be seen an enhancement on the phase velocity or wave response of the system and without a doubt this issue is much more substantial at the lower wave number. It is also observed that when the applied voltage is more than zero, we can find a range for the fiber angle that these values are the critical fiber angle and this critical range will expand by increasing the external electrical load. The useful suggestion of this study is that for designing the structure, we should attention to the FG pattern and higher value of the wavenumber, simultaneously. The presented study outputs can be used in ultrasonic inspection techniques and structural health monitoring.

  相似文献   
958.

Cloud computing has gained huge attention over the past decades because of continuously increasing demands. There are several advantages to organizations moving toward cloud-based data storage solutions. These include simplified IT infrastructure and management, remote access from effectively anywhere in the world with a stable Internet connection and the cost efficiencies that cloud computing can bring. The associated security and privacy challenges in cloud require further exploration. Researchers from academia, industry, and standards organizations have provided potential solutions to these challenges in the previously published studies. The narrative review presented in this survey provides cloud security issues and requirements, identified threats, and known vulnerabilities. In fact, this work aims to analyze the different components of cloud computing as well as present security and privacy problems that these systems face. Moreover, this work presents new classification of recent security solutions that exist in this area. Additionally, this survey introduced various types of security threats which are threatening cloud computing services and also discussed open issues and propose future directions. This paper will focus and explore a detailed knowledge about the security challenges that are faced by cloud entities such as cloud service provider, the data owner, and cloud user.

  相似文献   
959.
In this paper, steel-making continuous casting (SCC) scheduling problem (SCCSP) is investigated. This problem is a specific case of hybrid flow shop scheduling problem accompanied by technological constraints of steel-making. Since classic optimization methods fail to obtain an optimal solution for this problem over a suitable time, a novel iterative algorithm is developed. The proposed algorithm, named HANO, is based on a combination of ant colony optimization (ACO) and non-linear optimization methods.  相似文献   
960.
Wireless Sensor Network (WSN) should be capable of fulfilling its mission, in a timely manner and without loss of important information. In this paper, we propose a new analytical model for calculating RRT (Reliable Real-Time) degree in multihop WSNs, where RRT degree describes the percentage of real-time data that the network can reliably deliver on time from any source to its destination. Also, packet loss probability is modeled as a function of the probability of link failure when the buffer is full and the probability of node failure when node’s energy is depleted. Most of the network properties are considered as random variables and a queuing theory based model is derived. In this model, the effect of network load on the packets’ delay, RRT degree, and node’s energy depletion rate are considered. Also network calculus is tailored and extended so that a worst case analysis of the delay and queue quantities in sensor networks is possible. Simulation results are used to validate the proposed model. The simulation results agree very well with the model.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号