首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   12187篇
  免费   923篇
  国内免费   109篇
电工技术   217篇
综合类   56篇
化学工业   3310篇
金属工艺   301篇
机械仪表   529篇
建筑科学   459篇
矿业工程   26篇
能源动力   756篇
轻工业   1112篇
水利工程   242篇
石油天然气   182篇
武器工业   6篇
无线电   1228篇
一般工业技术   2091篇
冶金工业   310篇
原子能技术   91篇
自动化技术   2303篇
  2024年   48篇
  2023年   232篇
  2022年   405篇
  2021年   746篇
  2020年   693篇
  2019年   841篇
  2018年   990篇
  2017年   919篇
  2016年   904篇
  2015年   544篇
  2014年   906篇
  2013年   1371篇
  2012年   903篇
  2011年   960篇
  2010年   616篇
  2009年   546篇
  2008年   323篇
  2007年   254篇
  2006年   191篇
  2005年   129篇
  2004年   122篇
  2003年   72篇
  2002年   73篇
  2001年   40篇
  2000年   36篇
  1999年   42篇
  1998年   26篇
  1997年   24篇
  1996年   29篇
  1995年   29篇
  1994年   13篇
  1993年   21篇
  1992年   14篇
  1991年   21篇
  1990年   20篇
  1989年   16篇
  1988年   9篇
  1987年   7篇
  1986年   10篇
  1985年   8篇
  1984年   20篇
  1983年   12篇
  1982年   9篇
  1981年   3篇
  1980年   3篇
  1979年   7篇
  1978年   4篇
  1977年   2篇
  1973年   2篇
  1967年   2篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
Neural Computing and Applications - This study introduces a neural network (NN) adaptive tracking controller-based reinforcement learning (RL) scheme for unknown nonlinear systems. First, an...  相似文献   
992.
Neural Computing and Applications - For the current paper, the technique of feed-forward neural network deep learning controller (FFNNDLC) for the nonlinear systems is proposed. The FFNNDLC...  相似文献   
993.
Pattern Analysis and Applications - Outlier or anomaly detection is an important branch of data analysis that becomes a crucial task in many application domains. Data objects which significantly...  相似文献   
994.
In this paper, a direct self‐structured adaptive fuzzy control is introduced for the class of nonlinear systems with unknown dynamic models. Control is accomplished by an adaptive fuzzy system with a fixed number of rules and adaptive membership functions. The reference signal and state errors are used to tune the membership functions and update them instantaneously. The Lyapunov synthesis method is also used to guarantee the stability of the closed loop system. The proposed control scheme is applied to an inverted pendulum and a magnetic levitation system, and its effectiveness is shown via simulation. Copyright © 2011 John Wiley and Sons Asia Pte Ltd and Chinese Automatic Control Society  相似文献   
995.
This study deals with the neuro-fuzzy (NF) modelling of a real industrial winding process in which the acquired NF model can be exploited to improve control performance and achieve a robust fault-tolerant system. A new simulator model is proposed for a winding process using non-linear identification based on a recurrent local linear neuro-fuzzy (RLLNF) network trained by local linear model tree (LOLIMOT), which is an incremental tree-based learning algorithm. The proposed NF models are compared with other known intelligent identifiers, namely multilayer perceptron (MLP) and radial basis function (RBF). Comparison of our proposed non-linear models and associated models obtained through the least square error (LSE) technique (the optimal modelling method for linear systems) confirms that the winding process is a non-linear system. Experimental results show the effectiveness of our proposed NF modelling approach.  相似文献   
996.
This paper presents a computer-based method for the optimal design of three-dimensional Reinforced Concrete (RC) structures having beams subjected to shear force and bending moment, columns subjected to biaxial moments, biaxial shears and axial loads, and shear walls subjected to pure shear. Regarding the beams and columns, the design variables are the width, depth and area of longitudinal reinforcement of member sections. The design variables for the shear walls are the thickness of the wall, the area of vertical reinforcement, horizontal distance between the vertical stirrups, the area of horizontal reinforcement, vertical space between the horizontal stirrups, and the area of vertical flexural reinforcement. The Optimality Criteria (OC) method is applied to minimize the cost of the concrete, steel and formwork for the structure. ACI code [1] provisions concerning the strength and ductility of beams, columns and shear walls are taken as constraints. The constraints also impose upper and lower bounds on the dimensions of beams and columns, and on shear wall thickness, reinforcement area and the maximum and minimum vertical and horizontal spaces between the stirrups of the shear walls. Sensitivity analysis is conducted for both internal forces and the capacities of the sections of the beams, columns and shear walls. The features of the design method are illustrated by a solved example.  相似文献   
997.
Boundary stabilization of vibrating three‐dimensional Cosserat elastic solids are studied using mathematical tools, such as operator theory and semigroup techniques. The advantages of the boundary control laws for both boundary stabilization problems are investigated. The boundary stabilization problems are studied using a Lyapunov stability method and LaSalle's invariant set theorem. Numerical simulations are provided to illustrate the effectiveness and performance of the designed control scheme.  相似文献   
998.
This paper deals with the robust finite time tracking of desired trajectories for a wide group of robotic manipulators in spite of unknown disturbances, uncertainties, and saturations of actuators while only manipulator's positions are available and its velocities are not measurable physically. A new form of chattering‐free second order fast nonsingular terminal sliding mode control scheme is introduced to design input torques for fulfilling the determined tracking objective in the adjustable total finite settling time. The proposed control algorithm is incorporated with two nonlinear observers to estimate disturbances and velocities of joints within finite settling times. The global finite time stability of the closed‐loop manipulator is analytically proved. Finally, a numerical simulation is carried out to verify the effectiveness of the designed input torques. Copyright © 2017 John Wiley & Sons, Ltd.  相似文献   
999.
In this article, we consider the project critical path problem in an environment with hybrid uncertainty. In this environment, the duration of activities are considered as random fuzzy variables that have probability and fuzzy natures, simultaneously. To obtain a robust critical path with this kind of uncertainty a chance constraints programming model is used. This model is converted to a deterministic model in two stages. In the first stage, the uncertain model is converted to a model with interval parameters by alpha-cut method and distribution function concepts. In the second stage, the interval model is converted to a deterministic model by robust optimization and min-max regret criterion and ultimately a genetic algorithm with a proposed exact algorithm are applied to solve the final model. Finally, some numerical examples are given to show the efficiency of the solution procedure.  相似文献   
1000.
In this paper, a novel algorithm for image encryption based on hash function is proposed. In our algorithm, a 512-bit long external secret key is used as the input value of the salsa20 hash function. First of all, the hash function is modified to generate a key stream which is more suitable for image encryption. Then the final encryption key stream is produced by correlating the key stream and plaintext resulting in both key sensitivity and plaintext sensitivity. This scheme can achieve high sensitivity, high complexity, and high security through only two rounds of diffusion process. In the first round of diffusion process, an original image is partitioned horizontally to an array which consists of 1,024 sections of size 8 × 8. In the second round, the same operation is applied vertically to the transpose of the obtained array. The main idea of the algorithm is to use the average of image data for encryption. To encrypt each section, the average of other sections is employed. The algorithm uses different averages when encrypting different input images (even with the same sequence based on hash function). This, in turn, will significantly increase the resistance of the cryptosystem against known/chosen-plaintext and differential attacks. It is demonstrated that the 2D correlation coefficients (CC), peak signal-to-noise ratio (PSNR), encryption quality (EQ), entropy, mean absolute error (MAE) and decryption quality can satisfy security and performance requirements (CC <0.002177, PSNR <8.4642, EQ >204.8, entropy >7.9974 and MAE >79.35). The number of pixel change rate (NPCR) analysis has revealed that when only one pixel of the plain-image is modified, almost all of the cipher pixels will change (NPCR >99.6125 %) and the unified average changing intensity is high (UACI >33.458 %). Moreover, our proposed algorithm is very sensitive with respect to small changes (e.g., modification of only one bit) in the external secret key (NPCR >99.65 %, UACI >33.55 %). It is shown that this algorithm yields better security performance in comparison to the results obtained from other algorithms.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号