全文获取类型
收费全文 | 20160篇 |
免费 | 2620篇 |
国内免费 | 2461篇 |
专业分类
电工技术 | 2555篇 |
技术理论 | 1篇 |
综合类 | 1148篇 |
化学工业 | 1077篇 |
金属工艺 | 929篇 |
机械仪表 | 2322篇 |
建筑科学 | 150篇 |
矿业工程 | 140篇 |
能源动力 | 845篇 |
轻工业 | 77篇 |
水利工程 | 201篇 |
石油天然气 | 145篇 |
武器工业 | 283篇 |
无线电 | 2201篇 |
一般工业技术 | 1550篇 |
冶金工业 | 501篇 |
原子能技术 | 111篇 |
自动化技术 | 11005篇 |
出版年
2024年 | 142篇 |
2023年 | 604篇 |
2022年 | 627篇 |
2021年 | 847篇 |
2020年 | 869篇 |
2019年 | 712篇 |
2018年 | 720篇 |
2017年 | 1132篇 |
2016年 | 1261篇 |
2015年 | 1203篇 |
2014年 | 1587篇 |
2013年 | 1627篇 |
2012年 | 1979篇 |
2011年 | 1757篇 |
2010年 | 1316篇 |
2009年 | 1495篇 |
2008年 | 999篇 |
2007年 | 1334篇 |
2006年 | 1202篇 |
2005年 | 585篇 |
2004年 | 322篇 |
2003年 | 302篇 |
2002年 | 313篇 |
2001年 | 277篇 |
2000年 | 244篇 |
1999年 | 200篇 |
1998年 | 157篇 |
1997年 | 118篇 |
1996年 | 119篇 |
1995年 | 111篇 |
1994年 | 94篇 |
1993年 | 74篇 |
1992年 | 75篇 |
1991年 | 57篇 |
1990年 | 51篇 |
1989年 | 38篇 |
1988年 | 78篇 |
1987年 | 123篇 |
1986年 | 112篇 |
1985年 | 49篇 |
1984年 | 50篇 |
1983年 | 26篇 |
1982年 | 33篇 |
1981年 | 36篇 |
1980年 | 26篇 |
1979年 | 41篇 |
1978年 | 18篇 |
1975年 | 9篇 |
1967年 | 9篇 |
1965年 | 8篇 |
排序方式: 共有10000条查询结果,搜索用时 10 毫秒
101.
Rapid advances in sensing and communication technologies connect isolated manufacturing units, which generates large amounts of data. The new trend of mass customization brings a higher level of disturbances and uncertainties to production planning. Traditional manufacturing systems analyze data and schedule orders in a centralized architecture, which is inefficient and unreliable for the overdependence on central controllers and limited communication channels. Internet of things (IoT) and cloud technologies make it possible to build a distributed manufacturing architecture such as the multi-agent system (MAS). Recently, artificial intelligence (AI) methods are used to solve scheduling problems in the manufacturing setting. However, it is difficult for scheduling algorithms to process high-dimensional data in a distributed system with heterogeneous manufacturing units. Therefore, this paper presents new cyber-physical integration in smart factories for online scheduling of low-volume-high-mix orders. First, manufacturing units are interconnected with each other through the cyber-physical system (CPS) by IoT technologies. Attributes of machining operations are stored and transmitted by radio frequency identification (RFID) tags. Second, we propose an AI scheduler with novel neural networks for each unit (e.g., warehouse, machine) to schedule dynamic operations with real-time sensor data. Each AI scheduler can collaborate with other schedulers by learning from their scheduling experiences. Third, we design new reward functions to improve the decision-making abilities of multiple AI schedulers based on reinforcement learning (RL). The proposed methodology is evaluated and validated in a smart factory by real-world case studies. Experimental results show that the new architecture for smart factories not only improves the learning and scheduling efficiency of multiple AI schedulers but also effectively deals with unexpected events such as rush orders and machine failures. 相似文献
102.
103.
煤矿监控图像增强算法的分析与实现 总被引:1,自引:0,他引:1
针对煤矿井下粉尘多、光照差的恶劣环境使得矿井监控图像偏暗、对比度低、视觉效果差的特点,提出了一种基于小波变换和模糊理论的图像增强算法。该算法选择小波变换为工具分解图像,应用新的模糊隶属度和增强算子对高频信息进行模糊处理,利用直方图均衡化对低频信息进行处理,最后对图像进行重构。处理结果较好地增强了图像细节信息,从整体上改善了图像效果。 相似文献
104.
经济型矿用无极绳绞车控制装置设计 总被引:1,自引:0,他引:1
介绍了经济型矿用无极绳绞车控制装置的组成、工作原理、硬件及软件设计。该装置以主控制箱为核心,可实时检测速度信号和绞车运行信息,并可将信息实时显示在触摸显示屏上,具有绞车启停、正反向控制、调速和自动加减速控制、机头机尾过卷、启车预警、岔道告警等功能;当绞车出现故障时能够立即停车,确保绞车安全运行。该装置既可以作为无极绳绞车的软启或直启控制系统,又可以作为无极绳绞车变频控制系统。 相似文献
105.
针对钱家营矿综合自动化系统存在仅以信息集成为主、服务器配置落后、无法实现智能调度、集中监控等问题,提出了系统改造原则,详细阐述了系统环网、调控中心和软件平台的改造与实施。改造后系统在注重信息采集和处理的同时,也注重对信息进行综合处理及生产和安全自动化系统的联合监测监控,实现了矿井综合自动化系统的五融合。 相似文献
106.
107.
108.
A. Alp Kindiroglu H. Yalcin O. Aran M. Hr��z P. Campr L. Akarun A. Karpov 《Pattern Recognition and Image Analysis》2012,22(4):527-536
This paper presents the design and evaluation of a multi-lingual fingerspelling recognition module that is designed for an information terminal. Through the use of multimodal input and output methods, the information terminal acts as a communication medium between deaf and blind people. The system converts fingerspelled words to speech and vice versa using fingerspelling recognition, fingerspelling synthesis, speech recognition and speech synthesis in Czech, Russian, and Turkish languages. We describe an adaptive skin color based fingersign recognition system with a close to real-time performance and present recognition results on 88 different letters signed by five different signers, using above four hours of training and test videos. 相似文献
109.
《Journal of Network and Computer Applications》2012,35(3):1151-1161
Multi-agent systems have emerged as a very significant platform in provisioning distributed and collaborative services to critical applications. Such applications require ubiquitous agent presence in the environment for monitoring, collecting data, communication, and subsequent data analysis, where the sensitivity of the application's nature cannot be understated. Recent advances in the field of autonomous, ubiquitous, intelligent and distributed computing have led to corresponding developments in the use of collaborating multi-agents to protect critical infrastructures. Such systems have witnessed crucial demand for deployment in diverse application scenarios such as E-commerce, E-health, Network Intrusion Detection, Telematics and Transport Systems, Environmental Monitoring, as well as for distributed information processing in general. Critical infrastructures have longed for a distributed system in place for their uninterrupted and accurate operations. Multi-agents have provided one such approach towards addressing the issue of protecting such infrastructures through collaborative and distributed information processing. In this paper, a state-of-the-art on the use of multi-agent based systems for protecting five most common critical infrastructures, is presented. 相似文献
110.
《Journal of Network and Computer Applications》2012,35(6):2059-2067
RFID (Radio Frequency IDentification) based communication solutions have been widely used nowadays for mobile environments such as access control for secure system, ticketing systems for transportation, and sport events. These systems usually depend on readers that are not continuously connected to a secure backend system. Thus, the readers should be able to perform their duties even in offline mode, which generally requires the management by the readers of the susceptible data. The use of RFID may cause several security and privacy issues such as traceability of tag owner, malicious eavesdropping and cloning of tags. Besides, when a reader is compromised by an adversary, the solution to resolve these issues getting worse. In order to handle these issues, several RFID authentication protocols have been recently proposed; but almost none of them provide strong privacy for the tag owner. On the other hand, several frameworks have been proposed to analyze the security and privacy but none of them consider offline RFID system.Motivated by this need, in this paper, we first revisit Vaudenay's model, extend it by considering offline RFID system and introduce the notion of compromise reader attacks. Then, we propose an efficient RFID mutual authentication protocol. Our protocol is based on the use of physically unclonable functions (PUFs) which provide cost-efficient means to the fingerprint chips based on their physical properties. We prove that our protocol provides destructive privacy for tag owner even against reader attacks. 相似文献