首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   18290篇
  免费   2873篇
  国内免费   1977篇
电工技术   2021篇
技术理论   1篇
综合类   2540篇
化学工业   1787篇
金属工艺   359篇
机械仪表   1626篇
建筑科学   688篇
矿业工程   326篇
能源动力   485篇
轻工业   1142篇
水利工程   443篇
石油天然气   513篇
武器工业   323篇
无线电   1576篇
一般工业技术   1440篇
冶金工业   909篇
原子能技术   76篇
自动化技术   6885篇
  2024年   75篇
  2023年   223篇
  2022年   534篇
  2021年   565篇
  2020年   542篇
  2019年   498篇
  2018年   477篇
  2017年   556篇
  2016年   734篇
  2015年   856篇
  2014年   1066篇
  2013年   1275篇
  2012年   1315篇
  2011年   1471篇
  2010年   1237篇
  2009年   1326篇
  2008年   1455篇
  2007年   1637篇
  2006年   1487篇
  2005年   1218篇
  2004年   1064篇
  2003年   820篇
  2002年   661篇
  2001年   518篇
  2000年   442篇
  1999年   260篇
  1998年   201篇
  1997年   142篇
  1996年   101篇
  1995年   67篇
  1994年   34篇
  1993年   34篇
  1992年   28篇
  1991年   28篇
  1990年   20篇
  1989年   15篇
  1988年   23篇
  1987年   15篇
  1986年   14篇
  1985年   9篇
  1984年   13篇
  1962年   5篇
  1961年   3篇
  1960年   3篇
  1959年   11篇
  1958年   6篇
  1957年   10篇
  1956年   8篇
  1955年   4篇
  1954年   5篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
31.
路径分配是NoC设计流程中的两个关键步骤之一;路径分配的结果对NoC系统的性能尤其是通讯延时有着很重要的影响;多约束条件下的NoC路径分配问题是NP完全问题,要求出其最优解比较困难,目前常用的方法是利用启发式算法求得其较优解;文中提出一种基于云自适应遗传算法的NoC路径分配解决方案,该算法利用云模型对传统遗传算法加以改进,采取新的方法自动调整遗传算法过程中的交叉概率pc和变异概率pm,将适应度与云模型的3个参数Ex、En、He相互结合,从而达到优化遗传算法的目的;将此算法应用于2D-Mesh拓扑结构的NoC中,以平衡链路负载和联合优化为实验目标,以优化静态通讯分配结果;实验证明,文章所采取的算法在平衡链路负载和联合优化方面均取得了良好的效果。  相似文献   
32.
飞机环控试验台须模拟流量0~14000kg/h、压力0~2.5MPa和常温~500℃的空气环境;项目要求测控范围广、精度±1%且不超调;空气状态具有非线性、时变等特点,且控制参数之间存在复杂耦合;针对以上难点,设计了分布式测控系统,提出了改进的智能PID控制方案;通过遗传算法分段整定PID参数,离线建立PID数据库,使系统能够根据控制目标值选择最优PID初值;在此基础上,结合模糊推理在线调整PID参数,使系统具有了自适应性,能在具体工况和干扰下达到很好的控制效果;实际应用中完全满足了指标要求,解决了传统PID的控制难点,对类似的复杂系统有一定借鉴意义。  相似文献   
33.
基于模糊数据挖掘和遗传算法的网络入侵检测技术   总被引:2,自引:0,他引:2  
文章通过开发一套新的网络入侵检测系统来证实应用模糊逻辑和遗传算法的数据挖掘技术的有效性;这个系统联合了基于模糊数据挖掘技术的异常检测和基于专家系统的滥用检测,在开发异常检测的部分时,利用模糊数据挖掘技术来从正常的行为存储模式中寻找差异,遗传算法用来调整模糊隶属函数和选择一个合适的特征集合,滥用检测部分用于寻找先前行为描述模式,这种模式很可能预示着入侵,网络的通信量和系统的审计数据被用做两个元件的输入;此系统的系统结构既支持异常检测又支持滥用检测、既适用于个人工作站又可以适用于复杂网络。  相似文献   
34.
This paper is concerned with the problem of stochastic stability analysis for a class of genetic regulatory networks with Markovian jump parameters and time‐varying delays. A delay‐dependent stability criterion is derived by using a novel mode‐dependent Lyapunov functional. The derived stability criterion is expressed in terms of linear matrix inequalities and is less conservative than the existing ones in the literature. A numerical example is provided to demonstrate the effectiveness of the proposed stability criterion. Copyright © 2011 John Wiley and Sons Asia Pte Ltd and Chinese Automatic Control Society  相似文献   
35.
In recent years, there has been a considerable growth of application of group technology in cellular manufacturing. This has led to investigation of the primary cell formation problem (CFP), both in classical and soft-computing domain. Compared to more well-known and analytical techniques like mathematical programming which have been used rigorously to solve CFPs, heuristic approaches have yet gained the same level of acceptance. In the last decade we have seen some fruitful attempts to use evolutionary techniques like genetic algorithm (GA) and Ant Colony Optimization to find solutions of the CFP. The primary aim of this study is to investigate the applicability of a fine grain variant of the predator-prey GA (PPGA) in CFPs. The algorithm has been adapted to emphasize local selection strategy and to maintain a reasonable balance between prey and predator population, while avoiding premature convergence. The results show that the algorithm is competitive in identifying machine-part clusters from the initial CFP matrix with significantly less number of iterations. The algorithm scaled efficiently for large size problems with competitive performance. Optimal cluster identification is then followed by removal of the bottleneck elements to give a final solution with minimum inter-cluster transition cost. The results give considerable impetus to study similar NP-complete combinatorial problems using fine-grain GAs in future.  相似文献   
36.
In the analysis of time invariant fuzzy time series, fuzzy logic group relationships tables have been generally preferred for determination of fuzzy logic relationships. The reason of this is that it is not need to perform complex matrix operations when these tables are used. On the other hand, when fuzzy logic group relationships tables are exploited, membership values of fuzzy sets are ignored. Thus, in defiance of fuzzy set theory, fuzzy sets’ elements with the highest membership value are only considered. This situation causes information loss and decrease in the explanation power of the model. To deal with these problems, a novel time invariant fuzzy time series forecasting approach is proposed in this study. In the proposed method, membership values in the fuzzy relationship matrix are computed by using particle swarm optimization technique. The method suggested in this study is the first method proposed in the literature in which particle swarm optimization algorithm is used to determine fuzzy relations. In addition, in order to increase forecasting accuracy and make the proposed approach more systematic, the fuzzy c-means clustering method is used for fuzzification of time series in the proposed method. The proposed method is applied to well-known time series to show the forecasting performance of the method. These time series are also analyzed by using some other forecasting methods available in the literature. Then, the results obtained from the proposed method are compared to those produced by the other methods. It is observed that the proposed method gives the most accurate forecasts.  相似文献   
37.
Radio frequency identification (RFID) is a powerful technology that enables wireless information storage and control in an economical way. These properties have generated a wide range of applications in different areas. Due to economic and technological constrains, RFID devices are seriously limited, having small or even tiny computational capabilities. This issue is particularly challenging from the security point of view. Security protocols in RFID environments have to deal with strong computational limitations, and classical protocols cannot be used in this context. There have been several attempts to overcome these limitations in the form of new lightweight security protocols designed to be used in very constrained (sometimes called ultra‐lightweight) RFID environments. One of these proposals is the David–Prasad ultra‐lightweight authentication protocol. This protocol was successfully attacked using a cryptanalysis technique named Tango attack. The capacity of the attack depends on a set of boolean approximations. In this paper, we present an enhanced version of the Tango attack, named Genetic Tango attack, that uses Genetic Programming to design those approximations, easing the generation of automatic cryptanalysis and improving its power compared to a manually designed attack. Experimental results are given to illustrate the effectiveness of this new attack.  相似文献   
38.
合理控制库存量,降低原料库存成本对纺织企业提高市场竞争力具有重大的意义。通过建立原料库存的不定量不定期控制模型,并采用遗传算法求解,给出了满足平均库存成本最小的(s,S)控制策略,并通过实例验证算法的有效性。  相似文献   
39.
星地任务优化调度是利用特定的星地资源合理地安排星地任务。由于星地任务众多而资源有限,而且星地任务受星地可见性以及多方面约束,星地任务调度问题十分复杂。针对星地任务的特点,建立了星地任务调度问题模型,提出了基于改进遗传算法的星地任务优化调度算法。算法采用按适应度排名轮盘赌选择、顺序交叉、随机对换变异的算法要素。针对遗传算法局部搜索能力弱的特点,提出了利用爬山算法优化新一代个体的方法,以增强遗传算法的局部搜索能力,给出了基于改进遗传算法的星地任务调度算法。  相似文献   
40.
为了整合磁共振测深(MRS)地下水探测系统的测量与反演功能,结合LabVIEW软件在测量与信号处理方面的优势,利用虚拟仪器技术开发了地下水探测系统的上位机系统软件,实现了对探测系统整个操作流程的管理。根据已知探测地区的拉莫尔频率产生激发信号,送至发射/接收线圈,利用快速关断技术实现了发射与接收的快速切换。将采集的弛豫衰减信号送至反演解释算法模块,采用改进的量子遗传算法与截断奇异值分解(TSVD)的联合方法,反演解释了地下含水层的水文地质参数。野外试验表明,该探测系统的工作稳定性好,验证了反演结果的准确性。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号