首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1095篇
  免费   155篇
  国内免费   66篇
电工技术   58篇
综合类   77篇
化学工业   134篇
金属工艺   33篇
机械仪表   115篇
建筑科学   58篇
矿业工程   26篇
能源动力   42篇
轻工业   204篇
水利工程   26篇
石油天然气   63篇
武器工业   4篇
无线电   55篇
一般工业技术   169篇
冶金工业   18篇
原子能技术   22篇
自动化技术   212篇
  2024年   9篇
  2023年   41篇
  2022年   58篇
  2021年   61篇
  2020年   65篇
  2019年   56篇
  2018年   48篇
  2017年   59篇
  2016年   56篇
  2015年   64篇
  2014年   64篇
  2013年   87篇
  2012年   70篇
  2011年   68篇
  2010年   49篇
  2009年   65篇
  2008年   56篇
  2007年   49篇
  2006年   62篇
  2005年   42篇
  2004年   33篇
  2003年   32篇
  2002年   27篇
  2001年   15篇
  2000年   12篇
  1999年   7篇
  1998年   11篇
  1997年   3篇
  1996年   6篇
  1995年   11篇
  1994年   6篇
  1993年   5篇
  1992年   5篇
  1991年   4篇
  1990年   2篇
  1989年   1篇
  1987年   2篇
  1986年   2篇
  1985年   1篇
  1983年   1篇
  1979年   1篇
排序方式: 共有1316条查询结果,搜索用时 390 毫秒
11.
Design of forging process variables under uncertainties   总被引:4,自引:0,他引:4  
Forging is a complex nonlinear process that is vulnerable to various manufacturing anomalies, such as variations in billet geometry, billet/die temperatures, material properties, and workpiece and forging equipment positional errors. A combination of these uncertainties could induce heavy manufacturing losses through premature die failure, final part geometric distortion, and reduced productivity. Identifying, quantifying, and controlling the uncertainties will reduce variability risk in a manufacturing environment, which will minimize the overall production cost. In this article, various uncertainties that affect the forging process are identified, and their cumulative effect on the forging tool life is evaluated. Because the forging process simulation is time-consuming, a response surface model is used to reduce computation time by establishing a relationship between the process performance and the critical process variables. A robust design methodology is developed by incorporating reliability-based optimization techniques to obtain sound forging components. A case study of an automotive-component forging-process design is presented to demonstrate the applicability of the method.  相似文献   
12.
The study of numerical abilities, and how they are acquired, is being used to explore the continuity between ontogenesis and environmental learning. One technique that proves useful in this exploration is the artificial simulation of numerical abilities with neural networks, using different learning paradigms to explore development. A neural network simulation of subitization, sometimes referred to as visual enumeration, and of counting, a recurrent operation, has been developed using the so-called multi-net architecture. Our numerical ability simulations use two or more neural networks combining supervised and unsupervised learning techniques to model subitization and counting. Subitization has been simulated using networks employing unsupervised self-organizing learning, the results of which agree with infant subitization experiments and are comparable with supervised neural network simulations of subitization reported in the literature. Counting has been simulated using a multi-net system of supervised static and recurrent backpropagation networks that learn their individual tasks within an unsupervised, competitive framework. The developmental profile of the counting simulation shows similarities to that of children learning to count and demonstrates how neural networks can learn how to be combined together in a process modelling development.  相似文献   
13.
This paper proposes a novel method to quantify the error of a nominal normalized right graph symbol (NRGS) for an errors-in-variables (EIV) system corrupted with bounded noise. Following an identification framework for estimation of a perturbation model set, a worst-case v-gap error bound for the estimated nominal NRGS can be first determined from \textit{a priori} and \textit{a posteriori} information on the underlying EIV system. Then, an NRGS perturbation model set can be derived from a close relation between the v-gap metric of two models and ${\rm H}_\infty$-norm of their NRGSs' difference. The obtained NRGS perturbation model set paves the way for robust controller design using an ${\rm H}_\infty$ loop-shaping method because it is a standard form of the well-known NCF (normalized coprime factor) perturbation model set. Finally, a numerical simulation is used to demonstrate the effectiveness of the proposed identification method.  相似文献   
14.
15.
Suboptimal robust synthesis for MIMO nominal system under coprime factor perturbations is considered in classical and non-classical statements. In the classical statement, weights of perturbations and upper bound on magnitude bounded exogenous disturbance are assumed to be known to controller designer. Suboptimal synthesis within ε tolerance is reduced to the solution of log2(1/ε) standard mixed sensitivity problems of ℓ1 optimization. In the non-classical statement, the upper bounds on perturbations and exogenous disturbance are to be estimated from measurement data and suboptimal synthesis is reduced to the solution of 1/ε mixed sensitivity problems.  相似文献   
16.
The aircraft lap joints are inspected with an enhanced visual inspection technique named “Edge of Light”, which is patented by the NRC Institute for Aerospace Research. This technique is applicable for rapid detection of possible hidden corrosion in lap joints. The surface deformation due to hidden corrosion can be characterized by this optical-based inspection method. In this study, a calibration procedure is developed to quantify the lap joint surface deformation. The effect of surface reflectivity is investigated with the solid film highlighting technique (SolidHiTM), which helps achieve a uniform reflectivity during the inspection. The efficiency of the technique is demonstrated with the experimental results. This work is supported by NRC-IAR New Initiative Research Funding.  相似文献   
17.
基于免疫网络的信息安全风险评估模型   总被引:1,自引:0,他引:1       下载免费PDF全文
黄欢  庄毅  许斌 《计算机工程》2008,34(23):164-166
风险评估是评价网络信息系统安全的有效措施之一。该文基于免疫网络可动态实时诊断的特性,提出一种新的信息安全风险评估模型,给出模型中各项指标的定量计算方法,以评估整个信息系统的风险值。该模型能够综合考虑评估要素的相互关联,针对风险动态更新,进行实时监控。实验验证了其评估信息系统安全状态的有效性。  相似文献   
18.
彭泽伟 《数字社区&智能家居》2009,5(3):1573-1574,1577
以2005年颁布的国标草案《信息安全风险评估指南》为主要指导,并参考NISTSP800—30的管理控制思想、评估方法以及威胁发生可能性的计算方法,给出了一个具有可操作性的信息安全风险评估量化模型。  相似文献   
19.
针对无线传感器网络经典集中式多维定标MDS-MAP算法在定位精度与矩阵计算复杂度方面的不足,提出一种基于分布式的ADMDS-MAP定位算法.该算法通过采用测定距离量化,得到节点的近邻向量(CNV),然后通过相关的估算算法得到距离矩阵D和节点的初始估值,加入适当的求精计算得到节点的精确位置.理论分析和仿真实验表明,改进算法能够提高节点的定位精度.  相似文献   
20.
提出了一种新的基于图像分块DWT的自适应盲水印算法。算法以一幅有意义的二值水印图像为水印信号。同时,利用了Hilbert扫描能很好地保持图像空间局部连接性的特点。在图像块的Hilbert序列中选取相邻的3个分块分别进行一层小波变换,计算各分块对应子带的均值并比较大小,根据较大和较小的两个均值决定的步长,调整另外一个均值对应子带系数的大小,从而完成自适应的嵌入水印信号。而且,水印的提取无需原始图像参与,达到真正的盲水印。实验结果表明,该算法是有效的,水印具有较好的不可见性,对通常的图像处理操作和裁剪、挤压、像素移位等几何攻击有较强的鲁棒性.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号