全文获取类型
收费全文 | 1095篇 |
免费 | 155篇 |
国内免费 | 66篇 |
专业分类
电工技术 | 58篇 |
综合类 | 77篇 |
化学工业 | 134篇 |
金属工艺 | 33篇 |
机械仪表 | 115篇 |
建筑科学 | 58篇 |
矿业工程 | 26篇 |
能源动力 | 42篇 |
轻工业 | 204篇 |
水利工程 | 26篇 |
石油天然气 | 63篇 |
武器工业 | 4篇 |
无线电 | 55篇 |
一般工业技术 | 169篇 |
冶金工业 | 18篇 |
原子能技术 | 22篇 |
自动化技术 | 212篇 |
出版年
2024年 | 9篇 |
2023年 | 41篇 |
2022年 | 58篇 |
2021年 | 61篇 |
2020年 | 65篇 |
2019年 | 56篇 |
2018年 | 48篇 |
2017年 | 59篇 |
2016年 | 56篇 |
2015年 | 64篇 |
2014年 | 64篇 |
2013年 | 87篇 |
2012年 | 70篇 |
2011年 | 68篇 |
2010年 | 49篇 |
2009年 | 65篇 |
2008年 | 56篇 |
2007年 | 49篇 |
2006年 | 62篇 |
2005年 | 42篇 |
2004年 | 33篇 |
2003年 | 32篇 |
2002年 | 27篇 |
2001年 | 15篇 |
2000年 | 12篇 |
1999年 | 7篇 |
1998年 | 11篇 |
1997年 | 3篇 |
1996年 | 6篇 |
1995年 | 11篇 |
1994年 | 6篇 |
1993年 | 5篇 |
1992年 | 5篇 |
1991年 | 4篇 |
1990年 | 2篇 |
1989年 | 1篇 |
1987年 | 2篇 |
1986年 | 2篇 |
1985年 | 1篇 |
1983年 | 1篇 |
1979年 | 1篇 |
排序方式: 共有1316条查询结果,搜索用时 390 毫秒
11.
Design of forging process variables under uncertainties 总被引:4,自引:0,他引:4
Jalaja Repalle Ramana V. Grandhi 《Journal of Materials Engineering and Performance》2005,14(1):123-131
Forging is a complex nonlinear process that is vulnerable to various manufacturing anomalies, such as variations in billet
geometry, billet/die temperatures, material properties, and workpiece and forging equipment positional errors. A combination
of these uncertainties could induce heavy manufacturing losses through premature die failure, final part geometric distortion,
and reduced productivity. Identifying, quantifying, and controlling the uncertainties will reduce variability risk in a manufacturing
environment, which will minimize the overall production cost. In this article, various uncertainties that affect the forging
process are identified, and their cumulative effect on the forging tool life is evaluated. Because the forging process simulation
is time-consuming, a response surface model is used to reduce computation time by establishing a relationship between the
process performance and the critical process variables. A robust design methodology is developed by incorporating reliability-based
optimization techniques to obtain sound forging components. A case study of an automotive-component forging-process design
is presented to demonstrate the applicability of the method. 相似文献
12.
The study of numerical abilities, and how they are acquired, is being used to explore the continuity between ontogenesis and environmental learning. One technique that proves useful in this exploration is the artificial simulation of numerical abilities with neural networks, using different learning paradigms to explore development. A neural network simulation of subitization, sometimes referred to as visual enumeration, and of counting, a recurrent operation, has been developed using the so-called multi-net architecture. Our numerical ability simulations use two or more neural networks combining supervised and unsupervised learning techniques to model subitization and counting. Subitization has been simulated using networks employing unsupervised self-organizing learning, the results of which agree with infant subitization experiments and are comparable with supervised neural network simulations of subitization reported in the literature. Counting has been simulated using a multi-net system of supervised static and recurrent backpropagation networks that learn their individual tasks within an unsupervised, competitive framework. The developmental profile of the counting simulation shows similarities to that of children learning to count and demonstrates how neural networks can learn how to be combined together in a process modelling development. 相似文献
13.
This paper proposes a novel method to quantify the error of a nominal normalized right graph symbol (NRGS) for an errors-in-variables (EIV) system corrupted with bounded noise. Following an identification framework for estimation of a perturbation model set, a worst-case v-gap error bound for the estimated nominal NRGS can be first determined from \textit{a priori} and \textit{a posteriori} information on the underlying EIV system. Then, an NRGS perturbation model set can be derived from a close relation between the v-gap metric of two models and ${\rm H}_\infty$-norm of their NRGSs' difference. The obtained NRGS perturbation model set paves the way for robust controller design using an ${\rm H}_\infty$ loop-shaping method because it is a standard form of the well-known NCF (normalized coprime factor) perturbation model set. Finally, a numerical simulation is used to demonstrate the effectiveness of the proposed identification method. 相似文献
14.
15.
Suboptimal robust synthesis for MIMO nominal system under coprime factor perturbations is considered in classical and non-classical statements. In the classical statement, weights of perturbations and upper bound on magnitude bounded exogenous disturbance are assumed to be known to controller designer. Suboptimal synthesis within ε tolerance is reduced to the solution of log2(1/ε) standard mixed sensitivity problems of ℓ1 optimization. In the non-classical statement, the upper bounds on perturbations and exogenous disturbance are to be estimated from measurement data and suboptimal synthesis is reduced to the solution of 1/ε mixed sensitivity problems. 相似文献
16.
The aircraft lap joints are inspected with an enhanced visual inspection technique named “Edge of Light”, which is patented
by the NRC Institute for Aerospace Research. This technique is applicable for rapid detection of possible hidden corrosion
in lap joints. The surface deformation due to hidden corrosion can be characterized by this optical-based inspection method.
In this study, a calibration procedure is developed to quantify the lap joint surface deformation. The effect of surface reflectivity
is investigated with the solid film highlighting technique (SolidHiTM), which helps achieve a uniform reflectivity during the inspection. The efficiency of the technique is demonstrated with
the experimental results.
This work is supported by NRC-IAR New Initiative Research Funding. 相似文献
17.
18.
彭泽伟 《数字社区&智能家居》2009,5(3):1573-1574,1577
以2005年颁布的国标草案《信息安全风险评估指南》为主要指导,并参考NISTSP800—30的管理控制思想、评估方法以及威胁发生可能性的计算方法,给出了一个具有可操作性的信息安全风险评估量化模型。 相似文献
19.
20.
提出了一种新的基于图像分块DWT的自适应盲水印算法。算法以一幅有意义的二值水印图像为水印信号。同时,利用了Hilbert扫描能很好地保持图像空间局部连接性的特点。在图像块的Hilbert序列中选取相邻的3个分块分别进行一层小波变换,计算各分块对应子带的均值并比较大小,根据较大和较小的两个均值决定的步长,调整另外一个均值对应子带系数的大小,从而完成自适应的嵌入水印信号。而且,水印的提取无需原始图像参与,达到真正的盲水印。实验结果表明,该算法是有效的,水印具有较好的不可见性,对通常的图像处理操作和裁剪、挤压、像素移位等几何攻击有较强的鲁棒性. 相似文献