全文获取类型
收费全文 | 2023篇 |
免费 | 67篇 |
国内免费 | 54篇 |
专业分类
电工技术 | 547篇 |
综合类 | 88篇 |
化学工业 | 148篇 |
金属工艺 | 104篇 |
机械仪表 | 137篇 |
建筑科学 | 26篇 |
矿业工程 | 20篇 |
能源动力 | 89篇 |
轻工业 | 26篇 |
水利工程 | 3篇 |
石油天然气 | 229篇 |
武器工业 | 5篇 |
无线电 | 135篇 |
一般工业技术 | 78篇 |
冶金工业 | 48篇 |
原子能技术 | 6篇 |
自动化技术 | 455篇 |
出版年
2024年 | 2篇 |
2023年 | 11篇 |
2022年 | 19篇 |
2021年 | 21篇 |
2020年 | 19篇 |
2019年 | 22篇 |
2018年 | 21篇 |
2017年 | 51篇 |
2016年 | 53篇 |
2015年 | 56篇 |
2014年 | 81篇 |
2013年 | 84篇 |
2012年 | 101篇 |
2011年 | 139篇 |
2010年 | 88篇 |
2009年 | 106篇 |
2008年 | 111篇 |
2007年 | 150篇 |
2006年 | 140篇 |
2005年 | 162篇 |
2004年 | 119篇 |
2003年 | 85篇 |
2002年 | 62篇 |
2001年 | 61篇 |
2000年 | 42篇 |
1999年 | 43篇 |
1998年 | 39篇 |
1997年 | 41篇 |
1996年 | 35篇 |
1995年 | 34篇 |
1994年 | 27篇 |
1993年 | 31篇 |
1992年 | 51篇 |
1991年 | 11篇 |
1990年 | 8篇 |
1989年 | 6篇 |
1988年 | 5篇 |
1987年 | 3篇 |
1985年 | 1篇 |
1981年 | 2篇 |
1971年 | 1篇 |
排序方式: 共有2144条查询结果,搜索用时 218 毫秒
41.
采用TMS320DM642EVM作为数字图像处理硬件平台,利用CCS开发环境来构建程序并对其进行优化;通过对改进后的Log算子和小波多尺度方法提取到的边缘图像进行数据融合,得到一幅新的边缘图像。实验结果表明,该方法提高了边缘检测的运算速度,满足了实时性要求;并能有效地抑制噪声的影响,保留了图像边缘细节。 相似文献
42.
基于日志恢复技术的内存数据库快速恢复模型的研究 总被引:1,自引:0,他引:1
在研究已有恢复技术的基础上,提出了"快速恢复模型".该模型依据快速日志驱动检查点算法、重栽算法.以及模型架构上的支持,不仅能保证系统的可靠运行,同时能在系统崩溃时提供快速、高效的恢复系统的手段.通过实验证明,该方法相对于其他恢复方法,能控制日志的产生数量,使得在系统崩溃并重新启动时,能以最快的速度恢复到系统崩溃前的最近一致点上. 相似文献
43.
随着开源软件技术的不断发展,为提高开发效率并降低人力成本,组件化开发模式逐渐得到行业的认可,开发人员可以利用相关工具便捷地使用第三方组件,也可将自己开发的组件贡献给开发社区,从而形成了软件供应链.然而,这种开发模式必然会导致高危漏洞随组件之间的依赖链条扩散到其他组件或项目,从而造成漏洞影响的扩大化,例如2021年底披露的Log4j2漏洞,通过软件供应链对Java生态安全造成了巨大影响.当前针对Java语言软件供应链安全的分析与研究大多是对组件或项目进行抽样调研,这忽略了组件或项目对整个开源生态的影响,无法精准衡量其对生态所产生的影响.为此,本文针对Java语言生态软件供应链安全分析技术展开研究,首次给出了软件供应链安全领域的组件依赖关系和影响力等重要指标的形式化定义,并依据此提出了基于索引文件的增量式组件配置收集和基于POM语义的多核并行依赖解析,设计实现了Java开源生态组件依赖关系提取与解析框架,收集并提取超过880万个组件版本和6500万条依赖关系.在此基础上,本文以受到漏洞影响的日志库Log4j2为例,全面评估其对生态的影响以及修复比例,结果表明该漏洞影响了生态15.12%的组件(71082个)以及16.87%的组件版本(1488971个)同时仅有29.13%的组件在最新版本中进行了修复. 相似文献
44.
45.
This paper addresses the problem of wide speed range sensorless control of induction motor.The proposed method is based on model reference adaptive system (MRAS),in which the current model serves as the adjustable model,and a novel hybrid model integrating the modified voltage model (MVM) and high-frequency signal injection method (HFSIM) are established to serve as the reference model.The HFSIM works together with MVM to improve the performance of the rotor speed and rotor flux position estimation at low speed,whereas at high speed,the MVM acts alone.In addition,a rotor resistance online estimation scheme is proposed to update the rotor resistance contained in the adjustable model and to ensure the estimation accuracy further.Experimental results show that the proposed MRAS method is very effective from low to high speed range,including zero speed. 相似文献
46.
Dual-key-binding cancelable palmprint cryptosystem for palmprint protection and information security
Biometric cryptosystems and cancelable biometrics are both practical and promising schemes to enhance the security and privacy of biometric systems. Though a number of bio-crypto algorithms have been proposed, they have limited practical applicability because they lack of cancelability. Since biometrics are immutable, the users whose biometrics are stolen cannot use bio-crypto systems anymore. Cancelable biometric schemes are of cancelability; however, they are difficult to compromise the conflicts between the security and performance. By embedded a novel cancelable palmprint template, namely “two dimensional (2D) Palmprint Phasor”, the proposed palmprint cryptosystem overcomes the lack of cancelability in existing biometric cryptosystems. Besides, the authentication performance is enhanced when users have different tokens/keys. Furthermore, we develop a novel dual-key-binding cancelable palmprint cryptosystem to enhance the security and privacy of palmprint biometric. 2D Palmprint Phasor template is scrambled by the scrambling transformation based on the chaotic sequence that is generated by both the user's token/key and strong key extracted from palmprint. Dual-key-binding scrambling not only has more robustness to resist against chosen plain text attack, but also enhances the secure requirement of non-invertibility. 2D Palmprint Phasor algorithm and dual-key-binding scrambling both increase the difficulty of adversary's statistical analysis. The experimental results and security analysis confirm the efficiency of the proposed scheme. 相似文献
47.
Xiaoping Tu Louis-A. Dessaint Roger Champagne Kamal Al-Haddad 《Mathematics and computers in simulation》2010,81(2):194-207
Most simulation models of electric machines use the coupled circuit approach, where the machine is considered as an electric circuit element with time-varying inductances (abc model) or with constant inductances (dq0 model). On the other hand, the rotating magnetic field approach, which considers the electric machine as two groups of windings producing rotating magnetic fields and can give insight into internal phenomena of the machines, has not yet received much attention in electric machines modeling, especially for machine transient analysis. Based on the rotating magnetic field approach, this paper presents a transient model of the induction machine including main flux saturation effect. Based on the direct computation of the magnetizing fluxes of all machine windings, the model represents instantaneous main flux saturation by simply introducing a main flux saturation factor. No iteration process is involved to incorporate the saturation effects. The model combines the advantages of the dq0 and abc models advantages, such as rapid computation time and nonsymmetrical conditions simulation, respectively. The simulation results and the experimental tests show advantages and verification of the model. 相似文献
48.
49.
Traditional and fuzzy cluster analyses are applicable to variables whose values are uncorrelated. Hence, in order to cluster time series data which are usually serially correlated, one needs to extract features from the time series, the values of which are uncorrelated. The periodogram which is an estimator of the spectral density function of a time series is a feature that can be used in the cluster analysis of time series because its ordinates are uncorrelated. Additionally, the normalized periodogram and the logarithm of the normalized periodogram are also features that can be used. In this paper, we consider a fuzzy clustering approach for time series based on the estimated cepstrum. The cepstrum is the spectrum of the logarithm of the spectral density function. We show in our simulation studies for the typical generating processes that have been considered, fuzzy clustering based on the cepstral coefficients performs very well compared to when it is based on other features. 相似文献
50.
In the last few decades the continuous monitoring of complex dynamic systems has become an increasingly important issue across diverse engineering areas. This paper presents a pattern recognition based system that uses visual-based efficient invariants features for continuous monitoring of induction motors. The procedures presented here are based on the image identification of the 3-D current state space patterns that allow the identification of distinct fault types and, furthermore, their corresponding severity. This automatic fault detection system deals with time-variant electric currents and is based on the identification of three-phase stator currents specified patterns. Several simulation and experimental results are also presented in order to verify the effectiveness of the proposed methodology. 相似文献