全文获取类型
收费全文 | 409篇 |
免费 | 13篇 |
专业分类
电工技术 | 19篇 |
化学工业 | 54篇 |
金属工艺 | 16篇 |
机械仪表 | 12篇 |
建筑科学 | 6篇 |
矿业工程 | 2篇 |
能源动力 | 18篇 |
轻工业 | 38篇 |
水利工程 | 13篇 |
无线电 | 34篇 |
一般工业技术 | 106篇 |
冶金工业 | 34篇 |
原子能技术 | 6篇 |
自动化技术 | 64篇 |
出版年
2023年 | 4篇 |
2022年 | 6篇 |
2021年 | 14篇 |
2020年 | 11篇 |
2019年 | 12篇 |
2018年 | 9篇 |
2017年 | 18篇 |
2016年 | 19篇 |
2015年 | 9篇 |
2014年 | 14篇 |
2013年 | 37篇 |
2012年 | 23篇 |
2011年 | 28篇 |
2010年 | 34篇 |
2009年 | 25篇 |
2008年 | 22篇 |
2007年 | 16篇 |
2006年 | 15篇 |
2005年 | 10篇 |
2004年 | 3篇 |
2003年 | 4篇 |
2002年 | 4篇 |
2001年 | 6篇 |
2000年 | 3篇 |
1999年 | 5篇 |
1998年 | 2篇 |
1997年 | 7篇 |
1996年 | 7篇 |
1995年 | 2篇 |
1994年 | 5篇 |
1993年 | 8篇 |
1992年 | 3篇 |
1991年 | 4篇 |
1990年 | 2篇 |
1989年 | 2篇 |
1988年 | 3篇 |
1987年 | 7篇 |
1986年 | 1篇 |
1984年 | 1篇 |
1983年 | 1篇 |
1982年 | 2篇 |
1981年 | 4篇 |
1980年 | 2篇 |
1979年 | 1篇 |
1978年 | 1篇 |
1977年 | 1篇 |
1976年 | 3篇 |
1973年 | 1篇 |
1968年 | 1篇 |
排序方式: 共有422条查询结果,搜索用时 31 毫秒
1.
Siba Prasada Panigrahi Santanu Kumar Nayak Sasmita Kumari Padhy 《International Journal of Adaptive Control and Signal Processing》2008,22(7):705-716
This paper presents a neuro‐fuzzy network (NFN) where all its parameters can be tuned simultaneously using genetic algorithms (GAs). The approach combines the merits of fuzzy logic theory, neural networks and GAs. The proposed NFN does not require a priori knowledge about the system and eliminates the need for complicated design steps such as manual tuning of input–output membership functions, and selection of fuzzy rule base. Although, only conventional GAs have been used, convergence results are very encouraging. A well‐known numerical example derived from literature is used to evaluate and compare the performance of the network with other equalizing approaches. Simulation results show that the proposed neuro‐fuzzy controller, all parameters of which have been tuned simultaneously using GAs, offers advantages over existing equalizers and has improved performance. From the perspective of application and implementation, this paper is very interesting as it provides a new method for performing blind equalization. The main contribution of this paper is the use of learning algorithms to train a feed‐forward neural network for M‐ary QAM and PSK signals. This paper also provides a platform for researchers of the area for further development. Copyright © 2008 John Wiley & Sons, Ltd. 相似文献
2.
Robinson J. Rubinov E. Toulson C. Prasada B. Sabri S. Goldberg N. Vonderweidt G. 《Communications, IEEE Transactions on》1991,39(11):1698-1708
The multimedia interactive conferencing application (MICA), a personal-workstation application for multipoint visual teleconferencing, is described. MICA allows people at two or more locations to share visual material such as documents, photographs, and computer screens in a highly interactive way. It supports the distribution, storage, retrieval, and high-quality display of visuals, real-time interaction by pointing and annotation, and meeting services facilities. The context of multimedia teleconferencing and computer-supported cooperative work is established, relating earlier research to the design of MICA. The services MICA offers are outlined. The handling, compression, and display of multiple media, and the design of a suitable user interface for MICA are discussed 相似文献
3.
E. Sriram Prasath Sreraman Muralidharan Chiranjib Mitra Prasanta K. Panigrahi 《Quantum Information Processing》2012,11(2):397-410
We investigate the entanglement properties of the two magnon states and explicate conditions under which, the two magnon state
becomes useful for several quantum communication protocols. We systematically study the temporal behaviour of concurrence
to find out the effect of exchange interaction on entanglement. The two magnon state, which is potentially realizable in quantum
dots using Heisenberg exchange interaction, is found to be suitable for carrying out deterministic teleportation of an arbitrary
two qubit composite system. Further, conditions for which the channel capacity reaches “Holevo bound”, allowing four classical
bits to be transmitted through two qubits are derived. Later, an unconventional protocol is given to demonstrate that this
state can be used for sharing of a two qubit entangled state among two parties. 相似文献
4.
Sajid Husain M. Kifayatullah G. S. R. Sastry N. Prasada Raju 《Journal of the American Oil Chemists' Society》1993,70(12):1251-1254
Application of13C nuclear magnetic resonance (NMR) spectroscopy for detection of castor oil (CO) in various edible oils, such as coconut oil,
palm oil, groundnut oil and mustard oil, is described. Characteristic signals observed at δ 132.4, δ 125.6, δ 71.3, δ 36.8
and δ 35.4 ppm, due to C10, C9, C12, C13 and C11 carbons of ricinoleic acid (RA) in CO, were selected for distinguishing it
from edible oils. Quantitative13C NMR spectra of oils were recorded in CDCl3 with a gated decoupling technique. The minimum detection limits for qualitative and quantitative analyses were 2.0 and 3.0%,
respectively. The proposed method is simple, nondestructive and requires no sample pretreatment. Its application to heat-abused
oils has also been demonstrated successfully without any of the interferences observed in most other methods. 相似文献
5.
Effect of sintering on physico-chemical and catalytic properties of Mo, Co-Mo, Ni-Mosupported on -Al2O3 is reported. Such effects on hydrodesulfurization (HDS), hydrogenation (HYD) and hydrodeoxygenation (HDO) are investigated as a function of sintering temperature. The results indicated that HDS and HYD have different optimum calcination temperatures and these functionalities originate from different sites. The results are discussed in the light of molybdenum sulfide dispersion, promotional effects and phase transformations of active component, promoters and support. 相似文献
6.
C. Jena M. Basu C. K. Panigrahi 《Soft Computing - A Fusion of Foundations, Methodologies and Applications》2016,20(2):681-688
This paper presents differential evolution with Gaussian mutation to solve the complex non-smooth non-convex combined heat and power economic dispatch (CHPED) problem. Valve-point loading and prohibited operating zones of conventional thermal generators are taken into account. Differential evolution (DE) is a simple yet powerful global optimization technique. It exploits the differences of randomly sampled pairs of objective vectors for its mutation process. This mutation process is not suitable for complex multimodal optimization. This paper proposes Gaussian mutation in DE which improves search efficiency and guarantees a high probability of obtaining the global optimum without significantly impairing the simplicity of the structure of DE. The effectiveness of the proposed method has been verified on five test problems and three test systems. The results of the proposed approach are compared with those obtained by other evolutionary methods. It is found that the proposed differential evolution with Gaussian mutation-based approach is able to provide better solution. 相似文献
7.
Insider threats have gained prominence and pose the most challenging threats to a database system. In this paper, we have proposed a new approach for detecting intrusive attacks in databases by fusion of information sources and use of belief update. In database intrusion detection, only intra-transactional features are not sufficient for detecting attackers within the organization as they are potentially familiar with the day-to-day work. Thus, the proposed system uses inter-transactional as well as intra-transactional features for intrusion detection. Moreover, we have also considered three different sensitivity levels of table attributes for keeping track of the malicious modification of the highly sensitive attributes more carefully. We have analyzed the performance of the proposed database intrusion detection system using stochastic models. Our system performs significantly better compared to two intrusion detection systems recently proposed in the literature. 相似文献
8.
Kundu Amlan Panigrahi Suvasini Sural Shamik Majumdar Arun K. 《Dependable and Secure Computing, IEEE Transactions on》2009,6(4):309-315
A phenomenal growth in the number of credit card transactions, especially for online purchases, has recently led to a substantial rise in fraudulent activities. Implementation of efficient fraud detection systems has thus become imperative for all credit card issuing banks to minimize their losses. In real life, fraudulent transactions are interspersed with genuine transactions and simple pattern matching is not often sufficient to detect them accurately. Thus, there is a need for combining both anomaly detection as well as misuse detection techniques. In this paper, we propose to use two-stage sequence alignment in which a profile analyzer (PA) first determines the similarity of an incoming sequence of transactions on a given credit card with the genuine cardholder's past spending sequences. The unusual transactions traced by the profile analyzer are next passed on to a deviation analyzer (DA) for possible alignment with past fraudulent behavior. The final decision about the nature of a transaction is taken on the basis of the observations by these two analyzers. In order to achieve online response time for both PA and DA, we suggest a new approach for combining two sequence alignment algorithms BLAST and SSAHA. 相似文献
9.
10.
B.K. Panigrahi P.K. Dash J.B.V. Reddy 《Engineering Applications of Artificial Intelligence》2009,22(3):442-454
This paper presents an advanced signal processing technique known as S-transform (ST) to detect and quantify various power quality (PQ) disturbances. ST is also utilized to extract some useful features of the disturbance signal. The excellent time–frequency resolution characteristic of the ST makes it an attractive candidate for analysis of power system disturbance signals. The number of features required in the proposed approach is less than that of the wavelet transform (WT) for identification of PQ disturbances. The features extracted by using ST are used to train a support vector machine (SVM) classifier for automatic classification of the PQ disturbances. Since the proposed methodology can reduce the features of disturbance signal to a great extent without losing its original property, it efficiently utilizes the memory space and computation time of the processor. Eleven types of PQ disturbances are considered for the classification purpose. The simulation results show that the combination of ST and SVM can effectively detect and classify different PQ disturbances. 相似文献