首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   309篇
  免费   7篇
电工技术   18篇
化学工业   39篇
金属工艺   10篇
机械仪表   5篇
建筑科学   3篇
矿业工程   1篇
能源动力   16篇
轻工业   18篇
水利工程   8篇
无线电   25篇
一般工业技术   88篇
冶金工业   28篇
原子能技术   6篇
自动化技术   51篇
  2024年   2篇
  2023年   5篇
  2022年   4篇
  2021年   14篇
  2020年   12篇
  2019年   14篇
  2018年   9篇
  2017年   12篇
  2016年   15篇
  2015年   6篇
  2014年   12篇
  2013年   29篇
  2012年   21篇
  2011年   20篇
  2010年   27篇
  2009年   19篇
  2008年   20篇
  2007年   12篇
  2006年   9篇
  2005年   7篇
  2004年   2篇
  2003年   3篇
  2002年   1篇
  2001年   5篇
  2000年   3篇
  1999年   1篇
  1997年   4篇
  1996年   6篇
  1995年   2篇
  1994年   1篇
  1993年   4篇
  1992年   1篇
  1991年   1篇
  1990年   2篇
  1989年   2篇
  1988年   2篇
  1987年   2篇
  1980年   1篇
  1977年   1篇
  1976年   1篇
  1973年   1篇
  1968年   1篇
排序方式: 共有316条查询结果,搜索用时 187 毫秒
1.
This paper presents a neuro‐fuzzy network (NFN) where all its parameters can be tuned simultaneously using genetic algorithms (GAs). The approach combines the merits of fuzzy logic theory, neural networks and GAs. The proposed NFN does not require a priori knowledge about the system and eliminates the need for complicated design steps such as manual tuning of input–output membership functions, and selection of fuzzy rule base. Although, only conventional GAs have been used, convergence results are very encouraging. A well‐known numerical example derived from literature is used to evaluate and compare the performance of the network with other equalizing approaches. Simulation results show that the proposed neuro‐fuzzy controller, all parameters of which have been tuned simultaneously using GAs, offers advantages over existing equalizers and has improved performance. From the perspective of application and implementation, this paper is very interesting as it provides a new method for performing blind equalization. The main contribution of this paper is the use of learning algorithms to train a feed‐forward neural network for M‐ary QAM and PSK signals. This paper also provides a platform for researchers of the area for further development. Copyright © 2008 John Wiley & Sons, Ltd.  相似文献   
2.
We investigate the entanglement properties of the two magnon states and explicate conditions under which, the two magnon state becomes useful for several quantum communication protocols. We systematically study the temporal behaviour of concurrence to find out the effect of exchange interaction on entanglement. The two magnon state, which is potentially realizable in quantum dots using Heisenberg exchange interaction, is found to be suitable for carrying out deterministic teleportation of an arbitrary two qubit composite system. Further, conditions for which the channel capacity reaches “Holevo bound”, allowing four classical bits to be transmitted through two qubits are derived. Later, an unconventional protocol is given to demonstrate that this state can be used for sharing of a two qubit entangled state among two parties.  相似文献   
3.
Snigdha Sushil  Vidya S. Batra   《Fuel》2006,85(17-18):2676-2679
The study investigates the heavy metal content of fly ash and bottom ash from three major power plants in North India, using flame atomic absorption spectrometry. It also studies the prevalent disposal methods used at these sites. The ashes were analysed for the presence of Cr, Mn, Pb, Zn, Cu, Ni and Co and detectable levels of all were found in both fly ash and bottom ash. The concentrations of Cr and Zn were highest while Co concentration was less. The wet disposal method is used in two of the power plants (site 1 and site 3). Neither of the sites uses ash pond lining in the construction of the ash ponds, hence leaching of the heavy metals is possible. Site 2 has adopted 100% dry disposal system which allows better utilization but incurs additional costs. Better management practices, increased utilization and proper disposal practices need to be undertaken to minimize the adverse environmental impact.  相似文献   
4.
This paper presents differential evolution with Gaussian mutation to solve the complex non-smooth non-convex combined heat and power economic dispatch (CHPED) problem. Valve-point loading and prohibited operating zones of conventional thermal generators are taken into account. Differential evolution (DE) is a simple yet powerful global optimization technique. It exploits the differences of randomly sampled pairs of objective vectors for its mutation process. This mutation process is not suitable for complex multimodal optimization. This paper proposes Gaussian mutation in DE which improves search efficiency and guarantees a high probability of obtaining the global optimum without significantly impairing the simplicity of the structure of DE. The effectiveness of the proposed method has been verified on five test problems and three test systems. The results of the proposed approach are compared with those obtained by other evolutionary methods. It is found that the proposed differential evolution with Gaussian mutation-based approach is able to provide better solution.  相似文献   
5.
Insider threats have gained prominence and pose the most challenging threats to a database system. In this paper, we have proposed a new approach for detecting intrusive attacks in databases by fusion of information sources and use of belief update. In database intrusion detection, only intra-transactional features are not sufficient for detecting attackers within the organization as they are potentially familiar with the day-to-day work. Thus, the proposed system uses inter-transactional as well as intra-transactional features for intrusion detection. Moreover, we have also considered three different sensitivity levels of table attributes for keeping track of the malicious modification of the highly sensitive attributes more carefully. We have analyzed the performance of the proposed database intrusion detection system using stochastic models. Our system performs significantly better compared to two intrusion detection systems recently proposed in the literature.  相似文献   
6.
A phenomenal growth in the number of credit card transactions, especially for online purchases, has recently led to a substantial rise in fraudulent activities. Implementation of efficient fraud detection systems has thus become imperative for all credit card issuing banks to minimize their losses. In real life, fraudulent transactions are interspersed with genuine transactions and simple pattern matching is not often sufficient to detect them accurately. Thus, there is a need for combining both anomaly detection as well as misuse detection techniques. In this paper, we propose to use two-stage sequence alignment in which a profile analyzer (PA) first determines the similarity of an incoming sequence of transactions on a given credit card with the genuine cardholder's past spending sequences. The unusual transactions traced by the profile analyzer are next passed on to a deviation analyzer (DA) for possible alignment with past fraudulent behavior. The final decision about the nature of a transaction is taken on the basis of the observations by these two analyzers. In order to achieve online response time for both PA and DA, we suggest a new approach for combining two sequence alignment algorithms BLAST and SSAHA.  相似文献   
7.
In real life, when bulk purchase becomes convenient or even mandatory, it is a common practice for distributors to explore an alternative market in order to maximize the revenue earned. In this paper, we consider an inventory model for a product having seasonal demand with two potential markets, say, primary and alternate. The distributor has a single opportunity of procurement prior to multiple demand seasons in the primary and the alternate market. Both the markets have similar demand patterns, with time lag between their demand seasons. The demand is a price and time dependent function with increasing, constant and declining phases within each demand season. The scale parameter of demand rate depends upon the market. In each market, successive seasons are separated by random time. In one replenishment cycle, the distributor has a single option to exit the primary market by transferring the inventory, with or without change in selling price. This option can be exercised at the end of any complete season at the primary market. Our investigations indicate that it will be beneficial for the distributor to shift to the alternate market even at a slightly lower selling price if demand rate in the alternate market is higher. Optimal number of seasons at the primary market before change of price or market is obtained. Optimal policy is obtained for jointly determining the order quantity and price. Concavity of the profit function is discussed. Solution procedure, numerical examples and sensitivity analysis are presented.  相似文献   
8.
9.
This paper presents an advanced signal processing technique known as S-transform (ST) to detect and quantify various power quality (PQ) disturbances. ST is also utilized to extract some useful features of the disturbance signal. The excellent time–frequency resolution characteristic of the ST makes it an attractive candidate for analysis of power system disturbance signals. The number of features required in the proposed approach is less than that of the wavelet transform (WT) for identification of PQ disturbances. The features extracted by using ST are used to train a support vector machine (SVM) classifier for automatic classification of the PQ disturbances. Since the proposed methodology can reduce the features of disturbance signal to a great extent without losing its original property, it efficiently utilizes the memory space and computation time of the processor. Eleven types of PQ disturbances are considered for the classification purpose. The simulation results show that the combination of ST and SVM can effectively detect and classify different PQ disturbances.  相似文献   
10.
Quantum cheques could be a forgery-free way to make transaction in a quantum networked banking system with perfect security against any no-signalling adversary. Here, we demonstrate the implementation of quantum cheque, proposed by Moulick and Panigrahi (Quantum Inf Process 15:2475–2486, 2016), using the five-qubit IBM quantum computer. Appropriate single qubit, CNOT and Fredkin gates are used in an optimized configuration. The accuracy of implementation is checked and verified through quantum state tomography by comparing results from the theoretical and experimental density matrices.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号