首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   600篇
  免费   50篇
  国内免费   4篇
电工技术   10篇
综合类   4篇
化学工业   100篇
金属工艺   13篇
机械仪表   39篇
建筑科学   5篇
能源动力   54篇
轻工业   80篇
水利工程   3篇
无线电   49篇
一般工业技术   157篇
冶金工业   26篇
原子能技术   2篇
自动化技术   112篇
  2024年   4篇
  2023年   15篇
  2022年   61篇
  2021年   87篇
  2020年   42篇
  2019年   54篇
  2018年   54篇
  2017年   46篇
  2016年   37篇
  2015年   24篇
  2014年   29篇
  2013年   31篇
  2012年   22篇
  2011年   26篇
  2010年   9篇
  2009年   14篇
  2008年   8篇
  2007年   13篇
  2006年   10篇
  2005年   6篇
  2004年   4篇
  2003年   7篇
  2002年   4篇
  2001年   5篇
  2000年   5篇
  1999年   4篇
  1998年   15篇
  1997年   4篇
  1996年   1篇
  1995年   1篇
  1994年   6篇
  1993年   1篇
  1992年   2篇
  1991年   1篇
  1989年   1篇
  1980年   1篇
排序方式: 共有654条查询结果,搜索用时 15 毫秒
1.
2.
Multimedia Tools and Applications - The world is facing many problems including that of traffic congestion. To highlight the issue of traffic congestion worldwide specially in urban areas and to...  相似文献   
3.
FT-Raman spectroscopy proves to be a powerful technique to study surface reactions on bioactive glasses and it eliminates the fluorescence of the organic phase of whole bone, thereby making it possible to compare the reaction layers formed on bioactive glasses with the mineral phase of bone. The spectrum of hydroxycarbonate apatite (HCA) developed on the bioactive glasses is closer to that of bone than synthetic hydroxyapatite (HA) and closely matches that of bone mineral obtained by deproteination of whole human femoral cortical bone.  相似文献   
4.
5.
The Journal of Supercomputing - The Internet of Things is a rapidly evolving technology in which interconnected computing devices and sensors share data over the network to decipher different...  相似文献   
6.
Neural Computing and Applications - Security is one of the primary concerns when designing wireless networks. Along detecting user identity, it is also important to detect the devices at the...  相似文献   
7.
For a class of multi‐input and multi‐output nonlinear uncertainty systems, a novel approach to design a nonlinear controller using minimax linear quadratic regulator (LQR) control is proposed. The proposed method combines a feedback linearization method with the robust minimax LQR approach in the presence of time‐varying uncertain parameters. The uncertainties, which are assumed to satisfy a certain integral quadratic constraint condition, do not necessarily satisfy a generalized matching condition. The procedure consists of feedback linearization of the nominal model and linearization of the remaining nonlinear uncertain terms with respect to each individual uncertainty at a local operating point. This two‐stage linearization process, followed by a robust minimax LQR control design, provides a robustly stable closed loop system. To demonstrate the effectiveness of the proposed approach, an application study is provided for a flight control problem of an air‐breathing hypersonic flight vehicle (AHFV), where the outputs to be controlled are the longitudinal velocity and altitude, and the control variables are the throttle setting and elevator deflection. The proposed method is used to derive a linearized uncertainty model for the longitudinal motion dynamics of the AHFV first, and then a robust minimax LQR controller is designed, which is based on this uncertainty model. The controller is synthesized considering seven uncertain aerodynamic and inertial parameters. The stability and performance of the synthesized controller is evaluated numerically via single scenario simulations for particular cruise conditions as well as a Monte‐Carlo type simulation based on numerous cases. It is observed that the control scheme proposed in this paper performs better, especially from the aspect of robustness to large ranges of uncertainties, than some controller design schemes previously published in the literature. Copyright © 2011 John Wiley and Sons Asia Pte Ltd and Chinese Automatic Control Society  相似文献   
8.
9.
Recently, physical layer security commonly known as Radio Frequency (RF) fingerprinting has been proposed to provide an additional layer of security for wireless devices. A unique RF fingerprint can be used to establish the identity of a specific wireless device in order to prevent masquerading/impersonation attacks. In the literature, the performance of RF fingerprinting techniques is typically assessed using high-end (expensive) receiver hardware. However, in most practical situations receivers will not be high-end and will suffer from device specific impairments which affect the RF fingerprinting process. This paper evaluates the accuracy of RF fingerprinting employing low-end receivers. The vulnerability to an impersonation attack is assessed for a modulation-based RF fingerprinting system employing low-end commodity hardware (by legitimate and malicious users alike). Our results suggest that receiver impairment effectively decreases the success rate of impersonation attack on RF fingerprinting. In addition, the success rate of impersonation attack is receiver dependent.  相似文献   
10.
The advent of modern mobile phones, 3G networks, and live video streaming has made it possible to broadcast live video from mobile devices. This is now giving rise to a new class of applications which enable mobile collaborative live video production, in which groups of amateurs work together to provide a rich broadcast of events. We focus on new and expected synchronization problems that arise in these more complex systems when broadcasting live events because of the delays that often occur in streaming over internet and mobile networks. The problem has been investigated by acquiring initial user feedback, as well as conducting technical delay measurements of two examples of such systems and relating them to existing literature. We identified two types of technical problems which affect the mixing of the streams, namely the difference in delay in multiple streams, a.k.a. asynchrony among streams, and the delay between the event itself and its presentation in the mixer. These problems affect the mixing in various ways depending on whether or not the director has visual access to the unmediated event. This knowledge has then been used to inform the conceptualization of identifiable ways of handling delays and synchronization. We suggest the introduction of a software feature providing context-dependent delay, in which these requirements can be balanced differently to fit specific contexts of use. We specifically address the different types of mixing which occurs when the director, or mixer, only has access to the topic through the mobile media (“out of view”), as well as mixing in a context in which the topic also is physically present (“in-view”) in front of the mixer.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号