首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   261篇
  免费   11篇
  国内免费   3篇
化学工业   40篇
金属工艺   4篇
机械仪表   6篇
建筑科学   4篇
能源动力   17篇
轻工业   34篇
水利工程   1篇
石油天然气   11篇
无线电   28篇
一般工业技术   58篇
冶金工业   29篇
原子能技术   13篇
自动化技术   30篇
  2024年   3篇
  2023年   3篇
  2022年   14篇
  2021年   16篇
  2020年   7篇
  2019年   12篇
  2018年   14篇
  2017年   10篇
  2016年   14篇
  2015年   6篇
  2014年   12篇
  2013年   18篇
  2012年   11篇
  2011年   21篇
  2010年   12篇
  2009年   5篇
  2008年   12篇
  2007年   8篇
  2006年   11篇
  2005年   6篇
  2004年   2篇
  2003年   5篇
  2002年   6篇
  2001年   2篇
  2000年   2篇
  1999年   1篇
  1998年   10篇
  1997年   4篇
  1996年   3篇
  1995年   1篇
  1994年   3篇
  1993年   1篇
  1992年   1篇
  1991年   1篇
  1990年   1篇
  1989年   2篇
  1987年   1篇
  1982年   1篇
  1981年   1篇
  1980年   2篇
  1979年   2篇
  1978年   1篇
  1976年   2篇
  1974年   2篇
  1971年   2篇
  1968年   1篇
排序方式: 共有275条查询结果,搜索用时 31 毫秒
1.
2.
In the present investigation, the effect of three process variables viz., air rate, temperature and time of oxidation has been studied to determine the possibility of making paving bitumens from North Rumaila Crude Oil. In order to have flexibility in the choice of proper feedstock for bitumen production, the effect of these process parameters was studied on three different vacuum residues. Air rate and temperature of oxidation were optimised to produce a bitumen product having less temperature susceptibility. The composition studies of typical feeds and oxidised products indicate that mainly “saturates” components get converted to “asphaltics” on air blowing.  相似文献   
3.
Diploid genetic algorithms (DGAs) promise robustness as against simple genetic algorithms which only work towards optimization. Moreover, these algorithms outperform others in dynamic environments. The work examines the theoretical aspect of the concept by examining the existing literature. The present work takes the example of dynamic TSP to compare greedy approach, genetic algorithms and DGAs. The work also implements a greedy genetic approach for the problem. In the experiments carried out, the three variants of dominance were implemented and 115 runs proved the point that none of them outperforms the other.  相似文献   
4.
Low-density parity-check (LDPC) codes have become the part of various communication standards due to their excellent error correcting performance. Existing methods require matrix inverse computation for obtaining a systematic generator matrix from parity check matrix. With the change in code rate or code length the process is repeated and hence, a large number of pre-processing computations time and resources are required. In the existing methods, the complexity of encoding is essentially quadratic with respect to the block length. In this paper, it is shown that the parity check matrix can be constructed using patterned sub-matrix structure such that the matrix inverse operation is replaced by matrix multiplication of sparse matrices. The sparseness of matrices is then utilized to obtain efficient encoders which can achieve encoding in real time with reduced pre-computation complexity. Hardware implementation of encoder and simulation results show that the proposed encoder achieves throughput in excess of 1 Gbps with the same error correcting performance as the conventional designs.  相似文献   
5.
A vendor-managed inventory (VMI) relationship between a downstream retailer and an upstream vendor consists of two distinct components: (i) information sharing (IS) and (ii) a shift in decision-making responsibility. This study compares these two components of VMI in a two-stage serial supply chain based on the ‘static uncertainty’ strategy under dynamic and random demand with fill rate constraints. Numerical experiments are conducted using analytical models to identify the conditions where the incremental value of VMI over IS is significant. The results provide guidelines relevant to academia and supply chain practitioners in taking VMI adoption decision above and beyond IS according to their specific business environment.  相似文献   
6.
We show for the first time that self-exciting and self-sensing piezoelectric cantilevers consisting only of lead zirconate titanate (PZT) measure resonance only if they are asymmetrically anchored. Symmetric-anchoring did not give rise to electrically measurable bending resonant modes in the 0-100 kHz range. Sensitivity of first and second bending mode resonances was characterized in a flow apparatus using small density changes in liquid (0.003-0.01 g/cm3) and by dodecanethiol chemisorption at 30 pM. Density change results were consistent with existing models of submerged cantilevers, and yielded mass-change sensitivity of ∼33 ng/Hz and 217 pg/Hz for the first two modes. In chemisorption experiments, where binding was localized to 1 mm2 distal tip of the PZT cantilever, sensitivity improved by an order of magnitude to 2 pg/Hz and 414 fg/Hz for the same two resonant modes.  相似文献   
7.
8.

Medical images are more typical than any other ordinary images, since it stores patient’s information for diagnosis purpose. Such images need more security and confidentiality as total diagnosis depends on it. In telemedicine applications, transmission of medical image via open channel, demands strong security and copyright protection. In our proposed robust watermarking model, a double layer security is introduced to ensure the robustness of embedded data. The embedded data is scrambled using a unique key and then a transform domain based hybrid watermarking technique is used to embed the scrambled data into the transform coefficients of the host image. The data embedding in medical images involves more attention, so that the diagnosis part must not be affected by any modification. Therefore, Support Vector Machine (SVM) is used as a classifier, which classify a medical image into two regions i.e. Non Region of Interest (NROI) and Region of Interest (ROI) to embed watermark data into the NROI part of the medical image, using the proposed embedding algorithm. The objective of the proposed model is to avoid any quality degradation to the medical image. The simulation is performed to measure the Peak Signal to Noise Ratio (PSNR) for imperceptibility and Structural Similarity Index (SSIM) to test the robustness. The experimented result shows, robustness and imperceptibility with SSIM of more than 0.50 and PSNR of more than 35 dB for proposed watermarking model.

  相似文献   
9.
This paper describes a nonlinear programming‐based robust design methodology for controllers and prefilters of a predefined structure for the linear time‐invariant systems involved in the quantitative feedback theory. This controller and prefilter synthesis problem is formulated as a single optimization problem with a given performance optimization objective and constraints enforcing stability and various specifications usually enforced in the quantitative feedback theory. The focus is set on providing constraints expression that can be used in standard nonlinear programming solvers. The nonlinear solver then computes in a single‐step controller and prefilter design parameters that satisfy the prescribed constraints and maximizes the performance optimization objective. The effectiveness of the proposed approach is demonstrated through a variety of difficult design cases like resonant plants, open‐loop unstable plants, and plants with variation in the time delay. Copyright © 2016 John Wiley & Sons, Ltd.  相似文献   
10.
Given a plant and a desired specification our goal is to construct a controller system which, when interconnected with the plant, yields a system that behaves like the desired specification. We can always construct the canonical controller introduced in van der Schaft (2003) [10]. For linear systems there exists a controller which when interconnected to the plant yields the desired behaviour if and only if the canonical controller is itself one such controller, see Vinjamoor and van der Schaft (2011) [4]. In this paper we extend this result to nonlinear systems. It turns out that one has to look at the canonical controller together with its subsystems. We obtain necessary and sufficient conditions for the existence of a controller for a class of nonlinear systems. We end with examples which show that in certain cases looking at subsystems of the canonical controller also does not suffice.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号