首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2212篇
  免费   390篇
  国内免费   11篇
工业技术   2613篇
  2023年   61篇
  2022年   55篇
  2021年   112篇
  2020年   104篇
  2019年   120篇
  2018年   143篇
  2017年   125篇
  2016年   161篇
  2015年   130篇
  2014年   151篇
  2013年   215篇
  2012年   114篇
  2011年   119篇
  2010年   97篇
  2009年   98篇
  2008年   84篇
  2007年   76篇
  2006年   56篇
  2005年   67篇
  2004年   57篇
  2003年   34篇
  2002年   28篇
  2001年   39篇
  2000年   35篇
  1999年   36篇
  1998年   42篇
  1997年   24篇
  1996年   24篇
  1995年   9篇
  1994年   11篇
  1993年   17篇
  1992年   8篇
  1991年   9篇
  1990年   15篇
  1989年   15篇
  1988年   7篇
  1987年   6篇
  1986年   7篇
  1985年   5篇
  1984年   10篇
  1983年   8篇
  1982年   7篇
  1980年   5篇
  1979年   4篇
  1978年   6篇
  1977年   8篇
  1976年   11篇
  1975年   8篇
  1974年   8篇
  1973年   5篇
排序方式: 共有2613条查询结果,搜索用时 15 毫秒
41.
In this paper, the robust input covariance constraint (ICC) control problem with polytopic uncertainty is solved using convex optimization with linear matrix inequality (LMI) approach. The ICC control problem is an optimal control problem that optimizes the output performance subjected to multiple constraints on the input covariance matrices. This control problem has significant practical implications when hard constraints need to be satisfied on control actuators. The contribution of this paper is the characterization of the control synthesis LMIs used to solve the robust ICC control problem for polytopic uncertain systems. Both continuous‐ and discrete‐time systems are considered. Parameter‐dependent and independent Lyapunov functions have been used for robust ICC controller synthesis. Numerical design examples are presented to illustrate the effectiveness of the proposed approach.  相似文献   
42.
The modeling of the physical and electrical characteristics of microstrip non‐uniform transmission lines (NTLs) utilizing artificial neural networks (ANNs) is investigated. The fundamental equations and constraints for designing variable impedance transmission lines are first presented. Then, a proof‐of‐concept example of a compact non‐uniform matching transformer and the counterpart modeled version is elaborated for source and load impedances Zs and Zl, respectively, at 0.5 GHz. For comparison purposes, weights and biases of the proposed ANN are established with three different training techniques; namely: backpropagation (BP), Quasi‐Newton (QN), and conjugate gradient (CG); at which the ABCD matrix, impedance variations, input port matching (S11), and transmission parameter (S21) are set as benchmarks to examine the validity of the trained model. The concept is then extended to model a NTL ultrawideband (UWB) Wilkinson power divider (WPD) with three resistors for improved isolation. S‐parameters derived from the trained ANN outputs are close to those obtained by the traditional time‐consuming optimization procedure, and show input and output ports matching and isolation of below ?10 dB, and acceptable values of transmission parameters over the 3.1 GHz to 10.6 GHz band. The resulting models outperform traditional optimizations in terms of simulation time and reserved resources with comparable accuracy. © 2015 Wiley Periodicals, Inc. Int J RF and Microwave CAE 25:563–572, 2015.  相似文献   
43.
The game problem of pursuit is studied for dynamic processes evolving under uncertainty and counteraction. The terminal set is supposed to be a cylindrical set-valued mapping. The method of resolving functions is used to establish the sufficient conditions for the game termination in the class of quasi- and stroboscopic strategies for various schemes of the method. The guaranteed times are compared. The results are illustrated using the model with integral control unit and game problems with simple motion.  相似文献   
44.
Even though a lot of researches have been conducted in order to solve the problem of unconstrained handwriting recognition, an effective solution is still a serious challenge. In this article, we address two Arabic handwriting recognition-related issues. Firstly, we present IESK-arDB, a new multi-propose off-line Arabic handwritten database. It is publicly available and contains more than 4,000 word images, each equipped with binary version, thinned version as well as a ground truth information stored in separate XML file. Additionally, it contains around 6,000 character images segmented from the database. A letter frequency analysis showed that the database exhibits letter frequencies similar to that of large corpora of digital text, which proof the database usefulness. Secondly, we proposed a multi-phase segmentation approach that starts by detecting and resolving sub-word overlaps, then hypothesizing a large number of segmentation points that are later reduced by a set of heuristic rules. The proposed approach has been successfully tested on IESK-arDB. The results were very promising, indicating the efficiency of the suggested approach.  相似文献   
45.
In this paper, a fuzzy logic controller (FLC) based variable structure control (VSC) is presented. The main objective is to obtain an improved performance of highly non‐linear unstable systems. New functions for chattering reduction and error convergence without sacrificing invariant properties are proposed. The main feature of the proposed method is that the switching function is added as an additional fuzzy variable and will be introduced in the premise part of the fuzzy rules; together with the state variables. In this work, a tuning of the well known weighting parameters approach is proposed to optimize local and global approximation and modelling capability of the Takagi‐Sugeno (T‐S) fuzzy model to improve the choice of the performance index and minimize it. The main problem encountered is that the T‐S identification method can not be applied when the membership functions are overlapped by pairs. This in turn restricts the application of the T‐S method because this type of membership function has been widely used in control applications. The approach developed here can be considered as a generalized version of the T‐S method. An inverted pendulum mounted on a cart is chosen to evaluate the robustness, effectiveness, accuracy and remarkable performance of the proposed estimation approach in comparison with the original T‐S model. Simulation results indicate the potential, simplicity and generality of the estimation method and the robustness of the chattering reduction algorithm. In this paper, we prove that the proposed estimation algorithm converge the very fast, thereby making it very practical to use. The application of the proposed FLC‐VSC shows that both alleviation of chattering and robust performance are achieved.  相似文献   
46.
The Internet of Things (IoT) has gained more popularity in research because of its large-scale challenges and implementation. But security was the main concern when witnessing the fast development in its applications and size. It was a dreary task to independently set security systems in every IoT gadget and upgrade them according to the newer threats. Additionally, machine learning (ML) techniques optimally use a colossal volume of data generated by IoT devices. Deep Learning (DL) related systems were modelled for attack detection in IoT. But the current security systems address restricted attacks and can be utilized outdated datasets for evaluations. This study develops an Artificial Algae Optimization Algorithm with Optimal Deep Belief Network (AAA-ODBN) Enabled Ransomware Detection in an IoT environment. The presented AAA-ODBN technique mainly intends to recognize and categorize ransomware in the IoT environment. The presented AAA-ODBN technique follows a three-stage process: feature selection, classification, and parameter tuning. In the first stage, the AAA-ODBN technique uses AAA based feature selection (AAA-FS) technique to elect feature subsets. Secondly, the AAA-ODBN technique employs the DBN model for ransomware detection. At last, the dragonfly algorithm (DFA) is utilized for the hyperparameter tuning of the DBN technique. A sequence of simulations is implemented to demonstrate the improved performance of the AAA-ODBN algorithm. The experimental values indicate the significant outcome of the AAA-ODBN model over other models.  相似文献   
47.
With the increased advancements of smart industries, cybersecurity has become a vital growth factor in the success of industrial transformation. The Industrial Internet of Things (IIoT) or Industry 4.0 has revolutionized the concepts of manufacturing and production altogether. In industry 4.0, powerful Intrusion Detection Systems (IDS) play a significant role in ensuring network security. Though various intrusion detection techniques have been developed so far, it is challenging to protect the intricate data of networks. This is because conventional Machine Learning (ML) approaches are inadequate and insufficient to address the demands of dynamic IIoT networks. Further, the existing Deep Learning (DL) can be employed to identify anonymous intrusions. Therefore, the current study proposes a Hunger Games Search Optimization with Deep Learning-Driven Intrusion Detection (HGSODL-ID) model for the IIoT environment. The presented HGSODL-ID model exploits the linear normalization approach to transform the input data into a useful format. The HGSO algorithm is employed for Feature Selection (HGSO-FS) to reduce the curse of dimensionality. Moreover, Sparrow Search Optimization (SSO) is utilized with a Graph Convolutional Network (GCN) to classify and identify intrusions in the network. Finally, the SSO technique is exploited to fine-tune the hyper-parameters involved in the GCN model. The proposed HGSODL-ID model was experimentally validated using a benchmark dataset, and the results confirmed the superiority of the proposed HGSODL-ID method over recent approaches.  相似文献   
48.
Next-generation cellular networks are expected to provide users with innovative gigabits and terabits per second speeds and achieve ultra-high reliability, availability, and ultra-low latency. The requirements of such networks are the main challenges that can be handled using a range of recent technologies, including multi-access edge computing (MEC), artificial intelligence (AI), millimeter-wave communications (mmWave), and software-defined networking. Many aspects and design challenges associated with the MEC-based 5G/6G networks should be solved to ensure the required quality of service (QoS). This article considers developing a complex MEC structure for fifth and sixth-generation (5G/6G) cellular networks. Furthermore, we propose a seamless migration technique for complex edge computing structures. The developed migration scheme enables services to adapt to the required load on the radio channels. The proposed algorithm is analyzed for various use cases, and a test bench has been developed to emulate the operator’s infrastructure. The obtained results are introduced and discussed.  相似文献   
49.
Active matrix prestressed microelectromechanical shutter displays enable outstanding optical properties as well as robust operating performance. The microelectromechanical systems (MEMS) shutter elements have been optimized for higher light outcoupling efficiency with lower operation voltage and higher pixel density. The MEMS elements have been co-fabricated with self-aligned metal-oxide thin-film transistors (TFTs). Several optimizations were required to integrate MEMS process without hampering the performance of both elements. The optimized display process requires only seven photolithographic masks with ensuring proper compatibility between MEMS shutter and metal-oxide TFT process.  相似文献   
50.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号