首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   11896篇
  免费   484篇
  国内免费   297篇
工业技术   12677篇
  2025年   12篇
  2024年   50篇
  2023年   45篇
  2022年   117篇
  2021年   156篇
  2020年   190篇
  2019年   202篇
  2018年   170篇
  2017年   271篇
  2016年   333篇
  2015年   375篇
  2014年   545篇
  2013年   585篇
  2012年   572篇
  2011年   693篇
  2010年   574篇
  2009年   708篇
  2008年   752篇
  2007年   866篇
  2006年   866篇
  2005年   737篇
  2004年   627篇
  2003年   613篇
  2002年   446篇
  2001年   379篇
  2000年   302篇
  1999年   309篇
  1998年   270篇
  1997年   204篇
  1996年   164篇
  1995年   131篇
  1994年   101篇
  1993年   69篇
  1992年   38篇
  1991年   32篇
  1990年   24篇
  1989年   32篇
  1988年   18篇
  1987年   9篇
  1986年   8篇
  1985年   11篇
  1984年   6篇
  1983年   4篇
  1981年   5篇
  1980年   5篇
  1964年   10篇
  1962年   5篇
  1961年   5篇
  1959年   4篇
  1955年   4篇
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
1.
In arc welding processes, because of the complexity and nonlinearity of heat transfer phenomena, it is often difficult to design an effective control system based upon an exact mathematical model. In this paper, a self-organizing fuzzy control method is proposed to obtain a uniform weld quality by regulation of the surface temperature at a desired level. The proposed control system is designed to comprise a combined structure of the fuzzy SOC with conventional PD control for improving the system's stability. The control experiments show that the proposed controller guarantees a uniform weld quality for various welding conditions.  相似文献   
2.
文章采用模糊规划的方法证明了期望放出体在放矿中的合理性,从而使放矿这个复杂的过程能方便地采用数学手段来处理。同时说明了如何在崩落法矿山利用期望体来解决实际生产中的放矿问题。  相似文献   
3.
Bio-cryptography is an emerging security technology which combines cryptography with biometrics. A good bio-cryptosystem is required to protect the privacy of the relevant biometric data as well as achieving high recognition accuracy. Fingerprints have been widely used in bio-cryptosystem design. However, fingerprint uncertainty caused by distortion and rotation during the image capturing process makes it difficult to achieve a high recognition rate in most bio-cryptographic systems. Moreover, most existing bio-cryptosystems rely on the accurate detection of singular points for fingerprint image pre-alignment, which is very hard to achieve, and the image rotation transformation during the alignment process can cause significant singular point deviation and minutiae changes. In this paper, by taking full advantage of local Voronoi neighbor structures (VNSs), e.g. local structural stability and distortion insensitivity, we propose an alignment-free bio-cryptosystem based on fixed-length bit-string representations extracted from modified VNSs, which are rotation- and translation-invariant and distortion robust. The proposed alignment-free bio-cryptosystem is able to provide strong security while achieving good recognition performance. Experimental results in comparison with most existing alignment-free bio-cryptosystems using the publicly-available databases show the validity of the proposed scheme.  相似文献   
4.
Due to the complexity of the machine tool structure and the cutting process, the dynamics of machining processes are still not completely understood. This is especially true due to the demand of high-speed machining to increase productivity. In order to model and control these complex processes, new approaches, which can represent complex phenomenon combined with learning ability, are needed. The combined neural–fuzzy approach appears to be ideally suited for this purpose. In this paper, the recently developed fuzzy adaptive network (FAN) is used to model surface roughness in turning operations. The FAN network has both the learning ability of neural network and linguistic representation of complex, not well-understood, vague phenomenon. Furthermore, it can continuously improve the initially obtained rough model based on the daily operating data. To illustrate this approach, a model representing the influences of machining parameters on surface roughness is established and then the model is verified by the use of the results of pilot experiments. Finally, a comparison with the results based on statistical regression is provided.  相似文献   
5.
A.  C.M. Takemura  O. Colliot  O. Camara  I.   《Pattern recognition》2008,41(8):2525-2540
Segmenting the heart in medical images is a challenging and important task for many applications. In particular, segmenting the heart in CT images is very useful for cardiology and oncological applications such as radiotherapy. Although the majority of methods in the literature are designed for ventricle segmentation, there is a real interest in segmenting the heart as a whole in this modality. In this paper, we address this problem and propose an automatic and robust method, based on anatomical knowledge about the heart, in particular its position with respect to the lungs. This knowledge is represented in a fuzzy formalism and it is used both to define a region of interest and to drive the evolution of a deformable model in order to segment the heart inside this region. The proposed method has been applied on non-contrast CT images and the obtained results have been compared to manual segmentations of the heart, showing the good accuracy and high robustness of our approach.  相似文献   
6.
为了帮助顾客从众多对症的非处方药中选出最满意的药品,提出了开发1个基于Web的非处方药满意度评价系统。系统根据顾客提供的典型症状,采用疾病与症状相结合的选药策略,查找出所有对症的非处方药,并以药品安全性、疗效、稳定性、易用性、价格作为评价因素,根据顾客的关注角度和关注程度确定各因素权重,用模型b=W·R对对症药品进行满意度评价,按满意度高低依次推荐。经实际应用,系统推荐准确度在70%以上。  相似文献   
7.
Huan Huang 《Information Sciences》2010,180(19):3806-3813
This paper shows that the Zadeh’s extensions of sendograph-metric-continuous fuzzy-valued functions are sendograph-metric-continuous fuzzy functions.  相似文献   
8.
A new incrementally growing neural network model, called the growing fuzzy topology ART (GFTART) model, is proposed based on integrating the conventional fuzzy ART model with the incremental topology-preserving mechanism of the growing cell structure (GCS) model. This is in addition, to a new training algorithm, called the push-pull learning algorithm. The proposed GFTART model has two purposes: First, to reduce the proliferation of incrementally generated nodes in the F2 layer by the conventional fuzzy ART model based on replacing each F2 node with a GCS. Second, to enhance the class-dependent clustering representation ability of the GCS model by including the categorization property of the conventional fuzzy ART model. In addition, the proposed push-pull training algorithm enhances the cluster discriminating property and partially improves the forgetting problem of the training algorithm in the GCS model.  相似文献   
9.
In sensor networks, a compromised node can either generate fabricated reports with false votes or inject false votes into real reports, which causes severe damage such as false alarms, energy drain and information loss. An interleaved hop-by-hop authentication (IHA) scheme addresses the former attack by detecting and filtering false reports in a deterministic and hop-by-hop fashion. Unfortunately, in IHA, all en-route nodes must join to verify reports while only a few are necessary to the authentication procedure. In this paper, we propose a fuzzy-based interleaved multi-hop authentication scheme based on IHA. In our scheme, the fuzzy logic system only selects some nodes for verification based on the network characteristics. Moreover, we apply a voting method and a hash-based key assignment mechanism to improve network security. Through performance evaluation, the proposed scheme is found to save up to 13% of the energy consumption and to provide more network protection compared to IHA.  相似文献   
10.
Loss and gain functions for CBR retrieval   总被引:2,自引:0,他引:2  
The method described in this article evaluates case similarity in the retrieval stage of case-based reasoning (CBR). It thus plays a key role in deciding which case to select, and therefore, in deciding which solution will be eventually applied. In CBR, there are many retrieval techniques. One feature shared by most is that case retrieval is based on attribute similarity and importance. However, there are other crucial factors that should be considered, such as the possible consequences of a given solution, in other words its potential loss and gain. As their name clearly implies, these concepts are defined as functions measuring loss and gain when a given retrieval case solution is applied. Moreover, these functions help the user to choose the best solution so that when a mistake is made the resulting loss is minimal. In this way, the highest benefit is always obtained.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号

京公网安备 11010802026262号