首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   10494篇
  免费   1839篇
  国内免费   1440篇
工业技术   13773篇
  2024年   40篇
  2023年   200篇
  2022年   327篇
  2021年   359篇
  2020年   402篇
  2019年   391篇
  2018年   354篇
  2017年   513篇
  2016年   562篇
  2015年   670篇
  2014年   816篇
  2013年   887篇
  2012年   897篇
  2011年   956篇
  2010年   730篇
  2009年   778篇
  2008年   858篇
  2007年   796篇
  2006年   615篇
  2005年   514篇
  2004年   409篇
  2003年   300篇
  2002年   271篇
  2001年   226篇
  2000年   176篇
  1999年   103篇
  1998年   82篇
  1997年   87篇
  1996年   58篇
  1995年   58篇
  1994年   44篇
  1993年   43篇
  1992年   31篇
  1991年   25篇
  1990年   20篇
  1989年   24篇
  1988年   15篇
  1987年   8篇
  1986年   9篇
  1985年   11篇
  1984年   5篇
  1983年   15篇
  1982年   18篇
  1981年   14篇
  1980年   12篇
  1979年   8篇
  1978年   8篇
  1977年   4篇
  1976年   6篇
  1975年   7篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
Edge Computing is one of the radically evolving systems through generations as it is able to effectively meet the data saving standards of consumers, providers and the workers. Requisition for Edge Computing based items have been increasing tremendously. Apart from the advantages it holds, there remain lots of objections and restrictions, which hinders it from accomplishing the need of consumers all around the world. Some of the limitations are constraints on computing and hardware, functions and accessibility, remote administration and connectivity. There is also a backlog in security due to its inability to create a trust between devices involved in encryption and decryption. This is because security of data greatly depends upon faster encryption and decryption in order to transfer it. In addition, its devices are considerably exposed to side channel attacks, including Power Analysis attacks that are capable of overturning the process. Constrained space and the ability of it is one of the most challenging tasks. To prevail over from this issue we are proposing a Cryptographic Lightweight Encryption Algorithm with Dimensionality Reduction in Edge Computing. The t-Distributed Stochastic Neighbor Embedding is one of the efficient dimensionality reduction technique that greatly decreases the size of the non-linear data. The three dimensional image data obtained from the system, which are connected with it, are dimensionally reduced, and then lightweight encryption algorithm is employed. Hence, the security backlog can be solved effectively using this method.  相似文献   
2.
A random placement of large-scale sensor network in the outdoor environment often causes low coverage.An area coverage optimization algorithm of mobile sensor network (MSN) based on virtual force perturbation and Cuckoo search (VF-CS) was proposed.Firstly,the virtual force of the sensor nodes within the Thiessen polygon was analyzed based on the partitioning of Voronoi diagram of the monitoring area.Secondly,the force of polygon vertices and neighbor nodes was taken as the perturbation factor for updating the node’s location of the Cuckoo search (CS).Finally,the VF-CS guided the node to move so as to achieve the optimal coverage.The simulation results demonstrate that the proposed algorithm has higher coverage and shorter average moving distance of nodes than the Voronoi diagram based algorithms in literatures.  相似文献   
3.
Search results of spatio-temporal data are often displayed on a map, but when the number of matching search results is large, it can be time-consuming to individually examine all results, even when using methods such as filtered search to narrow the content focus. This suggests the need to aggregate results via a clustering method. However, standard unsupervised clustering algorithms like K-means (i) ignore relevance scores that can help with the extraction of highly relevant clusters, and (ii) do not necessarily optimize search results for purposes of visual presentation. In this article, we address both deficiencies by framing the clustering problem for search-driven user interfaces in a novel optimization framework that (i) aims to maximize the relevance of aggregated content according to cluster-based extensions of standard information retrieval metrics and (ii) defines clusters via constraints that naturally reflect interface-driven desiderata of spatial, temporal, and keyword coherence that do not require complex ad-hoc distance metric specifications as in K-means. After comparatively benchmarking algorithmic variants of our proposed approach – RadiCAL – in offline experiments, we undertake a user study with 24 subjects to evaluate whether RadiCAL improves human performance on visual search tasks in comparison to K-means clustering and a filtered search baseline. Our results show that (a) our binary partitioning search (BPS) variant of RadiCAL is fast, near-optimal, and extracts higher-relevance clusters than K-means, and (b) clusters optimized via RadiCAL result in faster search task completion with higher accuracy while requiring a minimum workload leading to high effectiveness, efficiency, and user satisfaction among alternatives.  相似文献   
4.
文章首先总结了电力企业信息管理系统的现状,提出了多源信息管理系统融合集成的邦联、子集和完全融合3种方式,分析了3种方式的优缺点,以建设企业"互联网搜索"型数字引擎为目标,提出了融合基于本体的图数据库建模,多维关联与路径因果分析,和人机共生互动可视化决策于一体的企业信息管理系统技术发展趋势;在系统分析目前正在快速发展的图数据库技术与传统关系数据库之间的本质区别基础上,总结原创的电力图计算平台技术的特点;在此基础上讨论"电网一张图"在建设能源互联网时空信息管理平台数据关联索引图中的核心作用,提出了支持能源互联网建设的"电网一张图"时空信息管理系统的技术架构与特点,最后总结"电网一张图"时空信息管理系统在提高电网安全运行水平、提升客户服务水平、增强清洁能源消纳水平、改善经营绩效水平、以及为综合能源服务和建设能源生态等提供数据服务方面的广阔应用场景。  相似文献   
5.
ABSTRACT

Feature selection is an important task to improve the classifier’s accuracy and to decrease the problem size. A number of methodologies have been presented for feature selection problems using metaheuristic algorithms. In this paper, an improved self-adaptive inertia weight particle swarm optimisation with local search and combined with C4.5 classifiers for feature selection algorithm is proposed. In this proposed algorithm, the gradient base local search with its capacity of helping to explore the feature space and an improved self-adaptive inertia weight particle swarm optimisation with its ability to converge a best global solution in the search space. Experimental results have verified that the SIW-APSO-LS performed well compared with other state of art feature selection techniques on a suit of 16 standard data sets.  相似文献   
6.
This paper elucidates Common Mode Voltage (CMV) reduction in transformerless 3-phase 3-level Coupled Inductor Neutral Point (CI-NPC) Clamped Inverter with Hybrid Energy System. The three dimensional Space Vector Pulse Width Modulation (3D-SVPWM) with Nearest State Vector (NSV) is implemented to reduce the CMV by proper selection of medium, large and small vectors in 3D cubic space region. This NSV scheme in addition to CMV reduction, reduces the capacitor voltage balancing issues and minimizes switching losses. The proposed control provides full utilization of dc link voltage with reduced harmonics. This 3-level CI-NPC inverter is energized by hybrid energy source which includes photovoltaic system and wind energy system. The results obtained for the proposed scheme through simulation and experimental setup is compared with the conventional 2D-SVPWM and 3D-SVPWM scheme. From the compared results it is evident that the proposed scheme reduces CMV to a larger extent than 2D and 3D-SVPWM control. The simulation and experimental results are verified using matlab-simulink and FPGA-Spartan-6 controller respectively.  相似文献   
7.
This paper introduces an efficient algorithm for the bike request scheduling problem (BRSP). The BRSP is built around the concept of request, defined as the pickup or dropoff of a number of identical items (bikes) at a specific station, within a certain time window, and with a certain priority. The aim of the BRSP is to sequence requests on (and hence determine the routes of) a set of vehicles, in such a way that the sum of the priorities of the executed requests is maximized, all time windows are respected, and the capacity of the vehicles is not exceeded. The generation of the set of requests is explicitly not a part of the problem definition of the BRSP. The primary application of the BRSP, from which it derives its name, is to determine the routes of a set of repositioning vehicles in a bike sharing system, although other applications exist. The algorithm introduced in this paper is based on a set of related greedy randomized adaptive search procedure followed by variable neighborhood descent (GRASP + VND) operators embedded in a large neighborhood search (LNS) framework. Since this paper presents the first heuristic for the BRSP, a computational comparison to existing approaches is not possible. We therefore compare the solutions found by our LNS heuristic to those found by an exact solver (Gurobi). These experiments confirm that the proposed algorithm scales to realistic dimensions and is able to find near‐optimal solutions in seconds.  相似文献   
8.
This paper proposes a novel hybrid technique called enhanced grey wolf optimization-sine cosine algorithm-cuckoo search (EGWO-SCA-CS) algorithm to improve the electrical power system stability. The proposed method comprises of a popular grey wolf optimization (GWO) in an enhanced and hybrid form. It embraces the well-balanced exploration and exploitation using the cuckoo search (CS) algorithm and enhanced search capability through the sine cosine algorithm (SCA) to elude the stuck to the local optima. The proposed technique is validated with the 23 benchmark functions and compared with state-of-the-art methods. The benchmark functions consist of unimodal, multimodal function from which the best suitability of the proposed technique can be identified. The robustness analysis also presented with the proposed method through boxplot, and a detailed statistical analysis is performed for a set of 30 individual runs. From the inferences gathered from the benchmark functions, the proposed technique is applied to the stability problem of a power system, which is heavily stressed with the nonlinear variation of the load and thereby operating conditions. The dynamics of power system components have been considered for the mathematical model of a multimachine system, and multiobjective function has been framed in tuning the optimal controller parameters. The effectiveness of the proposed algorithm has been assessed by considering two case studies, namely, (i) the optimal controller parameter tuning, and (ii) the coordination of oscillation damping devices in the power system stability enhancement. In the first case study, the power system stabilizer (PSS) is considered as a controller, and a self-clearing three-phase fault is considered as the system uncertainty. In contrast, static synchronous compensator (STATCOM) and PSS are considered as controllers to be coordinated, and perturbation in the system states as uncertainty in the second case study.  相似文献   
9.
This paper mainly illustrates the Tree Seeds Algorithm (TSA) to tackle structural damage identification problem. The damage model is simulated by the alterations of both stiffness and mass parameters. The objective function is introduced by minimizing the differences between the measured and calculated acceleration data. To enhance the performance of the standard TSA, two modifications including the bare-bones Gaussian updated mechanism and the withering process are introduced. The modified algorithm is named after the BGTSA. In the numerical simulation part, the BGTSA is firstly used to make comparisons with several state-of-the-art algorithms on the CEC05. Secondly, the BGTSA is utilized to deal with the structural damage identification problem by optimizing the acceleration-based nonlinear objective function. Numerical experiments involving a simply supported beam and a truss are carried out to verify the effectiveness of the proposed algorithm. The final results show that with low amount of acceleration data, the BGTSA can acquire better identification results compared with other evolutionary algorithms. Therefore the proposed algorithm could be viewed as a potential tool to solve the structural damage identification problem.  相似文献   
10.
复杂网络最短路径经典算法的处理效率较低,不适用于大规模复杂网络,而现有近似算法通用性有限,且计算准确率不理想,不能满足规模日益扩大的复杂网络中的最短路径计算需求。针对于此,提出基于[k]-shell的复杂网络最短路径近似算法。算法利用节点的[k]-shell值进行网络划分并引导搜索路径,利用超点聚合处理[k]-shell子网来降低路径搜索中节点和连边的规模,通过在路径搜索过程使用双向搜索树方法提高算法的计算效率和准确率。实验结果表明,算法通用性较好,在现实与仿真大规模复杂网络中均具有较高的计算效率和准确率。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号