首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1152篇
  免费   81篇
  国内免费   12篇
工业技术   1245篇
  2024年   4篇
  2023年   22篇
  2022年   17篇
  2021年   75篇
  2020年   69篇
  2019年   85篇
  2018年   106篇
  2017年   80篇
  2016年   86篇
  2015年   37篇
  2014年   67篇
  2013年   135篇
  2012年   65篇
  2011年   83篇
  2010年   49篇
  2009年   51篇
  2008年   26篇
  2007年   20篇
  2006年   8篇
  2005年   13篇
  2004年   4篇
  2003年   11篇
  2002年   6篇
  2001年   4篇
  2000年   2篇
  1999年   3篇
  1998年   8篇
  1997年   7篇
  1996年   3篇
  1995年   4篇
  1994年   6篇
  1993年   4篇
  1992年   5篇
  1991年   5篇
  1990年   5篇
  1989年   2篇
  1987年   3篇
  1986年   3篇
  1985年   3篇
  1984年   4篇
  1983年   5篇
  1982年   13篇
  1981年   3篇
  1979年   5篇
  1977年   4篇
  1976年   3篇
  1975年   3篇
  1970年   5篇
  1966年   6篇
  1961年   3篇
排序方式: 共有1245条查询结果,搜索用时 343 毫秒
21.
In this article,the 2-D unsteady viscous flow around two circular cylinders in a tandem arrangement is numerically simulated in order to study the characteristics of the flow in both laminar and turbulent regimes.The method applied alternatively is based on the finite volume method on a Cartesian-staggered grid.The great source term technique is employed to identify the cylinders placed in the flow field.To apply the boundary conditions,the ghost-cell technique is used.The implemented computational method is firstly validated through simulation of laminar and turbulent flows around a fixed circular cylinder.Finally,the flow around two circular cylinders in a tandem arrangement is simulated and analyzed.The flow visualization parameters,the Strouhal numbers,and drag and lift coefficients are comprehensively presented and compared for different cases in order to reveal the effect of the Reynolds number and gap spacing on the behavior of the flow.The obtained results have shown two completely distinct flow characteristics in laminar and turbulent regimes.  相似文献   
22.
In smart environments, pervasive computing contributes in improving daily life activities for dependent people by providing personalized services. Nevertheless, those environments do not guarantee a satisfactory level for protecting the user privacy and ensuring the trust between communicating entities. In this study, we propose a trust evaluation model based on user past and present behavior. This model is associated with a lightweight authentication key agreement protocol (Elliptic Curve-based Simple Authentication Key Agreement). The aim is to enable the communicating entities to establish a level of trust and then succeed in a mutual authentication using a scheme suitable for low-resource devices in smart environments. An innovation in our trust model is that it uses an accurate approach to calculate trust in different situations and includes a human-based feature for trust feedback, which is user rating. Finally, we tested and implemented our scheme on Android mobile phones in a smart environment dedicated for handicapped people.  相似文献   
23.
In this paper, an agent matching method for bilateral contracts in a multi-agent market is proposed. Each agent has a hierarchical representation of its trading commodity attributes by a tree structure of fuzzy attributes. Using this structure, the similarity between the trees of each pair of buyer and seller is computed using a new ordered fuzzy similarity algorithm. Then, using the concept of Stackelberg equilibrium in a leader–follower game, matchmaking is performed among the sellers and buyers. The fuzzy similarities of each agent with others in its personal viewpoint have been used as its payoffs in a bimatrix game. Through a case study for bilateral contracts of energy, the capabilities of the proposed agent-based system are illustrated.  相似文献   
24.
In this paper, we propose a distributed congestion-aware channel assignment (DCACA) algorithm for multi-channel wireless mesh networks (MC–WMNs). The frequency channels are assigned according to the congestion measures which indicate the congestion status at each link. Depending on the selected congestion measure (e.g., queueing delay, packet loss probability, and differential backlog), various design objectives can be achieved. Our proposed distributed algorithm is simple to implement as it only requires each node to perform a local search. Unlike most of the previous channel assignment schemes, our proposed algorithm assigns not only the non-overlapped (i.e., orthogonal) frequency channels, but also the partially-overlapped channels. In this regard, we introduce the channel overlapping and mutual interference matrices which model the frequency overlapping among different channels. Simulation results show that in the presence of elastic traffic (e.g., TCP Vegas or TCP Reno) sources, our proposed DCACA algorithm increases the aggregate throughput and also decreases the average packet round-trip compared with the previously proposed Load-Aware channel assignment algorithm. Furthermore, in a congested IEEE 802.11b network setting, compared with the use of three non-overlapped channels, the aggregate network throughput can further be increased by 25% and the average round-trip time can be reduced by more than one half when all the 11 partially-overlapped channels are used.  相似文献   
25.
26.
In the present article, the adaptive neuro-fuzzy inference system (ANFIS) is employed to model the discharge coefficient in rectangular sharp-crested side weirs. The genetic algorithm (GA) is used for the optimum selection of membership functions, while the singular value decomposition (SVD) method helps in computing the linear parameters of the ANFIS results section (GA/SVD-ANFIS). The effect of each dimensionless parameter on discharge coefficient prediction is examined in five different models to conduct sensitivity analysis by applying the above-mentioned dimensionless parameters. Two different sets of experimental data are utilized to examine the models and obtain the best model. The study results indicate that the model designed through GA/SVD-ANFIS predicts the discharge coefficient with a good level of accuracy (mean absolute percentage error?=?3.362 and root mean square error?=?0.027). Moreover, comparing this method with existing equations and the multi-layer perceptron–artificial neural network (MLP-ANN) indicates that the GA/SVD-ANFIS method has superior performance in simulating the discharge coefficient of side weirs.  相似文献   
27.
Emerging technologies such as edge computing, Internet of Things (IoT), 5G networks, big data, Artificial Intelligence (AI), and Unmanned Aerial Vehicles (UAVs) empower, Industry 4.0, with a progressive production methodology that shows attention to the interaction between machine and human beings. In the literature, various authors have focused on resolving security problems in UAV communication to provide safety for vital applications. The current research article presents a Circle Search Optimization with Deep Learning Enabled Secure UAV Classification (CSODL-SUAVC) model for Industry 4.0 environment. The suggested CSODL-SUAVC methodology is aimed at accomplishing two core objectives such as secure communication via image steganography and image classification. Primarily, the proposed CSODL-SUAVC method involves the following methods such as Multi-Level Discrete Wavelet Transformation (ML-DWT), CSO-related Optimal Pixel Selection (CSO-OPS), and signcryption-based encryption. The proposed model deploys the CSO-OPS technique to select the optimal pixel points in cover images. The secret images, encrypted by signcryption technique, are embedded into cover images. Besides, the image classification process includes three components namely, Super-Resolution using Convolution Neural Network (SRCNN), Adam optimizer, and softmax classifier. The integration of the CSO-OPS algorithm and Adam optimizer helps in achieving the maximum performance upon UAV communication. The proposed CSODL-SUAVC model was experimentally validated using benchmark datasets and the outcomes were evaluated under distinct aspects. The simulation outcomes established the supreme better performance of the CSODL-SUAVC model over recent approaches.  相似文献   
28.
This paper proposes an optimal recursive estimator to estimate the states of a stochastic discrete time linear dynamic system when the states of the system are constrained with inequality constraints. The case when the constraints are strictly satisfied is treated independently from the case when some of the constraints are violated. For the first case, the well known Kalman filter estimator is used. In the second case, an algorithm which uses a series of successive orthogonalizations on the measurement subspaces is employed to obtain the optimal estimate. It is shown that the proposed estimator has several attractive properties such that it is an unbiased estimator. More importantly, compared to other estimator found in the literature, the proposed estimator needs less computational efforts, is numerically more stable and it leads to a smaller variance. To show the effectiveness of the proposed estimator, several simulation results are presented and discussed.  相似文献   
29.
In this paper, we present a new sufficient condition for absolute stability of Lure system with two additive time-varying delay components. This criterion is expressed as a set of linear matrix inequalities (LMIs), which can be readily tested by using standard numerical software. We use this new criterion to stabilize a class of nonlinear time-delay systems. Some numerical examples are given to illustrate the applicability of the results using standard numerical software.  相似文献   
30.
In this paper, we present a new sufficient condition for absolute stability of Lure system with two additive time-varying delay components. This criterion is expressed as a set of linear matrix inequalities (LMIs), which can be readily tested by using standard numerical software. We use this new criterion to stabilize a class of nonlinear time-delay systems. Some numerical examples are given to illustrate the applicability of the results using standard numerical software.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号