首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1951篇
  免费   164篇
  国内免费   16篇
工业技术   2131篇
  2024年   4篇
  2023年   66篇
  2022年   115篇
  2021年   179篇
  2020年   141篇
  2019年   148篇
  2018年   169篇
  2017年   137篇
  2016年   127篇
  2015年   88篇
  2014年   113篇
  2013年   171篇
  2012年   134篇
  2011年   108篇
  2010年   81篇
  2009年   79篇
  2008年   46篇
  2007年   41篇
  2006年   31篇
  2005年   16篇
  2004年   10篇
  2003年   12篇
  2002年   10篇
  2001年   2篇
  2000年   7篇
  1999年   10篇
  1998年   19篇
  1997年   9篇
  1996年   9篇
  1995年   8篇
  1994年   10篇
  1993年   4篇
  1992年   5篇
  1991年   4篇
  1990年   2篇
  1987年   3篇
  1986年   1篇
  1984年   5篇
  1983年   1篇
  1982年   1篇
  1981年   3篇
  1980年   1篇
  1968年   1篇
排序方式: 共有2131条查询结果,搜索用时 15 毫秒
11.

Shear connectors play a prominent role in the design of steel-concrete composite systems. The behavior of shear connectors is generally determined through conducting push-out tests. However, these tests are costly and require plenty of time. As an alternative approach, soft computing (SC) can be used to eliminate the need for conducting push-out tests. This study aims to investigate the application of artificial intelligence (AI) techniques, as sub-branches of SC methods, in the behavior prediction of an innovative type of C-shaped shear connectors, called Tilted Angle Connectors. For this purpose, several push-out tests are conducted on these connectors and the required data for the AI models are collected. Then, an adaptive neuro-fuzzy inference system (ANFIS) is developed to identify the most influencing parameters on the shear strength of the tilted angle connectors. Totally, six different models are created based on the ANFIS results. Finally, AI techniques such as an artificial neural network (ANN), an extreme learning machine (ELM), and another ANFIS are employed to predict the shear strength of the connectors in each of the six models. The results of the paper show that slip is the most influential factor in the shear strength of tilted connectors and after that, the inclination angle is the most effective one. Moreover, it is deducted that considering only four parameters in the predictive models is enough to have a very accurate prediction. It is also demonstrated that ELM needs less time and it can reach slightly better performance indices than those of ANN and ANFIS.

  相似文献   
12.
Combining accurate neural networks (NN) in the ensemble with negative error correlation greatly improves the generalization ability. Mixture of experts (ME) is a popular combining method which employs special error function for the simultaneous training of NN experts to produce negatively correlated NN experts. Although ME can produce negatively correlated experts, it does not include a control parameter like negative correlation learning (NCL) method to adjust this parameter explicitly. In this study, an approach is proposed to introduce this advantage of NCL into the training algorithm of ME, i.e., mixture of negatively correlated experts (MNCE). In this proposed method, the capability of a control parameter for NCL is incorporated in the error function of ME, which enables its training algorithm to establish better balance in bias-variance-covariance trade-off and thus improves the generalization ability. The proposed hybrid ensemble method, MNCE, is compared with their constituent methods, ME and NCL, in solving several benchmark problems. The experimental results show that our proposed ensemble method significantly improves the performance over the original ensemble methods.  相似文献   
13.
This paper presents a method of transferring voice using short messaging service in satellite communication system. The method is especially applicable in a situation where signal strength is low and voice call is not possible. In a tunnel, basement or environment with bad climate conditions, signal strength usually gets weak which make voice call difficult but SMS works in such situation. An application has been developed using J2ME language in order to test the proposed method. For experimentation, Thuraya SG-2520 satellite phone has been used.  相似文献   
14.
In this work,a degradable polyurethane composed of caprolactone(CL)and L-Lactide(LLA)as soft seg-ments,and 4,4'-methylenebis(cyclohexyl isocyanate)(H12MDI)and polytetramethylene ether glycol(PTMEG)as hard segments,was prepared.Hydrolytic degradation experiment revealed that the degrad-able polyurethane(PU)could be degraded in artificial seawater.It also showed that caprolactone-co-polyurethane(CL-PU)copolymer with higher crystallinity degraded much slower in artificial seawater.However,the introduction of LLA resulted in an increase in the hydrophilicity and reduction in the crys-tallinity of degradable PU,as demonstrated by the contact angle analysis.The result of the scanning elec-tron microscope showed that the surface of degradable PU renewed under static condition.Moreover,degradable PU was able to be used as a carrier,and it controlled the release rate of 4,5-dichloro-2-octyl-isothiazolone(DCOIT).The anti-diatom(Navicula incerta)test demonstrated that the(caprolactone-co-L-lactide)-co-polyurethane 4(CL/LAx-PU4)with DCOIT contents prevented the adhe-sion of diatom Navicula incerta(88.37%reduction)due to their self-polishing and the release of antifou-lants.Therefore,the degradable PU consisted of CL,LLA,and DCOIT could be a durable resin with good antifouling activity for the application in the marine anti-biofouling field.  相似文献   
15.
Coupling of side chain dynamics over long distances is an important component of allostery. Methionine side chains show the largest intrinsic flexibility among methyl-containing residues but the actual degree of conformational averaging depends on the proximity and mobility of neighboring residues. The 13C NMR chemical shifts of the methyl groups of methionine residues located at long distances in the same protein show a similar scaling with respect to the values predicted from the static X-ray structure by quantum methods. This results in a good linear correlation between calculated and observed chemical shifts. The slope is protein dependent and ranges from zero for the highly flexible calmodulin to 0.7 for the much more rigid calcineurin catalytic domain. The linear correlation is indicative of a similar level of side-chain conformational averaging over long distances, and the slope of the correlation line can be interpreted as an order parameter of the global side-chain flexibility.  相似文献   
16.
Composites of different natural fibers and polypropylene were prepared and their long‐term water absorption behaviors were studied. Wood flour, rice hulls, newsprint fibers, and kenaf fibers (at 25 and 50% by weight contents) were mixed with polypropylene and 1 and 2% compatibilizer, respectively. Water absorption tests were carried out on injection‐molded specimens at room temperature for 5 weeks. Measurements were made every week and water absorption was calculated. Water diffusion coefficients were also calculated by evaluating the water absorption isotherms. Results indicated a significant difference among different natural fibers, with kenaf fibers and newsprint fibers exhibiting the highest and wood flour and rice hulls the lowest water absorption values, respectively. The difference between 25 and 50% fiber contents for all composite formulations increased at longer immersion times. Water diffusion coefficients of the composites were found to be about 3 orders of magnitude higher than that of pure PP. © 2005 Wiley Periodicals, Inc. J Appl Polym Sci, 2006  相似文献   
17.
A web operating system is an operating system that users can access from any hardware at any location. A peer-to-peer (P2P) grid uses P2P communication for resource management and communication between nodes in a grid and manages resources locally in each cluster, and this provides a proper architecture for a web operating system. Use of semantic technology in web operating systems is an emerging field that improves the management and discovery of resources and services. In this paper, we propose PGSW-OS (P2P grid semantic Web OS), a model based on a P2P grid architecture and semantic technology to improve resource management in a web operating system through resource discovery with the aid of semantic features. Our approach integrates distributed hash tables (DHTs) and semantic overlay networks to enable semantic-based resource management by advertising resources in the DHT based upon their annotations to enable semantic-based resource matchmaking. Our model includes ontologies and virtual organizations. Our technique decreases the computational complexity of searching in a web operating system environment. We perform a simulation study using the Gridsim simulator, and our experiments show that our model provides enhanced utilization of resources, better search expressiveness, scalability, and precision.  相似文献   
18.
Computer analysis of visual art, especially paintings, is an interesting cross-disciplinary research domain. Most of the research in the analysis of paintings involve medium to small range datasets with own specific settings. Interestingly, significant progress has been made in the field of object and scene recognition lately. A key factor in this success is the introduction and availability of benchmark datasets for evaluation. Surprisingly, such a benchmark setup is still missing in the area of computational painting categorization. In this work, we propose a novel large scale dataset of digital paintings. The dataset consists of paintings from 91 different painters. We further show three applications of our dataset namely: artist categorization, style classification and saliency detection. We investigate how local and global features popular in image classification perform for the tasks of artist and style categorization. For both categorization tasks, our experimental results suggest that combining multiple features significantly improves the final performance. We show that state-of-the-art computer vision methods can correctly classify 50 % of unseen paintings to its painter in a large dataset and correctly attribute its artistic style in over 60 % of the cases. Additionally, we explore the task of saliency detection on paintings and show experimental findings using state-of-the-art saliency estimation algorithms.  相似文献   
19.
Importance sampling is a technique that is commonly used to speed up Monte Carlo simulation of rare events. However, little is known regarding the design of efficient importance sampling algorithms in the context of queueing networks. The standard approach, which simulates the system using an a priori fixed change of measure suggested by large deviation analysis, has been shown to fail in even the simplest network settings. Estimating probabilities associated with rare events has been a topic of great importance in queueing theory, and in applied probability at large. In this article, we analyse the performance of an importance sampling estimator for a rare event probability in a Jackson network. This article carries out strict deadlines to a two-node Jackson network with feedback whose arrival and service rates are modulated by an exogenous finite state Markov process. We have estimated the probability of network blocking for various sets of parameters, and also the probability of missing the deadline of customers for different loads and deadlines. We have finally shown that the probability of total population overflow may be affected by various deadline values, service rates and arrival rates.  相似文献   
20.
Recently, physical layer security commonly known as Radio Frequency (RF) fingerprinting has been proposed to provide an additional layer of security for wireless devices. A unique RF fingerprint can be used to establish the identity of a specific wireless device in order to prevent masquerading/impersonation attacks. In the literature, the performance of RF fingerprinting techniques is typically assessed using high-end (expensive) receiver hardware. However, in most practical situations receivers will not be high-end and will suffer from device specific impairments which affect the RF fingerprinting process. This paper evaluates the accuracy of RF fingerprinting employing low-end receivers. The vulnerability to an impersonation attack is assessed for a modulation-based RF fingerprinting system employing low-end commodity hardware (by legitimate and malicious users alike). Our results suggest that receiver impairment effectively decreases the success rate of impersonation attack on RF fingerprinting. In addition, the success rate of impersonation attack is receiver dependent.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号