首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3776篇
  免费   162篇
  国内免费   16篇
电工技术   32篇
综合类   4篇
化学工业   1105篇
金属工艺   82篇
机械仪表   114篇
建筑科学   49篇
矿业工程   5篇
能源动力   154篇
轻工业   291篇
水利工程   21篇
石油天然气   15篇
无线电   334篇
一般工业技术   801篇
冶金工业   260篇
原子能技术   33篇
自动化技术   654篇
  2024年   9篇
  2023年   50篇
  2022年   119篇
  2021年   158篇
  2020年   122篇
  2019年   126篇
  2018年   157篇
  2017年   140篇
  2016年   123篇
  2015年   92篇
  2014年   166篇
  2013年   457篇
  2012年   168篇
  2011年   177篇
  2010年   173篇
  2009年   157篇
  2008年   175篇
  2007年   128篇
  2006年   116篇
  2005年   94篇
  2004年   78篇
  2003年   68篇
  2002年   67篇
  2001年   51篇
  2000年   54篇
  1999年   50篇
  1998年   79篇
  1997年   53篇
  1996年   47篇
  1995年   31篇
  1994年   51篇
  1993年   33篇
  1992年   38篇
  1991年   23篇
  1990年   36篇
  1989年   32篇
  1988年   18篇
  1987年   22篇
  1986年   19篇
  1985年   25篇
  1984年   21篇
  1983年   30篇
  1982年   17篇
  1981年   15篇
  1980年   20篇
  1979年   15篇
  1978年   16篇
  1977年   7篇
  1976年   6篇
  1974年   6篇
排序方式: 共有3954条查询结果,搜索用时 31 毫秒
71.
An Architectural Framework for Accurate Characterization of Network Traffic   总被引:1,自引:0,他引:1  
In networks carrying large volume of traffic, accurate traffic characterization is necessary for understanding the dynamics and patterns of network resource usage. Previous approaches to flow characterization are based on random sampling of the packets (e.g., Cisco's NetFlow) or inferring characteristics solely based on long lived flows (LLFs) or on lossy data structures (e.g., bloom filters, hash tables). However, none of these approaches takes into account the heavy-tailed nature of the Internet traffic and separates the estimation algorithm from the flow measurement architecture.In this paper, we propose an alternate approach to traffic characterization by closely linking the flow measurement architecture with the estimation algorithm. Our measurement framework stores complete information related to short lived flows (SLFs) while collecting partial information related to LLFs. For real-time separation of LLFs and SLFs, we propose a novel algorithm based on typical sequences from Information theory. The distribution (pdf) and sample space of the underlying traffic is estimated using the non-parametric Parzen window technique and likelihood function defined over the Coupon collector problem. We validate the accuracy and performance of our estimation technique using traffic traces from the internal LAN in our laboratory and from National Library for Applied Network Research (NLANR).  相似文献   
72.
A phenomenal growth in the number of credit card transactions, especially for online purchases, has recently led to a substantial rise in fraudulent activities. Implementation of efficient fraud detection systems has thus become imperative for all credit card issuing banks to minimize their losses. In real life, fraudulent transactions are interspersed with genuine transactions and simple pattern matching is not often sufficient to detect them accurately. Thus, there is a need for combining both anomaly detection as well as misuse detection techniques. In this paper, we propose to use two-stage sequence alignment in which a profile analyzer (PA) first determines the similarity of an incoming sequence of transactions on a given credit card with the genuine cardholder's past spending sequences. The unusual transactions traced by the profile analyzer are next passed on to a deviation analyzer (DA) for possible alignment with past fraudulent behavior. The final decision about the nature of a transaction is taken on the basis of the observations by these two analyzers. In order to achieve online response time for both PA and DA, we suggest a new approach for combining two sequence alignment algorithms BLAST and SSAHA.  相似文献   
73.
A polygonP is said to be apalm polygon if there exists a pointxP such that the Euclidean shortest path fromx to any pointyP makes only left turns or only right turns. The set of all such pointsx is called thepalm kernel. In this paper we propose an O(E) time algorithm for recognizing a palm polygonP, whereE is the size of the visibility graph ofP. The algorithm recognizes the given polygonP as a palm polygon by computing the palm kernel ofP. If the palm kernel is not empty,P is a palm polygon.The extended abstract of this paper was reported at the Second Canadian Conference in Computational Geometry, pp. 246–251, 1990  相似文献   
74.
A connectionist system has been designed for learning and simultaneous recognition of flat industrial objects (based an the concepts of conventional and structured connectionist computing) by integrating the psychological hypotheses with the generalized Hough transform technique. The psychological facts include the evidence of separation of two regions for identification ("what it is") and pose estimation ("where it is"). The system uses the mechanism of selective attention for initial hypotheses generation. A special two-stage training paradigm has been developed for learning the structural relationships between the features and objects and the importance values of the features with respect to the objects. The performance of the system has been demonstrated on real-life data both for single and mixed (overlapped) instances of object categories. The robustness of the system with respect to noise and false alarming has been theoretically investigated.  相似文献   
75.
For a long time, legal entities have developed and used crime prediction methodologies. The techniques are frequently updated based on crime evaluations and responses from scientific communities. There is a need to develop type-based crime prediction methodologies that can be used to address issues at the subgroup level. Child maltreatment is not adequately addressed because children are voiceless. As a result, the possibility of developing a model for predicting child abuse was investigated in this study. Various exploratory analysis methods were used to examine the city of Chicago’s child abuse events. The data set was balanced using the Borderline-SMOTE technique, and then a stacking classifier was employed to ensemble multiple algorithms to predict various types of child abuse. The proposed approach successfully predicted crime types with 93% of accuracy, precision, recall, and F1-Score. The AUC value of the same was 0.989. However, when compared to the Extra Trees model (17.55), which is the second best, the proposed model’s execution time was significantly longer (476.63). We discovered that Machine Learning methods effectively evaluate the demographic and spatial-temporal characteristics of the crimes and predict the occurrences of various subtypes of child abuse. The results indicated that the proposed Borderline-SMOTE enabled Stacking Classifier model (BS-SC Model) would be effective in the real-time child abuse prediction and prevention process.  相似文献   
76.
Wireless Personal Communications - Everyone today actively uses online social networks to get in touch with their friends, for career opportunities, and business also. Some of the most popular...  相似文献   
77.
Mobile Networks and Applications - In the era of Internet of Things (IoT) powered by 5G technologies, Automobile Industry is headed towards a revolution. In Intelligent Transport Systems (ITS),...  相似文献   
78.
International Journal of Wireless Information Networks - In this work, energy efficient routing protocol variants considering different sink mobility in hierarchical cluster based wireless sensor...  相似文献   
79.
The Journal of Supercomputing - This study offers a neural network-based deep learning method for energy optimization modeling in electric vehicles (EV). The pre-processed driving cycle is...  相似文献   
80.
A vendor-managed inventory (VMI) relationship between a downstream retailer and an upstream vendor consists of two distinct components: (i) information sharing (IS) and (ii) a shift in decision-making responsibility. This study compares these two components of VMI in a two-stage serial supply chain based on the ‘static uncertainty’ strategy under dynamic and random demand with fill rate constraints. Numerical experiments are conducted using analytical models to identify the conditions where the incremental value of VMI over IS is significant. The results provide guidelines relevant to academia and supply chain practitioners in taking VMI adoption decision above and beyond IS according to their specific business environment.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号