首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3253篇
  免费   204篇
  国内免费   15篇
电工技术   61篇
综合类   6篇
化学工业   679篇
金属工艺   79篇
机械仪表   80篇
建筑科学   115篇
矿业工程   2篇
能源动力   208篇
轻工业   300篇
水利工程   37篇
石油天然气   78篇
无线电   429篇
一般工业技术   636篇
冶金工业   115篇
原子能技术   13篇
自动化技术   634篇
  2024年   5篇
  2023年   118篇
  2022年   175篇
  2021年   271篇
  2020年   182篇
  2019年   179篇
  2018年   223篇
  2017年   168篇
  2016年   175篇
  2015年   110篇
  2014年   138篇
  2013年   269篇
  2012年   177篇
  2011年   194篇
  2010年   136篇
  2009年   137篇
  2008年   103篇
  2007年   69篇
  2006年   78篇
  2005年   71篇
  2004年   51篇
  2003年   38篇
  2002年   37篇
  2001年   32篇
  2000年   25篇
  1999年   31篇
  1998年   36篇
  1997年   19篇
  1996年   19篇
  1995年   13篇
  1994年   17篇
  1993年   22篇
  1992年   19篇
  1991年   8篇
  1990年   8篇
  1989年   14篇
  1988年   15篇
  1987年   5篇
  1986年   10篇
  1985年   9篇
  1984年   6篇
  1983年   7篇
  1982年   6篇
  1981年   7篇
  1980年   6篇
  1979年   5篇
  1978年   8篇
  1977年   4篇
  1976年   7篇
  1974年   4篇
排序方式: 共有3472条查询结果,搜索用时 539 毫秒
71.
This survey investigates multipath routing protocols for mobile ad hoc networks (MANETs). The main objectives of multipath routing protocols are to provide reliable communication and to ensure load balancing as well as to improve quality of service (QoS) of MANETs. These multipath protocols are broadly classified into five categories based on their major goals. The goals are to improve delay, provide reliability, reduce overhead, maximize network life and support hybrid routing. Multipath routing protocols address issues such as multiple paths discovery and maintaining these paths. Issues, objectives, performances, advantages and disadvantages of these protocols are investigated and summarized. A checklist is provided as a guideline so that a network designer can choose an appropriate multipath routing protocol to meet the network's application objectives.  相似文献   
72.
Scenarios are possible future states of the world that represent alternative plausible conditions under different assumptions. Often, scenarios are developed in a context relevant to stakeholders involved in their applications since the evaluation of scenario outcomes and implications can enhance decision-making activities. This paper reviews the state-of-the-art of scenario development and proposes a formal approach to scenario development in environmental decision-making. The discussion of current issues in scenario studies includes advantages and obstacles in utilizing a formal scenario development framework, and the different forms of uncertainty inherent in scenario development, as well as how they should be treated. An appendix for common scenario terminology has been attached for clarity. Major recommendations for future research in this area include proper consideration of uncertainty in scenario studies in particular in relation to stakeholder relevant information, construction of scenarios that are more diverse in nature, and sharing of information and resources among the scenario development research community.  相似文献   
73.
Project-based learning is a student-centered comprehensive instructional approach where students collectively engage themselves in complex learning tasks. Recent advances in educational technologies have made student-centered learning in a technology rich environment both possible and feasible. This paper will report part of a larger study carried out at a school in the United States of America on the use ofconstructivism and technology in project-based learning. Data collection techniques included those typically associated with qualitative field research. In this paper, the technological infrastructure of the school and how technology is used in one of the project-based learning classes will be provided. Based on this study, some suggestions are also provided on how technology can be used in the context of other countries including in Malaysia.  相似文献   
74.
In this paper, load frequency control is performed for a two-area power system incorporating a high penetration of renewable energy sources. A droop controller for a type 3 wind turbine is used to extract the stored kinetic energy from the rotating masses during sudden load disturbances. An auxiliary storage controller is applied to achieve effective frequency response. The coot optimization algorithm (COA) is applied to allocate the optimum parameters of the fractional-order proportional integral derivative (FOPID), droop and auxiliary storage controllers. The fitness function is represented by the summation of integral square deviations in tie line power, and Areas 1 and 2 frequency errors. The robustness of the COA is proven by comparing the results with benchmarked optimizers including: atomic orbital search, honey badger algorithm, water cycle algorithm and particle swarm optimization. Performance assessment is confirmed in the following four scenarios: (i) optimization while including PID controllers; (ii) optimization while including FOPID controllers; (iii) validation of COA results under various load disturbances; and (iv) validation of the proposed controllers under varying weather conditions.  相似文献   
75.
Comprehensive analyses of the atomic structure using advanced analytical transmission electron microscopy-based methods combined with atom probe tomography confirm the presence of distinct glass–glass interfaces in a columnar Cu-Zr nanoglass synthesized by magnetron sputtering. These analyses provide first-time in-depth characterization of sputtered film nanoglasses and indicate that glass–glass interfaces indeed present an amorphous phase with reduced mass density as compared to the neighboring amorphous regions. Moreover, dedicated analyses of the diffusion kinetics by time-of-flight secondary ion mass spectroscopy (ToF SIMS) prove significantly enhanced diffusivity, suggesting fast transport along the low density glass–glass interfaces. The present results further indicate that sputter deposition is a feasible technique for reliable production of nanoglasses and that some of the concepts proposed for this new class of glassy materials are applicable.  相似文献   
76.
In this research, a modified fractional order proportional integral derivate (FOPID) control method is proposed for the photovoltaic (PV) and thermoelectric generator (TEG) combined hybrid renewable energy system. The faster tracking and steady-state output are aimed at the suggested maximum power point tracking (MPPT) control technique. The derivative order number (µ) value in the improved FOPID (also known as PIλDµ) control structure will be dynamically updated utilizing the value of change in PV array voltage output. During the transient, the value of µ is changeable; it’s one at the start and after reaching the maximum power point (MPP), allowing for strong tracking characteristics. TEG will use the freely available waste thermal energy created surrounding the PV array for additional power generation, increasing the system’s energy conversion efficiency. A high-gain DC-DC converter circuit is included in the system to maintain a high amplitude DC input voltage to the inverter circuit. The proposed approach’s performance was investigated using an extensive MATLAB software simulation and validated by comparing findings with the perturbation and observation (P&O) type MPPT control method. The study results demonstrate that the FOPID controller-based MPPT control outperforms the P&O method in harvesting the maximum power achievable from the PV-TEG hybrid source. There is also a better control action and a faster response.  相似文献   
77.
78.
Internet Protocol version 6 (IPv6) is the latest version of IP that goal to host 3.4 × 1038 unique IP addresses of devices in the network. IPv6 has introduced new features like Neighbour Discovery Protocol (NDP) and Address Auto-configuration Scheme. IPv6 needed several protocols like the Address Auto-configuration Scheme and Internet Control Message Protocol (ICMPv6). IPv6 is vulnerable to numerous attacks like Denial of Service (DoS) and Distributed Denial of Service (DDoS) which is one of the most dangerous attacks executed through ICMPv6 messages that impose security and financial implications. Therefore, an Intrusion Detection System (IDS) is a monitoring system of the security of a network that detects suspicious activities and deals with a massive amount of data comprised of repetitive and inappropriate features which affect the detection rate. A feature selection (FS) technique helps to reduce the computation time and complexity by selecting the optimum subset of features. This paper proposes a method for detecting DDoS flooding attacks (FA) based on ICMPv6 messages using a Binary Flower Pollination Algorithm (BFPA-FA). The proposed method (BFPA-FA) employs FS technology with a support vector machine (SVM) to identify the most relevant, influential features. Moreover, The ICMPv6-DDoS dataset was used to demonstrate the effectiveness of the proposed method through different attack scenarios. The results show that the proposed method BFPA-FA achieved the best accuracy rate (97.96%) for the ICMPv6 DDoS detection with a reduced number of features (9) to half the total (19) features. The proven proposed method BFPA-FA is effective in the ICMPv6 DDoS attacks via IDS.  相似文献   
79.
Magnetic Resonance Materials in Physics, Biology and Medicine - Signal intensity normalization is necessary to reduce heterogeneity in T2-weighted (T2W) magnetic resonance imaging (MRI) for...  相似文献   
80.
Due to the complexity of blockchain technology, it usually costs too much effort to build, maintain and monitor a blockchain system that supports a targeted application. To this end, the emerging “Blockchain as a Service” (BaaS) makes the blockchain and distributed ledgers more accessible, particularly for businesses, by reducing costs and overheads. BaaS combines the high computing power of cloud computing, the pervasiveness of IoT and the decentralization of blockchain, allowing people to build their own applications while ensuring the transparency and openness of the system. This paper surveys the research outputs of both academia and industry. First, it introduces the representative architectures of BaaS systems and then summarizes the research contributions of BaaS from the technologies for service provision, roles, container and virtualization, interfaces, customization and evaluation. The typical applications of BaaS in both academic and practical domains are also introduced. At present, the research on the blockchain is abundant, but research on BaaS is still in its infancy. Six challenges of BaaS are concluded in this paper for further study directions.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号