首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2449篇
  免费   121篇
  国内免费   14篇
电工技术   28篇
综合类   9篇
化学工业   544篇
金属工艺   75篇
机械仪表   91篇
建筑科学   79篇
矿业工程   8篇
能源动力   220篇
轻工业   390篇
水利工程   20篇
石油天然气   24篇
无线电   150篇
一般工业技术   503篇
冶金工业   97篇
原子能技术   37篇
自动化技术   309篇
  2024年   8篇
  2023年   42篇
  2022年   77篇
  2021年   104篇
  2020年   105篇
  2019年   99篇
  2018年   133篇
  2017年   127篇
  2016年   114篇
  2015年   78篇
  2014年   93篇
  2013年   236篇
  2012年   155篇
  2011年   166篇
  2010年   121篇
  2009年   150篇
  2008年   160篇
  2007年   114篇
  2006年   83篇
  2005年   62篇
  2004年   46篇
  2003年   41篇
  2002年   26篇
  2001年   16篇
  2000年   19篇
  1999年   18篇
  1998年   35篇
  1997年   18篇
  1996年   11篇
  1995年   6篇
  1994年   8篇
  1993年   13篇
  1992年   14篇
  1991年   13篇
  1990年   8篇
  1989年   6篇
  1988年   4篇
  1987年   7篇
  1986年   10篇
  1985年   7篇
  1984年   6篇
  1983年   2篇
  1982年   4篇
  1981年   6篇
  1979年   3篇
  1977年   1篇
  1976年   3篇
  1975年   1篇
  1974年   1篇
  1973年   3篇
排序方式: 共有2584条查询结果,搜索用时 15 毫秒
41.
The Internet of Things (IoT) has gained more popularity in research because of its large-scale challenges and implementation. But security was the main concern when witnessing the fast development in its applications and size. It was a dreary task to independently set security systems in every IoT gadget and upgrade them according to the newer threats. Additionally, machine learning (ML) techniques optimally use a colossal volume of data generated by IoT devices. Deep Learning (DL) related systems were modelled for attack detection in IoT. But the current security systems address restricted attacks and can be utilized outdated datasets for evaluations. This study develops an Artificial Algae Optimization Algorithm with Optimal Deep Belief Network (AAA-ODBN) Enabled Ransomware Detection in an IoT environment. The presented AAA-ODBN technique mainly intends to recognize and categorize ransomware in the IoT environment. The presented AAA-ODBN technique follows a three-stage process: feature selection, classification, and parameter tuning. In the first stage, the AAA-ODBN technique uses AAA based feature selection (AAA-FS) technique to elect feature subsets. Secondly, the AAA-ODBN technique employs the DBN model for ransomware detection. At last, the dragonfly algorithm (DFA) is utilized for the hyperparameter tuning of the DBN technique. A sequence of simulations is implemented to demonstrate the improved performance of the AAA-ODBN algorithm. The experimental values indicate the significant outcome of the AAA-ODBN model over other models.  相似文献   
42.
Biomedical image processing is widely utilized for disease detection and classification of biomedical images. Tongue color image analysis is an effective and non-invasive tool for carrying out secondary detection at anytime and anywhere. For removing the qualitative aspect, tongue images are quantitatively inspected, proposing a novel disease classification model in an automated way is preferable. This article introduces a novel political optimizer with deep learning enabled tongue color image analysis (PODL-TCIA) technique. The presented PODL-TCIA model purposes to detect the occurrence of the disease by examining the color of the tongue. To attain this, the PODL-TCIA model initially performs image pre-processing to enhance medical image quality. Followed by, Inception with ResNet-v2 model is employed for feature extraction. Besides, political optimizer (PO) with twin support vector machine (TSVM) model is exploited for image classification process, shows the novelty of the work. The design of PO algorithm assists in the optimal parameter selection of the TSVM model. For ensuring the enhanced outcomes of the PODL-TCIA model, a wide-ranging experimental analysis was applied and the outcomes reported the betterment of the PODL-TCIA model over the recent approaches.  相似文献   
43.
44.
45.
In this study, the rheological and conventional properties of binders prepared with crumb rubber (CR) and FT-paraffin were compared to styrene-butadiene-styrene (SBS)-modified binders’ properties. The objective of this study was to determine which modified binders in different combinations of the CR and the FT-paraffin exhibited better performance than the SBS-modified binders, in terms of conventional and rheological properties. Results showed that the additives exhibited different performances for different types of tests. Many of the combinations including the common usage of the CR and the FT-paraffin performed better at high temperature than the SBS modification. Overall, the test results show that the binders prepared by 6% CR with 3 and 4% FT-paraffin and those prepared with 8% CR with 3% FT-paraffin were better binders than the 4% SBS-modified binder, in terms of low and high temperature properties.  相似文献   
46.
Materials forming sand grains and colluvial soil deposits have a distinct structure, consisting of a composite matrix of coarse and fine soil grains. The influence of sand grains content on the behaviour of sand–clay mixtures was investigated by a series of intensive laboratory experiments. The California bearing ratio (CBR), unconfined compression strength (UCS) and compaction tests were carried out on various contents of sand and clay mixtures. The sand–clay mixtures were prepared with sand contents of 0, 10, 20, 30, 40, and 50% by weight. The laboratory tests on these mixtures have indicated that their behaviour will depend on the relative concentration of the sand and clay samples. The results of the tests showed a decrease in the UCS, and an increase the CBR values with an increase in the amount of sand. An increase in dry unit weight and a decrease in respective moisture content by an increase in the amount of sand were observed in the compaction tests.  相似文献   
47.
48.
49.
The number of mobile devices accessing wireless networks is skyrocketing due to the rapid advancement of sensors and wireless communication technology. In the upcoming years, it is anticipated that mobile data traffic would rise even more. The development of a new cellular network paradigm is being driven by the Internet of Things, smart homes, and more sophisticated applications with greater data rates and latency requirements. Resources are being used up quickly due to the steady growth of smartphone devices and multimedia apps. Computation offloading to either several distant clouds or close mobile devices has consistently improved the performance of mobile devices. The computation latency can also be decreased by offloading computing duties to edge servers with a specific level of computing power. Device-to-device (D2D) collaboration can assist in processing small-scale activities that are time-sensitive in order to further reduce task delays. The task offloading performance is drastically reduced due to the variation of different performance capabilities of edge nodes. Therefore, this paper addressed this problem and proposed a new method for D2D communication. In this method, the time delay is reduced by enabling the edge nodes to exchange data samples. Simulation results show that the proposed algorithm has better performance than traditional algorithm.  相似文献   
50.
Recently, many applications have used Peer-to-Peer (P2P) systems to overcome the current problems with client/server systems such as non-scalability, high bandwidth requirement and single point of failure. In this paper, we propose an efficient scheme to support efficient range query processing over structured P2P systems, while balancing both the storage load and access load. The paper proposes a rotating token scheme to balance the storage load by placing joining nodes in appropriate locations in the identifier space to share loads with already overloaded nodes. Then, to support range queries, we utilize an order-preserving mapping function to map keys to nodes in order preserving way and without hashing. This may result in an access load imbalance due to non-uniform distribution of keys in the identifier space. Thus, we propose an adaptive replication scheme to relieve overloaded nodes by shedding some load on other nodes to balance the access load. We derive a formula for estimating the overhead of the proposed adaptive replication scheme. In this study, we carry simulation experiments with synthetic data to measure the performance of the proposed schemes. Our simulation experiments show significant gains in both storage load balancing and access load balancing.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号