首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   57961篇
  免费   8181篇
  国内免费   7995篇
电工技术   986篇
技术理论   3篇
综合类   4336篇
化学工业   1116篇
金属工艺   489篇
机械仪表   1467篇
建筑科学   396篇
矿业工程   195篇
能源动力   1135篇
轻工业   309篇
水利工程   74篇
石油天然气   89篇
武器工业   92篇
无线电   9923篇
一般工业技术   2806篇
冶金工业   244篇
原子能技术   138篇
自动化技术   50339篇
  2024年   317篇
  2023年   1400篇
  2022年   2586篇
  2021年   2983篇
  2020年   2891篇
  2019年   2363篇
  2018年   2584篇
  2017年   3938篇
  2016年   4290篇
  2015年   3814篇
  2014年   5485篇
  2013年   4783篇
  2012年   5779篇
  2011年   5439篇
  2010年   4528篇
  2009年   4606篇
  2008年   3466篇
  2007年   3461篇
  2006年   2672篇
  2005年   1523篇
  2004年   696篇
  2003年   648篇
  2002年   656篇
  2001年   621篇
  2000年   393篇
  1999年   412篇
  1998年   195篇
  1997年   178篇
  1996年   182篇
  1995年   129篇
  1994年   160篇
  1993年   115篇
  1992年   110篇
  1991年   110篇
  1990年   82篇
  1989年   91篇
  1988年   174篇
  1987年   31篇
  1986年   27篇
  1985年   32篇
  1984年   34篇
  1983年   23篇
  1982年   27篇
  1981年   16篇
  1980年   11篇
  1979年   19篇
  1978年   18篇
  1977年   18篇
  1975年   7篇
  1974年   5篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
81.
Every year, the rate at which technology is applied on areas of our everyday life is increasing at a steady pace. This rapid development drives the technology companies to design and fabricate their integrated circuits (ICs) in non-trustworthy outsourcing foundries to reduce the cost, thus, leaving space for a synchronous form of virus, known as Hardware Trojan (HT), to be developed. HTs leak encrypted information, degrade device performance or lead to total destruction. To reduce the risks associated with these viruses, various approaches have been developed aiming to prevent and detect them, based on conventional or machine learning methods. Ideally, any undesired modification made to an IC should be detectable by pre-silicon verification/simulation and post-silicon testing. The infected circuit can be inserted in different stages of the manufacturing process, rendering the detection of HTs a complicated procedure. In this paper, we present a comprehensive review of research dedicated to countermeasures against HTs embedded into ICs. The literature is grouped in four main categories; (a) conventional HT detection approaches, (b) machine learning for HT countermeasures, (c) design for security and (d) runtime monitor.  相似文献   
82.
We study a two-stage stochastic and nonlinear optimization model for operating a power grid exposed to a natural disaster. Although this approach can be generalized to any natural hazard of continuous (and not instantaneous) nature, our focus is on wildfires. We assume that an approaching wildfire impacts the power grid by reducing the transmission capacity of its overhead lines. At the time when proactive decisions have to be taken, the severity of the wildfire is not known. This introduces uncertainty. In this paper, we extend previous work by more realistically capturing this uncertainty and by strengthening the mathematical programming formulation through standard reformulation techniques. With these reformulation techniques, the resulting two-stage, convex mixed-integer quadratically constrained programming formulation can be efficiently solved using commercial quadratic programming solvers as demonstrated on a case study on a modified version of the IEEE 123-bus test system with 100 scenarios. We also quantify the uncertainties through a second case study using the following three standard metrics of two-stage stochastic optimization: the expected value of perfect information, the expected result of using the expected value solution and the value of the stochastic solution.  相似文献   
83.
In order to perform multi-dimensional data aggregation operations efficiently in edge computing-based Internet of things (IoT) systems, a new efficient privacy-preserving multi-dimensional data aggregation (EPMDA) scheme is proposed in this paper. EPMDA scheme is characterized by employing the homomorphic Paillier encryption and SM9 signature algorithm. To improve the computation efficiency of the Paillier encryption operation, EPMDA scheme generates a pre-computed modular exponentiation table of each dimensional data,and the Paillier encryption operation can be implemented by using only several modular multiplications. For the multi-dimensional data, the scheme concatenates zeros between two adjacent dimensional data to avoid data overflow in the sum operation of ciphertexts. To enhance security, EPMDA scheme sets random number at the high address of the exponent. Moreover, the scheme utilizes SM9 signature scheme to guarantee device authentication and data integrity. The performance evaluation and comparison show that EPMDA scheme is more efficient than the existing multi-dimensional data aggregation schemes.  相似文献   
84.
Yaw control systems orientate the rotor of a wind turbine into the wind direction, optimize the wind power generated by wind turbines and alleviate the mechanical stresses on a wind turbine. Regarding the advantages of yaw control systems, a k-nearest neighbor classifier (k-NN) has been developed in order to forecast the yaw position parameter at 10-min intervals in this study. Air temperature, atmosphere pressure, wind direction, wind speed, rotor speed and wind power parameters are used in 2, 3, 4, 5 and 6-dimensional input spaces. The forecasting model using Manhattan distance metric for k = 3 uncovered the most accurate performance for atmosphere pressure, wind direction, wind speed and rotor speed inputs. However, the forecasting model using Euclidean distance metric for k = 1 brought out the most inconsistent results for atmosphere pressure and wind speed inputs. As a result of multi-tupled analyses, many feasible inferences were achieved for yaw position control systems. In addition, the yaw position forecasting model developed was compared with the persistence model and it surpassed the persistence model significantly in terms of the improvement percent.  相似文献   
85.
Sleep modes are widely accepted as an effective technique for energy-efficient networking: by adequately putting to sleep and waking up network resources according to traffic demands, a proportionality between energy consumption and network utilization can be approached, with important reductions in energy consumption. Previous studies have investigated and evaluated sleep modes for wireless access networks, computing variable percentages of energy savings. In this paper we characterize the maximum energy saving that can be achieved in a cellular wireless access network under a given performance constraint. In particular, our approach allows the derivation of realistic estimates of the energy-optimal density of base stations corresponding to a given user density, under a fixed performance constraint. Our results allow different sleep mode proposals to be measured against the maximum theoretically achievable improvement. We show, through numerical evaluation, the possible energy savings in today’s networks, and we further demonstrate that even with the development of highly energy-efficient hardware, a holistic approach incorporating system level techniques is essential to achieving maximum energy efficiency.  相似文献   
86.
87.
《Ceramics International》2019,45(13):16166-16172
Cr2O3 is a well-known corrosion resistant oxide used in refractory applications. However, it can oxidize into toxic and water-soluble Cr(VI) compounds upon reaction with calcium aluminate cement phases in the presence of oxygen, which subsequently causes disposal problems after use. This study describes the extent to which chromium in the spinel Mg(Al,Cr)2O4 phase can be oxidized to Cr(VI) when it reacts with the calcium aluminate cement phases C12A7, CA, CA2 and free CaO at 1300 °C in air, using XRD, XPS and leaching tests (TRGS 613 standard) as analytical tools. On reaction with CaO, the Mg(Al,CrIII)2O4 spinel mainly transformed into hauyne (Ca4Al6CrVIO16) and Ca5Cr3O12 which contains both Cr(IV) and Cr(VI). The reaction of C12A7 and CA with the spinel phase also resulted in the formation of Ca4Al6CrO16. Conversely, the reaction of Mg(Al,CrIII)2O4 spinel with CA2 resulted in the formation of only a trace amount of Cr(VI). Water-soluble Cr(VI) leached in large quantities (>100 mg/L) from samples where the Mg(Al,CrIII)2O4 reacted with either C12A7 or CA. Almost no Cr(VI) leached from the sample when Mg(Al,CrIII)2O4 reacted with CaO, using the standard TRGS 613 leach test, but a significant amount of Cr(VI) was released into solution when leached with a HCl solution for 12 h. Both Cr(IV) and Cr(VI) present in the Ca5Cr3O12 dissolved into acidic solution. Only a small amount of Cr(VI) leached from the sample that resulted when spinel was reacted with CA2, even after a prolonged HCl leach. Cr(III) in spinel Mg(Al,Cr)2O4 is very stable and does not leach in either distilled water or acidic solution.  相似文献   
88.
Machine Learning - We propose a set of highly scalable algorithms for the combinatorial data analysis problem of seriating similarity matrices. Seriation consists of finding a permutation of data...  相似文献   
89.
相似用户挖掘是提高社交网络服务质量的重要途径,在面向大数据的社交网络时代,准确的相似用户挖掘对于用户和互联网企业等都有重要的意义,而根据用户自己的兴趣话题挖掘的相似用户更符合相似用户的要求。提出了一种基于用户兴趣话题进行相似用户挖掘的方法。该方法首先使用TextRank话题提取方法对用户进行兴趣话题提取,再对用户发表内容进行训练,计算出所有词之间的相似度。提出CP(Corresponding Position similarity)、CPW(Corresponding Position Weighted similarity)、AP(All Position similarity)、APW(All Position Weighted similarity)四种用户兴趣话题词相似度计算方法,通过用户和相似用户间关注、粉丝重合率验证相似用户挖掘效果,APW similarity的相似用户的关注/粉丝重合百分比为1.687%,优于提出的其他三种算法,分别提高了26.3%、2.8%、12.4%,并且比传统的文本相似度方法Jaccard相似度、编辑距离算法、余弦相似度分别提高了20.4%、21.2%、45.0%。因此APW方法可以更加有效地挖掘出用户的相似用户。  相似文献   
90.
Liu  Song  Cui  Yuan-Zhen  Zou  Nian-Jun  Zhu  Wen-Hao  Zhang  Dong  Wu  Wei-Guo 《计算机科学技术学报》2019,34(2):456-475
Journal of Computer Science and Technology - DOACROSS loops are significant parts in many important scientific and engineering applications, which are generally exploited pipeline/wave-front...  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号