首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   618篇
  免费   36篇
  国内免费   69篇
电工技术   4篇
综合类   5篇
化学工业   48篇
金属工艺   7篇
机械仪表   8篇
建筑科学   4篇
矿业工程   2篇
能源动力   29篇
轻工业   9篇
水利工程   3篇
石油天然气   3篇
无线电   45篇
一般工业技术   41篇
原子能技术   1篇
自动化技术   514篇
  2024年   2篇
  2023年   13篇
  2022年   33篇
  2021年   41篇
  2020年   61篇
  2019年   33篇
  2018年   40篇
  2017年   84篇
  2016年   77篇
  2015年   33篇
  2014年   57篇
  2013年   19篇
  2012年   31篇
  2011年   23篇
  2010年   20篇
  2009年   38篇
  2008年   11篇
  2007年   19篇
  2006年   13篇
  2005年   11篇
  2004年   6篇
  2003年   8篇
  2002年   12篇
  2001年   11篇
  2000年   7篇
  1999年   6篇
  1998年   3篇
  1997年   6篇
  1996年   4篇
  1995年   1篇
排序方式: 共有723条查询结果,搜索用时 15 毫秒
1.
Mobile Networks and Applications - 5G/6G communication are first generation high speed wireless communication network which integrates the aerial data, terrestrial data and maritime data via...  相似文献   
2.
This work is devoted to the stress–strain state of isotropic double curved shell with defect system. The construction is weakened by two non-through thickness (internal) cracks of different length and by a circular hole located between cracks. In this study we use the line-spring model. Within the framework of this model cracks are modeled as mathematical cuts of shell’s middle surface. This leads to a two-dimensional problem. The problem is reduced to a system of eight boundary integral equations. To ensure the uniqueness of solution an additional equation is added. In the numerical solution of the problem special quadrature formulas for singular integrals of Cauchy type and the finite difference method are applied. The influence of defects on each other for double curved shell has been investigated. The given theoretical results can be used for the calculation of structural elements with holes, cracks on the strength and fracture toughness in various branches of engineering.  相似文献   
3.
We present a new algorithm, called MCS-M, for computing minimal triangulations of graphs. Lex-BFS, a seminal algorithm for recognizing chordal graphs, was the genesis for two other classical algorithms: LEX M and MCS. LEX M extends the fundamental concept used in Lex-BFS, resulting in an algorithm that not only recognizes chordality, but also computes a minimal triangulation of an arbitrary graph. MCS simplifies the fundamental concept used in Lex-BFS, resulting in a simpler algorithm for recognizing chordal graphs. The new algorithm MCS-M combines the extension of LEX M with the simplification of MCS, achieving all the results of LEX M in the same time complexity.  相似文献   
4.
In order to guarantee security and privacy of sensitive data, attribute-based keyword search (ABKS) enables data owners to upload their encrypted data to cloud servers, and authorizes intended data users to retrieve it. Meanwhile, ABKS outsources heavy search work to cloud servers, which makes ABKS adaptive to mobile computing environment. However, as cloud servers can both generate keyword ciphertexts and run search algorithm, the existing most ABKS schemes are vulnerable to keyword guessing attack. In this paper, we show the fundamental cause that the existing ABKS schemes do not resist keyword guessing attack is any entity can generate keyword ciphertext. To solve the above problem, in the phase of keyword ciphertext generation, we use private key of data owner to sign keyword prior to generating keyword ciphertext. Therefore, any other entity does not forge keyword ciphertext, which can resist keyword guessing attack. We give the formal definition and security model of attributed-based keyword search secure against keyword guessing attack (ABKS-SKGA). Furthermore, we provide an ABKS-SKGA scheme. The ABKS-SKGA scheme is proved secure against chosen-plaintext attack (CPA). Performance analysis shows that the proposed scheme is practical.  相似文献   
5.
Neural Computing and Applications - Lung cancer is a deadly disease if not diagnosed in its early stages. However, early detection of lung cancer is a challenging task due to the shape and size of...  相似文献   
6.
提出结构扩展的非负矩阵分解社区发现算法(nonnegative matrix factorization with structure extension, NMF-SE),通过结构扩展,加强相邻节点结构相似性,提高节点间连接的稠密度,从而提高非负矩阵分解在社区发现中的表现。结构扩展过程使节点将自身结构以一定的比例传递给周围的节点,从而使相邻节点间能够得到对方的拓扑结构信息。该过程构造了新的特征矩阵,使非负矩阵分解(nonnegative matrix factorization, NMF)更好地适用于社区发现,在图正则化的半监督任务中能更好地融合先验信息。在人工网络和真实网络上进行试验验证的结果表明,NMF-SE算法有效提高了复杂网络社区发现的准确性。  相似文献   
7.
The study of criminal networks using traces from heterogeneous communication media is acquiring increasing importance in nowadays society. The usage of communication media such as mobile phones and online social networks leaves digital traces in the form of metadata that can be used for this type of analysis. The goal of this work is twofold: first we provide a theoretical framework for the problem of detecting and characterizing criminal organizations in networks reconstructed from phone call records. Then, we introduce an expert system to support law enforcement agencies in the task of unveiling the underlying structure of criminal networks hidden in communication data. This platform allows for statistical network analysis, community detection and visual exploration of mobile phone network data. It enables forensic investigators to deeply understand hierarchies within criminal organizations, discovering members who play central role and provide connection among sub-groups. Our work concludes illustrating the adoption of our computational framework for a real-word criminal investigation.  相似文献   
8.
9.
Users are inclined to share sensitive data in a remote server if no strong security mechanism is in place. Searchable encryption satisfies the need of users to execute a search encrypted data. Previous searchable encryption methods such as “public key encryption with keyword search (PEKS)” restricted the data access to certain users, because only the assigned users were able to search the encrypted data. In this paper we will discuss the relation between Attribute Based Encryption (ABE) and searchable encryption and define a weak anonymity of the ABE scheme, named “attribute privacy”. With this weak anonymity, we propose a general transformation from ABE to Attribute Based Encryption with Keyword Search (ABEKS) and a concrete attribute private key-policy ABE (KP-ABE) scheme. We present an ABEKS scheme based on this KP-ABE scheme and permit multi-users to execute a flexible search on the remote encrypted data.  相似文献   
10.

With the increasing number of electricity consumers, production, distribution, and consumption problems of produced energy have appeared. This paper proposed an optimization method to reduce the peak demand using smart grid capabilities. In the proposed method, a hybrid Grasshopper Optimization Algorithm (GOA) with the self-adaptive Differential Evolution (DE) is used, called HGOA. The proposed method takes advantage of the global and local search strategies from Differential Evolution and Grasshopper Optimization Algorithm. Experimental results are applied in two scenarios; the first scenario has universal inputs and several appliances. The second scenario has an expanded number of appliances. The results showed that the proposed method (HGOA) got better power scheduling arrangements and better performance than other comparative algorithms using the classical benchmark functions. Moreover, according to the computational time, it runs in constant execution time as the population is increased. The proposed method got 0.26?% enhancement compared to the other methods. Finally, we found that the proposed HGOA always got better results than the original method in the worst cases and the best cases.

  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号