首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   19755篇
  免费   2964篇
  国内免费   2371篇
电工技术   1838篇
技术理论   4篇
综合类   1576篇
化学工业   307篇
金属工艺   190篇
机械仪表   754篇
建筑科学   324篇
矿业工程   209篇
能源动力   168篇
轻工业   465篇
水利工程   312篇
石油天然气   223篇
武器工业   168篇
无线电   3757篇
一般工业技术   724篇
冶金工业   123篇
原子能技术   94篇
自动化技术   13854篇
  2024年   56篇
  2023年   422篇
  2022年   636篇
  2021年   770篇
  2020年   841篇
  2019年   653篇
  2018年   588篇
  2017年   777篇
  2016年   910篇
  2015年   1146篇
  2014年   1802篇
  2013年   1563篇
  2012年   1878篇
  2011年   1792篇
  2010年   1213篇
  2009年   1186篇
  2008年   1397篇
  2007年   1495篇
  2006年   1125篇
  2005年   1096篇
  2004年   840篇
  2003年   672篇
  2002年   466篇
  2001年   343篇
  2000年   277篇
  1999年   214篇
  1998年   144篇
  1997年   128篇
  1996年   133篇
  1995年   119篇
  1994年   101篇
  1993年   60篇
  1992年   62篇
  1991年   36篇
  1990年   27篇
  1989年   21篇
  1988年   32篇
  1987年   10篇
  1986年   10篇
  1985年   6篇
  1984年   5篇
  1983年   7篇
  1982年   5篇
  1981年   3篇
  1980年   7篇
  1979年   3篇
  1978年   2篇
  1977年   5篇
  1976年   2篇
  1972年   2篇
排序方式: 共有10000条查询结果,搜索用时 62 毫秒
11.
Edge Computing is one of the radically evolving systems through generations as it is able to effectively meet the data saving standards of consumers, providers and the workers. Requisition for Edge Computing based items have been increasing tremendously. Apart from the advantages it holds, there remain lots of objections and restrictions, which hinders it from accomplishing the need of consumers all around the world. Some of the limitations are constraints on computing and hardware, functions and accessibility, remote administration and connectivity. There is also a backlog in security due to its inability to create a trust between devices involved in encryption and decryption. This is because security of data greatly depends upon faster encryption and decryption in order to transfer it. In addition, its devices are considerably exposed to side channel attacks, including Power Analysis attacks that are capable of overturning the process. Constrained space and the ability of it is one of the most challenging tasks. To prevail over from this issue we are proposing a Cryptographic Lightweight Encryption Algorithm with Dimensionality Reduction in Edge Computing. The t-Distributed Stochastic Neighbor Embedding is one of the efficient dimensionality reduction technique that greatly decreases the size of the non-linear data. The three dimensional image data obtained from the system, which are connected with it, are dimensionally reduced, and then lightweight encryption algorithm is employed. Hence, the security backlog can be solved effectively using this method.  相似文献   
12.
在通讯设备爆炸式增长的时代,移动边缘计算作为5G通讯技术的核心技术之一,对其进行合理的资源分配显得尤为重要。移动边缘计算的思想是把云计算中心下沉到基站部署(边缘云),使云计算中心更加靠近用户,以快速解决计算资源分配问题。但是,相对于大型的云计算中心,边缘云的计算资源有限,传统的虚拟机分配方式不足以灵活应对边缘云的计算资源分配问题。为解决此问题,提出一种根据用户综合需求变化的动态计算资源和频谱分配算法(DRFAA),采用"分治"策略,并将资源模拟成"流体"资源进行分配,以寻求较大的吞吐量和较低的传输时延。实验仿真结果显示,动态计算资源和频谱分配算法可以有效地降低用户与边缘云之间的传输时延,也可以提高边缘云的吞吐量。  相似文献   
13.
We propose a full Eulerian incompressible solid-fluid interaction scheme capable of achieving high parallel efficiency and easily generating meshes for complex solid geometries. While good scalability of a full Eulerian solid-fluid interaction formulation has been reported by Sugiyama et al, their analysis was carried out using uniform Cartesian mesh and an artificial compressibility method. Typically, it is more challenging to achieve good scalability for hierarchical Cartesian meshes and a fully incompressible formulation. In addition, the conventional full Eulerian methods require a large computational cost to resolve complex solid geometries due to the usage of uniform Cartesian meshes. In an attempt to overcome the aforementioned issues, we employ the building-cube method, where the computational domain is divided into cubic regions called cubes. Each cube is divided at equal intervals, the same number of cubes is assigned to each core, and the spatial loop processing is executed for each cube. The numerical method is verified by computing five numerical examples. In the weak scaling test, the parallel efficiency at 32768 cores with 32 cores as a reference is 93.6%. In the strong scaling test, the parallel efficiency at 32768 cores with 128 cores as a reference is 70.2%.  相似文献   
14.
The motivation of this work is to address real-time sequential inference of parameters with a full Bayesian formulation. First, the proper generalized decomposition (PGD) is used to reduce the computational evaluation of the posterior density in the online phase. Second, Transport Map sampling is used to build a deterministic coupling between a reference measure and the posterior measure. The determination of the transport maps involves the solution of a minimization problem. As the PGD model is quasi-analytical and under a variable separation form, the use of gradient and Hessian information speeds up the minimization algorithm. Eventually, uncertainty quantification on outputs of interest of the model can be easily performed due to the global feature of the PGD solution over all coordinate domains. Numerical examples highlight the performance of the method.  相似文献   
15.
The Curriculum Vitae (CV, also referred to as “résumé”) is an established representation of a person's academic and professional history. A typical CV is comprised of multiple sections associated with spatio‐temporal, nominal, hierarchical, and ordinal data. The main task of a recruiter is, given a job application with specific requirements, to compare and assess CVs in order to build a short list of promising candidates to interview. Commonly, this is done by viewing CVs in a side‐by‐side fashion. This becomes challenging when comparing more than two CVs, because the reader is required to switch attention between them. Furthermore, there is no guarantee that the CVs are structured similarly, thus making the overview cluttered and significantly slowing down the comparison process. In order to address these challenges, in this paper we propose “CV3”, an interactive exploration environment offering users a new way to explore, assess, and compare multiple CVs, to suggest suitable candidates for specific job requirements. We validate our system by means of domain expert feedback whose results highlight both the efficacy of our approach and its limitations. We learned that CV3 eases the overall burden of recruiters thereby assisting them in the selection process.  相似文献   
16.
360° VR videos provide users with an immersive visual experience. To encode 360° VR videos, spherical pixels must be mapped onto a two‐dimensional domain to take advantage of the existing video encoding and storage standards. In VR industry, standard cubemap projection is the most widely used projection method for encoding 360° VR videos. However, it exhibits pixel density variation at different regions due to projection distortion. We present a generalized algorithm to improve the efficiency of cubemap projection using polynomial approximation. In our algorithm, standard cubemap projection can be regarded as a special form with 1st‐order polynomial. Our experiments show that the generalized cubemap projection can significantly reduce the projection distortion using higher order polynomials. As a result, pixel distribution can be well balanced in the resulting 360° VR videos. We use PSNR, S‐PSNR and CPP‐PSNR to evaluate the visual quality and the experimental results demonstrate promising performance improvement against standard cubemap projection and Google's equi‐angular cubemap.  相似文献   
17.
With the growth of distributed computing systems, the modern Big Data analysis platform products often have diversified characteristics. It is hard for users to make decisions when they are in early contact with Big Data platforms. In this paper, we discussed the design principles and research directions of modern Big Data platforms by presenting research in modern Big Data products. We provided a detailed review and comparison of several state-of-the-art frameworks and concluded into a typical structure with five horizontal and one vertical. According to this structure, this paper presents the components and modern optimization technologies developed for Big Data, which helps to choose the most suitable components and architecture from various Big Data technologies based on requirements.  相似文献   
18.
Efficient energy and temperature management techniques are essential elements for operators of cloud data centers. Dynamic virtual machine (VM) consolidation using live migration techniques presents a great opportunity for cloud service providers to adaptively reduce energy consumption and optimize their resource utilization. In recent studies, power consumption readings of individual physical hosts were chosen as the main monitoring parameters in their allocation policies, whereas very few have considered host temperature, which has shown to have a negative impact on server reliability, as a migration criterion. In this work, a thermal-aware VM consolidation mechanism is proposed for resource allocation optimization and server reliability assurance. We consider the variability in host temperature as a migration criterion to avoid outage incidents via having better VM consolidations. Extensive simulation results obtained from CloudSim show the promising performance of the proposed mechanism in energy saving while reducing the number of server outage incidents due to fluctuations in host temperature.  相似文献   
19.
针对基于容积脉搏波(PPG)提取运动心率时,传统心率提取算法由于运动噪声干扰使测量结果误差大、实时性不好的问题,提出一种抗运动干扰的实时心率提取方法。该方法通过实时小波去噪,同时结合三轴加速度信号(ACC)对运动进行分类训练,计算各运动状态心率增益,对实时心率值进行补偿。实验结果表明,通过与同时采集的ECG信号计算出的实时心率进行对比,绝对误差率仅为1.2%左右。相比传统心率提取算法,该算法具有抗干扰性强,实时准确的特点。  相似文献   
20.
针对镀液温度变化的非线性和滞后性,设计了采用专家规则的镀液温度实时控制系统。该系统在实时监测的基础上,构建了综合评判镀液温度偏差和镀液温度偏差变化率的专家规则,实现了镀液温度的自适应快速调节。仿真分析结果表明,该系统克服了非线性和滞后性的不良影响,能够实现镀液温度的实时控制。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号