首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   520篇
  免费   21篇
  国内免费   4篇
电工技术   7篇
化学工业   165篇
金属工艺   14篇
机械仪表   7篇
建筑科学   9篇
能源动力   32篇
轻工业   28篇
水利工程   8篇
石油天然气   2篇
无线电   49篇
一般工业技术   102篇
冶金工业   15篇
原子能技术   11篇
自动化技术   96篇
  2024年   2篇
  2023年   14篇
  2022年   21篇
  2021年   27篇
  2020年   18篇
  2019年   14篇
  2018年   21篇
  2017年   22篇
  2016年   22篇
  2015年   15篇
  2014年   23篇
  2013年   31篇
  2012年   33篇
  2011年   24篇
  2010年   20篇
  2009年   23篇
  2008年   14篇
  2007年   14篇
  2006年   15篇
  2005年   15篇
  2004年   14篇
  2003年   20篇
  2002年   13篇
  2001年   9篇
  2000年   5篇
  1999年   5篇
  1998年   11篇
  1997年   3篇
  1996年   2篇
  1995年   10篇
  1994年   4篇
  1993年   4篇
  1992年   6篇
  1991年   4篇
  1990年   5篇
  1989年   2篇
  1987年   4篇
  1986年   5篇
  1985年   3篇
  1984年   2篇
  1983年   2篇
  1982年   2篇
  1981年   4篇
  1980年   3篇
  1979年   1篇
  1976年   1篇
  1975年   5篇
  1973年   3篇
  1972年   2篇
  1969年   2篇
排序方式: 共有545条查询结果,搜索用时 15 毫秒
1.
Multimedia Tools and Applications - Currently, Deep Learning is playing an influential role for Image analysis and object classification. Maize’s diseases reduce production that subsequently...  相似文献   
2.
3.
The main purpose of this article is to show how one can integrate statistical and nonstatistical items of evidence in the belief function framework. First, we use the properties of consonant belief functions to define the belief that the true mean of a variable lies in a given interval when a statistical test is performed for the variable. Second, we use the above definition to determine the sample size for a statistical test when a desired level of belief is needed from the sample. Third, we determine the level of belief that the true mean lies in a given interval when a statistical test yields certain values for the sample mean and the standard deviation of the mean for the variable. Finally, we use the auditing situation to illustrate the process of integrating statistical and nonstatistical items evidence. © 1994 John Wiley & Sons, Inc.  相似文献   
4.
Neural Computing and Applications - In this research article, a novel approach is proposed by considering the sine augmented scaled sine cosine (SAS-SCA) Algorithm for the load frequency control of...  相似文献   
5.
New experimental results on pressure loss for the single and two‐phase gas‐liquid flow with non‐Newtonian liquids in helical coils are reported. For a constant value of the curvature ratio, the value of the helix angle of the coils is varied from 2.56° to 9.37°. For single phase flow, the effect of helix angle on pressure loss is found to be negligible in laminar flow regime but pressure loss increases with the increasing value of helix angle in turbulent flow conditions. On the other hand, for the two‐phase flow, the well‐known Lockhart‐Martinelli method correlates the present results for all values of helix angle (2.56‐9.37°) satisfactorily under turbulent/laminar and turbulent/turbulent conditions over the following ranges of variables as: 0.57 ≤ n′ ≤ 1; Re′ < 4000; Rel < 4000; Reg < 8000; 8 ≤ x ≤ 1000 and 0.2 ≤ De′ ≤ 1000.  相似文献   
6.
The field of information systems (IS) remains ill-defined, facing problems of recognition and identity crisis. Several papers and debates have been dedicated on this topic for over three decades. The focus of these debates have largely centered on the state of the IS field in Americas and Europe and with a limited study conducted in the Asia–Pacific context. This study attempts to assess the field in the Indian context and highlight the challenges and issues faced by IS faculties in India. Based on literature survey of the seminal papers in the field, we identified the salient topics of interest to IS researchers: identity of the IS field; diversity of the field; research approaches, methods and rigor; reference disciplines; journals and conferences; and IS course and curriculum. A two-phase study was carried out to explore the interest generated by the IS field in India. In the first phase, secondary data review of leading business schools in India was carried out to understand their focus on IS as an academic discipline. In the second phase, we conducted interviews of IS researchers from the premium business schools in India. In our study, we analyze the research focus of IS faculties in B-schools in India, analyze the composition of the faculty pool and the nature of research work undertaken by them. Our study points at the restricted focus of IS researchers in India around a few narrow areas, with a significant breadth of topics not being explored for research. We found the identity struggle of the field to be prominent, which was further compounded by the limited number of active, IS researchers. The growing importance of qualitative techniques in IS research, the challenges of developing a sound base in multiple reference disciplines and the need for making IS course interesting for business school students were some of the other significant observations. Our study also highlighted the paradox of the success of the IT industry in India leading to reduced enrollment of IS courses in B-Schools. We conclude by providing recommendations to B-school deans and directors.  相似文献   
7.
Multimedia Tools and Applications - In today’s Internet era, group communications in multimedia applications are becoming more and more popular. The issues of controlling illegal access to...  相似文献   
8.
Feasible clinical application of any automated segmenting methodology demands more than just accuracy. Amendment to the automated delineation is necessary when the algorithm fails, however, integrated solution to such a scenario is largely absent in literature. Hence in this survey we devised an architecture that does both the automated and interactive lung field localizations using a single segmenting engine—random walker algorithm—so that intuitive amendment is only necessary when the automated generated delineation is unsatisfactory. The algorithm proceeds by first extracting 18 intensity profiles running horizontally, each of them equally spacing apart, and in each intensity profile three extreme points denoting the two lungs and the esophagus are determined through profile matching. This done, the algorithm removes profiles that do not intersect with the lung, and the rest of the extreme points are plugged into random walker algorithm to perform segmentation. The achieved accuracy in localization by the above was 0.8875 in terms of overlap measure (the maximum value for this parameter is 1) over 341 images. In the case where unsatisfactory delineation prompts amendment necessary, the user can interactively segment the lung by just a shift on some of the previous-determined points to the desired locations, and random walker algorithm is run again with the amended input. By such a fusion, the benefits of both the automated and interactive segmentation are shared in a single architecture.  相似文献   
9.
This paper investigates the resource allocation in a massively deployed user cognitive radio enabled non-orthogonal multiple access (CR-NOMA) network considering the downlink scenario. The system performance deteriorates with the number of users who are experiencing similar channel characteristics from the base station (BS) in NOMA. To address this challenge, we propose a framework for maximizing the system throughput that is based on one-to-one matching game theory integrated with the machine learning technique. The proposed approach is decomposed to solve users clustering and power allocation subproblems. The selection of optimal cluster heads (CHs) and their associated cluster members is based on Gale-Shapley matching game theoretical model with the application of Hungarian method. The CHs can harvest energy from the BS and transfer their surplus power to the primary user (PU) through wireless power transfer. In return, they are allowed to access the licensed band for secondary transmission. The power allocation to the users intended for power conservation at CHs is formulated as a probabilistic constraint, which is then solved by employing the support vector machine (SVM) algorithm. The simulation results demonstrate the efficacy of our proposed schemes that enable the CHs to transfer the residual power while ensuring maximum system throughput. The effects of different parameters on the performance are also studied.  相似文献   
10.

The concept of cloud envisioned cyber-physical systems is a practical technology that allows users to interact with each other while transferring data in the cloud. In cyber-physical systems, cloud storage utilizes data deduplication techniques to improve the performance of its applications. However, this method exposes sensitive data and causes security risks. Various research related to cloud storage has been conducted. Despite the advantages of this technology, it lacks the necessary security features and high performance. In the proposed method, a victim's virtual computer is moved to the cloud without interfering with the other processes running on the network. It protects against the attacks caused by encrypting the data with a cryptographically binding hash. Post-Quantum Cryptographic techniques, such as lightweight Multi-Extractable Somewhere Statistically Binding and Learning With Error authenticate data sharing protocols (MESSB–LWE), have been used. These allow for safe data sharing across geographically scattered physical devices and clients with lightweight concepts. The numerical analysis of MESSB–LWE is carried out in different stages, and the results show that it has incredible performance and practicality when compared to the literature. Finally, the authors have explored a couple of factors that should be considered for future research work in authentication for securing remote systems in the cloud environment.

  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号