首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1343篇
  免费   97篇
  国内免费   13篇
电工技术   39篇
综合类   6篇
化学工业   313篇
金属工艺   26篇
机械仪表   66篇
建筑科学   64篇
矿业工程   3篇
能源动力   94篇
轻工业   120篇
水利工程   30篇
石油天然气   28篇
无线电   124篇
一般工业技术   201篇
冶金工业   44篇
原子能技术   8篇
自动化技术   287篇
  2024年   7篇
  2023年   42篇
  2022年   48篇
  2021年   94篇
  2020年   89篇
  2019年   96篇
  2018年   124篇
  2017年   121篇
  2016年   98篇
  2015年   61篇
  2014年   98篇
  2013年   164篇
  2012年   86篇
  2011年   89篇
  2010年   56篇
  2009年   42篇
  2008年   28篇
  2007年   19篇
  2006年   22篇
  2005年   7篇
  2004年   10篇
  2003年   8篇
  2002年   2篇
  2001年   3篇
  2000年   3篇
  1999年   6篇
  1998年   7篇
  1997年   7篇
  1996年   3篇
  1995年   1篇
  1994年   3篇
  1992年   1篇
  1991年   3篇
  1988年   1篇
  1987年   1篇
  1985年   1篇
  1977年   2篇
排序方式: 共有1453条查询结果,搜索用时 15 毫秒
1.
2.
3.
安南  张申生  胡涛 《计算机工程》2003,29(6):17-18,26
介绍了Cit-CSP--Cit/E-commerce信息安全保障平台子系统,并阐述了它所提供的消息摘要、块加密、加密(公钥)、签名和MAC等功能和服务。  相似文献   
4.

Shear connectors play a prominent role in the design of steel-concrete composite systems. The behavior of shear connectors is generally determined through conducting push-out tests. However, these tests are costly and require plenty of time. As an alternative approach, soft computing (SC) can be used to eliminate the need for conducting push-out tests. This study aims to investigate the application of artificial intelligence (AI) techniques, as sub-branches of SC methods, in the behavior prediction of an innovative type of C-shaped shear connectors, called Tilted Angle Connectors. For this purpose, several push-out tests are conducted on these connectors and the required data for the AI models are collected. Then, an adaptive neuro-fuzzy inference system (ANFIS) is developed to identify the most influencing parameters on the shear strength of the tilted angle connectors. Totally, six different models are created based on the ANFIS results. Finally, AI techniques such as an artificial neural network (ANN), an extreme learning machine (ELM), and another ANFIS are employed to predict the shear strength of the connectors in each of the six models. The results of the paper show that slip is the most influential factor in the shear strength of tilted connectors and after that, the inclination angle is the most effective one. Moreover, it is deducted that considering only four parameters in the predictive models is enough to have a very accurate prediction. It is also demonstrated that ELM needs less time and it can reach slightly better performance indices than those of ANN and ANFIS.

  相似文献   
5.
Mahdi  M. 《Microsystem Technologies》2021,27(8):2913-2917
Microsystem Technologies - In this paper, we propose a simple design for the heating device with ultra-low power consumption. The device is composed of a micro heater made of Nichrome (20/80)...  相似文献   
6.
Multimedia Tools and Applications - Image retargeting is the task of making images capable of being displayed on screens with different sizes. This work should be done so that high-level visual...  相似文献   
7.
International Journal of Information Security - The pervasive use of mobile technologies and GPS-equipped vehicles has resulted in a large number of moving objects databases. Privacy protection is...  相似文献   
8.

One of the biggest challenges in water quality monitoring is how to optimize big Data gathered from a wide range of resources. This paper presented a new software-based pathway of process mining approach for extending a flexible WQI (Water Quality Index) that would deal with uncertainties derived from missing data occurrence in short- and long-term assessments. The methodology is based on integration of four multi-criteria group decision-making models coupled with fuzzy simulation including AHP (Analytical Hierarchy Process), fuzzy OWA (Ordered Weighting Average), TOPSIS (Technique for Order Preference by Similarity to Ideal Solution), and fuzzy TOPSIS that were used for data mining and group consensus evaluation.. Examining the methodology on groundwater resources being supplied for drinking in Shiraz, Iran showed high integrity, accuracy, and proximity-to-real interpretation of water quality. This was the first study where decision-making risks such as Decision Makers’ risk-prone or risk-aversion attitudes (optimistic degree), DMs’ power, and consensus degree of each water quality parameter have been considered in WQI research. The proposed index offered a flexible choice in defining the intended project duration, stakeholders’ judgments, types of water use and water resource, standards, as well as type and number of water quality parameters. Thus, beside sustaining the unity in structure, this methodology could be suggested as a potentially WQI for other regions. The presented methodology would help more efficient monitoring of water resources for drinking purpose with respect to water quality.

  相似文献   
9.
Water Resources Management - This paper shows the utility of a new interval cooperative game theory as an effective water diplomacy tool to resolve competing and conflicting needs of water users...  相似文献   
10.
Internet of Things (IoT) is a newly emerged paradigm where multiple embedded devices, known as things, are connected via the Internet to collect, share, and analyze data from the environment. In order to overcome the limited storage and processing capacity constraint of IoT devices, it is now possible to integrate them with cloud servers as large resource pools. Such integration, though bringing applicability of IoT in many domains, raises concerns regarding the authentication of these devices while establishing secure communications to cloud servers. Recently, Kumari et al proposed an authentication scheme based on elliptic curve cryptography (ECC) for IoT and cloud servers and claimed that it satisfies all security requirements and is secure against various attacks. In this paper, we first prove that the scheme of Kumari et al is susceptible to various attacks, including the replay attack and stolen-verifier attack. We then propose a lightweight authentication protocol for secure communication of IoT embedded devices and cloud servers. The proposed scheme is proved to provide essential security requirements such as mutual authentication, device anonymity, and perfect forward secrecy and is robust against security attacks. We also formally verify the security of the proposed protocol using BAN logic and also the Scyther tool. We also evaluate the computation and communication costs of the proposed scheme and demonstrate that the proposed scheme incurs minimum computation and communication overhead, compared to related schemes, making it suitable for IoT environments with low processing and storage capacity.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号