首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3665篇
  免费   223篇
  国内免费   17篇
电工技术   74篇
综合类   7篇
化学工业   833篇
金属工艺   83篇
机械仪表   86篇
建筑科学   133篇
矿业工程   3篇
能源动力   219篇
轻工业   357篇
水利工程   46篇
石油天然气   81篇
无线电   455篇
一般工业技术   702篇
冶金工业   126篇
原子能技术   14篇
自动化技术   686篇
  2024年   14篇
  2023年   128篇
  2022年   259篇
  2021年   310篇
  2020年   198篇
  2019年   197篇
  2018年   254篇
  2017年   192篇
  2016年   193篇
  2015年   126篇
  2014年   155篇
  2013年   295篇
  2012年   195篇
  2011年   201篇
  2010年   152篇
  2009年   152篇
  2008年   113篇
  2007年   73篇
  2006年   78篇
  2005年   77篇
  2004年   56篇
  2003年   44篇
  2002年   40篇
  2001年   33篇
  2000年   28篇
  1999年   32篇
  1998年   38篇
  1997年   21篇
  1996年   26篇
  1995年   14篇
  1994年   21篇
  1993年   22篇
  1992年   20篇
  1991年   9篇
  1990年   9篇
  1989年   15篇
  1988年   16篇
  1987年   6篇
  1986年   12篇
  1985年   11篇
  1984年   7篇
  1983年   8篇
  1982年   6篇
  1981年   7篇
  1980年   7篇
  1979年   6篇
  1978年   8篇
  1977年   4篇
  1976年   7篇
  1974年   4篇
排序方式: 共有3905条查询结果,搜索用时 15 毫秒
81.
82.
Internet Protocol version 6 (IPv6) is the latest version of IP that goal to host 3.4 × 1038 unique IP addresses of devices in the network. IPv6 has introduced new features like Neighbour Discovery Protocol (NDP) and Address Auto-configuration Scheme. IPv6 needed several protocols like the Address Auto-configuration Scheme and Internet Control Message Protocol (ICMPv6). IPv6 is vulnerable to numerous attacks like Denial of Service (DoS) and Distributed Denial of Service (DDoS) which is one of the most dangerous attacks executed through ICMPv6 messages that impose security and financial implications. Therefore, an Intrusion Detection System (IDS) is a monitoring system of the security of a network that detects suspicious activities and deals with a massive amount of data comprised of repetitive and inappropriate features which affect the detection rate. A feature selection (FS) technique helps to reduce the computation time and complexity by selecting the optimum subset of features. This paper proposes a method for detecting DDoS flooding attacks (FA) based on ICMPv6 messages using a Binary Flower Pollination Algorithm (BFPA-FA). The proposed method (BFPA-FA) employs FS technology with a support vector machine (SVM) to identify the most relevant, influential features. Moreover, The ICMPv6-DDoS dataset was used to demonstrate the effectiveness of the proposed method through different attack scenarios. The results show that the proposed method BFPA-FA achieved the best accuracy rate (97.96%) for the ICMPv6 DDoS detection with a reduced number of features (9) to half the total (19) features. The proven proposed method BFPA-FA is effective in the ICMPv6 DDoS attacks via IDS.  相似文献   
83.
Magnetic Resonance Materials in Physics, Biology and Medicine - Signal intensity normalization is necessary to reduce heterogeneity in T2-weighted (T2W) magnetic resonance imaging (MRI) for...  相似文献   
84.
The introduction of the Internet of Things (IoT) paradigm serves as pervasive resource access and sharing platform for different real-time applications. Decentralized resource availability, access, and allocation provide a better quality of user experience regardless of the application type and scenario. However, privacy remains an open issue in this ubiquitous sharing platform due to massive and replicated data availability. In this paper, privacy-preserving decision-making for the data-sharing scheme is introduced. This scheme is responsible for improving the security in data sharing without the impact of replicated resources on communicating users. In this scheme, classification learning is used for identifying replicas and accessing granted resources independently. Based on the trust score of the available resources, this classification is recurrently performed to improve the reliability of information sharing. The user-level decisions for information sharing and access are made using the classification of the resources at the time of availability. This proposed scheme is verified using the metrics access delay, success ratio, computation complexity, and sharing loss.  相似文献   
85.
Due to the complexity of blockchain technology, it usually costs too much effort to build, maintain and monitor a blockchain system that supports a targeted application. To this end, the emerging “Blockchain as a Service” (BaaS) makes the blockchain and distributed ledgers more accessible, particularly for businesses, by reducing costs and overheads. BaaS combines the high computing power of cloud computing, the pervasiveness of IoT and the decentralization of blockchain, allowing people to build their own applications while ensuring the transparency and openness of the system. This paper surveys the research outputs of both academia and industry. First, it introduces the representative architectures of BaaS systems and then summarizes the research contributions of BaaS from the technologies for service provision, roles, container and virtualization, interfaces, customization and evaluation. The typical applications of BaaS in both academic and practical domains are also introduced. At present, the research on the blockchain is abundant, but research on BaaS is still in its infancy. Six challenges of BaaS are concluded in this paper for further study directions.  相似文献   
86.
Engineering with Computers - The study is investigated the capacity of new artificial intelligence (AI) methodologies for shear strength (Vs) computation of reinforced concrete (RC) beams. The...  相似文献   
87.
Microsystem Technologies - The dynamic performance of a micro-resonator depends on its energy loss mechanism which is quantified by Q-factor (Quality factor). This paper presents numerical...  相似文献   
88.
Intrusion detection systems that have emerged in recent decades can identify a variety of malicious attacks that target networks by employing several detection approaches. However, the current approaches have challenges in detecting intrusions, which may affect the performance of the overall detection system as well as network performance. For the time being, one of the most important creative technological advancements that plays a significant role in the professional world today is blockchain technology. Blockchain technology moves in the direction of persistent revolution and change. It is a chain of blocks that covers information and maintains trust between individuals no matter how far apart they are. Recently, blockchain was integrated into intrusion detection systems to enhance their overall performance. Blockchain has also been adopted in healthcare, supply chain management, and the Internet of Things. Blockchain uses robust cryptography with private and public keys, and it has numerous properties that have leveraged security’s performance over peer-to-peer networks without the need for a third party. To explore and highlight the importance of integrating blockchain with intrusion detection systems, this paper provides a comprehensive background of intrusion detection systems and blockchain technology. Furthermore, a comprehensive review of emerging intrusion detection systems based on blockchain technology is presented. Finally, this paper suggests important future research directions and trending topics in intrusion detection systems based on blockchain technology.  相似文献   
89.
90.
Introduction: Oral phosphate binders are the main stay of treatment of hyperphosphatemia. Adherence rates to ferric citrate, a recently approved phosphate binder, are unknown. Methods: We conducted a post‐hoc analysis to evaluate whether adherence rates were different for ferric citrate vs. active control in 412 subjects with end stage kidney disease (ESKD) who were randomized to ferric citrate vs. active control (sevelamer carbonate and/or calcium acetate). Adherence was defined as percent of actual number of pills taken to total number of pills prescribed. Findings: There were no significant differences in baseline characteristics including gender, race/ethnicity, and age between the ferric citrate and active control groups. Baseline phosphorus, calcium, and parathyroid hormone levels were similar. Mean (SD) adherence was 81.4% (17.4) and 81.7% (15.9) in the ferric citrate and active control groups, respectively (P = 0.88). Adherence remained similar between both groups after adjusting for gender, race/ethnicity, age, cardiovascular disease (CVD), and diabetic nephropathy (mean [95% CI]: 81.4% [78.2, 84.6] and 81.5% [77.7, 85.2] for ferric citrate and active control, respectively). Gender, race/ethnicity, age, and diagnosis of diabetic nephropathy did not influence adherence to the prescribed phosphate binder. Subjects with CVD had lower adherence rates to phosphate binder; this was significant only in the active control group. Discussion: Adherence rates to the phosphate binder, ferric citrate, were similar to adherence rates to active control. Similar adherence rates to ferric citrate are notable since tolerance to active control was an entry criteria and the study was open label. Gender, race/ethnicity, nor age influenced adherence.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号