首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2004篇
  免费   90篇
  国内免费   9篇
电工技术   35篇
综合类   9篇
化学工业   519篇
金属工艺   40篇
机械仪表   50篇
建筑科学   58篇
矿业工程   1篇
能源动力   110篇
轻工业   219篇
水利工程   14篇
石油天然气   38篇
无线电   213篇
一般工业技术   360篇
冶金工业   130篇
原子能技术   11篇
自动化技术   296篇
  2023年   35篇
  2022年   63篇
  2021年   97篇
  2020年   74篇
  2019年   80篇
  2018年   83篇
  2017年   69篇
  2016年   82篇
  2015年   58篇
  2014年   73篇
  2013年   152篇
  2012年   86篇
  2011年   128篇
  2010年   94篇
  2009年   75篇
  2008年   64篇
  2007年   71篇
  2006年   58篇
  2005年   54篇
  2004年   39篇
  2003年   32篇
  2002年   25篇
  2001年   33篇
  2000年   23篇
  1999年   22篇
  1998年   49篇
  1997年   19篇
  1996年   30篇
  1995年   25篇
  1994年   19篇
  1993年   13篇
  1992年   18篇
  1991年   20篇
  1990年   10篇
  1989年   14篇
  1988年   18篇
  1987年   13篇
  1986年   16篇
  1985年   21篇
  1984年   10篇
  1983年   12篇
  1982年   16篇
  1981年   16篇
  1980年   15篇
  1979年   12篇
  1978年   7篇
  1977年   12篇
  1976年   11篇
  1975年   9篇
  1973年   9篇
排序方式: 共有2103条查询结果,搜索用时 15 毫秒
61.

We perceive big data with massive datasets of complex and variegated structures in the modern era. Such attributes formulate hindrances while analyzing and storing the data to generate apt aftermaths. Privacy and security are the colossal perturb in the domain space of extensive data analysis. In this paper, our foremost priority is the computing technologies that focus on big data, IoT (Internet of Things), Cloud Computing, Blockchain, and fog computing. Among these, Cloud Computing follows the role of providing on-demand services to their customers by optimizing the cost factor. AWS, Azure, Google Cloud are the major cloud providers today. Fog computing offers new insights into the extension of cloud computing systems by procuring services to the edges of the network. In collaboration with multiple technologies, the Internet of Things takes this into effect, which solves the labyrinth of dealing with advanced services considering its significance in varied application domains. The Blockchain is a dataset that entertains many applications ranging from the fields of crypto-currency to smart contracts. The prospect of this research paper is to present the critical analysis and review it under the umbrella of existing extensive data systems. In this paper, we attend to critics' reviews and address the existing threats to the security of extensive data systems. Moreover, we scrutinize the security attacks on computing systems based upon Cloud, Blockchain, IoT, and fog. This paper lucidly illustrates the different threat behaviour and their impacts on complementary computational technologies. The authors have mooted a precise analysis of cloud-based technologies and discussed their defense mechanism and the security issues of mobile healthcare.

  相似文献   
62.
Computational Economics - This study tries to unravel the stock market prediction puzzle using the textual analytic with the help of natural language processing (NLP) techniques and Deep-learning...  相似文献   
63.
In evaluating health and safety improvements for performance improvement, it is necessary to account for both the contributions of a healthy workforce and the resources required supporting it.

The Economic Assessment of the Work Environment (EAWE) is a financial framework that helps management forecast the financial benefits of health and safety implementations. The five-step process comprises (1) a health assessment to identify critical elements in the work environment, (2) an action plan to address gaps, (3) performance targets based on internal goals and external benchmarks, (4) transformation of the expected improvements in health and safety into expected performance outcomes, and (5) implementation in stages, starting from individual jobs to entire organisation.

EAWE offers a dynamic framework for corporate decision-makers when evaluating health and safety programmes. Further research should explore the bounds of EAWE across different types of organisations and the evolution of performance over time.  相似文献   

64.
In the present article, the adaptive neuro-fuzzy inference system (ANFIS) is employed to model the discharge coefficient in rectangular sharp-crested side weirs. The genetic algorithm (GA) is used for the optimum selection of membership functions, while the singular value decomposition (SVD) method helps in computing the linear parameters of the ANFIS results section (GA/SVD-ANFIS). The effect of each dimensionless parameter on discharge coefficient prediction is examined in five different models to conduct sensitivity analysis by applying the above-mentioned dimensionless parameters. Two different sets of experimental data are utilized to examine the models and obtain the best model. The study results indicate that the model designed through GA/SVD-ANFIS predicts the discharge coefficient with a good level of accuracy (mean absolute percentage error?=?3.362 and root mean square error?=?0.027). Moreover, comparing this method with existing equations and the multi-layer perceptron–artificial neural network (MLP-ANN) indicates that the GA/SVD-ANFIS method has superior performance in simulating the discharge coefficient of side weirs.  相似文献   
65.
The objectives of this study were to: (1) develop a new bioactive dental bonding agent with nanoparticles of amorphous calcium phosphate and dimethylaminohexadecyl methacrylate for tooth root caries restorations and endodontic applications, and (2) investigate biofilm inhibition by the bioactive bonding agent against eight species of periodontal and endodontic pathogens for the first time. Bonding agent was formulated with 5?% of dimethylaminohexadecyl methacrylate. Nanoparticles of amorphous calcium phosphate at 30?wt% was mixed into adhesive. Eight species of biofilms were grown on resins: Porphyromonas gingivalis, Prevotella intermedia, Prevotella nigrescens, Aggregatibacter actinomycetemcomitans, Fusobacterium nucleatum, Parvimonas micra, Enterococcus faecalis, Enterococcus faecium. Colony-forming units, live/dead assay, biomass, metabolic activity and polysaccharide of biofilms were determined. The results showed that adding dimethylaminohexadecyl methacrylate and nanoparticles of amorphous calcium phosphate into bonding agent did not decrease dentin bond strength (P?>?0.1). Adding dimethylaminohexadecyl methacrylate reduced the colony-forming units of all eight species of biofilms by nearly three orders of magnitude. The killing efficacy of dimethylaminohexadecyl methacrylate resin was: P. gingivalis?>?A. actinomycetemcomitans?>?P. intermedia?>?P. nigrescens?>?F. nucleatum?>?P. micra?>?E. faecalis?>?E. faecium. Dimethylaminohexadecyl methacrylate resin had much less biomass, metabolic activity and polysaccharide of biofilms than those without dimethylaminohexadecyl methacrylate (P?<?0.05). In conclusion, a novel dental adhesive was developed for root caries and endodontic applications, showing potent inhibition of biofilms of eight species of periodontal and endodontic pathogens, and reducing colony-forming units by three orders of magnitude. The bioactive adhesive is promising for tooth root restorations to provide subgingival margins with anti-periodontal pathogen capabilities, and for endodontic sealer applications to combat endodontic biofilms.  相似文献   
66.
The demand for cloud computing has increased manifold in the recent past. More specifically, on-demand computing has seen a rapid rise as organizations rely mostly on cloud service providers for their day-to-day computing needs. The cloud service provider fulfills different user requirements using virtualization - where a single physical machine can host multiple Virtual Machines. Each virtual machine potentially represents a different user environment such as operating system, programming environment, and applications. However, these cloud services use a large amount of electrical energy and produce greenhouse gases. To reduce the electricity cost and greenhouse gases, energy efficient algorithms must be designed. One specific area where energy efficient algorithms are required is virtual machine consolidation. With virtual machine consolidation, the objective is to utilize the minimum possible number of hosts to accommodate the required virtual machines, keeping in mind the service level agreement requirements. This research work formulates the virtual machine migration as an online problem and develops optimal offline and online algorithms for the single host virtual machine migration problem under a service level agreement constraint for an over-utilized host. The online algorithm is analyzed using a competitive analysis approach. In addition, an experimental analysis of the proposed algorithm on real-world data is conducted to showcase the improved performance of the proposed algorithm against the benchmark algorithms. Our proposed online algorithm consumed 25% less energy and performed 43% fewer migrations than the benchmark algorithms.  相似文献   
67.
Vehicle-to-grid technology is an emerging field that allows unused power from Electric Vehicles (EVs) to be used by the smart grid through the central aggregator. Since the central aggregator is connected to the smart grid through a wireless network, it is prone to cyber-attacks that can be detected and mitigated using an intrusion detection system. However, existing intrusion detection systems cannot be used in the vehicle-to-grid network because of the special requirements and characteristics of the vehicle-to-grid network. In this paper, the effect of denial-of-service attacks of malicious electric vehicles on the central aggregator of the vehicle-to-grid network is investigated and an intrusion detection system for the vehicle-to-grid network is proposed. The proposed system, central aggregator–intrusion detection system (CA-IDS), works as a security gateway for EVs to analyze and monitor incoming traffic for possible DoS attacks. EVs are registered with a Central Aggregator (CAG) to exchange authenticated messages, and malicious EVs are added to a blacklist for violating a set of predefined policies to limit their interaction with the CAG. A denial of service (DoS) attack is simulated at CAG in a vehicle-to-grid (V2G) network manipulating various network parameters such as transmission overhead, receiving capacity of destination, average packet size, and channel availability. The proposed system is compared with existing intrusion detection systems using different parameters such as throughput, jitter, and accuracy. The analysis shows that the proposed system has a higher throughput, lower jitter, and higher accuracy as compared to the existing schemes.  相似文献   
68.
Classification of electroencephalogram (EEG) signals for humans can be achieved via artificial intelligence (AI) techniques. Especially, the EEG signals associated with seizure epilepsy can be detected to distinguish between epileptic and non-epileptic regions. From this perspective, an automated AI technique with a digital processing method can be used to improve these signals. This paper proposes two classifiers: long short-term memory (LSTM) and support vector machine (SVM) for the classification of seizure and non-seizure EEG signals. These classifiers are applied to a public dataset, namely the University of Bonn, which consists of 2 classes –seizure and non-seizure. In addition, a fast Walsh-Hadamard Transform (FWHT) technique is implemented to analyze the EEG signals within the recurrence space of the brain. Thus, Hadamard coefficients of the EEG signals are obtained via the FWHT. Moreover, the FWHT is contributed to generate an efficient derivation of seizure EEG recordings from non-seizure EEG recordings. Also, a k-fold cross-validation technique is applied to validate the performance of the proposed classifiers. The LSTM classifier provides the best performance, with a testing accuracy of 99.00%. The training and testing loss rates for the LSTM are 0.0029 and 0.0602, respectively, while the weighted average precision, recall, and F1-score for the LSTM are 99.00%. The results of the SVM classifier in terms of accuracy, sensitivity, and specificity reached 91%, 93.52%, and 91.3%, respectively. The computational time consumed for the training of the LSTM and SVM is 2000 and 2500 s, respectively. The results show that the LSTM classifier provides better performance than SVM in the classification of EEG signals. Eventually, the proposed classifiers provide high classification accuracy compared to previously published classifiers.  相似文献   
69.
70.
Context:How can quality of software systems be predicted before deployment? In attempting to answer this question, prediction models are advocated in several studies. The performance of such models drops dramatically, with very low accuracy, when they are used in new software development environments or in new circumstances.ObjectiveThe main objective of this work is to circumvent the model generalizability problem. We propose a new approach that substitutes traditional ways of building prediction models which use historical data and machine learning techniques.MethodIn this paper, existing models are decision trees built to predict module fault-proneness within the NASA Critical Mission Software. A genetic algorithm is developed to combine and adapt expertise extracted from existing models in order to derive a “composite” model that performs accurately in a given context of software development. Experimental evaluation of the approach is carried out in three different software development circumstances.ResultsThe results show that derived prediction models work more accurately not only for a particular state of a software organization but also for evolving and modified ones.ConclusionOur approach is considered suitable for software data nature and at the same time superior to model selection and data combination approaches. It is then concluded that learning from existing software models (i.e., software expertise) has two immediate advantages; circumventing model generalizability and alleviating the lack of data in software-engineering.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号