首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   570篇
  免费   9篇
  国内免费   2篇
电工技术   7篇
综合类   1篇
化学工业   104篇
金属工艺   11篇
机械仪表   8篇
建筑科学   14篇
矿业工程   2篇
能源动力   39篇
轻工业   77篇
水利工程   25篇
石油天然气   5篇
无线电   64篇
一般工业技术   97篇
冶金工业   17篇
自动化技术   110篇
  2024年   21篇
  2023年   25篇
  2022年   40篇
  2021年   55篇
  2020年   44篇
  2019年   47篇
  2018年   36篇
  2017年   28篇
  2016年   27篇
  2015年   19篇
  2014年   16篇
  2013年   50篇
  2012年   15篇
  2011年   35篇
  2010年   25篇
  2009年   14篇
  2008年   18篇
  2007年   12篇
  2006年   6篇
  2005年   12篇
  2004年   3篇
  2003年   3篇
  2002年   4篇
  2000年   1篇
  1999年   2篇
  1998年   1篇
  1997年   1篇
  1996年   3篇
  1994年   2篇
  1993年   2篇
  1992年   4篇
  1991年   1篇
  1990年   2篇
  1989年   4篇
  1987年   1篇
  1985年   1篇
  1977年   1篇
排序方式: 共有581条查询结果,搜索用时 15 毫秒
31.
Experimental demonstration of small angle (0.8 degrees-5 degrees ) direct UV-written X couplers in silica-on-silicon is presented. Maximum and minimum coupling ratios of 95%(+/-0.8%) and 1.9% (+/-1%), respectively, were recorded. The structures also display very low polarization and wavelength dependence. A typical excess loss of 1.0 dB(+/-0.5 dB) was recorded. Device modeling using the beam propagation method and an analytical model showed good agreement with experimental results over a broad crossing angle and wavelength range.  相似文献   
32.
Two qubit quantum computations are viewed as two player, strictly competitive games and a game-theoretic measure of optimality of these computations is developed. To this end, the geometry of Hilbert space of quantum computations is used to establish the equivalence of game-theoretic solution concepts of Nash equilibrium and mini-max outcomes in games of this type, and quantum mechanisms are designed for realizing these mini-max outcomes.  相似文献   
33.
Computational Economics - This study tries to unravel the stock market prediction puzzle using the textual analytic with the help of natural language processing (NLP) techniques and Deep-learning...  相似文献   
34.

Visual Cryptography (VC) is gaining attraction during the past few years to secure the visual information in the transmission network. It enables the visual data i.e. handwritten notes, photos, printed text, etc. to encrypt in such a way that their decryption can be done through the human visual framework. Hence, no computational assistance is required for the decryption of the secret images they can be seen through naked eye. In this paper, a novel enhanced halftoning-based VC scheme is proposed that works for both binary and color images. Fake share is generated by the combination of random black and white pixels. The proposed algorithm consists of 3 stages i.e., detection, encryption, and decryption. Halftoning, Encryption, (2, 2) visual cryptography and the novel idea of fake share, make it even more secure and improved. As a result, it facilitates the original restored image to the authentic user, however, the one who enters the wrong password gets the combination of fake share with any real share. Both colored and black images can be processed with minimal capacity using the proposed scheme.

  相似文献   
35.
The performance of most of the classification algorithms on a particular dataset is highly dependent on the learning parameters used for training them. Different approaches like grid search or genetic algorithms are frequently employed to find suitable parameter values for a given dataset. Grid search has the advantage of finding more accurate solutions in general at the cost of higher computation time. Genetic algorithms, on the other hand, are able to find good solutions in less time, but the accuracy of these solutions is usually lower than those of grid search.  相似文献   
36.
Concept browsing interfaces can help educators and learners to locate and use learning resources that are aligned with recognized learning goals. The Strand Map Service enables users to navigate interactive visualizations of related learning goals and to request digital library resources aligned with learning goals. These interfaces are created using a programmatic Web service interface that dynamically generates interactive visual components. Preliminary findings suggest that these library interfaces appear to help users stay focused on the scientific content of their information discovery task, as opposed to focusing on the mechanics of searching.  相似文献   
37.
Microsystem Technologies - Electronic devices are shrinking day by day, while the speed and reliability is increasing. At the same time, IC designs and micro/nano electronic systems are becoming...  相似文献   
38.
39.

The detection of manmade disasters particularly fire is valuable because it causes many damages in terms of human lives. Research on fire detection using wireless sensor network and video-based methods is a very hot research topic. However, the WSN based detection model need fire happens and a lot of smoke and fire for detection. Similarly, video-based models also have some drawbacks because conventional algorithms need feature vectors and high rule-based models for detection. In this paper, we proposed a fire detection method which is based on powerful machine learning and deep learning algorithms. We used both sensors data as well as images data for fire prevention. Our proposed model has three main deep neural networks i.e. a hybrid model which consists of Adaboost and many MLP neural networks, Adaboost-LBP model and finally convolutional neural network. We used Adaboost-MLP model to predict the fire. After the prediction, we proposed two neural networks i.e. Adaboost-LBP model and convolutional neural network for detection of fire using the videos and images taken from the cameras installed for the surveillance. Adaboost-LBP model is to generate the ROIs from the image where emergencies exist Our proposed model results are quite good, and the accuracy is almost 99%. The false alarming rate is very low and can be reduced more using further training.

  相似文献   
40.
In cognitive radio network, the secondary users (SUs) use the spectrum of primary users for communication which arises the security issues. The status of SUs as legitimate users is compulsory for the stability of the system. This paper addresses the issue of delay caused by a band-selection decision process that directly affects the security and performance. The model cluster-based distributed cooperative spectrum sensing is proposed. In this model, cluster heads (CHs) exchange control information with other CHs and ordinary nodes. This model significantly reduced the delay, sensing, convergence, routing, in band-selection process. This also reduces the energy consumption while sensing the spectrum which seriously leads to performance upgradation. The simulated results show the improved performance of cognitive radio networks in terms of delay, packet loss ratio and bandwidth usage as compared to cluster-based cooperative spectrum sensing model. The opportunity for primary user emulation attacker is minimized as the overall delay is reduced.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号