首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   498篇
  免费   29篇
  国内免费   3篇
电工技术   6篇
化学工业   84篇
金属工艺   8篇
机械仪表   13篇
建筑科学   19篇
矿业工程   1篇
能源动力   38篇
轻工业   90篇
水利工程   4篇
石油天然气   2篇
无线电   48篇
一般工业技术   87篇
冶金工业   22篇
原子能技术   2篇
自动化技术   106篇
  2024年   1篇
  2023年   15篇
  2022年   36篇
  2021年   54篇
  2020年   26篇
  2019年   25篇
  2018年   33篇
  2017年   22篇
  2016年   32篇
  2015年   15篇
  2014年   20篇
  2013年   41篇
  2012年   31篇
  2011年   35篇
  2010年   24篇
  2009年   22篇
  2008年   19篇
  2007年   13篇
  2006年   13篇
  2005年   6篇
  2004年   5篇
  2003年   6篇
  2001年   5篇
  2000年   5篇
  1999年   1篇
  1997年   3篇
  1996年   6篇
  1995年   3篇
  1993年   2篇
  1992年   2篇
  1991年   1篇
  1987年   1篇
  1985年   1篇
  1984年   1篇
  1983年   1篇
  1981年   2篇
  1978年   2篇
排序方式: 共有530条查询结果,搜索用时 15 毫秒
61.
This paper presents link to system (L2S) interfacing technique for multiple input and multiple output (MIMO) iterative receivers. In L2S interfacing, usually the post detection signal to noise ratio (SNR)‐based frame error rate lookup tables (LUT) are used to predict the link level performance of receivers. While L2S interfacing for linear MIMO receivers can be conveniently implemented, it is more challenging for MIMO iterative receivers due to unavailability of the closed form SNR expressions. In this paper, we propose three methods for post detection SNR estimation for MIMO iterative receivers. The first is based on the QR decomposition of the channel matrix, the second relies on the residual noise calculation based on the soft symbols, and the third exploits the closed form SNR expressions for linear receivers. A link to system interface model for iterative receivers is developed for evaluating the reference curves for different modulation and coding schemes, and results are validated by comparing the simulated and predicted frame error rates. It is shown that linear and residual noise‐based SNR approximations result in a very good prediction performance whereas the performance of QR decomposition‐based method degrades for higher order modulations and coding schemes. This paper presents link to system interfacing technique for MIMO iterative receivers. A link to system interface model for iterative receivers is developed for evaluating the reference curves for different modulation and coding schemes, and results are validated by comparing the simulated and predicted frame error rates. Three post detection SNR evaluation schemes have been proposed for link to system interfacing all of which give good prediction performance especially at lower order modulation.  相似文献   
62.
Printing techniques using nanomaterials have emerged as a versatile tool for fast prototyping and potentially large-scale manufacturing of functional devices. Surfactants play a significant role in many printing processes due to their ability to reduce interfacial tension between ink solvents and nanoparticles and thus improve ink colloidal stability. Here, a colloidal graphene quantum dot (GQD)-based nanosurfactant is reported to stabilize various types of 2D materials in aqueous inks. In particular, a graphene ink with superior colloidal stability is demonstrated by GQD nanosurfactants via the π–π stacking interaction, leading to the printing of multiple high-resolution patterns on various substrates using a single printing pass. It is found that nanosurfactants can significantly improve the mechanical stability of the printed graphene films compared with those of conventional molecular surfactant, as evidenced by 100 taping, 100 scratching, and 1000 bending cycles. Additionally, the printed composite film exhibits improved photoconductance using UV light with 400 nm wavelength, arising from excitation across the nanosurfactant bandgap. Taking advantage of the 3D conformal aerosol jet printing technique, a series of UV sensors of heterogeneous structures are directly printed on 2D flat and 3D spherical substrates, demonstrating the potential of manufacturing geometrically versatile devices based on nanosurfactant inks.  相似文献   
63.
The purpose of this research is the segmentation of lungs computed tomography (CT) scan for the diagnosis of COVID-19 by using machine learning methods. Our dataset contains data from patients who are prone to the epidemic. It contains three types of lungs CT images (Normal, Pneumonia, and COVID-19) collected from two different sources; the first one is the Radiology Department of Nishtar Hospital Multan and Civil Hospital Bahawalpur, Pakistan, and the second one is a publicly free available medical imaging database known as Radiopaedia. For the preprocessing, a novel fuzzy c-mean automated region-growing segmentation approach is deployed to take an automated region of interest (ROIs) and acquire 52 hybrid statistical features for each ROIs. Also, 12 optimized statistical features are selected via the chi-square feature reduction technique. For the classification, five machine learning classifiers named as deep learning J4, multilayer perceptron, support vector machine, random forest, and naive Bayes are deployed to optimize the hybrid statistical features dataset. It is observed that the deep learning J4 has promising results (sensitivity and specificity: 0.987; accuracy: 98.67%) among all the deployed classifiers. As a complementary study, a statistical work is devoted to the use of a new statistical model to fit the main datasets of COVID-19 collected in Pakistan.  相似文献   
64.
Cerebral Microbleeds (CMBs) are microhemorrhages caused by certain abnormalities of brain vessels. CMBs can be found in people with Traumatic Brain Injury (TBI), Alzheimer’s disease, and in old individuals having a brain injury. Current research reveals that CMBs can be highly dangerous for individuals having dementia and stroke. The CMBs seriously impact individuals’ life which makes it crucial to recognize the CMBs in its initial phase to stop deterioration and to assist individuals to have a normal life. The existing work report good results but often ignores false-positive’s perspective for this research area. In this paper, an efficient approach is presented to detect CMBs from the Susceptibility Weighted Images (SWI). The proposed framework consists of four main phases (i) making clusters of brain Magnetic Resonance Imaging (MRI) using k-mean classifier (ii) reduce false positives for better classification results (iii) discriminative feature extraction specific to CMBs (iv) classification using a five layers convolutional neural network (CNN). The proposed method is evaluated on a public dataset available for 20 subjects. The proposed system shows an accuracy of 98.9% and a 1.1% false-positive rate value. The results show the superiority of the proposed work as compared to existing states of the art methods.  相似文献   
65.
Multimedia Tools and Applications - Visual Scene interpretation is one of the major areas of research in the recent past. Recognition of human object interaction is a fundamental step...  相似文献   
66.
Water Resources Management - The use of wavelet-coupled data-driven models is increasing in the field of hydrological modelling. However, wavelet-coupled artificial neural network (ANN) models...  相似文献   
67.

In this paper, we introduced some similarity measures for bipolar neutrosophic sets such as; Dice similarity measure, weighted Dice similarity measure, Hybrid vector similarity measure and weighted Hybrid vector similarity measure. Also we examine the propositions of the similarity measures. Furthermore, a multi-criteria decision-making method for bipolar neutrosophic set is developed based on these given similarity measures. Then, a practical example is shown to verify the feasibility of the new method. Finally, we compare the proposed method with the existing methods in order to demonstrate the practicality and effectiveness of the developed method in this paper.

  相似文献   
68.
To the best of our knowledge, the tool of soft set theory is a new efficacious technique to dispose uncertainties and it focuses on the parameterization, while fuzzy set theory emphasizes the truth degree and rough set theory as another tool to handle uncertainties, it places emphasis on granular. However, the real-world problems that under considerations are usual very complicated. Consequently, it is very difficult to solve them by a single mathematical tool. It is worth noting that decision making (briefly, DM) in an imprecise environment has been showing more and more role in real-world applications. Researches on the idiographic applications of the above three uncertain theories as well as their hybrid models in DM have attracted many researchers’ widespread interest. DM methods are not yet proposed based on fusions of the above three uncertain theories. In view of the reason, by compromising the above three uncertain theories, we elaborate some reviews to DM methods based on two classes of hybrid soft models: SRF-sets and SFR-sets. We test all algorithms for DM and computation time on data sets produced by soft sets and FS-sets. The numerical experimentation programs are written for given pseudo codes in MATLAB. At the same time, the comparisons of all algorithms are given. Finally, we expatiate on an overview of techniques based on the involved hybrid soft set models.  相似文献   
69.

The Internet of Things (IoT) has emerged as one of the most revolutionary technological innovations with the proliferation of applications within almost all fields of the human race. A cloud environment is the main component of IoT infrastructure to make IoT devices efficient, safe, reliable, usable, and autonomous. Reduction in infrastructure cost and demand accessibility of shared resources are essential parts of cloud-based IoT (CIoT) infrastructure. Information leakage in cloud-assisted IoT devices may invite dangerous activities and phenomena. Various cloud-based systems store IoT sensor data and later on access it accordingly. Some of them are public, and some of them are private. Private cloud services must be secured from external as well as internal adversaries. Hence, there must be a robust mechanism to prevent unauthorized access to devices. This paper proposes a novel and efficient protocol based on the Elliptic Curve property known as Elliptic Curve Discrete Logarithm Problem (ECDLP) with hash and XOR functions for the authentication in cloud-based IoT devices. In comparison to the existing protocols, the proposed protocol is resistant to attacks and other security vulnerabilities. The one-way hash function and XOR function effectively ensure a reduction in computation cost. AVISPA and BAN logic have been used for formal analysis of the proposed protocol. As per the performance analysis results, it is clear that the proposed protocol is efficiently suitable for cloud-assisted IoT devices.

  相似文献   
70.
Taxonomy is generated to effectively organize and access large volume of data. A taxonomy is a way of representing concepts that exist in data. It needs to continuously evolve to reflect changes in data. Existing automatic taxonomy generation techniques do not handle the evolution of data; therefore, the generated taxonomies do not truly represent the data. The evolution of data can be handled by either regenerating taxonomy from scratch, or allowing taxonomy to incrementally evolve whenever changes occur in the data. The former approach is not economical in terms of time and resources. A taxonomy incremental evolution (TIE) algorithm, as proposed, is a novel attempt to handle the data that evolve in time. It serves as a layer over an existing clustering-based taxonomy generation technique and allows an existing taxonomy to incrementally evolve. The algorithm was evaluated in research articles selected from the computing domain. It was found that the taxonomy using the algorithm that evolved with data needed considerably shorter time, and had better quality per unit time as compared to the taxonomy regenerated from scratch.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号