首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3548篇
  免费   178篇
  国内免费   3篇
电工技术   64篇
综合类   6篇
化学工业   889篇
金属工艺   73篇
机械仪表   80篇
建筑科学   193篇
矿业工程   6篇
能源动力   85篇
轻工业   272篇
水利工程   18篇
石油天然气   5篇
无线电   307篇
一般工业技术   676篇
冶金工业   454篇
原子能技术   21篇
自动化技术   580篇
  2022年   43篇
  2021年   68篇
  2020年   43篇
  2019年   60篇
  2018年   63篇
  2017年   78篇
  2016年   91篇
  2015年   96篇
  2014年   128篇
  2013年   174篇
  2012年   149篇
  2011年   223篇
  2010年   160篇
  2009年   140篇
  2008年   174篇
  2007年   161篇
  2006年   135篇
  2005年   116篇
  2004年   82篇
  2003年   94篇
  2002年   71篇
  2001年   69篇
  2000年   61篇
  1999年   62篇
  1998年   147篇
  1997年   118篇
  1996年   87篇
  1995年   52篇
  1994年   46篇
  1993年   52篇
  1992年   38篇
  1991年   34篇
  1990年   30篇
  1989年   27篇
  1988年   27篇
  1987年   23篇
  1986年   42篇
  1985年   27篇
  1984年   28篇
  1983年   23篇
  1982年   19篇
  1981年   29篇
  1980年   25篇
  1979年   30篇
  1978年   32篇
  1977年   43篇
  1976年   38篇
  1975年   18篇
  1973年   16篇
  1970年   18篇
排序方式: 共有3729条查询结果,搜索用时 15 毫秒
841.

The fifth generation (5G) networks are characterized with ultra-dense deployment of base stations with limited footprint. Consequently, user equipment’s handover frequently as they move within 5G networks. In addition, 5G requirements of ultra-low latencies imply that handovers should be executed swiftly to minimize service disruptions. To preserve security and privacy while at the same time maintaining optimal performance during handovers, numerous schemes have been developed. However, majority of these techniques are either limited to security and privacy or address only performance aspect of the handover mechanism. As such, there is need for a novel handover authentication protocol that addresses security, privacy and performance simultaneously. This paper presents a machine learning protocol that not only facilitates optimal selection of target cell but also upholds both security and privacy during handovers. Formal security analysis using the widely adopted Burrows–Abadi–Needham (BAN) logic shows that the proposed protocol achieves all the six formulated under this proof. As such, the proposed protocol facilitates strong and secure mutual authentication among the communicating entities before generating the shares session key. The derived session key protected the exchanged packets to avert attacks such as forgery. In addition, informal security evaluation of the proposed protocol shows that it offers perfect forward key secrecy, mutual authentication any user anonymity. It is also demonstrated to be robust against attacks such as denial of service (DoS), man-in-the-middle (MitM), masquerade, packet replays and forgery. In terms of performance, simulation results shows that it has lower packets drop rate and ping–pong rate, with higher ratio of packets received compared with improved 5G authentication and key agreement (5G AKA’) protocol. Specifically, using 5G AKA’ as the basis, the proposed protocol reduces the handover rate by 94.4%, hence the resulting handover signaling is greatly minimized.

  相似文献   
842.
We present new methods for fast Gaussian process (GP) inference in large-scale scenarios including exact multi-class classification with label regression, hyperparameter optimization, and uncertainty prediction. In contrast to previous approaches, we use a full Gaussian process model without sparse approximation techniques. Our methods are based on exploiting generalized histogram intersection kernels and their fast kernel multiplications. We empirically validate the suitability of our techniques in a wide range of scenarios with tens of thousands of examples. Whereas plain GP models are intractable due to both memory consumption and computation time in these settings, our results show that exact inference can indeed be done efficiently. In consequence, we enable every important piece of the Gaussian process framework—learning, inference, hyperparameter optimization, variance estimation, and online learning—to be used in realistic scenarios with more than a handful of data.  相似文献   
843.
The procedure for the engineering of products and production systems in manufacturing companies is often distributed over several organisational units. The different units involved in these procedures use their respective methods and tools, resulting in silo-like and distributed information and data sources for engineering. In this paper, the open platform amePLM is introduced. This platform is based on a semantic data model. The ontology as explicitly formulated data model allows an integrated view on data and information available in the systems used along the product lifecycle, and the automatic provision of suitable information to the user. Furthermore, this open approach allows the linking of the solution to existing engineering software systems in the sense of a continuous flow of information.  相似文献   
844.
Pt-decorated \(\hbox {TiO}_{2}\) nanotubes Pt@TiO2 are prepared only by applying a set of facile wet-chemical redox reactions to ion track-etched polycarbonate templates. First, a homogeneous layer of Pt nanoparticles is deposited onto the complex template surface by reducing potassium tetrachloroplatinate with absorbed dimethylaminoborane. Second, the template is coated with a conformal \(\hbox {TiO}_{2}\) layer, using a chemical bath deposition reaction based on titanium(III) chloride. After the removal of the template, the rutile-type \(\hbox {TiO}_{2}\) nanotubes remain decorated with Pt nanoparticles and nanoparticle-clusters on their outside. During the process, neither vacuum techniques nor external current sources or addition of heat are employed. The crystallinity, composition, and morphology of the composite nanotubes are analysed by X-ray diffraction, scanning and transmission electron microscopy as well as by energy-dispersive X-ray spectroscopy. Finally, the obtained materials are examplarily applied in the electrooxidation of ethanol and formic acid, and their performances have been evaluated. Compared to conventional carbon black-supported Pt nanoparticles, the Pt@TiO2 nanotubes show higher reaction rates. Mass activities of 2.36 \(\hbox {A}\hbox { mg}_{\rm Pt}^{-1}\hbox { cm}^{-2}\) are reached in ethanol oxidation and 7.56 \(\hbox {A}\hbox { mg}_{\rm Pt}^{-1}\hbox { cm}^{-2}\) in the formic acid oxidation. The present structures are able to exploit the synergy of Pt and \(\hbox {TiO}_{2}\) with a bifunctional mechanism to result in powerful but easy-to-fabricate catalyst structures. They represent an easily producible type of composite nanostructures which can be applied in various fields such as in catalytics and sensor technology.  相似文献   
845.
846.
847.
Declarative systems aim at solving tasks by running inference engines on a specification, to free their users from having to specify how a task should be tackled. In order to provide such functionality, declarative systems themselves apply complex reasoning techniques, and, as a consequence, the development of such systems can be laborious work. In this paper, we demonstrate that the declarative approach can be applied to develop such systems, by tackling the tasks solved inside a declarative system declaratively. In order to do this, a meta-level representation of those specifications is often required. Furthermore, by using the language of the system for the meta-level representation, it opens the door to bootstrapping: an inference engine can be improved using the inference it performs itself.One such declarative system is the IDP knowledge base system, based on the language \(\rm FO(\cdot)^{\rm IDP}\), a rich extension of first-order logic. In this paper, we discuss how \(\rm FO(\cdot)^{\rm IDP}\) can support meta-level representations in general and which language constructs make those representations even more natural. Afterwards, we show how meta-\(\rm FO(\cdot)^{\rm IDP}\) can be applied to bootstrap its model expansion inference engine. We discuss the advantages of this approach: the resulting program is easier to understand, easier to maintain, and more flexible.  相似文献   
848.
849.
850.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号