首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7146篇
  免费   501篇
  国内免费   24篇
电工技术   76篇
综合类   13篇
化学工业   1198篇
金属工艺   91篇
机械仪表   117篇
建筑科学   141篇
矿业工程   17篇
能源动力   335篇
轻工业   418篇
水利工程   41篇
石油天然气   93篇
无线电   442篇
一般工业技术   791篇
冶金工业   3252篇
原子能技术   46篇
自动化技术   600篇
  2024年   14篇
  2023年   120篇
  2022年   223篇
  2021年   256篇
  2020年   206篇
  2019年   219篇
  2018年   258篇
  2017年   218篇
  2016年   285篇
  2015年   197篇
  2014年   266篇
  2013年   373篇
  2012年   215篇
  2011年   221篇
  2010年   181篇
  2009年   166篇
  2008年   134篇
  2007年   116篇
  2006年   95篇
  2005年   92篇
  2004年   79篇
  2003年   54篇
  2002年   45篇
  2001年   53篇
  2000年   42篇
  1999年   158篇
  1998年   1063篇
  1997年   623篇
  1996年   408篇
  1995年   191篇
  1994年   204篇
  1993年   206篇
  1992年   38篇
  1991年   27篇
  1990年   39篇
  1989年   39篇
  1988年   35篇
  1987年   27篇
  1986年   26篇
  1985年   25篇
  1984年   14篇
  1983年   16篇
  1982年   28篇
  1981年   22篇
  1980年   28篇
  1978年   14篇
  1977年   96篇
  1976年   172篇
  1975年   11篇
  1974年   8篇
排序方式: 共有7671条查询结果,搜索用时 16 毫秒
161.
Primary focal segmental glomerulosclerosis (FSGS) is a lesion associated with a poor prognosis and results in end-stage renal disease after 5 to 10 years. Based on past experience, many nephrologists have considered primary FSGS a lesion that is steroid resistant and therefore are reluctant to offer steroids as treatment. Recent data, however, have demonstrated that patients with primary FSGS have a response to steroid therapy that is considerably better than had been described. Thus, it may be that nephrologists have been more "steroid reluctant" than the lesion is steroid resistant. To better understand this issue we review the clinical course and response to therapy in patients with primary FSGS.  相似文献   
162.
The objective of our study was to assess the long-term outcome of patients with prosthetic valve endocarditis. We used a multicenter, prospective, observational study design. Six university teaching hospitals with high volume cardiothoracic surgery participated. Seventy-four patients with prosthetic valve endocarditis as defined by explicit, objective criteria were selected for participation. All patients were followed up prospectively for 1 year. Thirty-one percent and 69% had development of endocarditis within 60 days of valve insertion ("early") and after 60 days ("late"), respectively. The most common causes were Staphylococcus epidermidis (40%), Staphylococcus aureus (20%), streptococcal species (18%), and aerobic gram-negative bacilli (11%). Physical signs of endocarditis (new or changing murmur, stigmata, emboli) were seen in 58%. At 6 months and 12 months, mortality was 46% and 47%, respectively. Surgical replacement of the infected valve led to significantly lower mortality (23%) as compared with medical therapy alone (56%), as assessed by both univariate and multivariate analyses (p < 0.05). Improved outcome was seen for the surgical group even when controlling for severity of illness at time of diagnosis. From these findings we conclude that accurate assessment of outcome in prosthetic valve endocarditis requires long-term follow-up of at least 6 months following diagnosis. Surgical therapy warrants greater scrutiny; evaluation in controlled clinical trials is appropriate.  相似文献   
163.
The Internet of Things (IoT) has gained more popularity in research because of its large-scale challenges and implementation. But security was the main concern when witnessing the fast development in its applications and size. It was a dreary task to independently set security systems in every IoT gadget and upgrade them according to the newer threats. Additionally, machine learning (ML) techniques optimally use a colossal volume of data generated by IoT devices. Deep Learning (DL) related systems were modelled for attack detection in IoT. But the current security systems address restricted attacks and can be utilized outdated datasets for evaluations. This study develops an Artificial Algae Optimization Algorithm with Optimal Deep Belief Network (AAA-ODBN) Enabled Ransomware Detection in an IoT environment. The presented AAA-ODBN technique mainly intends to recognize and categorize ransomware in the IoT environment. The presented AAA-ODBN technique follows a three-stage process: feature selection, classification, and parameter tuning. In the first stage, the AAA-ODBN technique uses AAA based feature selection (AAA-FS) technique to elect feature subsets. Secondly, the AAA-ODBN technique employs the DBN model for ransomware detection. At last, the dragonfly algorithm (DFA) is utilized for the hyperparameter tuning of the DBN technique. A sequence of simulations is implemented to demonstrate the improved performance of the AAA-ODBN algorithm. The experimental values indicate the significant outcome of the AAA-ODBN model over other models.  相似文献   
164.
With the increased advancements of smart industries, cybersecurity has become a vital growth factor in the success of industrial transformation. The Industrial Internet of Things (IIoT) or Industry 4.0 has revolutionized the concepts of manufacturing and production altogether. In industry 4.0, powerful Intrusion Detection Systems (IDS) play a significant role in ensuring network security. Though various intrusion detection techniques have been developed so far, it is challenging to protect the intricate data of networks. This is because conventional Machine Learning (ML) approaches are inadequate and insufficient to address the demands of dynamic IIoT networks. Further, the existing Deep Learning (DL) can be employed to identify anonymous intrusions. Therefore, the current study proposes a Hunger Games Search Optimization with Deep Learning-Driven Intrusion Detection (HGSODL-ID) model for the IIoT environment. The presented HGSODL-ID model exploits the linear normalization approach to transform the input data into a useful format. The HGSO algorithm is employed for Feature Selection (HGSO-FS) to reduce the curse of dimensionality. Moreover, Sparrow Search Optimization (SSO) is utilized with a Graph Convolutional Network (GCN) to classify and identify intrusions in the network. Finally, the SSO technique is exploited to fine-tune the hyper-parameters involved in the GCN model. The proposed HGSODL-ID model was experimentally validated using a benchmark dataset, and the results confirmed the superiority of the proposed HGSODL-ID method over recent approaches.  相似文献   
165.
Next-generation cellular networks are expected to provide users with innovative gigabits and terabits per second speeds and achieve ultra-high reliability, availability, and ultra-low latency. The requirements of such networks are the main challenges that can be handled using a range of recent technologies, including multi-access edge computing (MEC), artificial intelligence (AI), millimeter-wave communications (mmWave), and software-defined networking. Many aspects and design challenges associated with the MEC-based 5G/6G networks should be solved to ensure the required quality of service (QoS). This article considers developing a complex MEC structure for fifth and sixth-generation (5G/6G) cellular networks. Furthermore, we propose a seamless migration technique for complex edge computing structures. The developed migration scheme enables services to adapt to the required load on the radio channels. The proposed algorithm is analyzed for various use cases, and a test bench has been developed to emulate the operator’s infrastructure. The obtained results are introduced and discussed.  相似文献   
166.
Internet Protocol version 6 (IPv6) is the latest version of IP that goal to host 3.4 × 1038 unique IP addresses of devices in the network. IPv6 has introduced new features like Neighbour Discovery Protocol (NDP) and Address Auto-configuration Scheme. IPv6 needed several protocols like the Address Auto-configuration Scheme and Internet Control Message Protocol (ICMPv6). IPv6 is vulnerable to numerous attacks like Denial of Service (DoS) and Distributed Denial of Service (DDoS) which is one of the most dangerous attacks executed through ICMPv6 messages that impose security and financial implications. Therefore, an Intrusion Detection System (IDS) is a monitoring system of the security of a network that detects suspicious activities and deals with a massive amount of data comprised of repetitive and inappropriate features which affect the detection rate. A feature selection (FS) technique helps to reduce the computation time and complexity by selecting the optimum subset of features. This paper proposes a method for detecting DDoS flooding attacks (FA) based on ICMPv6 messages using a Binary Flower Pollination Algorithm (BFPA-FA). The proposed method (BFPA-FA) employs FS technology with a support vector machine (SVM) to identify the most relevant, influential features. Moreover, The ICMPv6-DDoS dataset was used to demonstrate the effectiveness of the proposed method through different attack scenarios. The results show that the proposed method BFPA-FA achieved the best accuracy rate (97.96%) for the ICMPv6 DDoS detection with a reduced number of features (9) to half the total (19) features. The proven proposed method BFPA-FA is effective in the ICMPv6 DDoS attacks via IDS.  相似文献   
167.
Active matrix prestressed microelectromechanical shutter displays enable outstanding optical properties as well as robust operating performance. The microelectromechanical systems (MEMS) shutter elements have been optimized for higher light outcoupling efficiency with lower operation voltage and higher pixel density. The MEMS elements have been co-fabricated with self-aligned metal-oxide thin-film transistors (TFTs). Several optimizations were required to integrate MEMS process without hampering the performance of both elements. The optimized display process requires only seven photolithographic masks with ensuring proper compatibility between MEMS shutter and metal-oxide TFT process.  相似文献   
168.
In this study, a series of donor–acceptor–donor (D-A-D) type small molecules based on the fluorene and diphenylethenyl enamine units, which are distinguished by different acceptors, as holetransporting materials (HTMs) for perovskite solar cells is presented. The incorporation of the malononitrile acceptor units is found to be beneficial for not only carrier transportation but also defects passivation via Pb–N interactions. The highest power conversion efficiency of over 22% is achieved on cells based on V1359, which is higher than that of spiro-OMeTAD under identical conditions. This st shows that HTMs prepared via simplified synthetic routes are not only a low-cost alternative to spiro-OMeTAD but also outperform in efficiency and stability state-of-art materials obtained via expensive cross-coupling methods.  相似文献   
169.

In communication industry one of the most rapidly growing area is wireless technology and its applications. The efficient access to radio spectrum is a requirement to make this communication feasible for the users that are running multimedia applications and establishing real-time connections on an already overcrowded spectrum. In recent times cognitive radios (CR) are becoming the prime candidates for improved utilization of available spectrum. The unlicensed secondary users share the spectrum with primary licensed user in such manners that the interference at the primary user does not increase from a predefined threshold. In this paper, we propose an algorithm to address the power control problem for CR networks. The proposed solution models the wireless system with a non-cooperative game, in which each player maximize its utility in a competitive environment. The simulation results shows that the proposed algorithm improves the performance of the network in terms of high SINR and low power consumption.

  相似文献   
170.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号