首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7387篇
  免费   332篇
  国内免费   53篇
电工技术   134篇
综合类   27篇
化学工业   1832篇
金属工艺   124篇
机械仪表   224篇
建筑科学   281篇
矿业工程   6篇
能源动力   480篇
轻工业   749篇
水利工程   77篇
石油天然气   116篇
无线电   691篇
一般工业技术   1201篇
冶金工业   374篇
原子能技术   87篇
自动化技术   1369篇
  2024年   26篇
  2023年   154篇
  2022年   331篇
  2021年   419篇
  2020年   311篇
  2019年   340篇
  2018年   429篇
  2017年   370篇
  2016年   368篇
  2015年   242篇
  2014年   325篇
  2013年   670篇
  2012年   362篇
  2011年   517篇
  2010年   363篇
  2009年   346篇
  2008年   301篇
  2007年   226篇
  2006年   207篇
  2005年   145篇
  2004年   114篇
  2003年   125篇
  2002年   95篇
  2001年   66篇
  2000年   77篇
  1999年   54篇
  1998年   91篇
  1997年   44篇
  1996年   56篇
  1995年   46篇
  1994年   40篇
  1993年   47篇
  1992年   38篇
  1991年   35篇
  1990年   31篇
  1989年   23篇
  1988年   35篇
  1987年   32篇
  1986年   21篇
  1985年   17篇
  1984年   27篇
  1983年   23篇
  1982年   24篇
  1981年   16篇
  1980年   20篇
  1979年   16篇
  1978年   18篇
  1976年   19篇
  1975年   20篇
  1974年   12篇
排序方式: 共有7772条查询结果,搜索用时 0 毫秒
71.
Power system stability is enhanced through a novel stabilizer developed around an adaptive fuzzy sliding mode approach which applies the Nussbaum gain to a nonlinear model of a single-machine infinite-bus (SMIB) and multi-machine power system stabilizer subjected to a three phase fault. The Nussbaum gain is used to avoid the positive sign constraint and the problem of controllability of the system. A comparative simulation study is presented to evaluate the achieved performance.  相似文献   
72.
From the perspective of data security, which has always been an important aspect of quality of service, cloud computing focuses a new challenging security threats. Therefore, a data security model must solve the most challenges of cloud computing security. The proposed data security model provides a single default gateway as a platform. It used to secure sensitive user data across multiple public and private cloud applications, including Salesforce, Chatter, Gmail, and Amazon Web Services, without influencing functionality or performance. Default gateway platform encrypts sensitive data automatically in a real time before sending to the cloud storage without breaking cloud application. It did not effect on user functionality and visibility. If an unauthorized person gets data from cloud storage, he only sees encrypted data. If authorized person accesses successfully in his cloud, the data is decrypted in real time for your use. The default gateway platform must contain strong and fast encryption algorithm, file integrity, malware detection, firewall, tokenization and more. This paper interested about authentication, stronger and faster encryption algorithm, and file integrity.  相似文献   
73.
Xia Y  Kamel MS 《Neural computation》2008,20(3):844-872
The constrained L(1) estimation is an attractive alternative to both the unconstrained L(1) estimation and the least square estimation. In this letter, we propose a cooperative recurrent neural network (CRNN) for solving L(1) estimation problems with general linear constraints. The proposed CRNN model combines four individual neural network models automatically and is suitable for parallel implementation. As a special case, the proposed CRNN includes two existing neural networks for solving unconstrained and constrained L(1) estimation problems, respectively. Unlike existing neural networks, with penalty parameters, for solving the constrained L(1) estimation problem, the proposed CRNN is guaranteed to converge globally to the exact optimal solution without any additional condition. Compared with conventional numerical algorithms, the proposed CRNN has a low computational complexity and can deal with the L(1) estimation problem with degeneracy. Several applied examples show that the proposed CRNN can obtain more accurate estimates than several existing algorithms.  相似文献   
74.
Sophisticated on-chip interconnects using packet and circuit switching techniques were recently proposed as a solution to non-scalable shared-bus schemes currently used in Systems-on-Chip (SoCs) implementation. Different interconnect architectures have been studied and adapted for SoCs to achieve high throughput, low latency and energy consumption, and efficient silicon area. Recently, a new on-chip interconnect architecture by adapting the WK-recursive network topology structure has been introduced for SoCs. This paper analyses and compares the energy consumption and the area requirements of Wk-recursive network with five common on-chip interconnects, 2D Mesh, Ring, Spidergon, Fat-Tree and Butterfly Fat-Tree. We investigated the effects of load and traffic models and the obtained results show that the traffic models and load that ends processing elements has a direct effect on the energy consumption and area requirements. In these results, WK-recursive interconnect generally has a higher energy consumption and silicon area requirements in heavy traffic load.  相似文献   
75.
We study the problem of stabilizing a distributed linear system on a subregion of its geometrical domain. We are concerned with two methods: the first approach enables us to characterize a stabilizing control via the steady state Riccati equation, and the second one is based on decomposing the state space into two suitable subspaces and studying the projections of the initial system onto such subspaces. The obtained results are performed through various examples.  相似文献   
76.
An original inversion method specifically adapted to the estimation of Poisson coefficient of balls by using their resonance spectra is described. From the study of their elastic vibrations, it is possible to accurately characterize the balls. The proposed methodology can create both spheroidal modes in the balls and detect such vibrations over a large frequency range. Experimentally, by using both an ultrasonic probe for the emission (piezoelectric transducer) and a heterodyne optic probe for the reception (interferometer), it was possible to take spectroscopic measurements of spheroidal vibrations over a large frequency range (100 kHz-45 MHz) in a continuous regime. This method, which uses ratios between wave resonance frequencies, allows the Poisson coefficient to be determined independently of Young's modulus and the ball's radius and density. This has the advantage of providing highly accurate estimations of Poisson coefficient (+/-4.3 x 10(-4)) over a wide frequency range.  相似文献   
77.
Neural Computing and Applications - Feature selection (FS) is one of the basic data preprocessing steps in data mining and machine learning. It is used to reduce feature size and increase model...  相似文献   
78.
The conventional hospital environment is transformed into digital transformation that focuses on patient centric remote approach through advanced technologies. Early diagnosis of many diseases will improve the patient life. The cost of health care systems is reduced due to the use of advanced technologies such as Internet of Things (IoT), Wireless Sensor Networks (WSN), Embedded systems, Deep learning approaches and Optimization and aggregation methods. The data generated through these technologies will demand the bandwidth, data rate, latency of the network. In this proposed work, efficient discrete grey wolf optimization (DGWO) based data aggregation scheme using Elliptic curve Elgamal with Message Authentication code (ECEMAC) has been used to aggregate the parameters generated from the wearable sensor devices of the patient. The nodes that are far away from edge node will forward the data to its neighbor cluster head using DGWO. Aggregation scheme will reduce the number of transmissions over the network. The aggregated data are preprocessed at edge node to remove the noise for better diagnosis. Edge node will reduce the overhead of cloud server. The aggregated data are forward to cloud server for central storage and diagnosis. This proposed smart diagnosis will reduce the transmission cost through aggregation scheme which will reduce the energy of the system. Energy cost for proposed system for 300 nodes is 0.34μJ. Various energy cost of existing approaches such as secure privacy preserving data aggregation scheme (SPPDA), concealed data aggregation scheme for multiple application (CDAMA) and secure aggregation scheme (ASAS) are 1.3 μJ, 0.81 μJ and 0.51 μJ respectively. The optimization approaches and encryption method will ensure the data privacy.  相似文献   
79.
Wireless Personal Communications - The cell-Free massive multiple input multiple output “mMIMO” networks can provide a satisfied performance for the fifth generation “5G”...  相似文献   
80.
Wireless Personal Communications - Software-defined networking (SDN) is widely perceived to simplify network management and monitoring. The introduction of the SDN model into wireless sensor...  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号