首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1633篇
  免费   139篇
  国内免费   14篇
电工技术   44篇
综合类   8篇
化学工业   425篇
金属工艺   72篇
机械仪表   62篇
建筑科学   83篇
矿业工程   4篇
能源动力   124篇
轻工业   127篇
水利工程   26篇
石油天然气   29篇
无线电   168篇
一般工业技术   242篇
冶金工业   74篇
原子能技术   16篇
自动化技术   282篇
  2024年   7篇
  2023年   36篇
  2022年   55篇
  2021年   98篇
  2020年   80篇
  2019年   103篇
  2018年   144篇
  2017年   131篇
  2016年   150篇
  2015年   85篇
  2014年   110篇
  2013年   190篇
  2012年   121篇
  2011年   88篇
  2010年   78篇
  2009年   56篇
  2008年   42篇
  2007年   32篇
  2006年   18篇
  2005年   9篇
  2004年   10篇
  2003年   13篇
  2002年   13篇
  2001年   11篇
  2000年   8篇
  1999年   4篇
  1998年   13篇
  1997年   3篇
  1996年   5篇
  1995年   12篇
  1994年   5篇
  1993年   4篇
  1992年   6篇
  1991年   5篇
  1990年   4篇
  1989年   6篇
  1988年   3篇
  1987年   2篇
  1986年   4篇
  1985年   3篇
  1984年   1篇
  1983年   3篇
  1982年   5篇
  1979年   3篇
  1976年   1篇
  1975年   1篇
  1973年   2篇
  1970年   2篇
  1969年   1篇
排序方式: 共有1786条查询结果,搜索用时 15 毫秒
21.
Wireless mesh networks (WMNs) introduce a new type of network that has been applied over the last few years. One of the most important developing issues in WMNs is multicast routing, which is a key technology that provides dissemination of data to a group of members in an efficient way. In this article, after an introduction about the structure of a WMN, multicast routing algorithms and protocols in WMNs are surveyed in a detailed and efficient manner. Moreover, effort is made to scale the study into one of the important potential capabilities of multicast routing mechanisms in WMNs, which is taking advantage of using different channels and radios association. While nodes in a single-radio mesh network operating on single-channel have restrictions for capacity, equipping mesh routers with multiple radios using multiple channels can decrease the intention of capacity problem as well as increase the aggregate bandwidth available to the network and improving the throughput. Hence, the purpose of channel assignment is to decrease the interferences while increasing the network capacity and keeping the connectivity of the network. Therefore, this article investigates the multicast protocols considering a definition of three types of WMNs, based on channel-radio association including SRSC, SRMC and MRMC. In its follow, a classification for multicast routing algorithms regarding the achieved optimal solutions will be presented. Finally, a study of MRMC and its relevant problems will be offered, considering the joint channel assignment and the multicast tree construction problem.  相似文献   
22.
The crystallinity of rigid PVC specimens, stabilized by a tin mercaptide or a lead stabilizer, has been studied. It is found that the crystallinity of rigid PVC is greatly influenced by the type of stabilizer added, and that the response of the PVC toward subsequent UV exposure was also different. The effects of unstable structures and crystallinity, after UV irradiation, on the mechanical properties of rigid PVC have been investigated.  相似文献   
23.
Reserve estimation is a key to find the correct NPV in a mining project. The most important factor in reserve estimation is the metal price. Metal price fluctuations in recent years were exaggerated, and imposed a high degree of uncertainty to the re-serve estimation, and in consequence to the whole mine planning procedure. Real option approach is an efficient method of deci-sion making in the uncertain conditions. This approach has been used for evaluation of defined natural resources projects until now. This study considering the metal price uncertainty used real option approach to prepare a methodology for reserve estimation in open pit mines. This study was done on a copper cylindrical deposit, but the achieved methodology can be adjusted for all kinds of deposits. This methodology was comprehensively described through the examples in such a manner that can be used by the mine planners.  相似文献   
24.
Trimellitic anhydride was reacted with 4,4′‐diaminodiphenyl ether in a mixture of acetic acid and pyridine (3 : 2) at room temperature and was refluxed at 90–100°C, and N,N′‐(4,4′‐diphenylether) bistrimellitimide (3) was obtained in a quantitative yield. 3 was converted into N,N′‐(4,4′‐diphenylether) bistrimellitimide diacid chloride (4) by a reaction with thionyl chloride. Then, six new poly(amide imide)s were synthesized under microwave irradiation with a domestic microwave oven through the polycondensation reactions of 4 with six different derivatives of 5,5‐disubstituted hydantoin in the presence of a small amount of a polar organic medium such as o‐cresol. The polycondensation proceeded rapidly and was completed within 7–10 min, producing a series of new poly(amide imide)s in high yields with inherent viscosities of 0.27–0.66 dL/g. The resulting poly(amide imide)s were characterized by elemental analysis, viscosity measurements, differential scanning calorimetry, thermogravimetric analysis, derivative thermogravimetry, solubility testing, and Fourier transform infrared spectroscopy. All the polymers were soluble at room temperature in polar solvents such as N,N‐dimethylacetamide, N,N‐dimethylformamide, dimethyl sulfoxide, tetrahydrofuran, and N‐methyl‐2‐pyrrolidone. © 2004 Wiley Periodicals, Inc. J Appl Polym Sci 92: 3447–3453, 2004  相似文献   
25.
This paper presents a method for reconstructing unreliable spectral components of speech signals using the statistical distributions of the clean components. Our goal is to model the temporal patterns in speech signal and take advantage of correlations between speech features in both time and frequency domain simultaneously. In this approach, a hidden Markov model (HMM) is first trained on clean speech data to model the temporal patterns which appear in the sequences of the spectral components. Using this model and according to the probabilities of occurring noisy spectral component at each states, a probability distributions for noisy components are estimated. Then, by applying maximum a posteriori (MAP) estimation on the mentioned distributions, the final estimations of the unreliable spectral components are obtained. The proposed method is compared to a common missing feature method which is based on the probabilistic clustering of the feature vectors and also to a state of the art method based on sparse reconstruction. The experimental results exhibits significant improvement in recognition accuracy over a noise polluted Persian corpus.  相似文献   
26.
With the increased advancements of smart industries, cybersecurity has become a vital growth factor in the success of industrial transformation. The Industrial Internet of Things (IIoT) or Industry 4.0 has revolutionized the concepts of manufacturing and production altogether. In industry 4.0, powerful Intrusion Detection Systems (IDS) play a significant role in ensuring network security. Though various intrusion detection techniques have been developed so far, it is challenging to protect the intricate data of networks. This is because conventional Machine Learning (ML) approaches are inadequate and insufficient to address the demands of dynamic IIoT networks. Further, the existing Deep Learning (DL) can be employed to identify anonymous intrusions. Therefore, the current study proposes a Hunger Games Search Optimization with Deep Learning-Driven Intrusion Detection (HGSODL-ID) model for the IIoT environment. The presented HGSODL-ID model exploits the linear normalization approach to transform the input data into a useful format. The HGSO algorithm is employed for Feature Selection (HGSO-FS) to reduce the curse of dimensionality. Moreover, Sparrow Search Optimization (SSO) is utilized with a Graph Convolutional Network (GCN) to classify and identify intrusions in the network. Finally, the SSO technique is exploited to fine-tune the hyper-parameters involved in the GCN model. The proposed HGSODL-ID model was experimentally validated using a benchmark dataset, and the results confirmed the superiority of the proposed HGSODL-ID method over recent approaches.  相似文献   
27.
The Journal of Supercomputing - Internet of Things (IoT) is an emerging paradigm that consists of numerous connected and interrelated devices with embedded sensors, exchanging data with each other...  相似文献   
28.
Journal of Intelligent Manufacturing - In recent years, driven by Industry 4.0 wave, academic research has focused on the science, engineering, and enabling technologies for intelligent and cyber...  相似文献   
29.
The Journal of Supercomputing - Fast execution of functions is an inevitable challenge in the serverless computing landscape. Inefficient dispatching, fluctuations in invocation rates, burstiness...  相似文献   
30.
In this paper, the effects of dilute charged impurity doping on electronic heat capacity (EHC) and magnetic susceptibility (MS) of a two-dimensional material ferromagnetic gapped graphene-like, MoS2, are investigated within the Green’s function approach by using the Kane-Mele Hamiltonian and self-consistent Born approximation (SCBA) at Dirac points. Our findings show that there is a critical impurity concentration (IC) and scattering strength (ISS) for each valley in EHC and MS curves. Also, we have found that the spin band gap decreases with impurity only for valley K, and \(K^{\prime }, \downarrow \) due to the existence of inversion symmetry between valleys. On the other hand, a magnetic phase transition from ferromagnetic to antiferromagnetic and paramagnetic has been observed. The increase of scattering rate of carriers in the presence of impurity is the main reason of these behaviors.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号