首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6416篇
  免费   496篇
  国内免费   65篇
电工技术   73篇
综合类   24篇
化学工业   1505篇
金属工艺   109篇
机械仪表   296篇
建筑科学   129篇
矿业工程   10篇
能源动力   395篇
轻工业   822篇
水利工程   71篇
石油天然气   51篇
武器工业   1篇
无线电   780篇
一般工业技术   1384篇
冶金工业   129篇
原子能技术   60篇
自动化技术   1138篇
  2024年   43篇
  2023年   237篇
  2022年   530篇
  2021年   820篇
  2020年   511篇
  2019年   559篇
  2018年   530篇
  2017年   439篇
  2016年   444篇
  2015年   284篇
  2014年   333篇
  2013年   473篇
  2012年   283篇
  2011年   356篇
  2010年   208篇
  2009年   172篇
  2008年   129篇
  2007年   120篇
  2006年   59篇
  2005年   43篇
  2004年   51篇
  2003年   44篇
  2002年   29篇
  2001年   22篇
  2000年   27篇
  1999年   26篇
  1998年   28篇
  1997年   21篇
  1996年   14篇
  1995年   19篇
  1994年   11篇
  1993年   16篇
  1992年   14篇
  1991年   8篇
  1990年   2篇
  1989年   6篇
  1988年   6篇
  1987年   6篇
  1986年   2篇
  1985年   7篇
  1984年   8篇
  1983年   4篇
  1982年   6篇
  1981年   5篇
  1980年   5篇
  1979年   4篇
  1978年   4篇
  1977年   3篇
  1975年   2篇
  1961年   1篇
排序方式: 共有6977条查询结果,搜索用时 15 毫秒
41.
The Internet of Things (IoT) is a network of heterogeneous and smart devices that can make decisions without human intervention. It can connect millions of devices across the universe. Their ability to collect information, perform analysis, and even come to meaningful conclusions without human capital intervention matters. Such circumstances require stringent security measures and, in particular, the extent of authentication. Systems applied in the IoT paradigm point out high-interest levels since enormous damage will occur if a malicious, wrongly authenticated device finds its way into the IoT system. This research provides a clear and updated view of the trends in the IoT authentication area. Among the issues covered include a series of authentication protocols that have remained research gaps in various studies. This study applies a comparative evaluation of authentication protocols, including their strengths and weaknesses. Thus, it forms the foundation in the IoT authentication field of study. In that direction, a multi authentication architecture that involves secured means is proposed for protocol authentication. Informal analysis can affect the security of the protocols. Burrows-Abadi-Needham (BAN) logic provides proof of the attainment of mutual authentication. NS3 simulator tool is used to compare the performance of the proposed protocol to verify the formal security offered by the BAN logic.  相似文献   
42.
Artificial Life and Robotics - Although the design of the reward function in reinforcement learning is important, it is difficult to design a system that can adapt to a variety of environments and...  相似文献   
43.

The edge computing model offers an ultimate platform to support scientific and real-time workflow-based applications over the edge of the network. However, scientific workflow scheduling and execution still facing challenges such as response time management and latency time. This leads to deal with the acquisition delay of servers, deployed at the edge of a network and reduces the overall completion time of workflow. Previous studies show that existing scheduling methods consider the static performance of the server and ignore the impact of resource acquisition delay when scheduling workflow tasks. Our proposed method presented a meta-heuristic algorithm to schedule the scientific workflow and minimize the overall completion time by properly managing the acquisition and transmission delays. We carry out extensive experiments and evaluations based on commercial clouds and various scientific workflow templates. The proposed method has approximately 7.7% better performance than the baseline algorithms, particularly in overall deadline constraint that gives a success rate.

  相似文献   
44.
Journal of Signal Processing Systems - Segmentation of thigh tissues (muscle, fat, inter-muscular adipose tissue (IMAT), bone, and bone marrow) from magnetic resonance imaging (MRI) scans is useful...  相似文献   
45.
The Journal of Supercomputing - Power consumption is likely to remain a significant concern for exascale performance in the foreseeable future. In addition, graphics processing units (GPUs) have...  相似文献   
46.
Neural Computing and Applications - In the present study, a novel application of backpropagated neurocomputing heuristics (BNCH) is presented for epidemic virus model that portrays the Stuxnet...  相似文献   
47.
Scalability is one of the most important quality attribute of software-intensive systems, because it maintains an effective performance parallel to the large fluctuating and sometimes unpredictable workload. In order to achieve scalability, thread pool system (TPS) (which is also known as executor service) has been used extensively as a middleware service in software-intensive systems. TPS optimization is a challenging problem that determines the optimal size of thread pool dynamically on runtime. In case of distributed-TPS (DTPS), another issue is the load balancing b/w available set of TPSs running at backend servers. Existing DTPSs are overloaded either due to an inappropriate TPS optimization strategy at backend servers or improper load balancing scheme that cannot quickly recover an overload. Consequently, the performance of software-intensive system is suffered. Thus, in this paper, we propose a new DTPS that follows the collaborative round robin load balancing that has the effect of a double-edge sword. On the one hand, it effectively performs the load balancing (in case of overload situation) among available TPSs by a fast overload recovery procedure that decelerates the load on the overloaded TPSs up to their capacities and shifts the remaining load towards other gracefully running TPSs. And on the other hand, its robust load deceleration technique which is applied to an overloaded TPS sets an appropriate upper bound of thread pool size, because the pool size in each TPS is kept equal to the request rate on it, hence dynamically optimizes TPS. We evaluated the results of the proposed system against state of the art DTPSs by a client-server based simulator and found that our system outperformed by sustaining smaller response times.  相似文献   
48.
The Journal of Supercomputing - The central cloud facilities based on virtual machines offer many benefits to reduce the scheduling costs and improve service availability and accessibility. The...  相似文献   
49.
The full potential linearized augmented plane wave method of density functional theory has been used to investigate the structural, electronic, magnetic and thermoelectric properties of cubic perovskites BaVO3 and LaVO3. The ferromagnetic ground state has been found to be stable by comparing the total energies of non-spin-polarized and spin-polarized calculations performed for optimized unit cells. For both compounds, the bond length and tolerance factor are also measured. From the band structures and density of states plots, it is found that both compounds are half-metallic. We found that the presence of V at the octahedral site of these perovskites develops exchange splitting through p-d hybridization, which results in a stable ferromagnetic state. The observed exchange splitting is further clarified from the magnetic moment, charge and spin of the anion and cations. Finally, we also presented the calculated thermoelectric properties of these materials, which show that half-metallic BaVO3 and LaVO3 materials are potential contenders for thermoelectric applications.  相似文献   
50.
In this study, larvicidal activity of silver nanoparticles (AgNPs) synthesised using apple extract against fourth instar larvae of Aedes aegypti was determined. As a result, the AgNPs showed moderate larvicidal effects against Ae. aegypti larvae (LC50  = 15.76 ppm and LC90  = 27.7 ppm). In addition, comparison of larvicidal activity performance of AgNPs at high concentration prepared using two different methods showed that Ae. aegypti larvae was fully eliminated within the duration of 2.5 h. From X‐ray diffraction, the AgNP crystallites were found to exhibit face centred cubic structure. The average size of these AgNPs as estimated by particle size distribution was in the range of 50–120 nm. The absorption maxima of the synthesised Ag showed characteristic Ag surface plasmon resonance peak. This green synthesis provides an economic, eco‐friendly and clean synthesis route to Ag.Inspec keywords: silver, nanofabrication, X‐ray diffraction, zoology, particle size, nanoparticles, biomedical materials, nanomedicineOther keywords: time 2.5 h, size 50 nm to 120 nm, silver nanoparticle, larvicidal property, instar larvae, Aedes aegypti, larvicidal effect, larvicidal activity performance, X‐ray diffraction, nanoparticle particle size distribution, absorption maxima, silver surface plasmon resonance peak  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号