首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   399篇
  免费   23篇
  国内免费   2篇
电工技术   7篇
化学工业   104篇
金属工艺   3篇
机械仪表   7篇
建筑科学   8篇
矿业工程   3篇
能源动力   29篇
轻工业   21篇
水利工程   2篇
石油天然气   4篇
无线电   63篇
一般工业技术   67篇
冶金工业   16篇
原子能技术   22篇
自动化技术   68篇
  2024年   4篇
  2023年   3篇
  2022年   17篇
  2021年   27篇
  2020年   20篇
  2019年   26篇
  2018年   17篇
  2017年   26篇
  2016年   14篇
  2015年   15篇
  2014年   16篇
  2013年   44篇
  2012年   20篇
  2011年   25篇
  2010年   28篇
  2009年   21篇
  2008年   9篇
  2007年   11篇
  2006年   6篇
  2005年   5篇
  2004年   5篇
  2003年   3篇
  2002年   8篇
  2001年   3篇
  2000年   2篇
  1999年   3篇
  1998年   2篇
  1997年   3篇
  1996年   6篇
  1994年   3篇
  1992年   2篇
  1991年   4篇
  1987年   2篇
  1985年   2篇
  1984年   3篇
  1983年   1篇
  1982年   3篇
  1981年   3篇
  1980年   2篇
  1978年   1篇
  1977年   2篇
  1976年   3篇
  1975年   2篇
  1972年   1篇
  1958年   1篇
排序方式: 共有424条查询结果,搜索用时 31 毫秒
361.
Minimizing the breach detection gap (BDG) for cyber-attacks is a big concern for all organizations and governments. Cyber-attacks are discovered daily, many of which have gone undetected for days to years before the victim organizations detect and deploy the cyber defense. Cyber defense solutions are advancing to combat risks and attacks from traditional to next-generation advanced defense protection solutions. However, many individuals, organizations and businesses continue to be hit by new waves of global cyber-attacks. In this paper, we present a blockchain-enabled federated cloud computing framework that uses the Dempster–Shafer theory to reduce BDG by continuously monitoring and analyzing the network traffics against cyber-attacks. We evaluate the proposed approach using numerical results, and the proposed approach outperforms the traditional approaches.  相似文献   
362.
Neural Computing and Applications - The increasing popularity of massively online open courses (MOOCs) has been attracting a lot of learners. Despite the popularity, it has been observed that there...  相似文献   
363.
Multimedia Tools and Applications - Image segmentation is the method of partitioning an image into a group of pixels that are homogenous in some manner. The homogeneity dependents on some...  相似文献   
364.
365.
Among microbial enzymes, inulinases or fructo-furanosylhydrolases have received considerable attention in the past decade, and as a result, a variety of applications based on enzymatic hydrolysis of inulin have been documented. Inulinases are employed for generation of fructose and inulo-oligosaccharides (IOS) in a single-step reaction with specificity. The high fructose syrup can be biotransformed into value-added products such as ethanol, single cell protein, while IOS are indicated in nutraceutical industry as prebiotic. Myriad microorganisms produce inulinases, and a number of exo- and endo-inulinases have been characterized and expressed in heterologous hosts. Initially, predominated by Aspergilli, Penicillia, and some yeasts (Kluyveromyces spp.), the list of prominent inulinase producers has gradually expanded and now includes extremophilic prokaryotes and marine-derived microorganisms producing robust inulinases. The present paper summarizes important developments about microbial inulinases and their applications made in the last decade.  相似文献   
366.
367.
368.
Vehicular networks has been recently proposed to connect vehicles and form ad-hoc networks. Many safety and information-entertainment related applications have thus been proposed. These applications, however, potentially have unique privacy challenges. For example, the vehicle’s network identity is strictly linked to the owner’s identity due to the insurance liability. In this paper, we propose cross-layer privacy protection protocols including initialization, joining and exiting protocols. In addition, we also analytically discuss the optimization of the quantity of pseudonyms to save costs. The analytical and numerical results showed the effectiveness of the proposed methods.  相似文献   
369.
In this paper, we introduce a smoothed piecewise linear network (SPLN) and develop second order training algorithms for it. An embedded feature selection algorithm is developed which minimizes training error with respect to distance measure weights. Then a method is presented which adjusts center vector locations in the SPLN. We also present a gradient method for optimizing the SPLN output weights. Results with several data sets show that the distance measure optimization, center vector optimization, and output weight optimization, individually and together, reduce testing errors in the final network.  相似文献   
370.
This article presents the performance analysis of novel pseudo 4-phase dual-rail protocol with self-reset and multiple-reset logic for high speed asynchronous applications. The self-reset logic eliminates the need for separate empty phase and hence reduces the number of transitions at the input and the output. The multiple-reset logic reduces the reset phase and hence increases the throughput. The performance of the pseudo 4-phase dual-rail protocol is compared with the existing 4-phase dual-rail protocol by implementing 8-bit and 16-bit asynchronously pipelined carry look ahead adders (CLA) in 0.35?µm technology. The time period decreases up to 32.58% and 35.93% respectively, the reset phase reduces up to 66.39% and 76.18%, respectively, and the operating frequency increases up to 48.4% and 56.2%, respectively, for 8- and 16-bit CLA adders with the pseudo 4-phase dual-rail protocol compared to the conventional 4-phase dual-rail protocol at the cost of increase in area of 8.8% and 3.3%, respectively. The delay-power product in ns-mW of the 8- and 16-bit CLAs is reduced at the maximum of 11.29% and 23.74%, respectively, with the pseudo 4-phase dual-rail protocol compared to the conventional 4-phase dual-rail protocol. The pseudo 4-phase dual-rail protocol is suitable for interfacing with synchronous environments.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号