首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   988篇
  免费   65篇
  国内免费   5篇
电工技术   18篇
综合类   2篇
化学工业   204篇
金属工艺   11篇
机械仪表   49篇
建筑科学   34篇
能源动力   43篇
轻工业   103篇
水利工程   13篇
石油天然气   12篇
无线电   121篇
一般工业技术   209篇
冶金工业   55篇
原子能技术   23篇
自动化技术   161篇
  2023年   22篇
  2022年   62篇
  2021年   79篇
  2020年   70篇
  2019年   64篇
  2018年   58篇
  2017年   51篇
  2016年   47篇
  2015年   33篇
  2014年   46篇
  2013年   98篇
  2012年   48篇
  2011年   64篇
  2010年   36篇
  2009年   33篇
  2008年   26篇
  2007年   23篇
  2006年   11篇
  2005年   9篇
  2004年   7篇
  2003年   7篇
  2002年   9篇
  2001年   5篇
  2000年   3篇
  1999年   5篇
  1998年   11篇
  1997年   11篇
  1996年   5篇
  1995年   4篇
  1994年   2篇
  1993年   6篇
  1992年   6篇
  1991年   5篇
  1990年   5篇
  1989年   9篇
  1988年   9篇
  1987年   7篇
  1986年   5篇
  1985年   6篇
  1984年   6篇
  1982年   4篇
  1980年   2篇
  1978年   3篇
  1977年   4篇
  1976年   5篇
  1975年   6篇
  1974年   5篇
  1973年   4篇
  1970年   3篇
  1969年   2篇
排序方式: 共有1058条查询结果,搜索用时 0 毫秒
71.
Analysis of energy-tax for multipath routing in wireless sensor networks   总被引:1,自引:0,他引:1  
Recently, multipath routing in wireless sensor networks (WSN) has got immense research interest due to its capability of providing increased robustness, reliability, throughput, and security. However, a theoretical analysis on the energy consumption behavior of multipath routing has not yet been studied. In this paper, we present a general framework for analyzing the energy consumption overhead (i.e., energy tax) resulting from multipath routing protocol in WSN. The framework includes a baseline routing model, a network model, and two energy consumption schemes for sensor nodes, namely, periodic listening and selective wake-up schemes. It exploits the influence of node density, link failure rates, number of multiple paths, and transmission environment on the energy consumption. Scaling laws of energy-tax due to routing and data traffic are derived through analysis, which provide energy profiles of single-path and multipath routing and serve as a guideline for designing energy-efficient protocols for WSN. The crossover points of relative energy taxes, paid by single-path and multipath routing, reception, and transmission, are obtained. Finally, the scaling laws are validated and performance comparisons are depicted for a reference network via numerical results.  相似文献   
72.
Multimedia Tools and Applications - The natural population-based prediction of type 2 diabetes is costly since it needs a high number of resources. Even though much research has used machine...  相似文献   
73.
Engineering with Computers - Over the past few decades, it has been observed a remarkable progression in the development of computer aid models in the field of civil engineering. Machine learning...  相似文献   
74.
Metallurgical and Materials Transactions A - The bondline of electric-resistance-welded (ERW) linepipe steel, often etched white (i.e., ferrite) in optical microscopy, is generally believed to be...  相似文献   
75.
Cloud computing is one of the most attractive and cost-saving models, which provides online services to end-users. Cloud computing allows the user to access data directly from any node. But nowadays, cloud security is one of the biggest issues that arise. Different types of malware are wreaking havoc on the clouds. Attacks on the cloud server are happening from both internal and external sides. This paper has developed a tool to prevent the cloud server from spamming attacks. When an attacker attempts to use different spamming techniques on a cloud server, the attacker will be intercepted through two effective techniques: Cloudflare and K-nearest neighbors (KNN) classification. Cloudflare will block those IP addresses that the attacker will use and prevent spamming attacks. However, the KNN classifiers will determine which area the spammer belongs to. At the end of the article, various prevention techniques for securing cloud servers will be discussed, a comparison will be made with different papers, a conclusion will be drawn based on different results.  相似文献   
76.
Conclusion A diagnostic microprocessor device for checking the generator water-cooled stator winding insulation, realizing semiautomatic measuring of the level of resistance and absorption coefficient of the stator winding insulation, in which case the shunting effect of the water hoses is eliminated, was developed and is operating successfully. Translated from Gidrotekhnicheskoe Stroitel'stvo, No. 3, pp. 31–33, March, 1996.  相似文献   
77.
Real-Time Systems - Genetic algorithms can be used to generate input data in a real-time system that produce the worst-case execution time of a task. While generating the test data, the fitness...  相似文献   
78.

Artificial neural network (ANN) aimed to simulate the behavior of the nervous system as well as the human brain. Neural network models are mathematical computing systems inspired by the biological neural network in which try to constitute animal brains. ANNs recently extended, presented, and applied by many research scholars in the area of geotechnical engineering. After a comprehensive review of the published studies, there is a shortage of classification of study and research regarding systematic literature review about these approaches. A review of the literature reveals that artificial neural networks is well established in modeling retaining walls deflection, excavation, soil behavior, earth retaining structures, site characterization, pile bearing capacity (both skin friction and end-bearing) prediction, settlement of structures, liquefaction assessment, slope stability, landslide susceptibility mapping, and classification of soils. Therefore, the present study aimed to provide a systematic review of methodologies and applications with recent ANN developments in the subject of geotechnical engineering. Regarding this, a major database of the web of science has been selected. Furthermore, meta-analysis and systematic method which called PRISMA has been used. In this regard, the selected papers were classified according to the technique and method used, the year of publication, the authors, journals and conference names, research objectives, results and findings, and lastly solution and modeling. The outcome of the presented review will contribute to the knowledge of civil and/or geotechnical designers/practitioners in managing information in order to solve most types of geotechnical engineering problems. The methods discussed here help the geotechnical practitioner to be familiar with the limitations and strengths of ANN compared with alternative conventional mathematical modeling methods.

  相似文献   
79.
Though some software development teams are highly effective at delivering security, others either do not care or do not have access to security experts to teach them how. Unfortunately, these latter teams are still responsible for the security of the systems they build: systems that are ever more important to ever more people. We propose that a series of lightweight interventions, six hours of facilitated workshops delivered over three months, can improve a team's motivation to consider security and awareness of assurance techniques, changing its security culture even when no security experts are involved. The interventions were developed after an Appreciative Inquiry and Grounded Theory survey of security professionals to find out what approaches work best. We tested the interventions in a participatory action research field study where we delivered the workshops to three software development organizations and evaluated their effectiveness through interviews beforehand, immediately afterwards, and after twelve months. We found that the interventions can be effective with teams with limited or no security experience and that improvement is long-lasting. This approach and the learning points arising from the work here have the potential to be applied in many development teams, improving the security of software worldwide.  相似文献   
80.
Neural Computing and Applications - Rock-socketed piles are commonly used in foundations built in soft ground, and thus, their bearing capacity is a key issue of universal concern in research,...  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号