首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9578篇
  免费   740篇
  国内免费   89篇
电工技术   180篇
综合类   41篇
化学工业   2639篇
金属工艺   216篇
机械仪表   397篇
建筑科学   356篇
矿业工程   20篇
能源动力   622篇
轻工业   916篇
水利工程   190篇
石油天然气   153篇
武器工业   5篇
无线电   995篇
一般工业技术   1639篇
冶金工业   212篇
原子能技术   67篇
自动化技术   1759篇
  2024年   40篇
  2023年   192篇
  2022年   347篇
  2021年   617篇
  2020年   551篇
  2019年   682篇
  2018年   784篇
  2017年   738篇
  2016年   739篇
  2015年   431篇
  2014年   720篇
  2013年   1050篇
  2012年   661篇
  2011年   743篇
  2010年   474篇
  2009年   408篇
  2008年   251篇
  2007年   182篇
  2006年   151篇
  2005年   103篇
  2004年   101篇
  2003年   58篇
  2002年   57篇
  2001年   28篇
  2000年   23篇
  1999年   25篇
  1998年   25篇
  1997年   18篇
  1996年   24篇
  1995年   19篇
  1994年   10篇
  1993年   15篇
  1992年   11篇
  1991年   17篇
  1990年   16篇
  1989年   12篇
  1988年   7篇
  1987年   7篇
  1986年   8篇
  1985年   9篇
  1984年   14篇
  1983年   12篇
  1982年   5篇
  1981年   5篇
  1980年   2篇
  1979年   6篇
  1978年   3篇
  1977年   2篇
  1973年   2篇
  1967年   1篇
排序方式: 共有10000条查询结果,搜索用时 11 毫秒
61.
Maximizing the lifespan of wireless sensor networks is currently drawing a lot of attention in the research community. In order to reduce energy consumption, sensor nodes that are far from the base station avoid sending data directly. As a result, several disjoint clusters are formed, and nodes within a cluster send their data through the cluster head to avoid long transmissions. However, several parameters related to transmission cost need to be considered when selecting a cluster head. While most of the existing research work considers energy and distance as the most stringent parameters to reduce energy consumption, these approaches fail to create a fair and balanced cluster. Consequently, unbalanced clusters are formed, resulting in the degradation of overall performance. In this research work, a cluster head selection algorithm is proposed that covers all parts of the sensing area in a balanced manner, saving a significant amount of energy. Furthermore, a capture effect–based intracluster communication mechanism is proposed that efficiently utilizes the time slot under various traffic conditions. A Näive Bayes classifier is used to adapt the window size dynamically according to the traffic pattern. Finally, a simulation model using OMNeT++ is developed to compare the proposed approach with the pioneer clustering approach, LEACH, and the contemporary LEACH‐MAC protocol in terms of performance. The results of the simulation indicate that the proposed approach improves the overall performance in terms of network lifetime, energy efficiency, and throughput.  相似文献   
62.
Nowadays, software‐defined networking (SDN) is regarded as the best solution for the centralized handling and monitoring of large networks. However, it should be noted that SDN architecture suffers from the same security issues, which are the case with common networks. As a case in point, one of the shortcomings of SDNs is related to its high vulnerability to distributed denial of service (DDoS) attacks and other similar ones. Indeed, anomaly detection systems have been considered to deal with these attacks. The challenges are related to designing these systems including gathering data, extracting effective features, and selecting the best model for anomaly detection. In this paper, a novel combined approach is proposed; this method uses NetFlow protocol for gathering information and generating dataset, information gain ratio (IGR), in order to select the effective and relevant features and ensemble learning scheme (Stacking) for developing a structure with desirable performance and efficiency for detecting anomaly in SDN environment. The results obtained from the experiments revealed that the proposed method performs better than other methods in terms of enhancing accuracy (AC) and detection rate (DR) and reducing classification error (CE) and false alarm rate (FAR). The AC, DR, CE, and FAR of the proposed model were measured as 99.92%, 99.83%, 0.08%, and 0.03%, respectively. Furthermore, the proposed method prevents the occurrence of excessive overload on the controller and OpenFlow.  相似文献   
63.
The purpose of this paper is to understand and identify various psychological drivers which motivate managers of organizations to adopt Green information technology (Green IT) and Green information system (Green IS) within their corporations. These psychological factors are modelled through the lens of Upper Echelon Theory (UET) to study their interrelationship and interdependency and further prioritize them to strategize appropriate managerial actions. The factors were identified through an exhaustive literature review and further confirmed by the experts in the field. A hybrid Interpretive Structural Modelling – Analytic Network Process (ISM-ANP) approach has been adopted to establish the complex interrelationship among the psychological drivers and further to cluster and prioritize them. The main contribution of this study is composing directions and dominance of various psychological drivers to enhance decision-making process of managers towards the adoption of Green IT/IS. As long as decisions are made by individuals within organizations, this paper forms the basis of identifying individual-level factors important in motivating managers towards Green IT/IS adoption. The results of this study would help organizations and policy makers to understand and develop strategies to target and select an individual for managerial position with mind-set more towards environmental sustainability and Green IT/IS concepts. By applying the proposed methodology, organizations can classify and prioritize their action plans such as several educational methods to reinforce, foster and incline psychological factors to motivate their individuals to behave proenvironmentally and practice Green IT/IS initiatives to enhance environmental sustainability of their corporations.  相似文献   
64.
McEliece and Goldreich–Goldwasser–Halevi (GGH) cryptosystems are two instances of code and lattice-based cryptosystems whose security are based on the hardness of coding theoretic and lattice problems, respectively. However, such cryptosystems have a number of drawbacks which make them inefficient in practice. On the other hand, low density lattice codes (LDLCs) are practical lattice codes which can achieve capacity over additive white Gaussian noise channel and also can be encoded and decoded efficiently. This paper introduces a public key cryptosystem based on Latin square LDLCs, by which a relationship can be attained between code and lattice-based cryptography. In this way, we can exploit the efficient properties of codes and lattices, simultaneously to improve the security and efficiency of the proposed scheme. For instance, the security of this scheme is based on the hard problems related to lattices, i.e., closest vector problem and shortest basis problem, which in turn lead to increase the security level. On the other hand, we exploit the low complexity decoding algorithm of LDLCs to reduce the computational complexity. Moreover, this property allows using the larger values of the codeword length. Also, we use the special Gaussian vector, whose variance is upper bounded by Poltyrev bound, as the perturbation (error) vector. These strategies make the proposed scheme to be secure against the conventional cryptanalytic attacks.  相似文献   
65.
In this article, an inverter based transconductor using double CMOS pair is proposed for implementation of a second order lowpass Gm?CC Filter. The proposed operational transconductance amplifier (OTA) and biquad filter are designed using standard 0.35???m CMOS technology. Simulation results demonstrate the central frequency tunability from 10?kHz to 2.8?MHz which is suitable for the wireless specifications of Bluetooth (650?kHz), CDMA 2000 (700?kHz) and Wideband CDMA (2.2?MHz) applications. The power consumption of the filter is 445?nW and 178???W at 10?kHz and 2.8?MHz from 3.3?V supply voltage, respectively. The active area occupied by the designed filter on the silicon is 215?×?720???m2. The proposed approach guarantees the upper bound on THD to be ?40?dB for 300?mVpp signal swing. Employing the double CMOS pair in the inverters causes PSRR to reach 68.6?dB which is higher than similar works.  相似文献   
66.
Transient electroluminescence (EL) was used to measure the delay between the excitation pulse and onset of emission in OLEDs based on phosphorescent bis[3,5-bis(2-pyridyl)-1,2,4-triazolato] platinum(ΙΙ) doped into 4,4′-bis(carbazol-9-yl) triphenylamine (CBP), from which an electron mobility of 3.2 × 10−6 cm2/V s was approximated. Delayed recombination was observed after the drive pulse had been removed and based on its dependence on frequency and duty cycle, ascribed to trapping and de-trapping processes associated with disorder-induced carrier localization at the interface between the emissive layer and electron blocker. The data suggests that the exciton recombination zone is at, or close to the interface between the emissive layer and electron blocker. Despite the charge trapping effects, a peak power efficiency of 24 lm/W and peak external quantum efficiency of 10.64% were obtained. Mechanisms for the electroluminescence and delayed recombination are proposed.  相似文献   
67.
Providing good quality of service (QoS) in cellular IP networks is an important requirement for performance improvement of the cellular IP network. Resource reservation is one of the methods used in achieving this goal and is proven to be effective. The main resources to be reserved in a cellular IP network are bandwidth, buffer and central processing unit (CPU) cycles. Router CPU cycle is the time taken by the router to process the packet of the flow before forwarding it to the next router (hop). This paper proposes a model for CPU cycle optimization of routers for real‐time flows in a cellular IP network. The model applies both genetic algorithm (GA) and particle swarm optimization (PSO) as soft computing tools to optimize the CPU cycles and reduces the flow processing time at each router in the route taken by a flow. Simulation experiments illustrate a comparative study of the model.  相似文献   
68.
Utility is an important factor for serviceproviders, and they try to increase their utilities through adopting different policies and strategies. Because of unpredictable failures in systems, there are many scenarios in which the failures may cause random losses for service providers. Loss sharing can decrease negative effects of unexpected random losses. Because of capabilities of learning automata in random and stochastic environments, in this paper, a new learning automaton based method is presented for loss sharing purpose. It is illustrated that the loss sharing can be useful for service providers and helps them to decrease negative effect of the random losses. The presented method can be used especially in collaborative environments such as federated clouds. Results of the conducted experiments show the usefulness of the presented approach to improve utility of service providers.  相似文献   
69.
Grid computing is emerging as the foundation upon which virtual organizations can be built. Such organizations are becoming of increasing importance for tackling various projects, both in academic and in business fields. This paper is concerned with presenting an integrated view of the grid to readers interested in understanding it, or perhaps in developing it further or making use of it in the future. The target view is based on the STOPE (strategy/technology/organization/people/environment) framework that has previously been used to integrate the issues of various information technology problems over its well‐defined domains. For strategy, the view considers the reasons associated with the need for the grid, including grid services and grid benefits. For technology, the technical components of the grid and their functions are taken into account. For organization, the organizations concerned with the development, technology production, service provisioning and use of the grid are considered. For people, those associated with the grid in the related organizations are taken into account. For the environment, rules, practices and support associated with the grid are discussed. Finally, the paper emphasizes questions that need to be answered in order to contribute to the future development of the grid. Copyright © 2006 John Wiley & Sons, Ltd.  相似文献   
70.
International Journal of Wireless Information Networks - Dynamic variation of network topology in mobile ad hoc networks (MANET) forces network nodes to work together and rely on each other for...  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号