首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1026篇
  免费   75篇
  国内免费   17篇
电工技术   11篇
综合类   6篇
化学工业   202篇
金属工艺   16篇
机械仪表   52篇
建筑科学   16篇
能源动力   75篇
轻工业   162篇
水利工程   16篇
石油天然气   2篇
无线电   128篇
一般工业技术   225篇
冶金工业   16篇
原子能技术   7篇
自动化技术   184篇
  2024年   1篇
  2023年   39篇
  2022年   84篇
  2021年   126篇
  2020年   87篇
  2019年   84篇
  2018年   105篇
  2017年   68篇
  2016年   79篇
  2015年   41篇
  2014年   64篇
  2013年   65篇
  2012年   50篇
  2011年   67篇
  2010年   40篇
  2009年   23篇
  2008年   21篇
  2007年   16篇
  2006年   10篇
  2005年   7篇
  2004年   12篇
  2003年   5篇
  2002年   7篇
  2001年   3篇
  2000年   3篇
  1999年   1篇
  1998年   1篇
  1997年   1篇
  1995年   2篇
  1994年   3篇
  1989年   1篇
  1982年   2篇
排序方式: 共有1118条查询结果,搜索用时 15 毫秒
11.
12.
Anomaly detection in resource constrained wireless networks is an important challenge for tasks such as intrusion detection, quality assurance and event monitoring applications. The challenge is to detect these interesting events or anomalies in a timely manner, while minimising energy consumption in the network. We propose a distributed anomaly detection architecture, which uses multiple hyperellipsoidal clusters to model the data at each sensor node, and identify global and local anomalies in the network. In particular, a novel anomaly scoring method is proposed to provide a score for each hyperellipsoidal model, based on how remote the ellipsoid is relative to their neighbours. We demonstrate using several synthetic and real datasets that our proposed scheme achieves a higher detection performance with a significant reduction in communication overhead in the network compared to centralised and existing schemes.  相似文献   
13.

The present article introduced a novel idea for information hiding namely steganography. We have used new notions for the construction of the nonlinear component for block cipher based on inverse LA-semigroups. This nonlinear component fundamentally provides confidentiality in the proposed steganographic algorithm. The construction of the algorithm is fundamentally twofold. Firstly, we have constructed a novel scheme to design confusion component namely substitution box (S-box). Secondly, we have utilized the anticipated nonlinear component in digital steganography. The suggested algorithm is tested for different standard digital images. The authentication of the proposed algorithm is confirmed through statistical analysis.

  相似文献   
14.
Tariq  Junaid  Armghan  Ammar  Ijaz  Amir  Ashraf  Imran 《Multimedia Tools and Applications》2021,80(14):21449-21464
Multimedia Tools and Applications - The High Efficiency Video Coding (HEVC) efficiently reduces the size of the multimedia contents, but at the cost of high computation complexity. In order to make...  相似文献   
15.
区域水文要素复杂性研究是当今的热点问题,为了研究哈尔滨地区汛期径流量的复杂性特征及变化趋势,将R/S分析法和等概率粗粒化LZC算法引入到区域径流复杂性分析与变化趋势预测中,对地区内10个水文站点的汛期径流序列的复杂性进行诊断并对其变化趋势进行分析。研究结果表明:哈尔滨、通河、阿城、依兰、烟囱山各站未来的汛期径流量呈减少趋势,岔林河、莲花、西北河、延寿、四平山各站未来的汛期径流量呈增长趋势;各站点汛期径流序列的复杂度由高到低依次为:四平山、烟囱山、岔林河、阿城、西北河、依兰、莲花、通河、哈尔滨、延寿;从河流集水面积对其径流长程相关性和复杂性的影响可以看出,站点的河流集水面积越大,其径流量的长程相关性越强,复杂性指数越小。研究成果揭示了本地区汛期径流量的变化趋势以及复杂性演变特征,该特征可为区域径流预测及水资源优化配置提供科学依据。  相似文献   
16.
ABSTRACT

The quality of user-generated content over World Wide Web media is a matter of serious concern for both creators and users. To measure the quality of content, webometric techniques are commonly used. In recent times, bibliometric techniques have been introduced to good effect for evaluation of the quality of user-generated content, which were originally used for scholarly data. However, the application of bibliometric techniques to evaluate the quality of YouTube content is limited to h-index and g-index considering only views. This paper advocates for and demonstrates the adaptation of existing Bibliometric indices including h-index, g-index and M-index exploiting both views and comments and proposes three indices hvc, gvc and mvc for YouTube video channel ranking. The empirical results prove that the proposed indices using views along with the comments outperform the existing approaches on a real-world dataset of YouTube.  相似文献   
17.
Developing selective and coherent polymorphic crystals at the nanoscale offers a novel strategy for designing integrated architectures for photonic and optoelectronic applications such as metasurfaces, optical gratings, photodetectors, and image sensors. Here, a direct optical writing approach is demonstrated to deterministically create polymorphic 2D materials by locally inducing metallic 1T′-MoTe2 on the semiconducting 2H-MoTe2 host layer. In the polymorphic-engineered MoTe2, 2H- and 1T′- crystalline phases exhibit strong optical contrast from near-infrared to telecom-band ranges (1–1.5 µm), due to the change in the band structure and increase in surface roughness. Sevenfold enhancement of third harmonic generation intensity is realized with conversion efficiency (susceptibility) of ≈1.7 × 10−7 (1.1 × 10−19 m2 V−2) and ≈1.7 × 10−8 (0.3 × 10−19 m2 V−2) for 1T′ and 2H-MoTe2, respectively at telecom-band ultrafast pump laser. Lastly, based on polymorphic engineering on MoTe2, a Schottky photodiode with a high photoresponsivity of 90 AW−1 is demonstrated. This study proposes facile polymorphic engineered structures that will greatly benefit realizing integrated photonics and optoelectronic circuits.  相似文献   
18.
19.
Vehicle-to-grid technology is an emerging field that allows unused power from Electric Vehicles (EVs) to be used by the smart grid through the central aggregator. Since the central aggregator is connected to the smart grid through a wireless network, it is prone to cyber-attacks that can be detected and mitigated using an intrusion detection system. However, existing intrusion detection systems cannot be used in the vehicle-to-grid network because of the special requirements and characteristics of the vehicle-to-grid network. In this paper, the effect of denial-of-service attacks of malicious electric vehicles on the central aggregator of the vehicle-to-grid network is investigated and an intrusion detection system for the vehicle-to-grid network is proposed. The proposed system, central aggregator–intrusion detection system (CA-IDS), works as a security gateway for EVs to analyze and monitor incoming traffic for possible DoS attacks. EVs are registered with a Central Aggregator (CAG) to exchange authenticated messages, and malicious EVs are added to a blacklist for violating a set of predefined policies to limit their interaction with the CAG. A denial of service (DoS) attack is simulated at CAG in a vehicle-to-grid (V2G) network manipulating various network parameters such as transmission overhead, receiving capacity of destination, average packet size, and channel availability. The proposed system is compared with existing intrusion detection systems using different parameters such as throughput, jitter, and accuracy. The analysis shows that the proposed system has a higher throughput, lower jitter, and higher accuracy as compared to the existing schemes.  相似文献   
20.
Kriging is a well-established approximation technique for deterministic computer experiments. There are several Kriging variants and a comparative study is warranted to evaluate the different performance characteristics of the Kriging models in the computational fluid dynamics area, specifically in turbomachinery design where the most complex flow situations can be observed. Sufficiently accurate flow simulations can take a long time to converge. Hence, this type of simulation can benefit hugely from the computational cheap Kriging models to reduce the computational burden. The Kriging variants such as ordinary Kriging, universal Kriging and blind Kriging along with the commonly used response surface approximation (RSA) model were used to optimize the performance of a centrifugal impeller using CFD analysis. A Reynolds-averaged Navier–Stokes equation solver was utilized to compute the objective function responses. The responses along with the design variables were used to construct the Kriging variants and RSA functions. A hybrid genetic algorithm was used to find the optimal point in the design space. It was found that the best optimal design was produced by blind Kriging, while the RSA identified the worst optimal design. By changing the shape of the impeller, a reduction in inlet recirculation was observed, which resulted into an increase in efficiency.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号