首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7659篇
  免费   370篇
  国内免费   49篇
电工技术   213篇
综合类   20篇
化学工业   1638篇
金属工艺   159篇
机械仪表   183篇
建筑科学   240篇
矿业工程   8篇
能源动力   517篇
轻工业   778篇
水利工程   89篇
石油天然气   156篇
武器工业   4篇
无线电   942篇
一般工业技术   1347篇
冶金工业   455篇
原子能技术   82篇
自动化技术   1247篇
  2024年   19篇
  2023年   179篇
  2022年   428篇
  2021年   530篇
  2020年   374篇
  2019年   374篇
  2018年   483篇
  2017年   339篇
  2016年   379篇
  2015年   234篇
  2014年   357篇
  2013年   592篇
  2012年   389篇
  2011年   442篇
  2010年   284篇
  2009年   242篇
  2008年   228篇
  2007年   209篇
  2006年   173篇
  2005年   152篇
  2004年   125篇
  2003年   102篇
  2002年   117篇
  2001年   62篇
  2000年   65篇
  1999年   76篇
  1998年   123篇
  1997年   107篇
  1996年   71篇
  1995年   78篇
  1994年   51篇
  1993年   50篇
  1992年   40篇
  1991年   23篇
  1990年   28篇
  1989年   42篇
  1988年   46篇
  1987年   29篇
  1986年   28篇
  1985年   43篇
  1984年   49篇
  1983年   41篇
  1982年   26篇
  1981年   21篇
  1980年   28篇
  1979年   23篇
  1978年   18篇
  1977年   21篇
  1976年   30篇
  1975年   17篇
排序方式: 共有8078条查询结果,搜索用时 15 毫秒
101.
Ahmed F  Karim MA 《Applied optics》1995,34(32):7556-7560
Rotation-invariant target detection using a trained filter-feature-based joint Fourier transform (JFT) correlator is investigated. First, a composite reference image is obtained from a training set of targets. An optimum filter formulation is then applied on this composite image to come up with a new feature that we refer to as a filter feature. This feature is then used in a JFT correlator, which results in a simple and robust rotation-invariant target recognition system.  相似文献   
102.
For studying flow problems involved with complex physics it is now common to use numerical field methods for solving Navier-Stokes or Euler equations. However, for a large class of fluid mechanics problems, which can be dealt with linearized potential equations, the boundary element method proves to be quite useful, especially for its easy application and relatively less computational effort compared to the field methods. The boundary element method has undergone some significant advancements in the last decade with respect to the study of steady and unsteady flow problems concerning wing aerodynamics in compressible medium, flow fields of propellers and rotors and acoustical disturbance propagation from moving bodies. In this paper a few recent contributions which evolved in the DLR as research projects and as doctoral and diploma thesis of the Technical University Braunschweig are concisely described.List of symbols a Sound velocity - b Span of a wing - c p Coefficient of static pressure - c dp Coefficient of profile drag - c 1, c d, cm Coefficient of lift, drag and moment per unit span width - c L, cD, cM Total lift, drag and moment-coefficients - c T, cP Thrust and power-coefficient of a propeller - d Distance - D Doublet strength - e Specific heat energy - E Total energy in a moving medium element - f Frequency - F Field point - g Gravitational acceleration - h Radial distance in cylinder coordinates - I 1, I 2 Inducing functions - i, j, k Unit vectors in cartesian coordinates - k Wave number [/a ] - l Local wing-chord - l 0, l v Length of singularity element at t oand t v - m Notation for Fourier-component - M, M * Mach number based on local and critical sound speed - n Number of rotation per second - n Unit normal vector to a surface  相似文献   
103.
Powdered black pepper from Egyptian markets, was irradiated with different recommended doses of gamma rays (5.0 and 10.0 kGy) and with microwaves for different periods (20, 40 and 75 s) to improve its hygienic quality. The most common bacterial isolates were of three generaBacillus, Clostridium andMicrococcus (7.5 × 106), whereas the predominant fungi (7.8 × 104) wereAspergillus species,A. glaucus, A. flavus, A. niger andA. ochraceus. Doses of gamma irradiation used (5.0 and 10 kGy) were sufficient to decrease spore-forming bacteria (SFB) and to inhibit the fungal flora and coliforms which contaminated the black pepper powder. Microwave treatments for 40 s and 75 s were of the same effectiveness whereas treatment for 20 s was less so. GLC analysis proved the presence of 31 peaks, only 19 compounds were identified as monoterpene hydrocarbons (56.21%), the major one being -phellandrene and limonene. Sesquiterpenes were also present, mainly -caryollphyllene (3.69%) as well as oxygenated compounds such as terpenol, geraniol, Me-chavicol, eugenol and anisol. Gamma irradiation at 5 kGy and 10 kGy respectively decreased the numbers of identified compounds from 21 (86.58% concentration) in untreated pepper to 16 (59.22% concentration), 15 (54.06% concentration). In comparison, microwave treatments, particularly for 40 s and 75 s, increased the concentration of the same compounds. The results obtained indicate that microwave treatment, under these conditions, is a safe and suitable technique for decontamination of black pepper which does not result in a great loss of flavour compounds, as compared with recommended doses of gamma irradiation.  相似文献   
104.
In recent years, the usage and applications of Internet of Things (IoT) have increased exponentially. IoT connects multiple heterogeneous devices like sensors, micro controllers, actuators, smart devices like mobiles, watches, etc. IoT contributes the data produced in the context of data collection, including the domains like military, agriculture, healthcare, etc. The diversity of possible applications at the intersection of the IoT and the web semantics has prompted many research teams to work at the interface between these two disciplines. This makes it possible to collect data and control various objects in transparent way. The challenge lies in the use of this data. Ontologies address this challenge to meet specific data needs in the IoT field. This paper presents the implementation of a dynamic agriculture ontology-building tool that parses the ontology files to extract full data and update it based on the user needs. The technology is used to create the angular library for parsing the OWL files. The proposed ontology framework would accept user-defined ontologies and provide an interface for an online updating of the owl files to ensure the interoperability in the agriculture IoT.  相似文献   
105.
With the increased advancements of smart industries, cybersecurity has become a vital growth factor in the success of industrial transformation. The Industrial Internet of Things (IIoT) or Industry 4.0 has revolutionized the concepts of manufacturing and production altogether. In industry 4.0, powerful Intrusion Detection Systems (IDS) play a significant role in ensuring network security. Though various intrusion detection techniques have been developed so far, it is challenging to protect the intricate data of networks. This is because conventional Machine Learning (ML) approaches are inadequate and insufficient to address the demands of dynamic IIoT networks. Further, the existing Deep Learning (DL) can be employed to identify anonymous intrusions. Therefore, the current study proposes a Hunger Games Search Optimization with Deep Learning-Driven Intrusion Detection (HGSODL-ID) model for the IIoT environment. The presented HGSODL-ID model exploits the linear normalization approach to transform the input data into a useful format. The HGSO algorithm is employed for Feature Selection (HGSO-FS) to reduce the curse of dimensionality. Moreover, Sparrow Search Optimization (SSO) is utilized with a Graph Convolutional Network (GCN) to classify and identify intrusions in the network. Finally, the SSO technique is exploited to fine-tune the hyper-parameters involved in the GCN model. The proposed HGSODL-ID model was experimentally validated using a benchmark dataset, and the results confirmed the superiority of the proposed HGSODL-ID method over recent approaches.  相似文献   
106.
Wireless Personal Communications - The development of Smart Home Controllers has seen rapid growth in recent years, especially for smart devices, that can utilize the Internet of Things (IoT)....  相似文献   
107.

This paper proposes, for the first time, a new radiation pattern synthesis for fractal antenna array that combines the unique multi-band characteristics of fractal arrays with the adaptive beamforming requirements in wireless environment with high-jamming power. In this work, a new adaptive beamforming method based on discrete cbKalman filter is proposed for linear Cantor fractal array with high performance and low computational requirements. The proposed Kalman filter-based beamformer is compared with the Least Mean Squares (LMS) and the Recursive Least Squares (RLS) techniques under various parameter regimes, and the results reveal the superior performance of the proposed approach in terms of beamforming stability, Half-Power Beam Width (HPBW), maximum Side-Lobe Level (SLL), null depth at the direction of interference signals, and convergence rate for different Signal to Interference (SIR) values. Also, the results demonstrate that the suggested approach not only achieves perfect adaptation of the radiation pattern synthesis at high jamming power, but also keep the same SLL at different operating frequencies. This shows the usefulness of the proposed approach in multi-band smart antenna technology for mobile communications and other wireless systems.

  相似文献   
108.
Abdalrazik  Ahmad  Gomaa  Ahmed  Kishk  Ahmed A. 《Wireless Networks》2022,28(8):3779-3786
Wireless Networks - This paper proposes a quadruple band stacked oval patch antenna with sunlight-shaped slots supporting L1/L2/L5 GNSS bands and the 2.3 Ghz WiMAX band. The antenna produces...  相似文献   
109.
The Journal of Supercomputing - Power consumption is likely to remain a significant concern for exascale performance in the foreseeable future. In addition, graphics processing units (GPUs) have...  相似文献   
110.

Deep learning (DL) has shown great success in many human-related tasks, which has led to its adoption in many computer vision based applications, such as security surveillance systems, autonomous vehicles and healthcare. Such safety-critical applications have to draw their path to success deployment once they have the capability to overcome safety-critical challenges. Among these challenges are the defense against or/and the detection of the adversarial examples (AEs). Adversaries can carefully craft small, often imperceptible, noise called perturbations to be added to the clean image to generate the AE. The aim of AE is to fool the DL model which makes it a potential risk for DL applications. Many test-time evasion attacks and countermeasures, i.e., defense or detection methods, are proposed in the literature. Moreover, few reviews and surveys were published and theoretically showed the taxonomy of the threats and the countermeasure methods with little focus in AE detection methods. In this paper, we focus on image classification task and attempt to provide a survey for detection methods of test-time evasion attacks on neural network classifiers. A detailed discussion for such methods is provided with experimental results for eight state-of-the-art detectors under different scenarios on four datasets. We also provide potential challenges and future perspectives for this research direction.

  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号