首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5859篇
  免费   526篇
  国内免费   33篇
电工技术   110篇
综合类   16篇
化学工业   1736篇
金属工艺   144篇
机械仪表   142篇
建筑科学   178篇
矿业工程   23篇
能源动力   433篇
轻工业   531篇
水利工程   62篇
石油天然气   114篇
无线电   633篇
一般工业技术   1045篇
冶金工业   295篇
原子能技术   65篇
自动化技术   891篇
  2024年   11篇
  2023年   120篇
  2022年   260篇
  2021年   299篇
  2020年   252篇
  2019年   295篇
  2018年   368篇
  2017年   298篇
  2016年   361篇
  2015年   257篇
  2014年   326篇
  2013年   575篇
  2012年   309篇
  2011年   345篇
  2010年   267篇
  2009年   248篇
  2008年   205篇
  2007年   154篇
  2006年   149篇
  2005年   125篇
  2004年   113篇
  2003年   80篇
  2002年   80篇
  2001年   67篇
  2000年   62篇
  1999年   53篇
  1998年   105篇
  1997年   62篇
  1996年   64篇
  1995年   37篇
  1994年   38篇
  1993年   43篇
  1992年   32篇
  1991年   27篇
  1990年   30篇
  1989年   33篇
  1988年   19篇
  1987年   19篇
  1986年   13篇
  1985年   17篇
  1984年   20篇
  1983年   17篇
  1982年   15篇
  1981年   14篇
  1980年   16篇
  1979年   12篇
  1978年   15篇
  1977年   16篇
  1976年   24篇
  1974年   10篇
排序方式: 共有6418条查询结果,搜索用时 15 毫秒
61.
With the increased advancements of smart industries, cybersecurity has become a vital growth factor in the success of industrial transformation. The Industrial Internet of Things (IIoT) or Industry 4.0 has revolutionized the concepts of manufacturing and production altogether. In industry 4.0, powerful Intrusion Detection Systems (IDS) play a significant role in ensuring network security. Though various intrusion detection techniques have been developed so far, it is challenging to protect the intricate data of networks. This is because conventional Machine Learning (ML) approaches are inadequate and insufficient to address the demands of dynamic IIoT networks. Further, the existing Deep Learning (DL) can be employed to identify anonymous intrusions. Therefore, the current study proposes a Hunger Games Search Optimization with Deep Learning-Driven Intrusion Detection (HGSODL-ID) model for the IIoT environment. The presented HGSODL-ID model exploits the linear normalization approach to transform the input data into a useful format. The HGSO algorithm is employed for Feature Selection (HGSO-FS) to reduce the curse of dimensionality. Moreover, Sparrow Search Optimization (SSO) is utilized with a Graph Convolutional Network (GCN) to classify and identify intrusions in the network. Finally, the SSO technique is exploited to fine-tune the hyper-parameters involved in the GCN model. The proposed HGSODL-ID model was experimentally validated using a benchmark dataset, and the results confirmed the superiority of the proposed HGSODL-ID method over recent approaches.  相似文献   
62.

Background

The use of crowdsourcing in a pedagogically supported form to partner with learners in developing novel content is emerging as a viable approach for engaging students in higher-order learning at scale. However, how students behave in this form of crowdsourcing, referred to as learnersourcing, is still insufficiently explored.

Objectives

To contribute to filling this gap, this study explores how students engage with learnersourcing tasks across a range of course and assessment designs.

Methods

We conducted an exploratory study on trace data of 1279 students across three courses, originating from the use of a learnersourcing environment under different assessment designs. We employed a new methodology from the learning analytics (LA) field that aims to represent students' behaviour through two theoretically-derived latent constructs: learning tactics and the learning strategies built upon them.

Results

The study's results demonstrate students use different tactics and strategies, highlight the association of learnersourcing contexts with the identified learning tactics and strategies, indicate a significant association between the strategies and performance and contribute to the employed method's generalisability by applying it to a new context.

Implications

This study provides an example of how learning analytics methods can be employed towards the development of effective learnersourcing systems and, more broadly, technological educational solutions that support learner-centred and data-driven learning at scale. Findings should inform best practices for integrating learnersourcing activities into course design and shed light on the relevance of tactics and strategies to support teachers in making informed pedagogical decisions.  相似文献   
63.
Active matrix prestressed microelectromechanical shutter displays enable outstanding optical properties as well as robust operating performance. The microelectromechanical systems (MEMS) shutter elements have been optimized for higher light outcoupling efficiency with lower operation voltage and higher pixel density. The MEMS elements have been co-fabricated with self-aligned metal-oxide thin-film transistors (TFTs). Several optimizations were required to integrate MEMS process without hampering the performance of both elements. The optimized display process requires only seven photolithographic masks with ensuring proper compatibility between MEMS shutter and metal-oxide TFT process.  相似文献   
64.

The edge computing model offers an ultimate platform to support scientific and real-time workflow-based applications over the edge of the network. However, scientific workflow scheduling and execution still facing challenges such as response time management and latency time. This leads to deal with the acquisition delay of servers, deployed at the edge of a network and reduces the overall completion time of workflow. Previous studies show that existing scheduling methods consider the static performance of the server and ignore the impact of resource acquisition delay when scheduling workflow tasks. Our proposed method presented a meta-heuristic algorithm to schedule the scientific workflow and minimize the overall completion time by properly managing the acquisition and transmission delays. We carry out extensive experiments and evaluations based on commercial clouds and various scientific workflow templates. The proposed method has approximately 7.7% better performance than the baseline algorithms, particularly in overall deadline constraint that gives a success rate.

  相似文献   
65.
The Journal of Supercomputing - This paper designs and develops a computational intelligence-based framework using convolutional neural network (CNN) and genetic algorithm (GA) to detect COVID-19...  相似文献   
66.
Data available in software engineering for many applications contains variability and it is not possible to say which variable helps in the process of the prediction. Most of the work present in software defect prediction is focused on the selection of best prediction techniques. For this purpose, deep learning and ensemble models have shown promising results. In contrast, there are very few researches that deals with cleaning the training data and selection of best parameter values from the data. Sometimes data available for training the models have high variability and this variability may cause a decrease in model accuracy. To deal with this problem we used the Akaike information criterion (AIC) and the Bayesian information criterion (BIC) for selection of the best variables to train the model. A simple ANN model with one input, one output and two hidden layers was used for the training instead of a very deep and complex model. AIC and BIC values are calculated and combination for minimum AIC and BIC values to be selected for the best model. At first, variables were narrowed down to a smaller number using correlation values. Then subsets for all the possible variable combinations were formed. In the end, an artificial neural network (ANN) model was trained for each subset and the best model was selected on the basis of the smallest AIC and BIC value. It was found that combination of only two variables’ ns and entropy are best for software defect prediction as it gives minimum AIC and BIC values. While, nm and npt is the worst combination and gives maximum AIC and BIC values.  相似文献   
67.
In this study, we demonstrate Zn1?x Fe x S (x = 0.0, 0.25, 0.50, 0.75, and 1.0) device applications by reporting electronic, magnetic, and optical properties, computed with Wien2k software, using density functional theory (DFT). The modified Becke and Johnson (mBJ) potential has been applied to accurately determine the material band gap. The presence of half-metallic ferromagnetism (HMF) is demonstrated. Moreover, the observed ferromagnetism is justified in terms of various splitting energies and the exchange constants. The Fe magnetic moment decreases from 4.0 μ B due to the strong p ? d hybridization. A complete set of various optical parameters is also presented. The variation in the calculated static dielectric constant, due to Fe doping, is inversely related to the band gap that verifies Penn’s model. Moreover, the band gap of ZnS is tunable by the Fe doping, from ultraviolet to visible regions, depicting that the materials are appropriate for optoelectronic devices.  相似文献   
68.
We present the results of experimental study of the electric discharge between metal electrodes of various geometry and technical water within the pressure range of 8 × 103–105 Pa at the saw-tooth voltage generator frequency, f = 40 MHz, and the interelectrode distance, l = 3–30 mm. We consider transfer of the streamer discharge into spark one depending on the geometry of the metal electrode and its material. We investigate the electrical characteristics of the discharge between the plate electrode and the technical water within a wide pressure range. The essential influence of the streamer discharge type on the ozone release within the investigated parameters range is discovered.  相似文献   
69.
Six Sigma is a quality philosophy and methodology that aims to achieve operational excellence and delighted customers. The cost of poor quality depends on the sigma quality level and its corresponding failure rate. Six Sigma provides a well-defined target of 3.4 defects per million. This failure rate is commonly evaluated under the assumption that the process is normally distributed and its specifications are two-sided. However, these assumptions may lead to implementation of quality-improvement strategies that are based on inaccurate evaluations of quality costs and profits. This paper defines the relationship between failure rate and sigma quality level for inverse Gaussian processes. The inverse Gaussian distribution has considerable applications in describing cycle times, product life, employee service times, and so on. We show that for these processes attaining Six Sigma target failure rate requires higher quality efforts than for normal processes. A generic model is presented to characterise cycle times in manufacturing systems. In this model, the asymptotic production is described by a drifted Brownian motion, and the cycle time is evaluated by using the first passage time theory of a Wiener process to a boundary. The proposed method estimates the right efforts required to reach Six Sigma goals.  相似文献   
70.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号