全文获取类型
收费全文 | 12556篇 |
免费 | 762篇 |
国内免费 | 111篇 |
专业分类
电工技术 | 195篇 |
综合类 | 47篇 |
化学工业 | 3048篇 |
金属工艺 | 198篇 |
机械仪表 | 478篇 |
建筑科学 | 377篇 |
矿业工程 | 14篇 |
能源动力 | 824篇 |
轻工业 | 1430篇 |
水利工程 | 143篇 |
石油天然气 | 147篇 |
武器工业 | 1篇 |
无线电 | 1345篇 |
一般工业技术 | 2358篇 |
冶金工业 | 418篇 |
原子能技术 | 134篇 |
自动化技术 | 2272篇 |
出版年
2024年 | 60篇 |
2023年 | 352篇 |
2022年 | 785篇 |
2021年 | 1144篇 |
2020年 | 751篇 |
2019年 | 849篇 |
2018年 | 891篇 |
2017年 | 747篇 |
2016年 | 747篇 |
2015年 | 473篇 |
2014年 | 613篇 |
2013年 | 1055篇 |
2012年 | 596篇 |
2011年 | 802篇 |
2010年 | 526篇 |
2009年 | 470篇 |
2008年 | 382篇 |
2007年 | 304篇 |
2006年 | 235篇 |
2005年 | 165篇 |
2004年 | 145篇 |
2003年 | 143篇 |
2002年 | 106篇 |
2001年 | 71篇 |
2000年 | 86篇 |
1999年 | 63篇 |
1998年 | 94篇 |
1997年 | 52篇 |
1996年 | 61篇 |
1995年 | 56篇 |
1994年 | 43篇 |
1993年 | 54篇 |
1992年 | 45篇 |
1991年 | 39篇 |
1990年 | 31篇 |
1989年 | 25篇 |
1988年 | 39篇 |
1987年 | 35篇 |
1986年 | 21篇 |
1985年 | 21篇 |
1984年 | 30篇 |
1983年 | 24篇 |
1982年 | 27篇 |
1981年 | 19篇 |
1980年 | 22篇 |
1979年 | 19篇 |
1978年 | 20篇 |
1977年 | 15篇 |
1976年 | 18篇 |
1975年 | 19篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
81.
We study the problem of stabilizing a distributed linear system on a subregion of its geometrical domain. We are concerned with two methods: the first approach enables us to characterize a stabilizing control via the steady state Riccati equation, and the second one is based on decomposing the state space into two suitable subspaces and studying the projections of the initial system onto such subspaces. The obtained results are performed through various examples. 相似文献
82.
Razzaq Saad Shah Babar Iqbal Farkhund Ilyas Muhammad Maqbool Fahad Rocha Alvaro 《Neural computing & applications》2023,35(11):8017-8026
Neural Computing and Applications - A lot of different methods are being opted for improving the educational standards through monitoring of the classrooms. The developed world uses Smart... 相似文献
83.
Houssein Essam H. Hosney Mosa E. Mohamed Waleed M. Ali Abdelmgeid A. Younis Eman M. G. 《Neural computing & applications》2023,35(7):5251-5275
Neural Computing and Applications - Feature selection (FS) is one of the basic data preprocessing steps in data mining and machine learning. It is used to reduce feature size and increase model... 相似文献
84.
The conventional hospital environment is transformed into digital transformation that focuses on patient centric remote approach through advanced technologies. Early diagnosis of many diseases will improve the patient life. The cost of health care systems is reduced due to the use of advanced technologies such as Internet of Things (IoT), Wireless Sensor Networks (WSN), Embedded systems, Deep learning approaches and Optimization and aggregation methods. The data generated through these technologies will demand the bandwidth, data rate, latency of the network. In this proposed work, efficient discrete grey wolf optimization (DGWO) based data aggregation scheme using Elliptic curve Elgamal with Message Authentication code (ECEMAC) has been used to aggregate the parameters generated from the wearable sensor devices of the patient. The nodes that are far away from edge node will forward the data to its neighbor cluster head using DGWO. Aggregation scheme will reduce the number of transmissions over the network. The aggregated data are preprocessed at edge node to remove the noise for better diagnosis. Edge node will reduce the overhead of cloud server. The aggregated data are forward to cloud server for central storage and diagnosis. This proposed smart diagnosis will reduce the transmission cost through aggregation scheme which will reduce the energy of the system. Energy cost for proposed system for 300 nodes is 0.34μJ. Various energy cost of existing approaches such as secure privacy preserving data aggregation scheme (SPPDA), concealed data aggregation scheme for multiple application (CDAMA) and secure aggregation scheme (ASAS) are 1.3 μJ, 0.81 μJ and 0.51 μJ respectively. The optimization approaches and encryption method will ensure the data privacy. 相似文献
85.
Ono Yuya Kurashige Kentarou Hakim Afiqe Anuar Bin Muhammad Nor Sakamoto Yuma 《Artificial Life and Robotics》2023,28(2):287-294
Artificial Life and Robotics - Although the design of the reward function in reinforcement learning is important, it is difficult to design a system that can adapt to a variety of environments and... 相似文献
86.
Ahmadi Kourosh Dadashtabar Rashidi Ali Jabar Moghri Ali Massomi 《The Journal of supercomputing》2022,78(15):17309-17347
The Journal of Supercomputing - On the battlefield, early detection of armored vehicles can have a positive effect. Because according to this issue, timely and appropriate reactions can be done.... 相似文献
87.
Ikram Muhammad Jawad Saleh Mostafa Elsayed Al-Hashimi Muhammad Abdulhamid Abulnaja Osama Ahmed 《The Journal of supercomputing》2022,78(13):14919-14939
The Journal of Supercomputing - Power consumption is likely to remain a significant concern for exascale performance in the foreseeable future. In addition, graphics processing units (GPUs) have... 相似文献
88.
Raja Muhammad Asif Zahoor Naz Hira Shoaib Muhammad Mehmood Ammara 《Neural computing & applications》2022,34(7):5771-5790
Neural Computing and Applications - In the present study, a novel application of backpropagated neurocomputing heuristics (BNCH) is presented for epidemic virus model that portrays the Stuxnet... 相似文献
89.
Identity management is based on the creation and management of user identities for granting access to the cloud resources based on the user attributes. The cloud identity and access management (IAM) grants the authorization to the end-users to perform different actions on the specified cloud resources. The authorizations in the IAM are grouped into roles instead of granting them directly to the end-users. Due to the multiplicity of cloud locations where data resides and due to the lack of a centralized user authority for granting or denying cloud user requests, there must be several security strategies and models to overcome these issues. Another major concern in IAM services is the excessive or the lack of access level to different users with previously granted authorizations. This paper proposes a comprehensive review of security services and threats. Based on the presented services and threats, advanced frameworks for IAM that provide authentication mechanisms in public and private cloud platforms. A threat model has been applied to validate the proposed authentication frameworks with different security threats. The proposed models proved high efficiency in protecting cloud platforms from insider attacks, single sign-on failure, brute force attacks, denial of service, user privacy threats, and data privacy threats. 相似文献
90.
Faisal Bahadur Arif Iqbal Umar Insaf Ullah Fahad Algarni Muhammad Asghar Khan 《计算机系统科学与工程》2022,42(2):589-604
Scalability is one of the most important quality attribute of software-intensive systems, because it maintains an effective performance parallel to the large fluctuating and sometimes unpredictable workload. In order to achieve scalability, thread pool system (TPS) (which is also known as executor service) has been used extensively as a middleware service in software-intensive systems. TPS optimization is a challenging problem that determines the optimal size of thread pool dynamically on runtime. In case of distributed-TPS (DTPS), another issue is the load balancing b/w available set of TPSs running at backend servers. Existing DTPSs are overloaded either due to an inappropriate TPS optimization strategy at backend servers or improper load balancing scheme that cannot quickly recover an overload. Consequently, the performance of software-intensive system is suffered. Thus, in this paper, we propose a new DTPS that follows the collaborative round robin load balancing that has the effect of a double-edge sword. On the one hand, it effectively performs the load balancing (in case of overload situation) among available TPSs by a fast overload recovery procedure that decelerates the load on the overloaded TPSs up to their capacities and shifts the remaining load towards other gracefully running TPSs. And on the other hand, its robust load deceleration technique which is applied to an overloaded TPS sets an appropriate upper bound of thread pool size, because the pool size in each TPS is kept equal to the request rate on it, hence dynamically optimizes TPS. We evaluated the results of the proposed system against state of the art DTPSs by a client-server based simulator and found that our system outperformed by sustaining smaller response times. 相似文献