首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1190篇
  免费   73篇
  国内免费   8篇
电工技术   10篇
化学工业   298篇
金属工艺   20篇
机械仪表   16篇
建筑科学   12篇
能源动力   42篇
轻工业   298篇
水利工程   5篇
石油天然气   2篇
无线电   123篇
一般工业技术   209篇
冶金工业   95篇
原子能技术   3篇
自动化技术   138篇
  2024年   9篇
  2023年   26篇
  2022年   85篇
  2021年   94篇
  2020年   78篇
  2019年   83篇
  2018年   91篇
  2017年   62篇
  2016年   52篇
  2015年   54篇
  2014年   60篇
  2013年   79篇
  2012年   46篇
  2011年   48篇
  2010年   43篇
  2009年   35篇
  2008年   36篇
  2007年   31篇
  2006年   22篇
  2005年   11篇
  2004年   14篇
  2003年   8篇
  2002年   10篇
  2001年   5篇
  2000年   16篇
  1999年   10篇
  1998年   31篇
  1997年   25篇
  1996年   12篇
  1995年   8篇
  1994年   14篇
  1993年   11篇
  1992年   7篇
  1991年   6篇
  1990年   4篇
  1989年   6篇
  1988年   2篇
  1987年   3篇
  1986年   5篇
  1985年   2篇
  1982年   2篇
  1981年   6篇
  1980年   2篇
  1979年   3篇
  1978年   2篇
  1977年   2篇
  1976年   3篇
  1975年   2篇
  1973年   1篇
  1971年   1篇
排序方式: 共有1271条查询结果,搜索用时 0 毫秒
91.
Multimedia Tools and Applications - Prostate cancer (PCa) has become the second most dreadful cancer in men after lung cancer. Traditional approaches used for treatment of PCa were manual, time...  相似文献   
92.
Engineering with Computers - A novel hybrid many-objective evolutionary algorithm called Reference Vector Guided Evolutionary Algorithm based on hypervolume indicator (H-RVEA) is proposed in this...  相似文献   
93.
Software-defined networking (SDN) is an advanced networking paradigm that decouples forwarding control logic from the data plane. Therefore, it provides a loosely-coupled architecture between the control and data plane. This separation provides flexibility in the SDN environment for addressing any transformations. Further, it delivers a centralized way of managing networks due to control logic embedded in the SDN controller. However, this advanced networking paradigm has been facing several security issues, such as topology spoofing, exhausting bandwidth, flow table updating, and distributed denial of service (DDoS) attacks. A DDoS attack is one of the most powerful menaces to the SDN environment. Further, the central data controller of SDN becomes the primary target of DDoS attacks. In this article, we propose a Kafka-based distributed DDoS attacks detection approach for protecting the SDN environment named K-DDoS-SDN. The K-DDoS-SDN consists of two modules: (i) Network traffic classification (NTClassification) module and (ii) Network traffic storage (NTStorage) module. The NTClassification module is the detection approach designed using scalable H2O ML techniques in a distributed manner and deployed an efficient model on the two-nodes Kafka Streams cluster to classify incoming network traces in real-time. The NTStorage module collects raw packets, network flows, and 21 essential attributes and then systematically stores them in the HDFS to re-train existing models. The proposed K-DDoS-SDN designed and evaluated using the recent and publically available CICDDoS2019 dataset. The average classification accuracy of the proposed distributed K-DDoS-SDN for classifying network traces into legitimate and one of the most popular attacks, such as DDoS_UDP is 99.22%. Further, the outcomes demonstrate that proposed distributed K-DDoS-SDN classifies traffic traces into five categories with at least 81% classification accuracy.  相似文献   
94.
This study introduces a comprehensive framework designed for detecting and mitigating fake and potentially threatening user communities within 5G social networks. Leveraging geo-location data, community trust dynamics, and AI-driven community detection algorithms, this framework aims to pinpoint users posing potential harm. Including an artificial control model facilitates the selection of suitable community detection algorithms, coupled with a trust-based strategy to effectively identify and filter potential attackers. A distinctive feature of this framework lies in its ability to consider attributes that prove challenging for malicious users to emulate, such as the established trust within the community, geographical location, and adaptability to diverse attack scenarios. To validate its efficacy, we illustrate the framework using synthetic social network data, demonstrating its ability to distinguish potential malicious users from trustworthy ones.  相似文献   
95.
The promising potential of cloud computing and its convergence with technologies such as mobile computing, wireless networks, sensor technologies allows for creation and delivery of newer type of cloud services. In this paper, we advocate the use of cloud computing for the creation and management of cloud based health care services. As a representative case study, we design a Cloud Based Intelligent Health Care Service (CBIHCS) that performs real time monitoring of user health data for diagnosis of chronic illness such as diabetes. Advance body sensor components are utilized to gather user specific health data and store in cloud based storage repositories for subsequent analysis and classification. In addition, infrastructure level mechanisms are proposed to provide dynamic resource elasticity for CBIHCS. Experimental results demonstrate that classification accuracy of 92.59% is achieved with our prototype system and the predicted patterns of CPU usage offer better opportunities for adaptive resource elasticity.  相似文献   
96.
97.
Empirical validation of software metrics used to predict software quality attributes is important to ensure their practical relevance in software organizations. The aim of this work is to find the relation of object-oriented (OO) metrics with fault proneness at different severity levels of faults. For this purpose, different prediction models have been developed using regression and machine learning methods. We evaluate and compare the performance of these methods to find which method performs better at different severity levels of faults and empirically validate OO metrics given by Chidamber and Kemerer. The results of the empirical study are based on public domain NASA data set. The performance of the predicted models was evaluated using Receiver Operating Characteristic (ROC) analysis. The results show that the area under the curve (measured from the ROC analysis) of models predicted using high severity faults is low as compared with the area under the curve of the model predicted with respect to medium and low severity faults. However, the number of faults in the classes correctly classified by predicted models with respect to high severity faults is not low. This study also shows that the performance of machine learning methods is better than logistic regression method with respect to all the severities of faults. Based on the results, it is reasonable to claim that models targeted at different severity levels of faults could help for planning and executing testing by focusing resources on fault-prone parts of the design and code that are likely to cause serious failures.  相似文献   
98.
Microsystem Technologies - Fifth generation (5G) communication system enables the pathway for a higher data transfer rate. The frequency bands used for 5G communication system are distributed from...  相似文献   
99.

This paper proposes a novel hybrid multi-objective optimization algorithm named HMOSHSSA by synthesizing the strengths of Multi-objective Spotted Hyena Optimizer (MOSHO) and Salp Swarm Algorithm (SSA). HMOSHSSA utilizes the exploration capability of MOSHO to explore the search space effectively and leader and follower selection mechanism of SSA to achieve global best solution with faster convergence. The proposed algorithm is evaluated on 24 benchmark test functions, and its performance is compared with seven well-known multi-objective optimization algorithms. The experimental results demonstrate that HMOSHSSA acquires very competitive results and outperforms other algorithms in terms of convergence speed, search-ability and accuracy. Additionally, HMOSHSSA is also applied on seven well-known engineering problems to further verify its efficacy. The results reveal the effectiveness of proposed algorithm toward solving real-life multi-objective optimization problems.

  相似文献   
100.
Cloud computing is the delivery of on‐demand computing resources. Cloud computing has numerous applications in fields of education, social networking, and medicine. But the benefit of cloud for medical purposes is seamless, particularly because of the enormous data generated by the health care industry. This colossal data can be managed through big data analytics, and hidden patterns can be extracted using machine learning procedures. In particular, the latest issue in the medical domain is the prediction of heart diseases, which can be resolved through culmination of machine learning and cloud computing. Hence, an attempt has been made to propose an intelligent decision support model that can aid medical experts in predicting heart disease based on the historical data of patients. Various machine learning algorithms have been implemented on the heart disease dataset to predict accuracy for heart disease. Naïve Bayes has been selected as an effective model because it provides the highest accuracy of 86.42% followed by AdaBoost and boosted tree. Further, these 3 models are being ensembled, which has increased the overall accuracy to 87.91%. The experimental results have also been evaluated using 10,082 instances that clearly validate the maximum accuracy through ensembling and minimum execution time in cloud environment.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号