首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3332篇
  免费   199篇
  国内免费   17篇
电工技术   50篇
综合类   8篇
化学工业   830篇
金属工艺   58篇
机械仪表   130篇
建筑科学   74篇
矿业工程   2篇
能源动力   275篇
轻工业   316篇
水利工程   21篇
石油天然气   39篇
无线电   375篇
一般工业技术   660篇
冶金工业   119篇
原子能技术   20篇
自动化技术   571篇
  2024年   15篇
  2023年   104篇
  2022年   212篇
  2021年   271篇
  2020年   191篇
  2019年   189篇
  2018年   233篇
  2017年   180篇
  2016年   207篇
  2015年   130篇
  2014年   200篇
  2013年   296篇
  2012年   177篇
  2011年   188篇
  2010年   143篇
  2009年   124篇
  2008年   95篇
  2007年   85篇
  2006年   75篇
  2005年   49篇
  2004年   30篇
  2003年   32篇
  2002年   22篇
  2001年   26篇
  2000年   16篇
  1999年   18篇
  1998年   42篇
  1997年   20篇
  1996年   22篇
  1995年   19篇
  1994年   18篇
  1993年   11篇
  1992年   9篇
  1991年   7篇
  1990年   9篇
  1989年   8篇
  1988年   5篇
  1987年   8篇
  1986年   7篇
  1985年   9篇
  1984年   9篇
  1983年   5篇
  1981年   8篇
  1980年   2篇
  1979年   7篇
  1978年   3篇
  1977年   3篇
  1976年   2篇
  1975年   2篇
  1974年   2篇
排序方式: 共有3548条查询结果,搜索用时 0 毫秒
21.
Neural Processing Letters - The motivation behind this paper is to explore the issue of synchronization of fractional order neutral type fuzzy cellular neural networks with state feedback control....  相似文献   
22.
Multimedia Tools and Applications - Nowadays, web users frequently explore multimedia contents to satisfy their information needs. The exploration approaches usually provide linear interaction...  相似文献   
23.
Ultra-high molecular weight polyethylene (UHMWPE) is extensively used in frictional applications due to its advanced wear resistance. This advanced polymer is reinforced with hard particulate fillers for further developments against wear conditions. Since elevated temperatures prevail in the service conditions, wear behavior of UHMWPE composites is an important issue for the engineering applications. In the present work, UHMWPE-based composites including silicon carbide (SiC) fillers were fabricated in a compression molding chamber. In the specimen preparation stage, molding pressure, filler amount, and filler particle size were varied to investigate the influence of these variables. Upon deciding the optimum parameters from the wear tests conducted at room temperature, the wear experiments were repeated for the optimum specimen at elevated temperatures, such as 40 and 60°C. According to the results, the wear behavior of the SiC/UHMWPE composites is heavily changed by the effect of elevated temperature. Adhesive effect is pronounced at elevated temperatures while the wear characteristics possess the abrasive effect in the sliding path. In addition, the composites exhibit an accelerated material loss as temperature increases during the frictional system.  相似文献   
24.
An off-line handwriting recognition (OFHR) system is a computerized system that is capable of intelligently converting human handwritten data extracted from scanned paper documents into an equivalent text format. This paper studies a proposed OFHR for Malaysian bank cheques written in the Malay language. The proposed system comprised of three components, namely a character recognition system (CRS), a hybrid decision system and lexical word classification system. Two types of feature extraction techniques have been used in the system, namely statistical and geometrical. Experiments show that the statistical feature is reliable, accessible and offers results that are more accurate. The CRS in this system was implemented using two individual classifiers, namely an adaptive multilayer feed-forward back-propagation neural network and support vector machine. The results of this study are very promising and could generalize to the entire Malay lexical dictionary in future work toward scaled-up applications.  相似文献   
25.
A novel image encryption algorithm in streaming mode is proposed which exhaustively employs an entire set of DNA complementary rules alongwith one dimensional chaotic maps. The proposed algorithm is highly efficient due to encrypting the subset of digital image which contains 92.125 % of information. DNA addition operation is carried out on this MSB part. The core idea of the proposed scheme is to scramble the whole image by means of piecewise linear chaotic map (PWLCM) followed by decomposition of image into most significant bits (MSB) and least significant bits (LSB). The logistic sequence is XORed with the decoded MSB and LSB parts separately and finally these two parts are combined to get the ciphered image. The parameters for PWLCM, logistic map and selection of different DNA rules for encoding and decoding of both parts of an image are derived from 128-bit MD5 hash of the plain image. Simulated experimental results in terms of quantitative and qualitative ways prove the encryption quality. Efficiency and robustness against different noises make the proposed cipher a good candidate for real time applications.  相似文献   
26.
27.
Rotman lenses are used to obtain multiple beams from a single array. Although the beams produced by the feed antennas at focal points have no path length errors, the beams produced by feed antennas at off focal points may have large path length errors. These path length errors cause deterioration in the multiple beams. In this article, two novel methods are introduced to obtain feed curves which reduce the path length errors of off focal feed points significantly, compared with the commonly used circular and elliptical feed curves. The first method obtains feed curve points based on having zero path length error at three chosen points of the radiating array for each beam direction. The second method uses the particle swarm optimization method for obtaining optimum feed points for each beam direction. The results show that there is a very significant drop in the level of the maximum path length errors (in the order of about 1:4). © 2012 Wiley Periodicals, Inc. Int J RF and Microwave CAE 23: 634–638, 2013.  相似文献   
28.
讨论了以基于前缀封闭集合的Heyting代数的直觉解释的线性μ-演算(IμTL)作为描述“假设-保证”的逻辑基础的问题,提出了一个基于IμTL的“假设-保证”规则.该规则比往常应用线性时序逻辑(LTL)作为规范语言的那些规则具有更好的表达能力,扩展了对形如“always ?”等安全性质的“假设-保证”的范围,具备更一般的“假设-保证”推理能力及对循环推理的支持.  相似文献   
29.
With the tremendous applications of the wireless sensor network, self-localization has become one of the challenging subject matter that has gained attention of many researchers in the field of wireless sensor network. Localization is the process of assigning or computing the location of the sensor nodes in a sensor network. As the sensor nodes are deployed randomly, we do not have any knowledge about their location in advance. As a result, this becomes very important that they localize themselves as manual deployment of sensor node is not feasible. Also, in WSN the main problem is the power as the sensor nodes have very limited power source. This paper provides a novel solution for localizing the sensor nodes using controlled power of the beacon nodes such that we will have longer life of the beacon nodes which plays a vital role in the process of localization as it is the only special nodes that has the information about its location when they are deployed such that the remaining ordinary nodes can localize themselves in accordance with these beacon node. We develop a novel model that first finds the distance of the sensor nodes then it finds the location of the unknown sensor nodes in power efficient manner. Our simulation results show the effectiveness of the proposed methodology in terms of controlled and reduced power.  相似文献   
30.
Internet Protocol version 6 (IPv6) is the latest version of IP that goal to host 3.4 × 1038 unique IP addresses of devices in the network. IPv6 has introduced new features like Neighbour Discovery Protocol (NDP) and Address Auto-configuration Scheme. IPv6 needed several protocols like the Address Auto-configuration Scheme and Internet Control Message Protocol (ICMPv6). IPv6 is vulnerable to numerous attacks like Denial of Service (DoS) and Distributed Denial of Service (DDoS) which is one of the most dangerous attacks executed through ICMPv6 messages that impose security and financial implications. Therefore, an Intrusion Detection System (IDS) is a monitoring system of the security of a network that detects suspicious activities and deals with a massive amount of data comprised of repetitive and inappropriate features which affect the detection rate. A feature selection (FS) technique helps to reduce the computation time and complexity by selecting the optimum subset of features. This paper proposes a method for detecting DDoS flooding attacks (FA) based on ICMPv6 messages using a Binary Flower Pollination Algorithm (BFPA-FA). The proposed method (BFPA-FA) employs FS technology with a support vector machine (SVM) to identify the most relevant, influential features. Moreover, The ICMPv6-DDoS dataset was used to demonstrate the effectiveness of the proposed method through different attack scenarios. The results show that the proposed method BFPA-FA achieved the best accuracy rate (97.96%) for the ICMPv6 DDoS detection with a reduced number of features (9) to half the total (19) features. The proven proposed method BFPA-FA is effective in the ICMPv6 DDoS attacks via IDS.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号