首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4084篇
  免费   268篇
  国内免费   26篇
电工技术   67篇
综合类   8篇
化学工业   1130篇
金属工艺   101篇
机械仪表   128篇
建筑科学   108篇
矿业工程   8篇
能源动力   285篇
轻工业   364篇
水利工程   43篇
石油天然气   71篇
无线电   427篇
一般工业技术   731篇
冶金工业   207篇
原子能技术   40篇
自动化技术   660篇
  2024年   6篇
  2023年   55篇
  2022年   183篇
  2021年   212篇
  2020年   175篇
  2019年   218篇
  2018年   261篇
  2017年   212篇
  2016年   248篇
  2015年   153篇
  2014年   215篇
  2013年   414篇
  2012年   225篇
  2011年   263篇
  2010年   192篇
  2009年   168篇
  2008年   137篇
  2007年   94篇
  2006年   102篇
  2005年   64篇
  2004年   59篇
  2003年   49篇
  2002年   57篇
  2001年   34篇
  2000年   36篇
  1999年   20篇
  1998年   77篇
  1997年   47篇
  1996年   47篇
  1995年   30篇
  1994年   34篇
  1993年   37篇
  1992年   28篇
  1991年   21篇
  1990年   19篇
  1989年   21篇
  1988年   18篇
  1987年   15篇
  1986年   8篇
  1985年   14篇
  1984年   13篇
  1983年   11篇
  1982年   8篇
  1981年   10篇
  1980年   10篇
  1979年   8篇
  1978年   10篇
  1977年   8篇
  1976年   13篇
  1971年   4篇
排序方式: 共有4378条查询结果,搜索用时 446 毫秒
41.
In [4,7,9,12], classes of nonlinear systems are considered for which observers can be designed. Although observability of nonlinear systems is known to be dependent on the input, the proposed observers have the property that the estimation error decays to zero irrespective of the input. In the first part of this paper, it is shown that this phenomenon follows from a common property of these systems: for all of them, the “unobservable states” with respect to some input, are in some sense “stable” (in the linear case, these systems are called detectable), and for this reason, a reduced order observer can be designed. In the second part is given a more general class of nonlinear systems for which such an observer can be designed.  相似文献   
42.
43.
Vicious codes, especially viruses, as a kind of impressive malware have caused many disasters and continue to exploit more vulnerabilities. These codes are injected inside benign programs in order to abuse their hosts and ease their propagation. The offsets of injected virus codes are unknown and their targets usually are latent until they are executed and activated, what in turn makes viruses very hard to detect. In this paper enriched control flow graph miner, ECFGM in short, is presented to detect infected files corrupted by unknown viruses. ECFGM uses enriched control flow graph model to represent the benign and vicious codes. This model has more information than traditional control flow graph (CFG) by utilizing statistical information of dependent assembly instructions and API calls. To the best of our knowledge, the presented approach in this paper, for the first time, can recognize the offset of infected code of unknown viruses in the victim files. The main contributions of this paper are two folds: first, the presented model is able to detect unknown vicious code using ECFG model with reasonable complexity and desirable accuracy. Second, our approach is resistant against metamorphic viruses which utilize dead code insertion, variable renaming and instruction reordering methods.  相似文献   
44.
Peer-to-Peer networks attracted a significant amount of interest because of their capacity for resource sharing and content distribution. Content distribution applications allow personal computers to function in a coordinated manner as a distributed storage medium by contributing, searching, and obtaining digital content. Searching in unstructured P2P networks is an important problem, which has received considerable research attention. Acceptable searching techniques must provide large coverage rate, low traffic load, and optimum latency. This paper reviews flooding-based search techniques in unstructured P2P networks. It then analytically compares their coverage rate, and traffic overloads. Our simulation experiments have validated analytical results.  相似文献   
45.
Water Resources Management - Change in the spatiotemporal pattern of precipitation is one the most important effects of climate change. This may result in considerable changes in urban flooding and...  相似文献   
46.
Engineering with Computers - In the paper, we derive a geometric meshless method for coupled nonlinear sine-Gordon (CNSG) equations. Approximate solutions of the CNSG equations are supposed to be...  相似文献   
47.

Piles are widely applied to substructures of various infrastructural buildings. Soil has a complex nature; thus, a variety of empirical models have been proposed for the prediction of the bearing capacity of piles. The aim of this study is to propose a novel artificial intelligent approach to predict vertical load capacity of driven piles in cohesionless soils using support vector regression (SVR) optimized by genetic algorithm (GA). To the best of our knowledge, no research has been developed the GA-SVR model to predict vertical load capacity of driven piles in different timescales as of yet, and the novelty of this study is to develop a new hybrid intelligent approach in this field. To investigate the efficacy of GA-SVR model, two other models, i.e., SVR and linear regression models, are also used for a comparative study. According to the obtained results, GA-SVR model clearly outperformed the SVR and linear regression models by achieving less root mean square error (RMSE) and higher coefficient of determination (R2). In other words, GA-SVR with RMSE of 0.017 and R2 of 0.980 has higher performance than SVR with RMSE of 0.035 and R2 of 0.912, and linear regression model with RMSE of 0.079 and R2 of 0.625.

  相似文献   
48.
Hashemi  M. S.  Akgül  A. 《Engineering with Computers》2021,37(2):1147-1158
Engineering with Computers - In this paper, a Lie-group integrator based on $$GL_4(\mathbb {R})$$ and the reproducing kernel functions has been constructed to investigate the flow characteristics...  相似文献   
49.
Neural Computing and Applications - Lung cancer is a deadly disease if not diagnosed in its early stages. However, early detection of lung cancer is a challenging task due to the shape and size of...  相似文献   
50.
Nowadays malware is one of the serious problems in the modern societies. Although the signature based malicious code detection is the standard technique in all commercial antivirus softwares, it can only achieve detection once the virus has already caused damage and it is registered. Therefore, it fails to detect new malwares (unknown malwares). Since most of malwares have similar behavior, a behavior based method can detect unknown malwares. The behavior of a program can be represented by a set of called API's (application programming interface). Therefore, a classifier can be employed to construct a learning model with a set of programs' API calls. Finally, an intelligent malware detection system is developed to detect unknown malwares automatically. On the other hand, we have an appealing representation model to visualize the executable files structure which is control flow graph (CFG). This model represents another semantic aspect of programs. This paper presents a robust semantic based method to detect unknown malwares based on combination of a visualize model (CFG) and called API's. The main contribution of this paper is extracting CFG from programs and combining it with extracted API calls to have more information about executable files. This new representation model is called API-CFG. In addition, to have fast learning and classification process, the control flow graphs are converted to a set of feature vectors by a nice trick. Our approach is capable of classifying unseen benign and malicious code with high accuracy. The results show a statistically significant improvement over n-grams based detection method.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号