全文获取类型
收费全文 | 5711篇 |
免费 | 331篇 |
国内免费 | 21篇 |
专业分类
电工技术 | 84篇 |
综合类 | 11篇 |
化学工业 | 1424篇 |
金属工艺 | 146篇 |
机械仪表 | 155篇 |
建筑科学 | 189篇 |
矿业工程 | 4篇 |
能源动力 | 394篇 |
轻工业 | 621篇 |
水利工程 | 65篇 |
石油天然气 | 93篇 |
武器工业 | 1篇 |
无线电 | 634篇 |
一般工业技术 | 1114篇 |
冶金工业 | 168篇 |
原子能技术 | 30篇 |
自动化技术 | 930篇 |
出版年
2024年 | 24篇 |
2023年 | 172篇 |
2022年 | 333篇 |
2021年 | 452篇 |
2020年 | 301篇 |
2019年 | 314篇 |
2018年 | 351篇 |
2017年 | 301篇 |
2016年 | 316篇 |
2015年 | 214篇 |
2014年 | 293篇 |
2013年 | 500篇 |
2012年 | 332篇 |
2011年 | 398篇 |
2010年 | 261篇 |
2009年 | 234篇 |
2008年 | 165篇 |
2007年 | 125篇 |
2006年 | 122篇 |
2005年 | 92篇 |
2004年 | 69篇 |
2003年 | 64篇 |
2002年 | 59篇 |
2001年 | 50篇 |
2000年 | 45篇 |
1999年 | 42篇 |
1998年 | 46篇 |
1997年 | 30篇 |
1996年 | 36篇 |
1995年 | 20篇 |
1994年 | 27篇 |
1993年 | 29篇 |
1992年 | 21篇 |
1991年 | 14篇 |
1990年 | 14篇 |
1989年 | 18篇 |
1988年 | 23篇 |
1987年 | 9篇 |
1986年 | 17篇 |
1985年 | 17篇 |
1984年 | 12篇 |
1983年 | 13篇 |
1982年 | 12篇 |
1981年 | 12篇 |
1980年 | 6篇 |
1979年 | 7篇 |
1978年 | 11篇 |
1977年 | 9篇 |
1976年 | 9篇 |
1974年 | 8篇 |
排序方式: 共有6063条查询结果,搜索用时 0 毫秒
61.
In this research, a modified fractional order proportional integral derivate (FOPID) control method is proposed for the photovoltaic (PV) and thermoelectric generator (TEG) combined hybrid renewable energy system. The faster tracking and steady-state output are aimed at the suggested maximum power point tracking (MPPT) control technique. The derivative order number (µ) value in the improved FOPID (also known as PIλDµ) control structure will be dynamically updated utilizing the value of change in PV array voltage output. During the transient, the value of µ is changeable; it’s one at the start and after reaching the maximum power point (MPP), allowing for strong tracking characteristics. TEG will use the freely available waste thermal energy created surrounding the PV array for additional power generation, increasing the system’s energy conversion efficiency. A high-gain DC-DC converter circuit is included in the system to maintain a high amplitude DC input voltage to the inverter circuit. The proposed approach’s performance was investigated using an extensive MATLAB software simulation and validated by comparing findings with the perturbation and observation (P&O) type MPPT control method. The study results demonstrate that the FOPID controller-based MPPT control outperforms the P&O method in harvesting the maximum power achievable from the PV-TEG hybrid source. There is also a better control action and a faster response. 相似文献
62.
Ashit Kumar Dutta Mazen Mushabab Alqahtani Yasser Albagory Abdul Rahaman Wahab Sait Majed Alsanea 《计算机系统科学与工程》2023,44(3):2277-2292
Learning Management System (LMS) is an application software that is used in automation, delivery, administration, tracking, and reporting of courses and programs in educational sector. The LMS which exploits machine learning (ML) has the ability of accessing user data and exploit it for improving the learning experience. The recently developed artificial intelligence (AI) and ML models helps to accomplish effective performance monitoring for LMS. Among the different processes involved in ML based LMS, feature selection and classification processes find beneficial. In this motivation, this study introduces Glowworm-based Feature Selection with Machine Learning Enabled Performance Monitoring (GSO-MFWELM) technique for LMS. The key objective of the proposed GSO-MFWELM technique is to effectually monitor the performance in LMS. The proposed GSO-MFWELM technique involves GSO-based feature selection technique to select the optimal features. Besides, Weighted Extreme Learning Machine (WELM) model is applied for classification process whereas the parameters involved in WELM model are optimally fine-tuned with the help of Mayfly Optimization (MFO) algorithm. The design of GSO and MFO techniques result in reduced computation complexity and improved classification performance. The presented GSO-MFWELM technique was validated for its performance against benchmark dataset and the results were inspected under several aspects. The simulation results established the supremacy of GSO-MFWELM technique over recent approaches with the maximum classification accuracy of 0.9589. 相似文献
63.
Adnan Hasan Bdair Aighuraibawi Selvakumar Manickam Rosni Abdullah Zaid Abdi Alkareem Alyasseri Ayman Khallel Dilovan Asaad Zebari Hussam Mohammed Jasim Mazin Mohammed Abed Zainb Hussein Arif 《计算机系统科学与工程》2023,47(1):553-574
Internet Protocol version 6 (IPv6) is the latest version of IP that goal to host 3.4 × 1038 unique IP addresses of devices in the network. IPv6 has introduced new features like Neighbour Discovery Protocol (NDP) and Address Auto-configuration Scheme. IPv6 needed several protocols like the Address Auto-configuration Scheme and Internet Control Message Protocol (ICMPv6). IPv6 is vulnerable to numerous attacks like Denial of Service (DoS) and Distributed Denial of Service (DDoS) which is one of the most dangerous attacks executed through ICMPv6 messages that impose security and financial implications. Therefore, an Intrusion Detection System (IDS) is a monitoring system of the security of a network that detects suspicious activities and deals with a massive amount of data comprised of repetitive and inappropriate features which affect the detection rate. A feature selection (FS) technique helps to reduce the computation time and complexity by selecting the optimum subset of features. This paper proposes a method for detecting DDoS flooding attacks (FA) based on ICMPv6 messages using a Binary Flower Pollination Algorithm (BFPA-FA). The proposed method (BFPA-FA) employs FS technology with a support vector machine (SVM) to identify the most relevant, influential features. Moreover, The ICMPv6-DDoS dataset was used to demonstrate the effectiveness of the proposed method through different attack scenarios. The results show that the proposed method BFPA-FA achieved the best accuracy rate (97.96%) for the ICMPv6 DDoS detection with a reduced number of features (9) to half the total (19) features. The proven proposed method BFPA-FA is effective in the ICMPv6 DDoS attacks via IDS. 相似文献
64.
Sørland Kaia Ingerdatter Sunoqrot Mohammed R. S. Sandsmark Elise Langørgen Sverre Bertilsson Helena Trimble Christopher G. Lin Gigin Selnæs Kirsten M. Goa Pål E. Bathen Tone F. Elschot Mattijs 《Magma (New York, N.Y.)》2022,35(4):573-585
Magnetic Resonance Materials in Physics, Biology and Medicine - Signal intensity normalization is necessary to reduce heterogeneity in T2-weighted (T2W) magnetic resonance imaging (MRI) for... 相似文献
65.
Jie Song Pengyi Zhang Mohammed Alkubati Yubin Bao Ge Yu 《Digital Communications & Networks》2022,8(4):466-475
Due to the complexity of blockchain technology, it usually costs too much effort to build, maintain and monitor a blockchain system that supports a targeted application. To this end, the emerging “Blockchain as a Service” (BaaS) makes the blockchain and distributed ledgers more accessible, particularly for businesses, by reducing costs and overheads. BaaS combines the high computing power of cloud computing, the pervasiveness of IoT and the decentralization of blockchain, allowing people to build their own applications while ensuring the transparency and openness of the system. This paper surveys the research outputs of both academia and industry. First, it introduces the representative architectures of BaaS systems and then summarizes the research contributions of BaaS from the technologies for service provision, roles, container and virtualization, interfaces, customization and evaluation. The typical applications of BaaS in both academic and practical domains are also introduced. At present, the research on the blockchain is abundant, but research on BaaS is still in its infancy. Six challenges of BaaS are concluded in this paper for further study directions. 相似文献
66.
An efficient numerical algorithm for the study of time fractional Tricomi and Keldysh type equations
Ghafoor Abdul Haq Sirajul Rasool Amir Baleanu Dumitru 《Engineering with Computers》2022,38(4):3185-3195
Engineering with Computers - This work addresses a hybrid scheme for the numerical solutions of time fractional Tricomi and Keldysh type equations. In proposed methodology, Haar wavelets are used... 相似文献
67.
Wang Ankang Sahandabadi Sahereh Harrison Tyler Spicer Dean Ahamed Mohammed Jalal 《Microsystem Technologies》2022,28(11):2529-2539
Microsystem Technologies - The dynamic performance of a micro-resonator depends on its energy loss mechanism which is quantified by Q-factor (Quality factor). This paper presents numerical... 相似文献
68.
Salam Al-E’mari Mohammed Anbar Yousef Sanjalawe Selvakumar Manickam Iznan Hasbullah 《计算机系统科学与工程》2022,40(1):87-102
Intrusion detection systems that have emerged in recent decades can identify a variety of malicious attacks that target networks by employing several detection approaches. However, the current approaches have challenges in detecting intrusions, which may affect the performance of the overall detection system as well as network performance. For the time being, one of the most important creative technological advancements that plays a significant role in the professional world today is blockchain technology. Blockchain technology moves in the direction of persistent revolution and change. It is a chain of blocks that covers information and maintains trust between individuals no matter how far apart they are. Recently, blockchain was integrated into intrusion detection systems to enhance their overall performance. Blockchain has also been adopted in healthcare, supply chain management, and the Internet of Things. Blockchain uses robust cryptography with private and public keys, and it has numerous properties that have leveraged security’s performance over peer-to-peer networks without the need for a third party. To explore and highlight the importance of integrating blockchain with intrusion detection systems, this paper provides a comprehensive background of intrusion detection systems and blockchain technology. Furthermore, a comprehensive review of emerging intrusion detection systems based on blockchain technology is presented. Finally, this paper suggests important future research directions and trending topics in intrusion detection systems based on blockchain technology. 相似文献
69.
Ayman Altameem Jaideep Singh Sachdev Vijander Singh Ramesh Chandra Poonia Sandeep Kumar Abdul Khader Jilani Saudagar 《计算机系统科学与工程》2022,42(3):1095-1107
Brain-computer interfaces (BCIs) records brain activity using electroencephalogram (EEG) headsets in the form of EEG signals; these signals can be recorded, processed and classified into different hand movements, which can be used to control other IoT devices. Classification of hand movements will be one step closer to applying these algorithms in real-life situations using EEG headsets. This paper uses different feature extraction techniques and sophisticated machine learning algorithms to classify hand movements from EEG brain signals to control prosthetic hands for amputated persons. To achieve good classification accuracy, denoising and feature extraction of EEG signals is a significant step. We saw a considerable increase in all the machine learning models when the moving average filter was applied to the raw EEG data. Feature extraction techniques like a fast fourier transform (FFT) and continuous wave transform (CWT) were used in this study; three types of features were extracted, i.e., FFT Features, CWT Coefficients and CWT scalogram images. We trained and compared different machine learning (ML) models like logistic regression, random forest, k-nearest neighbors (KNN), light gradient boosting machine (GBM) and XG boost on FFT and CWT features and deep learning (DL) models like VGG-16, DenseNet201 and ResNet50 trained on CWT scalogram images. XG Boost with FFT features gave the maximum accuracy of 88%. 相似文献
70.