首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1432篇
  免费   74篇
  国内免费   5篇
电工技术   22篇
综合类   3篇
化学工业   332篇
金属工艺   33篇
机械仪表   48篇
建筑科学   23篇
能源动力   106篇
轻工业   138篇
水利工程   8篇
石油天然气   9篇
无线电   185篇
一般工业技术   274篇
冶金工业   71篇
原子能技术   3篇
自动化技术   256篇
  2024年   6篇
  2023年   32篇
  2022年   71篇
  2021年   112篇
  2020年   86篇
  2019年   75篇
  2018年   109篇
  2017年   83篇
  2016年   72篇
  2015年   51篇
  2014年   70篇
  2013年   122篇
  2012年   69篇
  2011年   80篇
  2010年   63篇
  2009年   50篇
  2008年   45篇
  2007年   42篇
  2006年   35篇
  2005年   27篇
  2004年   11篇
  2003年   17篇
  2002年   7篇
  2001年   13篇
  2000年   10篇
  1999年   6篇
  1998年   25篇
  1997年   14篇
  1996年   9篇
  1995年   14篇
  1994年   10篇
  1993年   5篇
  1992年   3篇
  1991年   4篇
  1990年   5篇
  1989年   7篇
  1988年   3篇
  1987年   6篇
  1986年   3篇
  1985年   6篇
  1984年   6篇
  1983年   3篇
  1982年   2篇
  1981年   7篇
  1980年   2篇
  1979年   5篇
  1978年   2篇
  1975年   2篇
  1974年   2篇
  1972年   1篇
排序方式: 共有1511条查询结果,搜索用时 15 毫秒
11.
Any sniffer can see the information sent through unprotected ‘probe request messages’ and ‘probe response messages’ in wireless local area networks (WLAN). A station (STA) can send probe requests to trigger probe responses by simply spoofing a genuine media access control (MAC) address to deceive access point (AP) controlled access list. Adversaries exploit these weaknesses to flood APs with probe requests, which can generate a denial of service (DoS) to genuine STAs. The research examines traffic of a WLAN using supervised feed-forward neural network classifier to identify genuine frames from rogue frames. The novel feature of this approach is to capture the genuine user and attacker training data separately and label them prior to training without network administrator’s intervention. The model’s performance is validated using self-consistency and fivefold cross-validation tests. The simulation is comprehensive and takes into account the real-world environment. The results show that this approach detects probe request attacks extremely well. This solution also detects an attack during an early stage of the communication, so that it can prevent any other attacks when an adversary contemplates to start breaking into the network.  相似文献   
12.
A polyaniline–TiO2 composite (PTC) was prepared by oxidative polymerization of aniline in phosphoric acid with ammonium persulphate, in the presence of TiO2. The composite was characterized by spectroscopic methods. An acrylic paint containing the PTC was prepared and the coating formed on magnesium alloy was evaluated by electrochemical impedance spectroscopy after exposure to salt spray test for a period of 250 h. The coating containing the PTC was found to protect the magnesium alloy more efficiently than the coating containing polyaniline.  相似文献   
13.
Neural Processing Letters - The motivation behind this paper is to explore the issue of synchronization of fractional order neutral type fuzzy cellular neural networks with state feedback control....  相似文献   
14.
An off-line handwriting recognition (OFHR) system is a computerized system that is capable of intelligently converting human handwritten data extracted from scanned paper documents into an equivalent text format. This paper studies a proposed OFHR for Malaysian bank cheques written in the Malay language. The proposed system comprised of three components, namely a character recognition system (CRS), a hybrid decision system and lexical word classification system. Two types of feature extraction techniques have been used in the system, namely statistical and geometrical. Experiments show that the statistical feature is reliable, accessible and offers results that are more accurate. The CRS in this system was implemented using two individual classifiers, namely an adaptive multilayer feed-forward back-propagation neural network and support vector machine. The results of this study are very promising and could generalize to the entire Malay lexical dictionary in future work toward scaled-up applications.  相似文献   
15.
A novel image encryption algorithm in streaming mode is proposed which exhaustively employs an entire set of DNA complementary rules alongwith one dimensional chaotic maps. The proposed algorithm is highly efficient due to encrypting the subset of digital image which contains 92.125 % of information. DNA addition operation is carried out on this MSB part. The core idea of the proposed scheme is to scramble the whole image by means of piecewise linear chaotic map (PWLCM) followed by decomposition of image into most significant bits (MSB) and least significant bits (LSB). The logistic sequence is XORed with the decoded MSB and LSB parts separately and finally these two parts are combined to get the ciphered image. The parameters for PWLCM, logistic map and selection of different DNA rules for encoding and decoding of both parts of an image are derived from 128-bit MD5 hash of the plain image. Simulated experimental results in terms of quantitative and qualitative ways prove the encryption quality. Efficiency and robustness against different noises make the proposed cipher a good candidate for real time applications.  相似文献   
16.
讨论了以基于前缀封闭集合的Heyting代数的直觉解释的线性μ-演算(IμTL)作为描述“假设-保证”的逻辑基础的问题,提出了一个基于IμTL的“假设-保证”规则.该规则比往常应用线性时序逻辑(LTL)作为规范语言的那些规则具有更好的表达能力,扩展了对形如“always ?”等安全性质的“假设-保证”的范围,具备更一般的“假设-保证”推理能力及对循环推理的支持.  相似文献   
17.
With the tremendous applications of the wireless sensor network, self-localization has become one of the challenging subject matter that has gained attention of many researchers in the field of wireless sensor network. Localization is the process of assigning or computing the location of the sensor nodes in a sensor network. As the sensor nodes are deployed randomly, we do not have any knowledge about their location in advance. As a result, this becomes very important that they localize themselves as manual deployment of sensor node is not feasible. Also, in WSN the main problem is the power as the sensor nodes have very limited power source. This paper provides a novel solution for localizing the sensor nodes using controlled power of the beacon nodes such that we will have longer life of the beacon nodes which plays a vital role in the process of localization as it is the only special nodes that has the information about its location when they are deployed such that the remaining ordinary nodes can localize themselves in accordance with these beacon node. We develop a novel model that first finds the distance of the sensor nodes then it finds the location of the unknown sensor nodes in power efficient manner. Our simulation results show the effectiveness of the proposed methodology in terms of controlled and reduced power.  相似文献   
18.
Wireless Personal Communications - Wireless Underground Networks comprise the ability to constantly monitor several physical parameters such as ground temperature, water level and soil condition,...  相似文献   
19.
Journal of Signal Processing Systems - Segmentation of thigh tissues (muscle, fat, inter-muscular adipose tissue (IMAT), bone, and bone marrow) from magnetic resonance imaging (MRI) scans is useful...  相似文献   
20.
The performance prediction models in the Pavement-ME design software are nationally calibrated using in-service pavement material properties, pavement structure, climate and truck loadings, and performance data obtained from the Long-Term Pavement Performance programme. The nationally calibrated models may not perform well if the inputs and performance data used to calibrate those do not represent the local design and construction practices. Therefore, before implementing the new M-E design procedure, each state highway agency (SHA) should evaluate how well the nationally calibrated performance models predict the measured field performance. The local calibrations of the Pavement-ME performance models are recommended to improve the performance prediction capabilities to reflect the unique conditions and design practices. During the local calibration process, the traditional calibration techniques (split sampling) may not necessarily provide adequate results when limited number of pavement sections are available. Consequently, there is a need to employ statistical and resampling methodologies that are more efficient and robust for model calibrations given the data related challenges encountered by SHAs. The main objectives of the paper are to demonstrate the local calibration of rigid pavement performance models and compare the calibration results based on different resampling techniques. The bootstrap is a non-parametric and robust resampling technique for estimating standard errors and confidence intervals of a statistic. The main advantage of bootstrapping is that model parameters estimation is possible without making distribution assumptions. This paper presents the use of bootstrapping and jackknifing to locally calibrate the transverse cracking and IRI performance models for newly constructed and rehabilitated rigid pavements. The results of the calibration show that the standard error of estimate and bias are lower compared to the traditional sampling methods. In addition, the validation statistics are similar to that of the locally calibrated model, especially for the IRI model, which indicates robustness of the local model coefficients.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号