首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2529篇
  免费   121篇
  国内免费   21篇
电工技术   56篇
综合类   8篇
化学工业   566篇
金属工艺   45篇
机械仪表   92篇
建筑科学   98篇
矿业工程   8篇
能源动力   203篇
轻工业   242篇
水利工程   30篇
石油天然气   28篇
无线电   284篇
一般工业技术   470篇
冶金工业   120篇
原子能技术   22篇
自动化技术   399篇
  2024年   13篇
  2023年   62篇
  2022年   131篇
  2021年   176篇
  2020年   137篇
  2019年   146篇
  2018年   148篇
  2017年   131篇
  2016年   127篇
  2015年   75篇
  2014年   112篇
  2013年   228篇
  2012年   153篇
  2011年   163篇
  2010年   115篇
  2009年   117篇
  2008年   98篇
  2007年   74篇
  2006年   41篇
  2005年   28篇
  2004年   27篇
  2003年   29篇
  2002年   29篇
  2001年   38篇
  2000年   18篇
  1999年   20篇
  1998年   28篇
  1997年   33篇
  1996年   24篇
  1995年   23篇
  1994年   19篇
  1993年   8篇
  1992年   12篇
  1991年   5篇
  1990年   9篇
  1989年   4篇
  1988年   5篇
  1987年   3篇
  1986年   6篇
  1985年   11篇
  1984年   8篇
  1983年   12篇
  1982年   6篇
  1979年   2篇
  1978年   4篇
  1977年   4篇
  1976年   4篇
  1974年   1篇
  1972年   1篇
  1970年   1篇
排序方式: 共有2671条查询结果,搜索用时 0 毫秒
11.
This paper emphasis on state-of-the-art of the earlier until the current trend and demand, principles, design considerations, key performance and fabrication technology of RF MEMS switch devices developed over the past few years. RF MEMS switch performance and features such as actuation voltage, insertion loss, isolation and ease with cost of fabrication and applications are compared and discussed.  相似文献   
12.
This paper introduces a robust voiced/non-voiced (VnV) speech classification method using bivariate empirical mode decomposition (bEMD). Fractional Gaussian noise (fGn) is employed as the reference signal to derive a data adaptive threshold for VnV discrimination. The analyzing speech signal and fGn are combined to generate a complex signal which is decomposed into a finite number of complex-valued intrinsic mode functions (IMFs) by using bEMD. The real and imaginary parts of the IMFs represent the IMFs of observed speech and fGn, respectively. The log-energies of both types of IMFs are calculated. There exist similarities between the IMF log-energy representation of fGn and unvoiced speech signals. Hence, the upper confidence limit from IMF log-energies of fGn is used as data adaptive threshold for VnV classification. If the subband log-energy of speech segment exceeds the threshold, the segment is classified as voiced and unvoiced otherwise. The experimental results show that the proposed algorithm performs better than the recently reported methods without requiring any training data for a wide range of SNRs.  相似文献   
13.
We describe a compressing translation from SAT solver generated propositional resolution refutation proofs to classical natural deduction proofs. The resulting proof can usually be checked quicker than one that simply simulates the original resolution proof. We use this result in interactive theorem provers, to speed up reconstruction of SAT solver generated proofs. The translation is fast and scales up to large proofs with millions of inferences.  相似文献   
14.
Automatic onset detection and picking algorithm has been proposed by applying the spectro-ratio on time–frequency sub-band. The proposed algorithm does not need any parameter settings as it will work on data generated by either short or very broad band seismometers. Our algorithm is applied on local events from Cairo region recorded by three stations of the Egyptian National Seismic Network (ENSN). Maximum standard deviation is observed to be 0.113 s of the corresponding manual picks made by analysts.  相似文献   
15.
Internet Protocol version 6 (IPv6) is the latest version of IP that goal to host 3.4 × 1038 unique IP addresses of devices in the network. IPv6 has introduced new features like Neighbour Discovery Protocol (NDP) and Address Auto-configuration Scheme. IPv6 needed several protocols like the Address Auto-configuration Scheme and Internet Control Message Protocol (ICMPv6). IPv6 is vulnerable to numerous attacks like Denial of Service (DoS) and Distributed Denial of Service (DDoS) which is one of the most dangerous attacks executed through ICMPv6 messages that impose security and financial implications. Therefore, an Intrusion Detection System (IDS) is a monitoring system of the security of a network that detects suspicious activities and deals with a massive amount of data comprised of repetitive and inappropriate features which affect the detection rate. A feature selection (FS) technique helps to reduce the computation time and complexity by selecting the optimum subset of features. This paper proposes a method for detecting DDoS flooding attacks (FA) based on ICMPv6 messages using a Binary Flower Pollination Algorithm (BFPA-FA). The proposed method (BFPA-FA) employs FS technology with a support vector machine (SVM) to identify the most relevant, influential features. Moreover, The ICMPv6-DDoS dataset was used to demonstrate the effectiveness of the proposed method through different attack scenarios. The results show that the proposed method BFPA-FA achieved the best accuracy rate (97.96%) for the ICMPv6 DDoS detection with a reduced number of features (9) to half the total (19) features. The proven proposed method BFPA-FA is effective in the ICMPv6 DDoS attacks via IDS.  相似文献   
16.

In communication industry one of the most rapidly growing area is wireless technology and its applications. The efficient access to radio spectrum is a requirement to make this communication feasible for the users that are running multimedia applications and establishing real-time connections on an already overcrowded spectrum. In recent times cognitive radios (CR) are becoming the prime candidates for improved utilization of available spectrum. The unlicensed secondary users share the spectrum with primary licensed user in such manners that the interference at the primary user does not increase from a predefined threshold. In this paper, we propose an algorithm to address the power control problem for CR networks. The proposed solution models the wireless system with a non-cooperative game, in which each player maximize its utility in a competitive environment. The simulation results shows that the proposed algorithm improves the performance of the network in terms of high SINR and low power consumption.

  相似文献   
17.
Journal of Intelligent Manufacturing - Deep learning-based predictive quality enables manufacturing companies to make data-driven predictions of the quality of a produced product based on process...  相似文献   
18.
The full potential linearized augmented plane wave method of density functional theory has been used to investigate the structural, electronic, magnetic and thermoelectric properties of cubic perovskites BaVO3 and LaVO3. The ferromagnetic ground state has been found to be stable by comparing the total energies of non-spin-polarized and spin-polarized calculations performed for optimized unit cells. For both compounds, the bond length and tolerance factor are also measured. From the band structures and density of states plots, it is found that both compounds are half-metallic. We found that the presence of V at the octahedral site of these perovskites develops exchange splitting through p-d hybridization, which results in a stable ferromagnetic state. The observed exchange splitting is further clarified from the magnetic moment, charge and spin of the anion and cations. Finally, we also presented the calculated thermoelectric properties of these materials, which show that half-metallic BaVO3 and LaVO3 materials are potential contenders for thermoelectric applications.  相似文献   
19.
The past three decades have witnessed notable advances in establishing photosensitizer–antibody photo‐immunoconjugates for photo‐immunotherapy and imaging of tumors. Photo‐immunotherapy minimizes damage to surrounding healthy tissue when using a cancer‐selective photo‐immunoconjugate, but requires a threshold intracellular photosensitizer concentration to be effective. Delivery of immunoconjugates to the target cells is often hindered by I) the low photosensitizer‐to‐antibody ratio of photo‐immunoconjugates and II) the limited amount of target molecule presented on the cell surface. Here, a nanoengineering approach is introduced to overcome these obstacles and improve the effectiveness of photo‐immunotherapy and imaging. Click chemistry coupling of benzoporphyrin derivative (BPD)–Cetuximab photo‐immunoconjugates onto FKR560 dye‐containing poly(lactic‐co‐glycolic acid) nanoparticles markedly enhances intracellular photo‐immunoconjugate accumulation and potentiates light‐activated photo‐immunotoxicity in ovarian cancer and glioblastoma. It is further demonstrated that co‐delivery and light activation of BPD and FKR560 allow longitudinal fluorescence tracking of photoimmunoconjugate and nanoparticle in cells. Using xenograft mouse models of epithelial ovarian cancer, intravenous injection of photo‐immunoconjugated nanoparticles doubles intratumoral accumulation of photo‐immunoconjugates, resulting in an enhanced photoimmunotherapy‐mediated tumor volume reduction, compared to “standard” immunoconjugates. This generalizable “carrier effect” phenomenon is attributed to the successful incorporation of photo‐immunoconjugates onto a nanoplatform, which modulates immunoconjugate delivery and improves treatment outcomes.  相似文献   
20.
Vehicle-to-grid technology is an emerging field that allows unused power from Electric Vehicles (EVs) to be used by the smart grid through the central aggregator. Since the central aggregator is connected to the smart grid through a wireless network, it is prone to cyber-attacks that can be detected and mitigated using an intrusion detection system. However, existing intrusion detection systems cannot be used in the vehicle-to-grid network because of the special requirements and characteristics of the vehicle-to-grid network. In this paper, the effect of denial-of-service attacks of malicious electric vehicles on the central aggregator of the vehicle-to-grid network is investigated and an intrusion detection system for the vehicle-to-grid network is proposed. The proposed system, central aggregator–intrusion detection system (CA-IDS), works as a security gateway for EVs to analyze and monitor incoming traffic for possible DoS attacks. EVs are registered with a Central Aggregator (CAG) to exchange authenticated messages, and malicious EVs are added to a blacklist for violating a set of predefined policies to limit their interaction with the CAG. A denial of service (DoS) attack is simulated at CAG in a vehicle-to-grid (V2G) network manipulating various network parameters such as transmission overhead, receiving capacity of destination, average packet size, and channel availability. The proposed system is compared with existing intrusion detection systems using different parameters such as throughput, jitter, and accuracy. The analysis shows that the proposed system has a higher throughput, lower jitter, and higher accuracy as compared to the existing schemes.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号