首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7632篇
  免费   364篇
  国内免费   48篇
电工技术   214篇
综合类   21篇
化学工业   1638篇
金属工艺   159篇
机械仪表   183篇
建筑科学   238篇
矿业工程   8篇
能源动力   511篇
轻工业   758篇
水利工程   90篇
石油天然气   157篇
武器工业   4篇
无线电   941篇
一般工业技术   1347篇
冶金工业   451篇
原子能技术   77篇
自动化技术   1247篇
  2024年   17篇
  2023年   178篇
  2022年   423篇
  2021年   524篇
  2020年   373篇
  2019年   372篇
  2018年   482篇
  2017年   336篇
  2016年   377篇
  2015年   232篇
  2014年   360篇
  2013年   589篇
  2012年   393篇
  2011年   442篇
  2010年   281篇
  2009年   240篇
  2008年   226篇
  2007年   207篇
  2006年   172篇
  2005年   152篇
  2004年   124篇
  2003年   102篇
  2002年   117篇
  2001年   62篇
  2000年   65篇
  1999年   76篇
  1998年   123篇
  1997年   107篇
  1996年   71篇
  1995年   78篇
  1994年   51篇
  1993年   50篇
  1992年   40篇
  1991年   23篇
  1990年   28篇
  1989年   42篇
  1988年   46篇
  1987年   28篇
  1986年   28篇
  1985年   42篇
  1984年   49篇
  1983年   41篇
  1982年   26篇
  1981年   21篇
  1980年   28篇
  1979年   23篇
  1978年   18篇
  1977年   21篇
  1976年   31篇
  1974年   17篇
排序方式: 共有8044条查询结果,搜索用时 0 毫秒
101.
In recent years, the usage and applications of Internet of Things (IoT) have increased exponentially. IoT connects multiple heterogeneous devices like sensors, micro controllers, actuators, smart devices like mobiles, watches, etc. IoT contributes the data produced in the context of data collection, including the domains like military, agriculture, healthcare, etc. The diversity of possible applications at the intersection of the IoT and the web semantics has prompted many research teams to work at the interface between these two disciplines. This makes it possible to collect data and control various objects in transparent way. The challenge lies in the use of this data. Ontologies address this challenge to meet specific data needs in the IoT field. This paper presents the implementation of a dynamic agriculture ontology-building tool that parses the ontology files to extract full data and update it based on the user needs. The technology is used to create the angular library for parsing the OWL files. The proposed ontology framework would accept user-defined ontologies and provide an interface for an online updating of the owl files to ensure the interoperability in the agriculture IoT.  相似文献   
102.
With the increased advancements of smart industries, cybersecurity has become a vital growth factor in the success of industrial transformation. The Industrial Internet of Things (IIoT) or Industry 4.0 has revolutionized the concepts of manufacturing and production altogether. In industry 4.0, powerful Intrusion Detection Systems (IDS) play a significant role in ensuring network security. Though various intrusion detection techniques have been developed so far, it is challenging to protect the intricate data of networks. This is because conventional Machine Learning (ML) approaches are inadequate and insufficient to address the demands of dynamic IIoT networks. Further, the existing Deep Learning (DL) can be employed to identify anonymous intrusions. Therefore, the current study proposes a Hunger Games Search Optimization with Deep Learning-Driven Intrusion Detection (HGSODL-ID) model for the IIoT environment. The presented HGSODL-ID model exploits the linear normalization approach to transform the input data into a useful format. The HGSO algorithm is employed for Feature Selection (HGSO-FS) to reduce the curse of dimensionality. Moreover, Sparrow Search Optimization (SSO) is utilized with a Graph Convolutional Network (GCN) to classify and identify intrusions in the network. Finally, the SSO technique is exploited to fine-tune the hyper-parameters involved in the GCN model. The proposed HGSODL-ID model was experimentally validated using a benchmark dataset, and the results confirmed the superiority of the proposed HGSODL-ID method over recent approaches.  相似文献   
103.
Wireless Personal Communications - The development of Smart Home Controllers has seen rapid growth in recent years, especially for smart devices, that can utilize the Internet of Things (IoT)....  相似文献   
104.

This paper proposes, for the first time, a new radiation pattern synthesis for fractal antenna array that combines the unique multi-band characteristics of fractal arrays with the adaptive beamforming requirements in wireless environment with high-jamming power. In this work, a new adaptive beamforming method based on discrete cbKalman filter is proposed for linear Cantor fractal array with high performance and low computational requirements. The proposed Kalman filter-based beamformer is compared with the Least Mean Squares (LMS) and the Recursive Least Squares (RLS) techniques under various parameter regimes, and the results reveal the superior performance of the proposed approach in terms of beamforming stability, Half-Power Beam Width (HPBW), maximum Side-Lobe Level (SLL), null depth at the direction of interference signals, and convergence rate for different Signal to Interference (SIR) values. Also, the results demonstrate that the suggested approach not only achieves perfect adaptation of the radiation pattern synthesis at high jamming power, but also keep the same SLL at different operating frequencies. This shows the usefulness of the proposed approach in multi-band smart antenna technology for mobile communications and other wireless systems.

  相似文献   
105.
Abdalrazik  Ahmad  Gomaa  Ahmed  Kishk  Ahmed A. 《Wireless Networks》2022,28(8):3779-3786
Wireless Networks - This paper proposes a quadruple band stacked oval patch antenna with sunlight-shaped slots supporting L1/L2/L5 GNSS bands and the 2.3 Ghz WiMAX band. The antenna produces...  相似文献   
106.
The Journal of Supercomputing - Power consumption is likely to remain a significant concern for exascale performance in the foreseeable future. In addition, graphics processing units (GPUs) have...  相似文献   
107.

Deep learning (DL) has shown great success in many human-related tasks, which has led to its adoption in many computer vision based applications, such as security surveillance systems, autonomous vehicles and healthcare. Such safety-critical applications have to draw their path to success deployment once they have the capability to overcome safety-critical challenges. Among these challenges are the defense against or/and the detection of the adversarial examples (AEs). Adversaries can carefully craft small, often imperceptible, noise called perturbations to be added to the clean image to generate the AE. The aim of AE is to fool the DL model which makes it a potential risk for DL applications. Many test-time evasion attacks and countermeasures, i.e., defense or detection methods, are proposed in the literature. Moreover, few reviews and surveys were published and theoretically showed the taxonomy of the threats and the countermeasure methods with little focus in AE detection methods. In this paper, we focus on image classification task and attempt to provide a survey for detection methods of test-time evasion attacks on neural network classifiers. A detailed discussion for such methods is provided with experimental results for eight state-of-the-art detectors under different scenarios on four datasets. We also provide potential challenges and future perspectives for this research direction.

  相似文献   
108.
109.
110.
Using Monte Carlo simulations, we are studying the magnetic properties of Fe-doped CuO thin films. The total magnetizations and the susceptibilities are studied as a function of the effect doping, external magnetic field, and exchange coupling. The critical temperature is discussed as a function of the effect of iron concentration. On the other hand, we investigate the effect of increasing temperatures on the coercive field for a constant value of exchange coupling and a fixed concentration. The coercive magnetic field is found to decrease with increasing temperature values until reaching its null value. The effect of increasing the exchange coupling amount on the saturation magnetic field H s is illustrated. A linear growth of the saturation magnetic field is found as a function of the exchange coupling interaction. To complete this study, we presented and discussed the magnetic hysteresis cycle loops.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号