首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1827篇
  免费   94篇
  国内免费   14篇
电工技术   43篇
综合类   7篇
化学工业   411篇
金属工艺   38篇
机械仪表   58篇
建筑科学   72篇
矿业工程   6篇
能源动力   150篇
轻工业   177篇
水利工程   13篇
石油天然气   23篇
无线电   218篇
一般工业技术   301篇
冶金工业   105篇
原子能技术   14篇
自动化技术   299篇
  2024年   8篇
  2023年   43篇
  2022年   75篇
  2021年   100篇
  2020年   80篇
  2019年   83篇
  2018年   100篇
  2017年   101篇
  2016年   88篇
  2015年   48篇
  2014年   92篇
  2013年   171篇
  2012年   118篇
  2011年   133篇
  2010年   94篇
  2009年   98篇
  2008年   76篇
  2007年   61篇
  2006年   34篇
  2005年   23篇
  2004年   22篇
  2003年   23篇
  2002年   22篇
  2001年   23篇
  2000年   16篇
  1999年   17篇
  1998年   22篇
  1997年   23篇
  1996年   20篇
  1995年   20篇
  1994年   16篇
  1993年   4篇
  1992年   10篇
  1991年   4篇
  1990年   7篇
  1989年   4篇
  1988年   5篇
  1987年   2篇
  1986年   5篇
  1985年   10篇
  1984年   6篇
  1983年   9篇
  1982年   4篇
  1981年   1篇
  1980年   1篇
  1978年   4篇
  1977年   4篇
  1976年   4篇
  1970年   1篇
排序方式: 共有1935条查询结果,搜索用时 328 毫秒
41.
Meteorological changes urge engineering communities to look for sustainable and clean energy technologies to keep the environment safe by reducing CO2 emissions. The structure of these technologies relies on the deep integration of advanced data-driven techniques which can ensure efcient energy generation, transmission, and distribution. After conducting thorough research for more than a decade, the concept of the smart grid (SG) has emerged, and its practice around the world paves the ways for efcient use of reliable energy technology. However, many developing features evoke keen interest and their improvements can be regarded as the next-generation smart grid (NGSG). Also, to deal with the non-linearity and uncertainty, the emergence of data-driven NGSG technology can become a great initiative to reduce the diverse impact of non-linearity. This paper exhibits the conceptual framework of NGSG by enabling some intelligent technical features to ensure its reliable operation, including intelligent control, agent-based energy conversion, edge computing for energy management, internet of things (IoT) enabled inverter, agent-oriented demand side management, etc. Also, a study on the development of data-driven NGSG is discussed to facilitate the use of emerging data-driven techniques (DDTs) for the sustainable operation of the SG. The prospects of DDTs in the NGSG and their adaptation challenges in real-time are also explored in this paper from various points of view including engineering, technology, et al. Finally, the trends of DDTs towards securing sustainable and clean energy evolution from the NGSG technology in order to keep the environment safe is also studied, while some major future issues are highlighted. This paper can ofer extended support for engineers and researchers in the context of data-driven technology and the SG.  相似文献   
42.
Internet Protocol version 6 (IPv6) is the latest version of IP that goal to host 3.4 × 1038 unique IP addresses of devices in the network. IPv6 has introduced new features like Neighbour Discovery Protocol (NDP) and Address Auto-configuration Scheme. IPv6 needed several protocols like the Address Auto-configuration Scheme and Internet Control Message Protocol (ICMPv6). IPv6 is vulnerable to numerous attacks like Denial of Service (DoS) and Distributed Denial of Service (DDoS) which is one of the most dangerous attacks executed through ICMPv6 messages that impose security and financial implications. Therefore, an Intrusion Detection System (IDS) is a monitoring system of the security of a network that detects suspicious activities and deals with a massive amount of data comprised of repetitive and inappropriate features which affect the detection rate. A feature selection (FS) technique helps to reduce the computation time and complexity by selecting the optimum subset of features. This paper proposes a method for detecting DDoS flooding attacks (FA) based on ICMPv6 messages using a Binary Flower Pollination Algorithm (BFPA-FA). The proposed method (BFPA-FA) employs FS technology with a support vector machine (SVM) to identify the most relevant, influential features. Moreover, The ICMPv6-DDoS dataset was used to demonstrate the effectiveness of the proposed method through different attack scenarios. The results show that the proposed method BFPA-FA achieved the best accuracy rate (97.96%) for the ICMPv6 DDoS detection with a reduced number of features (9) to half the total (19) features. The proven proposed method BFPA-FA is effective in the ICMPv6 DDoS attacks via IDS.  相似文献   
43.

In communication industry one of the most rapidly growing area is wireless technology and its applications. The efficient access to radio spectrum is a requirement to make this communication feasible for the users that are running multimedia applications and establishing real-time connections on an already overcrowded spectrum. In recent times cognitive radios (CR) are becoming the prime candidates for improved utilization of available spectrum. The unlicensed secondary users share the spectrum with primary licensed user in such manners that the interference at the primary user does not increase from a predefined threshold. In this paper, we propose an algorithm to address the power control problem for CR networks. The proposed solution models the wireless system with a non-cooperative game, in which each player maximize its utility in a competitive environment. The simulation results shows that the proposed algorithm improves the performance of the network in terms of high SINR and low power consumption.

  相似文献   
44.
Journal of Intelligent Manufacturing - Deep learning-based predictive quality enables manufacturing companies to make data-driven predictions of the quality of a produced product based on process...  相似文献   
45.
The Journal of Supercomputing - Smart services are a concept that provides services to the citizens in an efficient manner. The online shopping and recommender system can play an important role for...  相似文献   
46.
The past three decades have witnessed notable advances in establishing photosensitizer–antibody photo‐immunoconjugates for photo‐immunotherapy and imaging of tumors. Photo‐immunotherapy minimizes damage to surrounding healthy tissue when using a cancer‐selective photo‐immunoconjugate, but requires a threshold intracellular photosensitizer concentration to be effective. Delivery of immunoconjugates to the target cells is often hindered by I) the low photosensitizer‐to‐antibody ratio of photo‐immunoconjugates and II) the limited amount of target molecule presented on the cell surface. Here, a nanoengineering approach is introduced to overcome these obstacles and improve the effectiveness of photo‐immunotherapy and imaging. Click chemistry coupling of benzoporphyrin derivative (BPD)–Cetuximab photo‐immunoconjugates onto FKR560 dye‐containing poly(lactic‐co‐glycolic acid) nanoparticles markedly enhances intracellular photo‐immunoconjugate accumulation and potentiates light‐activated photo‐immunotoxicity in ovarian cancer and glioblastoma. It is further demonstrated that co‐delivery and light activation of BPD and FKR560 allow longitudinal fluorescence tracking of photoimmunoconjugate and nanoparticle in cells. Using xenograft mouse models of epithelial ovarian cancer, intravenous injection of photo‐immunoconjugated nanoparticles doubles intratumoral accumulation of photo‐immunoconjugates, resulting in an enhanced photoimmunotherapy‐mediated tumor volume reduction, compared to “standard” immunoconjugates. This generalizable “carrier effect” phenomenon is attributed to the successful incorporation of photo‐immunoconjugates onto a nanoplatform, which modulates immunoconjugate delivery and improves treatment outcomes.  相似文献   
47.
Vehicle-to-grid technology is an emerging field that allows unused power from Electric Vehicles (EVs) to be used by the smart grid through the central aggregator. Since the central aggregator is connected to the smart grid through a wireless network, it is prone to cyber-attacks that can be detected and mitigated using an intrusion detection system. However, existing intrusion detection systems cannot be used in the vehicle-to-grid network because of the special requirements and characteristics of the vehicle-to-grid network. In this paper, the effect of denial-of-service attacks of malicious electric vehicles on the central aggregator of the vehicle-to-grid network is investigated and an intrusion detection system for the vehicle-to-grid network is proposed. The proposed system, central aggregator–intrusion detection system (CA-IDS), works as a security gateway for EVs to analyze and monitor incoming traffic for possible DoS attacks. EVs are registered with a Central Aggregator (CAG) to exchange authenticated messages, and malicious EVs are added to a blacklist for violating a set of predefined policies to limit their interaction with the CAG. A denial of service (DoS) attack is simulated at CAG in a vehicle-to-grid (V2G) network manipulating various network parameters such as transmission overhead, receiving capacity of destination, average packet size, and channel availability. The proposed system is compared with existing intrusion detection systems using different parameters such as throughput, jitter, and accuracy. The analysis shows that the proposed system has a higher throughput, lower jitter, and higher accuracy as compared to the existing schemes.  相似文献   
48.
The number of mobile devices accessing wireless networks is skyrocketing due to the rapid advancement of sensors and wireless communication technology. In the upcoming years, it is anticipated that mobile data traffic would rise even more. The development of a new cellular network paradigm is being driven by the Internet of Things, smart homes, and more sophisticated applications with greater data rates and latency requirements. Resources are being used up quickly due to the steady growth of smartphone devices and multimedia apps. Computation offloading to either several distant clouds or close mobile devices has consistently improved the performance of mobile devices. The computation latency can also be decreased by offloading computing duties to edge servers with a specific level of computing power. Device-to-device (D2D) collaboration can assist in processing small-scale activities that are time-sensitive in order to further reduce task delays. The task offloading performance is drastically reduced due to the variation of different performance capabilities of edge nodes. Therefore, this paper addressed this problem and proposed a new method for D2D communication. In this method, the time delay is reduced by enabling the edge nodes to exchange data samples. Simulation results show that the proposed algorithm has better performance than traditional algorithm.  相似文献   
49.
One of the most pressing concerns for the consumer market is the detection of adulteration in meat products due to their preciousness. The rapid and accurate identification mechanism for lard adulteration in meat products is highly necessary, for developing a mechanism trusted by consumers and that can be used to make a definitive diagnosis. Fourier Transform Infrared Spectroscopy (FTIR) is used in this work to identify lard adulteration in cow, lamb, and chicken samples. A simplified extraction method was implied to obtain the lipids from pure and adulterated meat. Adulterated samples were obtained by mixing lard with chicken, lamb, and beef with different concentrations (10%–50% v/v). Principal component analysis (PCA) and partial least square (PLS) were used to develop a calibration model at 800–3500 cm−1. Three-dimension PCA was successfully used by dividing the spectrum in three regions to classify lard meat adulteration in chicken, lamb, and beef samples. The corresponding FTIR peaks for the lard have been observed at 1159.6, 1743.4, 2853.1, and 2922.5 cm−1, which differentiate chicken, lamb, and beef samples. The wavenumbers offer the highest determination coefficient R2 value of 0.846 and lowest root mean square error of calibration (RMSEC) and root mean square error prediction (RMSEP) with an accuracy of 84.6%. Even the tiniest fat adulteration up to 10% can be reliably discovered using this methodology.  相似文献   
50.
A novel and robust pitch estimation method is presented in this paper. The basic idea is to reshape the speech signal using a combination of the dominant harmonic modification (DHM) and data adaptive time domain filtering techniques. The noisy speech signal is filtered within the ranges of fundamental frequencies to obtain the pre-filtered signal (PFS). The dominant harmonic (DH) of the PFS is determined and enhanced its amplitude. Normalized autocorrelation function (NACF) is applied to that modified signal. Then empirical mode decomposition (EMD) based data adaptive time domain filtering is applied to the NACF signal. Partial reconstruction is performed in EMD domain. The pitch period is determined from the partially reconstructed signal. The experimental results show that the proposed method performs better than the other recently developed methods for noisy and clean speech signals in terms of gross and fine pitch errors.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号