首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1400篇
  免费   50篇
  国内免费   9篇
电工技术   17篇
综合类   3篇
化学工业   240篇
金属工艺   47篇
机械仪表   71篇
建筑科学   32篇
能源动力   78篇
轻工业   48篇
水利工程   2篇
石油天然气   3篇
无线电   185篇
一般工业技术   332篇
冶金工业   113篇
原子能技术   11篇
自动化技术   277篇
  2024年   11篇
  2023年   33篇
  2022年   60篇
  2021年   84篇
  2020年   66篇
  2019年   51篇
  2018年   61篇
  2017年   58篇
  2016年   64篇
  2015年   37篇
  2014年   57篇
  2013年   102篇
  2012年   56篇
  2011年   83篇
  2010年   46篇
  2009年   65篇
  2008年   59篇
  2007年   47篇
  2006年   48篇
  2005年   37篇
  2004年   34篇
  2003年   23篇
  2002年   22篇
  2001年   9篇
  2000年   15篇
  1999年   14篇
  1998年   17篇
  1997年   15篇
  1996年   21篇
  1995年   21篇
  1994年   15篇
  1993年   7篇
  1992年   8篇
  1991年   15篇
  1990年   6篇
  1989年   10篇
  1988年   14篇
  1987年   8篇
  1986年   5篇
  1985年   11篇
  1984年   7篇
  1983年   2篇
  1982年   3篇
  1981年   7篇
  1979年   7篇
  1978年   2篇
  1977年   3篇
  1976年   5篇
  1975年   3篇
  1974年   3篇
排序方式: 共有1459条查询结果,搜索用时 31 毫秒
31.
In today's Internet routing infrastructure, designers have addressed scaling concerns in routing constrained multiobjective optimization problems examining latency and mobility concerns as a secondary constrain. In tactical Mobile Ad-hoc Network (MANET), hubs can function based on the work plan in various social affairs and the internally connected hubs are almost having the related moving standards where the topology between one and the other are tightly coupled in steady support by considering the touchstone of hubs such as a self-sorted out, self-mending and self-administration. Clustering in the routing process is one of the key aspects to increase MANET performance by coordinating the pathways using multiple criteria and analytics. We present a Group Adaptive Hybrid Routing Algorithm (GAHRA) for gathering portability, which pursues table-driven directing methodology in stable accumulations and on-request steering strategy for versatile situations. Based on this aspect, the research demonstrates an adjustable framework for commuting between the table-driven approach and the on-request approach, with the objectives of enhancing the output of MANET routing computation in each hub. Simulation analysis and replication results reveal that the proposed method is promising than a single well-known existing routing approach and is well-suited for sensitive MANET applications.  相似文献   
32.
In this work, a deep learning (DL)-based massive multiple-input multiple-output (mMIMO) orthogonal frequency division multiplexing (OFDM) system is investigated over the tapped delay line type C (TDL-C) model with a Rayleigh fading distribution at frequencies ranging from 0.5 to 100 GHz. The proposed bi-directional long short-term memory (Bi-LSTM) channel state information (CSI) estimator uses online learning during training and offline learning during the practical implementation phase. The design of the estimator takes into account situations in which prior knowledge of channel statistics is limited and targets excellent performance, even with limited pilot symbols (PS). Three separate loss functions (mean square logarithmic error [MSLE], Huber, and Kullback–Leibler Distance [KLD]) are assessed in three classification layers. The symbol error rate (SER) and outage probability performance of the proposed estimator are evaluated using a number of optimization techniques, such as stochastic gradient descent (SGD), momentum, and the adaptive gradient (AdaGrad) algorithm. The Bi-LSTM-based CSI estimator is trained considering a specific number of PS. It can be readily seen that by incorporating a cyclic prefix (CP), the system becomes more resilient to channel impairments, resulting in a lower SER. Simulations show that the SGD optimization approach and Huber loss function-trained Bi-LSTM-based CSI estimator have the lowest SER and very high estimation accuracy. By using deep neural networks (DNNs), the Bi-LSTM method for CSI estimation achieves a superior channel capacity (in bps/Hz) at 10 dB than long short-term memory (LSTM) and other conventional CSI estimators, such as minimum mean square error (MMSE) and least squares (LS). The simulation results validate the analytical results in the study.  相似文献   
33.
Internet of Things (IoT) security is the act of securing IoT devices and networks. IoT devices, including industrial machines, smart energy grids, and building automation, are extremely vulnerable. With the goal of shielding network systems from illegal access in cloud servers and IoT systems, Intrusion Detection Systems (IDSs) and Network-based Intrusion Prevention Systems (NBIPSs) are proposed in this study. An intrusion prevention system is proposed to realize NBIPS to safeguard top to bottom engineering. The proposed NBIPS inspects network activity streams to identify and counteract misuse instances. The NBIPS is usually located specifically behind a firewall, and it provides a reciprocal layer of investigation that adversely chooses unsafe substances. Network-based IPS sensors can be installed either in an inline or a passive model. An inline sensor is installed to monitor the traffic passing through it. The sensors are installed to stop attacks by blocking the traffic using an IoT signature-based protocol.  相似文献   
34.
Engineering with Computers - Plate structures are the integral parts of any maritime engineering platform. With the recent focus on composite structures, the need for optimizing their design and...  相似文献   
35.
The Journal of Supercomputing - Data transmission is a great challenge in any network environment. However, medical data collected from IoT devices need to be transmitted at high speed to ensure...  相似文献   
36.

In recent years, we face an increasing interest in protecting multimedia data and copyrights due to the high exchange of information. Attackers are trying to get confidential information from various sources, which brings the importance of securing the data. Many researchers implemented techniques to hide secret information to maintain the integrity and privacy of data. In order to protect confidential data, histogram-based reversible data hiding with other cryptographic algorithms are widely used. Therefore, in the proposed work, a robust method for securing digital video is suggested. We implemented histogram bit shifting based reversible data hiding by embedding the encrypted watermark in featured video frames. Histogram bit shifting is used for hiding highly secured watermarks so that security for the watermark symbol is also being achieved. The novelty of the work is that only based on the quality threshold a few unique frames are selected, which holds the encrypted watermark symbol. The optimal value for this threshold is obtained using the Firefly Algorithm. The proposed method is capable of hiding high-capacity data in the video signal. The experimental result shows the higher capacity and video quality compared to other reversible data hiding techniques. The recovered watermark provides better identity identification against various attacks. A high value of PSNR and a low value of BER and MSE is reported from the results.

  相似文献   
37.
In today’s world, Cloud Computing (CC) enables the users to access computing resources and services over cloud without any need to own the infrastructure. Cloud Computing is a concept in which a network of devices, located in remote locations, is integrated to perform operations like data collection, processing, data profiling and data storage. In this context, resource allocation and task scheduling are important processes which must be managed based on the requirements of a user. In order to allocate the resources effectively, hybrid cloud is employed since it is a capable solution to process large-scale consumer applications in a pay-by-use manner. Hence, the model is to be designed as a profit-driven framework to reduce cost and make span. With this motivation, the current research work develops a Cost-Effective Optimal Task Scheduling Model (CEOTS). A novel algorithm called Target-based Cost Derivation (TCD) model is used in the proposed work for hybrid clouds. Moreover, the algorithm works on the basis of multi-intentional task completion process with optimal resource allocation. The model was successfully simulated to validate its effectiveness based on factors such as processing time, make span and efficient utilization of virtual machines. The results infer that the proposed model outperformed the existing works and can be relied in future for real-time applications.  相似文献   
38.

In this article, we introduce new field equations for incompressible non-viscous fluids, which can be treated similarly to Maxwell’s electromagnetic equations based on artificial intelligence algorithms. Lagrangian and Hamiltonian formulations are used to arrive at field equations that are solved using convolutional neural networks. Four linear differential equations, which describe the two fields, namely, the dynamic pressure and the vortex fields, are derived, and these can be used in place of Euler’s equation. The only assumption while deriving this equation is that the dynamic pressure and vortex fields obey the superposition principle. The important finding to be noted is that Euler’s fluid equations can be converted into field equations analogous to Maxwell’s electromagnetic equations. We solve the flow problem for laminar flow past a cylinder, sphere, and cone in two dimensions similar to the conduction in a uniform electric field and arrive at closed-form expressions. These closed-form expressions, which are obtained for the potentials of fluid flow, are similar to the streamline potential functions in the case of fluid dynamics.

  相似文献   
39.
The insulation resistance of conventional atmospheric plasma-sprayed alumina coatings with 10–15% porosity is ~1011 Ω. The presence of pores, lamellae boundaries, and other non-fillings dampens the insulation resistance of the coating. In the present study, aluminum phosphate was used to seal the surface of plasma-sprayed alumina coating and evaluate the effect of sealing on the insulation resistance and its thermal cycling response. Sealing was carried out with three concentrations of sealant (P/Al molar ratio of 3, 10, and 15). Characterization by X-ray diffraction and scanning electron microscopy revealed the primary sealing phase as aluminum metaphosphate and effective sealing of the pores by the aluminum phosphate phases. Insulation resistance is improved by two orders of magnitude after sealing the coated samples. Sealing with P/Al molar ratio 3 exhibited maximum insulation resistance of ~1013 Ω at room temperature. Thermal cycling studies between 650°C and 200°C on the sealed samples showed deterioration in thermal cycling life after sealing.  相似文献   
40.
A new data-driven reference vector-guided evolutionary algorithm has been successfully implemented to construct surrogate models for various objectives pertinent to an industrial blast furnace. A total of eight objectives have been modeled using the operational data of the furnace using 12 process variables identified through a principal component analysis and optimized simultaneously. The capability of this algorithm to handle a large number of objectives, which has been lacking earlier, results in a more efficient setting of the operational parameters of the furnace, leading to a precisely optimized hot metal production process.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号