首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7093篇
  免费   324篇
  国内免费   53篇
电工技术   133篇
综合类   26篇
化学工业   1786篇
金属工艺   118篇
机械仪表   211篇
建筑科学   277篇
矿业工程   6篇
能源动力   462篇
轻工业   725篇
水利工程   76篇
石油天然气   115篇
无线电   653篇
一般工业技术   1142篇
冶金工业   337篇
原子能技术   83篇
自动化技术   1320篇
  2024年   24篇
  2023年   151篇
  2022年   317篇
  2021年   405篇
  2020年   295篇
  2019年   335篇
  2018年   416篇
  2017年   358篇
  2016年   355篇
  2015年   236篇
  2014年   319篇
  2013年   641篇
  2012年   356篇
  2011年   505篇
  2010年   350篇
  2009年   326篇
  2008年   288篇
  2007年   217篇
  2006年   201篇
  2005年   140篇
  2004年   111篇
  2003年   117篇
  2002年   90篇
  2001年   64篇
  2000年   73篇
  1999年   50篇
  1998年   77篇
  1997年   41篇
  1996年   49篇
  1995年   40篇
  1994年   36篇
  1993年   44篇
  1992年   36篇
  1991年   32篇
  1990年   30篇
  1989年   20篇
  1988年   35篇
  1987年   30篇
  1986年   20篇
  1985年   15篇
  1984年   27篇
  1983年   22篇
  1982年   22篇
  1981年   16篇
  1980年   20篇
  1979年   16篇
  1978年   17篇
  1976年   18篇
  1975年   19篇
  1974年   12篇
排序方式: 共有7470条查询结果,搜索用时 10 毫秒
51.
From the perspective of data security, which has always been an important aspect of quality of service, cloud computing focuses a new challenging security threats. Therefore, a data security model must solve the most challenges of cloud computing security. The proposed data security model provides a single default gateway as a platform. It used to secure sensitive user data across multiple public and private cloud applications, including Salesforce, Chatter, Gmail, and Amazon Web Services, without influencing functionality or performance. Default gateway platform encrypts sensitive data automatically in a real time before sending to the cloud storage without breaking cloud application. It did not effect on user functionality and visibility. If an unauthorized person gets data from cloud storage, he only sees encrypted data. If authorized person accesses successfully in his cloud, the data is decrypted in real time for your use. The default gateway platform must contain strong and fast encryption algorithm, file integrity, malware detection, firewall, tokenization and more. This paper interested about authentication, stronger and faster encryption algorithm, and file integrity.  相似文献   
52.
Xia Y  Kamel MS 《Neural computation》2008,20(3):844-872
The constrained L(1) estimation is an attractive alternative to both the unconstrained L(1) estimation and the least square estimation. In this letter, we propose a cooperative recurrent neural network (CRNN) for solving L(1) estimation problems with general linear constraints. The proposed CRNN model combines four individual neural network models automatically and is suitable for parallel implementation. As a special case, the proposed CRNN includes two existing neural networks for solving unconstrained and constrained L(1) estimation problems, respectively. Unlike existing neural networks, with penalty parameters, for solving the constrained L(1) estimation problem, the proposed CRNN is guaranteed to converge globally to the exact optimal solution without any additional condition. Compared with conventional numerical algorithms, the proposed CRNN has a low computational complexity and can deal with the L(1) estimation problem with degeneracy. Several applied examples show that the proposed CRNN can obtain more accurate estimates than several existing algorithms.  相似文献   
53.
Sophisticated on-chip interconnects using packet and circuit switching techniques were recently proposed as a solution to non-scalable shared-bus schemes currently used in Systems-on-Chip (SoCs) implementation. Different interconnect architectures have been studied and adapted for SoCs to achieve high throughput, low latency and energy consumption, and efficient silicon area. Recently, a new on-chip interconnect architecture by adapting the WK-recursive network topology structure has been introduced for SoCs. This paper analyses and compares the energy consumption and the area requirements of Wk-recursive network with five common on-chip interconnects, 2D Mesh, Ring, Spidergon, Fat-Tree and Butterfly Fat-Tree. We investigated the effects of load and traffic models and the obtained results show that the traffic models and load that ends processing elements has a direct effect on the energy consumption and area requirements. In these results, WK-recursive interconnect generally has a higher energy consumption and silicon area requirements in heavy traffic load.  相似文献   
54.
We study the problem of stabilizing a distributed linear system on a subregion of its geometrical domain. We are concerned with two methods: the first approach enables us to characterize a stabilizing control via the steady state Riccati equation, and the second one is based on decomposing the state space into two suitable subspaces and studying the projections of the initial system onto such subspaces. The obtained results are performed through various examples.  相似文献   
55.
Neural Computing and Applications - Feature selection (FS) is one of the basic data preprocessing steps in data mining and machine learning. It is used to reduce feature size and increase model...  相似文献   
56.
The conventional hospital environment is transformed into digital transformation that focuses on patient centric remote approach through advanced technologies. Early diagnosis of many diseases will improve the patient life. The cost of health care systems is reduced due to the use of advanced technologies such as Internet of Things (IoT), Wireless Sensor Networks (WSN), Embedded systems, Deep learning approaches and Optimization and aggregation methods. The data generated through these technologies will demand the bandwidth, data rate, latency of the network. In this proposed work, efficient discrete grey wolf optimization (DGWO) based data aggregation scheme using Elliptic curve Elgamal with Message Authentication code (ECEMAC) has been used to aggregate the parameters generated from the wearable sensor devices of the patient. The nodes that are far away from edge node will forward the data to its neighbor cluster head using DGWO. Aggregation scheme will reduce the number of transmissions over the network. The aggregated data are preprocessed at edge node to remove the noise for better diagnosis. Edge node will reduce the overhead of cloud server. The aggregated data are forward to cloud server for central storage and diagnosis. This proposed smart diagnosis will reduce the transmission cost through aggregation scheme which will reduce the energy of the system. Energy cost for proposed system for 300 nodes is 0.34μJ. Various energy cost of existing approaches such as secure privacy preserving data aggregation scheme (SPPDA), concealed data aggregation scheme for multiple application (CDAMA) and secure aggregation scheme (ASAS) are 1.3 μJ, 0.81 μJ and 0.51 μJ respectively. The optimization approaches and encryption method will ensure the data privacy.  相似文献   
57.
Identity management is based on the creation and management of user identities for granting access to the cloud resources based on the user attributes. The cloud identity and access management (IAM) grants the authorization to the end-users to perform different actions on the specified cloud resources. The authorizations in the IAM are grouped into roles instead of granting them directly to the end-users. Due to the multiplicity of cloud locations where data resides and due to the lack of a centralized user authority for granting or denying cloud user requests, there must be several security strategies and models to overcome these issues. Another major concern in IAM services is the excessive or the lack of access level to different users with previously granted authorizations. This paper proposes a comprehensive review of security services and threats. Based on the presented services and threats, advanced frameworks for IAM that provide authentication mechanisms in public and private cloud platforms. A threat model has been applied to validate the proposed authentication frameworks with different security threats. The proposed models proved high efficiency in protecting cloud platforms from insider attacks, single sign-on failure, brute force attacks, denial of service, user privacy threats, and data privacy threats.  相似文献   
58.
This paper proposes an optimal recursive estimator to estimate the states of a stochastic discrete time linear dynamic system when the states of the system are constrained with inequality constraints. The case when the constraints are strictly satisfied is treated independently from the case when some of the constraints are violated. For the first case, the well known Kalman filter estimator is used. In the second case, an algorithm which uses a series of successive orthogonalizations on the measurement subspaces is employed to obtain the optimal estimate. It is shown that the proposed estimator has several attractive properties such that it is an unbiased estimator. More importantly, compared to other estimator found in the literature, the proposed estimator needs less computational efforts, is numerically more stable and it leads to a smaller variance. To show the effectiveness of the proposed estimator, several simulation results are presented and discussed.  相似文献   
59.
60.
We present two new classifiers for two-class classification problems using a new Beta-SVM kernel transformation and an iterative algorithm to concurrently select the support vectors for a support vector machine (SVM) and the hidden units for a single hidden layer neural network to achieve a better generalization performance. To construct the classifiers, the contributing data points are chosen on the basis of a thresholding scheme of the outputs of a single perceptron trained using all training data samples. The chosen support vectors are used to construct a new SVM classifier that we call Beta-SVN. The number of chosen support vectors is used to determine the structure of the hidden layer in a single hidden layer neural network that we call Beta-NN. The Beta-SVN and Beta-NN structures produced by our method outperformed other commonly used classifiers when tested on a 2-dimensional non-linearly separable data set.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号