首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   455篇
  免费   27篇
  国内免费   8篇
电工技术   4篇
化学工业   75篇
金属工艺   18篇
机械仪表   19篇
建筑科学   14篇
矿业工程   2篇
能源动力   21篇
轻工业   38篇
水利工程   17篇
无线电   70篇
一般工业技术   102篇
冶金工业   51篇
原子能技术   3篇
自动化技术   56篇
  2023年   13篇
  2022年   23篇
  2021年   42篇
  2020年   25篇
  2019年   22篇
  2018年   28篇
  2017年   31篇
  2016年   28篇
  2015年   8篇
  2014年   22篇
  2013年   26篇
  2012年   25篇
  2011年   28篇
  2010年   9篇
  2009年   22篇
  2008年   14篇
  2007年   11篇
  2006年   11篇
  2005年   9篇
  2004年   7篇
  2003年   3篇
  2002年   9篇
  2001年   5篇
  2000年   4篇
  1999年   4篇
  1998年   12篇
  1997年   8篇
  1996年   5篇
  1995年   5篇
  1994年   2篇
  1993年   4篇
  1992年   2篇
  1991年   1篇
  1990年   1篇
  1989年   3篇
  1988年   2篇
  1987年   1篇
  1986年   1篇
  1984年   3篇
  1983年   1篇
  1982年   1篇
  1981年   1篇
  1980年   1篇
  1978年   1篇
  1977年   3篇
  1976年   3篇
排序方式: 共有490条查询结果,搜索用时 16 毫秒
41.
High density of coexisting networks in the Industrial, Scientific and Medical (ISM) band leads to static and self interferences among different communication entities. The inevitability of these interferences demands for interference avoidance schemes to ensure reliability of network operations. This paper proposes a novel Diversified Adaptive Frequency Rolling (DAFR) technique for frequency hopping in Bluetooth piconets. DAFR employs intelligent hopping procedures in order to mitigate self interferences, weeds out the static interferer efficiently and ensures sufficient frequency diversity. We compare the performance of our proposed technique with the widely used existing frequency hopping techniques, namely, Adaptive Frequency Hopping (AFH) and Adaptive Frequency Rolling (AFR). Simulation studies validate the significant improvement in goodput and hopping diversity of our scheme compared to other schemes and demonstrate its potential benefit in real world deployment.  相似文献   
42.
The deep learning model encompasses a powerful learning ability that integrates the feature extraction, and classification method to improve accuracy. Convolutional Neural Networks (CNN) perform well in machine learning and image processing tasks like segmentation, classification, detection, identification, etc. The CNN models are still sensitive to noise and attack. The smallest change in training images as in an adversarial attack can greatly decrease the accuracy of the CNN model. This paper presents an alpha fusion attack analysis and generates defense against adversarial attacks. The proposed work is divided into three phases: firstly, an MLSTM-based CNN classification model is developed for classifying COVID-CT images. Secondly, an alpha fusion attack is generated to fool the classification model. The alpha fusion attack is tested in the last phase on a modified LSTM-based CNN (CNN-MLSTM) model and other pre-trained models. The results of CNN models show that the accuracy of these models dropped greatly after the alpha-fusion attack. The highest F1 score before the attack was achieved is 97.45 And after the attack lowest F1 score recorded is 22%. Results elucidate the performance in terms of accuracy, precision, F1 score and Recall.  相似文献   
43.
44.
45.
Program diagnosis systems were developed to help users solve programming problems. By providing guidence on errors and misconceptions, these systems can help the users in writing programs and understanding their dynamic behavior. Features of software visualization which aim at providing visual and concrete depictions to the abstractions and operations of programs have also shown to be making programs more understandable. The main theme of this paper is to asses the usefulness of incorporating features of software visualization into the design of program diagnosis systems intended for novices. We report an empirical evaluation to assess the effectiveness of supporting visualization features during problem solving. The system used in the evaluation integrates visualzation and immediacy features and supports a model-tracing based approach to program diagnosis. Unlike other similar systems, our prototype system supports a more flexible style of interaction by increasing the grain size of diagnosis to a complete programming statement. The evaluation reported here seems to suggest that when supported with visualization features, systems for program diagnosis tend to be more effective in helping the users during problem solving.  相似文献   
46.
A new method for inverse kinematics for hyper-redundant manipulators is proposed in this paper to plan the path of the end-effector. The basic idea is that for a given smooth path consisting of points close enough to each other; computing the inverse kinematics for these points is carried out geometrically using the proposed method. In this method, the angles between the adjacent links are set to be the same, which makes lining up of two or more joint axes impossible; therefore, avoiding singularities. The manipulability index has been used to show how far the manipulator from the singularity configuration is. The determination of the workspace of the manipulator using the proposed method has been presented in this paper. The simulation results have been carried out on a planar and a three dimensional manipulators. The effectiveness of the proposed method is clearly demonstrated by comparing its result with results calculated by the well-known method of measuring manipulability which is used for singularity avoidance for the last two decades.  相似文献   
47.
48.
The emergence of Internet of Things (IoT) has introduced smart objects as the fundamental building blocks for developing a smart cyber-physical universal environment. The IoTs have innumerable daily life applications. The healthcare industry particularly has been benefited due to the provision of ubiquitous health monitoring, emergency response services, electronic medical billing, etc. Since IoT devices possess limited storage and processing power, therefore these intelligent objects are unable to efficiently provide the e-health facilities, or process and store enormous amount of collected data. IoTs are merged with Cloud Computing technology in Multi-Cloud form that basically helps cover the limitations of IoTs by offering a secure and on-demand shared pool of resources i.e., networks, servers, storage, applications, etc., to deliver effective and well-organized e-health amenities. Although the framework based on the integration of IoT and Multi-Cloud is contributing towards better patient care, yet on the contrary, it is challenging the privacy and reliability of the patients’ information. The purpose of this systematic literature review is to identify the top security threat and to evaluate the existing security techniques used to combat this attack and their applicability in IoT and Multi-Cloud based e-Healthcare environment.  相似文献   
49.
Because of using traditional hand-sign segmentation and classification algorithm,many diversities of Bangla language including joint-letters,dependent vowels etc.and representing 51 Bangla written characters by using only 36 hand-signs,continuous hand-sign-spelled Bangla sign language(BdSL)recognition is challenging.This paper presents a Bangla language modeling algorithm for automatic recognition of hand-sign-spelled Bangla sign language which consists of two phases.First phase is designed for hand-sign classification and the second phase is designed for Bangla language modeling algorithm(BLMA)for automatic recognition of hand-sign-spelled Bangla sign language.In first phase,we have proposed two step classifiers for hand-sign classification using normalized outer boundary vector(NOBV)and window-grid vector(WGV)by calculating maximum inter correlation coefficient(ICC)between test feature vector and pre-trained feature vectors.At first,the system classifies hand-signs using NOBV.If classification score does not satisfy specific threshold then another classifier based on WGV is used.The system is trained using 5,200 images and tested using another(5,200×6)images of 52 hand-signs from 10 signers in 6 different challenging environments achieving mean accuracy of 95.83%for classification with the computational cost of 39.972 milliseconds per frame.In the Second Phase,we have proposed Bangla language modeling algorithm(BLMA)which discovers allhidden charactersbased onrecognized charactersfrom 52 hand-signs of BdSL to make any Bangla words,composite numerals and sentences in BdSL with no training,only based on the result of first phase.To the best of our knowledge,the proposed system is the first system in BdSL designed on automatic recognition of hand-sign-spelled BdSL for large lexicon.The system is tested for BLMA using hand-sign-spelled 500 words,100 composite numerals and 80 sentences in BdSL achieving mean accuracy of 93.50%,95.50%and 90.50%respectively.  相似文献   
50.
Throughout the world, the problem of buried unexploded ordnance (UXO) poses an enormous, persistent, and expensive problem. While UXO generally consists of sizable bodies of ferrous metal and can therefore be detected, with current technology it is extremely difficult to distinguish them reliably from typically widespread pieces of clutter. Thus the problem is one of subsurface discrimination. The authors previous modeling work on scattering of ground penetrating radar (GPR) from metallic objects surrounded by an infinite soil-like medium has suggested the utility of a number of key discriminants in broadband fully polarimetric sensing. In particular, resonance structure, induced field rotation and ellipticity, and bistatic observation of scattered signals were shown to offer key information about target shape and size. The authors investigate the effects on signature features of the proximity of a ground surface to the target, for the common case of shallow burial (<1 m). Overall, their analyses suggest that the key discriminants seen in scattering in an infinite medium survive the complex interactions with the ground surface. In some instances, these revealing signatures appear to be strengthened by the presence of a nearby surface. Multiposition backscatter also allows fundamental inferences about target elongation and symmetry when those cannot be obtained from single position viewing  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号