首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1017篇
  免费   62篇
  国内免费   15篇
电工技术   19篇
综合类   2篇
化学工业   238篇
金属工艺   22篇
机械仪表   28篇
建筑科学   50篇
矿业工程   1篇
能源动力   76篇
轻工业   114篇
水利工程   9篇
石油天然气   8篇
无线电   117篇
一般工业技术   166篇
冶金工业   81篇
原子能技术   9篇
自动化技术   154篇
  2024年   5篇
  2023年   18篇
  2022年   35篇
  2021年   46篇
  2020年   46篇
  2019年   47篇
  2018年   44篇
  2017年   65篇
  2016年   48篇
  2015年   32篇
  2014年   37篇
  2013年   96篇
  2012年   46篇
  2011年   48篇
  2010年   44篇
  2009年   41篇
  2008年   43篇
  2007年   25篇
  2006年   27篇
  2005年   22篇
  2004年   16篇
  2003年   12篇
  2002年   6篇
  2001年   7篇
  2000年   12篇
  1999年   7篇
  1998年   32篇
  1997年   18篇
  1996年   17篇
  1995年   17篇
  1994年   11篇
  1993年   13篇
  1992年   11篇
  1991年   6篇
  1990年   6篇
  1989年   10篇
  1988年   9篇
  1987年   6篇
  1986年   3篇
  1985年   10篇
  1984年   11篇
  1983年   7篇
  1982年   9篇
  1981年   4篇
  1980年   3篇
  1977年   2篇
  1976年   3篇
  1974年   2篇
  1973年   3篇
  1966年   1篇
排序方式: 共有1094条查询结果,搜索用时 31 毫秒
21.

Automatic key concept identification from text is the main challenging task in information extraction, information retrieval, digital libraries, ontology learning, and text analysis. The main difficulty lies in the issues with the text data itself, such as noise in text, diversity, scale of data, context dependency and word sense ambiguity. To cope with this challenge, numerous supervised and unsupervised approaches have been devised. The existing topical clustering-based approaches for keyphrase extraction are domain dependent and overlooks semantic similarity between candidate features while extracting the topical phrases. In this paper, a semantic based unsupervised approach (KP-Rank) is proposed for keyphrase extraction. In the proposed approach, we exploited Latent Semantic Analysis (LSA) and clustering techniques and a novel frequency-based algorithm for candidate ranking is introduced which considers locality-based sentence, paragraph and section frequencies. To evaluate the performance of the proposed method, three benchmark datasets (i.e. Inspec, 500N-KPCrowed and SemEval-2010) from different domains are used. The experimental results show that overall, the KP-Rank achieved significant improvements over the existing approaches on the selected performance measures.

  相似文献   
22.

The term Internet of Things (IoT) represents all communicating countless heterogeneous devices to share data and resources via the internet. The speedy advance of IoT devices proposes limitless benefits, but it also brings new challenges regarding security and forensics. Likewise, IoT devices can generate a massive amount of data that desires integrity and security during its handling and processing in an efficient way. IoT devices and data can be vulnerable to various types of cyber-crimes at each IoT layer. For combating these cyber-crimes in IoT infrastructure, IoT forensic term has shown up. The IoT forensic is the process of performing digital forensic investigation in the IoT environment in a forensically sound and timely fashion manner. Sundry challenges face the IoT forensics that requires urgent solutions and mitigation methods; digital evidence needs to be collected, preserved, analyzed, processed, and reported in a trusted manner to be acceptable for presenting in the court of law. Preserving the evidence unchanged or tampered with is the most critical challenge in digital forensics. Authentication is another challenge facing digital forensics; who is allowed to deal with the evidence? One of the most recent solutions for supporting IoT forensics is the use of Blockchain. Using Blockchain in digital forensics guarantees data integrity, immutability, scalability, and security. Therefore, this paper presents a comprehensive review of IoT security and forensics with the integration with Blockchain technology. It begins by providing an inclusive discussion of IoT security, as well as the need for IoT forensics, and the concepts of Blockchain. Then, a review of Blockchain-based IoT security and forensics issues is presented. Finally, a discussion of open research directions is provided.

  相似文献   
23.
Due to the fast development in data communication systems and computer networks in recent years, the necessity to protect the secret data has become extremely imperative. Several methods have been proposed to protect the secret data; one of them is the secret sharing scheme. It is a method of distributing a secret K among a finite set of participants, in such a way that only predefined subset of participant is enabled to reconstruct a secret from their shares. A secret sharing scheme realizing uniform access structure described by a graph has received a considerable attention. In this scheme, each vertex represents a participant and each edge represents a minimum authorized subset. In this paper, an independent dominating set of vertices in a graph G is introduced and applied as a novel idea to construct a secret sharing scheme such that the vertices of the graph represent the participants and the dominating set of vertices in G represents the minimal authorized set. While most of the previous schemes were based on the principle of adjacent vertices, the proposed scheme is based upon the principle of non-adjacent vertices. We prove that the scheme is perfect, and the lower bound of the information rate of this new construction is improved when compared to some well-known previous constructions. We include an experiment involving security threats to demonstrate the effectiveness of the proposed scheme.  相似文献   
24.
This paper describes a variable structure control for fractional‐order systems with delay in both the input and state variables. The proposed method includes a fractional‐order state predictor to eliminate the input delay. The resulting state‐delay system is controlled through a sliding mode approach where the controller uses a sliding surface defined by fractional order integral. Then, the proposed control law ensures that the state trajectories reach the sliding surface in finite time. Based on recent results of Lyapunov stability theory for fractional‐order systems, the stability of the closed loop is studied. Finally, an illustrative example is given to show the interest of the proposed approach.  相似文献   
25.
The Discrete Cosine Transform (DCT) is one of the most widely used techniques for image compression. Several algorithms are proposed to implement the DCT-2D. The scaled SDCT algorithm is an optimization of the DCT-1D, which consists in gathering all the multiplications at the end. In this paper, in addition to the hardware implementation on an FPGA, an extended optimization has been performed by merging the multiplications in the quantization block without having an impact on the image quality. A simplified quantization has been performed also to keep higher the performances of the all chain. Tests using MATLAB environment have shown that our proposed approach produces images with nearly the same quality of the ones obtained using the JPEG standard. FPGA-based implementations of this proposed approach is presented and compared to other state of the art techniques. The target is an an Altera Cyclone II FPGA using the Quartus synthesis tool. Results show that our approach outperforms the other ones in terms of processing-speed, used resources and power consumption. A comparison has been done between this architecture and a distributed arithmetic based architecture.  相似文献   
26.
The damage thresholds of five different types of quartz glass used for the production of spectroscopic cuvettes for liquids were determined with single temporal and spatial mode nanosecond pulses at 532 nm. One of the glasses had a damage threshold of ?420 J/cm(2), which was more than twice that of the other glasses.  相似文献   
27.

This paper proposes, for the first time, a new radiation pattern synthesis for fractal antenna array that combines the unique multi-band characteristics of fractal arrays with the adaptive beamforming requirements in wireless environment with high-jamming power. In this work, a new adaptive beamforming method based on discrete cbKalman filter is proposed for linear Cantor fractal array with high performance and low computational requirements. The proposed Kalman filter-based beamformer is compared with the Least Mean Squares (LMS) and the Recursive Least Squares (RLS) techniques under various parameter regimes, and the results reveal the superior performance of the proposed approach in terms of beamforming stability, Half-Power Beam Width (HPBW), maximum Side-Lobe Level (SLL), null depth at the direction of interference signals, and convergence rate for different Signal to Interference (SIR) values. Also, the results demonstrate that the suggested approach not only achieves perfect adaptation of the radiation pattern synthesis at high jamming power, but also keep the same SLL at different operating frequencies. This shows the usefulness of the proposed approach in multi-band smart antenna technology for mobile communications and other wireless systems.

  相似文献   
28.
During heat treatment processes, especially during quenching, cracks may form because of the presence of high thermal and mechanical stresses and strains. Notwithstanding the fact that increasingly detailed modelling for heat treatment is being performed (considering, i.a., grain size, creep and transformation plasticity), homogeneous microstructures are still normally assumed. Chemical and hence structural inhomogeneities are not commonly explicitly considered, which is especially accentuated in the case of real parts simulation because of the resulting numerical problem's size. Intensive quenching on a cylindrical specimen of 100Cr6 (SAE) steel is proposed here to experimentally investigate the microcrack generation. A finite element based model is proposed to numerically evaluate the fracture behaviour in a two‐step simulation. First, by solving the quenching problem in direct correspondance with the experimental test performed, and second, by studying the mesoscale response taking into account the influence of second phase particles in a representative volume element based approach. The maximum principal stress criterion is used to trigger the fracture by means of the extended finite element method at the mesoscale. The trend to form cracks in the surface region, experimentally observed, has been well captured by the model. The influence of carbides sizes and content on the mesoscale fracture response has been numerically analysed as well. A good agreement has been reached between the simulations and the experimental results, exhibiting the potential of the introduced approach to be used as a failure prediction methodology.  相似文献   
29.
This study aims to solve the nonlinear fractional-order mathematical model (FOMM) by using the normal and dysregulated bone remodeling of the myeloma bone disease (MBD). For the more precise performance of the model, fractional-order derivatives have been used to solve the disease model numerically. The FOMM is preliminarily designed to focus on the critical interactions between bone resorption or osteoclasts (OC) and bone formation or osteoblasts (OB). The connections of OC and OB are represented by a nonlinear differential system based on the cellular components, which depict stable fluctuation in the usual bone case and unstable fluctuation through the MBD. Untreated myeloma causes by increasing the OC and reducing the osteoblasts, resulting in net bone waste the tumor growth. The solutions of the FOMM will be provided by using the stochastic framework based on the Levenberg-Marquardt backpropagation (LVMBP) neural networks (NN), i.e., LVMBPNN. The mathematical performances of three variations of the fractional-order derivative based on the nonlinear disease model using the LVMPNN. The static structural performances are 82% for investigation and 9% for both learning and certification. The performances of the LVMBPNN are authenticated by using the results of the Adams-Bashforth-Moulton mechanism. To accomplish the capability, steadiness, accuracy, and ability of the LVMBPNN, the performances of the error histograms (EHs), mean square error (MSE), recurrence, and state transitions (STs) will be provided.  相似文献   
30.
Aluminium-silicon alloy with composition 12.5 wt% Si was rapidly quenched from the melt at a cooling rate of about 106 Ks–1 using the melt-spinning technique. The resulting ribbons were investigated by resistivity measurements and X-ray diffraction. The resistivity of the 20 m thick ribbons was 26.6 cm. This is 4.4 times its bulk resistivity value. The activation energy calculated from isothermal ageing was 1.14 ± 0.1 eV. The limit of primary solid solubility is extended almost to the eutectic composition and the large supersaturation is relieved by thermal annealing.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号