首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   965篇
  免费   54篇
  国内免费   9篇
电工技术   2篇
化学工业   239篇
金属工艺   13篇
机械仪表   20篇
建筑科学   12篇
矿业工程   1篇
能源动力   70篇
轻工业   31篇
水利工程   7篇
石油天然气   7篇
无线电   131篇
一般工业技术   226篇
冶金工业   73篇
原子能技术   3篇
自动化技术   193篇
  2024年   4篇
  2023年   23篇
  2022年   36篇
  2021年   43篇
  2020年   38篇
  2019年   35篇
  2018年   41篇
  2017年   30篇
  2016年   40篇
  2015年   35篇
  2014年   61篇
  2013年   105篇
  2012年   47篇
  2011年   60篇
  2010年   46篇
  2009年   50篇
  2008年   54篇
  2007年   32篇
  2006年   18篇
  2005年   18篇
  2004年   11篇
  2003年   18篇
  2002年   17篇
  2001年   7篇
  2000年   8篇
  1999年   9篇
  1998年   23篇
  1997年   11篇
  1996年   6篇
  1995年   9篇
  1994年   6篇
  1993年   5篇
  1992年   6篇
  1990年   5篇
  1989年   4篇
  1988年   8篇
  1987年   9篇
  1986年   8篇
  1985年   3篇
  1984年   3篇
  1983年   2篇
  1981年   4篇
  1980年   2篇
  1978年   3篇
  1977年   4篇
  1976年   4篇
  1974年   4篇
  1973年   5篇
  1970年   2篇
  1969年   2篇
排序方式: 共有1028条查询结果,搜索用时 484 毫秒
21.
An Architectural Framework for Accurate Characterization of Network Traffic   总被引:1,自引:0,他引:1  
In networks carrying large volume of traffic, accurate traffic characterization is necessary for understanding the dynamics and patterns of network resource usage. Previous approaches to flow characterization are based on random sampling of the packets (e.g., Cisco's NetFlow) or inferring characteristics solely based on long lived flows (LLFs) or on lossy data structures (e.g., bloom filters, hash tables). However, none of these approaches takes into account the heavy-tailed nature of the Internet traffic and separates the estimation algorithm from the flow measurement architecture.In this paper, we propose an alternate approach to traffic characterization by closely linking the flow measurement architecture with the estimation algorithm. Our measurement framework stores complete information related to short lived flows (SLFs) while collecting partial information related to LLFs. For real-time separation of LLFs and SLFs, we propose a novel algorithm based on typical sequences from Information theory. The distribution (pdf) and sample space of the underlying traffic is estimated using the non-parametric Parzen window technique and likelihood function defined over the Coupon collector problem. We validate the accuracy and performance of our estimation technique using traffic traces from the internal LAN in our laboratory and from National Library for Applied Network Research (NLANR).  相似文献   
22.
Authors use images to present a wide variety of important information in documents. For example, two-dimensional (2-D) plots display important data in scientific publications. Often, end-users seek to extract this data and convert it into a machine-processible form so that the data can be analyzed automatically or compared with other existing data. Existing document data extraction tools are semi-automatic and require users to provide metadata and interactively extract the data. In this paper, we describe a system that extracts data from documents fully automatically, completely eliminating the need for human intervention. The system uses a supervised learning-based algorithm to classify figures in digital documents into five classes: photographs, 2-D plots, 3-D plots, diagrams, and others. Then, an integrated algorithm is used to extract numerical data from data points and lines in the 2-D plot images along with the axes and their labels, the data symbols in the figure’s legend and their associated labels. We demonstrate that the proposed system and its component algorithms are effective via an empirical evaluation. Our data extraction system has the potential to be a vital component in high volume digital libraries.  相似文献   
23.
A phenomenal growth in the number of credit card transactions, especially for online purchases, has recently led to a substantial rise in fraudulent activities. Implementation of efficient fraud detection systems has thus become imperative for all credit card issuing banks to minimize their losses. In real life, fraudulent transactions are interspersed with genuine transactions and simple pattern matching is not often sufficient to detect them accurately. Thus, there is a need for combining both anomaly detection as well as misuse detection techniques. In this paper, we propose to use two-stage sequence alignment in which a profile analyzer (PA) first determines the similarity of an incoming sequence of transactions on a given credit card with the genuine cardholder's past spending sequences. The unusual transactions traced by the profile analyzer are next passed on to a deviation analyzer (DA) for possible alignment with past fraudulent behavior. The final decision about the nature of a transaction is taken on the basis of the observations by these two analyzers. In order to achieve online response time for both PA and DA, we suggest a new approach for combining two sequence alignment algorithms BLAST and SSAHA.  相似文献   
24.
Dasgupta K  Kundu S  Nair LG 《Applied optics》1995,34(12):1982-1988
The effect of nonlinear signal absorption (NLSA) due to ground-state absorption and excited-state absorption in a transversely pumped high-power dye laser amplifier is theoretically examined with a one-dimensional steady-state model for a dye amplifier pumped by a copper vapor laser. A well-approximated analytical expression for the extraction efficiency is derived, from which the effect of NLSA in reducing the amplifier efficiency can be appreciated immediately and can also be interpreted in terms of certain characteristic lengths. The reduction in efficiency due to NLSA is found to be largely independent of the pump power, provided that the signal power is increased linearly with the pump power to continue to saturate the amplifier gain and suppress amplified spontaneous emission.  相似文献   
25.

This paper deals with the secrecy performance analysis of a multicast network over mixed fading scenarios in which a cluster of passive eavesdroppers is trying to overhear the secret transmission. Our key contribution is to prevent this malicious attack of the illegitimate receivers. Rayleigh/ Rician mixed fading channels are considered to model alternately the multicast/ eavesdropper and eavesdropper/ multicast channels as such mixed fading scenarios are often encountered in cellular communication where only one link (either multicast or eavesdropper) undergo a line-of-sight propagation path. At first, we derive the probability density functions for the single-input-multiple-output multicast scenarios and then the secrecy analysis is carried out by obtaining closed-form expressions for the performance matrices such as the probability of non-zero secrecy multicast capacity, ergodic secrecy multicast capacity, and secure outage probability for multicasting. The derived expressions are beneficial to investigate how the antenna diversity can combat the detrimental impact of fading as well as the number of multicast users and eavesdroppers, and improve the secrecy level to the acceptable limit. Moreover, the best secure scenario in terms of the secrecy parameters is obtained when the multicast channels undergo Rician fading whereas the eavesdropper channels experience Rayleigh fading. Finally, the analytical expressions are justified via the Monte-Carlo simulations.

  相似文献   
26.
Wireless Personal Communications - This paper proposes and analyses the power allocation coefficient normalization for successive interference cancellation in power-domain non-orthogonal multiple...  相似文献   
27.
Supply chain managers are responsible for making decisions regarding supply chain risk in order to mitigate the impact of supply chain disruptions. This study develops and tests a theoretical model that leverages the individual-level knowledge-based view perspective to understand the process through which risk mitigation orientation of the supply chain manager contributes to his/her absorptive capacity. A supply chain manager’s absorptive capacity, in turn, enhances his/her ability to effectively mitigate supply chain risk. Study findings demonstrate that supply chain managers with high-risk mitigation orientation have greater level of absorptive capacity which enhances their risk mitigation competency. This study represents the first development and testing of a model that examines individual-level knowledge management factors that affect supply chain risk mitigation competency. This research emphasises the importance of the individual supply chain manager in managing risk and illustrates how theoretical perspectives from the knowledge management, supply chain risk and organisational behaviour literature can be fruitfully adopted to explain behaviour in the field of supply chain risk management.  相似文献   
28.
29.
30.
A smart city incorporates infrastructure methods that are environmentally responsible, such as smart communications, smart grids, smart energy, and smart buildings. The city administration has prioritized the use of cutting-edge technology and informatics as the primary strategy for enhancing service quality, with energy resources taking precedence. To achieve optimal energy management in the multidimensional system of a city tribe, it is necessary not only to identify and study the vast majority of energy elements, but also to define their implicit interdependencies. This is because optimal energy management is required to reach this objective. The lighting index is an essential consideration when evaluating the comfort indicators. In order to realize the concept of a smart city, the primary objective of this research is to create a system for managing and monitoring the lighting index. It is possible to identify two distinct phases within the intelligent system. Once data collection concludes, the monitoring system will be activated. In the second step, the operation of the control system is analyzed and its effect on the performance of the numerical model is determined. This evaluation is based on the proposed methodology. The optimized results were deemed satisfactory because they maintained the brightness index value (79%) while consuming less energy. The intelligent implementation system generated satisfactory outcomes, which were observed 1.75 times on average.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号