首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   12894篇
  免费   406篇
  国内免费   62篇
电工技术   263篇
综合类   24篇
化学工业   2275篇
金属工艺   371篇
机械仪表   365篇
建筑科学   231篇
矿业工程   75篇
能源动力   704篇
轻工业   1178篇
水利工程   190篇
石油天然气   83篇
无线电   1635篇
一般工业技术   2778篇
冶金工业   1562篇
原子能技术   198篇
自动化技术   1430篇
  2024年   39篇
  2023年   177篇
  2022年   506篇
  2021年   507篇
  2020年   409篇
  2019年   407篇
  2018年   553篇
  2017年   513篇
  2016年   483篇
  2015年   282篇
  2014年   446篇
  2013年   889篇
  2012年   521篇
  2011年   680篇
  2010年   547篇
  2009年   538篇
  2008年   484篇
  2007年   392篇
  2006年   332篇
  2005年   277篇
  2004年   250篇
  2003年   224篇
  2002年   188篇
  2001年   150篇
  2000年   147篇
  1999年   157篇
  1998年   358篇
  1997年   235篇
  1996年   253篇
  1995年   223篇
  1994年   183篇
  1993年   171篇
  1992年   143篇
  1991年   152篇
  1990年   114篇
  1989年   108篇
  1988年   130篇
  1987年   109篇
  1986年   89篇
  1985年   115篇
  1984年   94篇
  1983年   107篇
  1982年   99篇
  1981年   88篇
  1980年   78篇
  1979年   54篇
  1978年   46篇
  1977年   57篇
  1976年   80篇
  1975年   32篇
排序方式: 共有10000条查询结果,搜索用时 46 毫秒
61.
Wireless Personal Communications - Biometric traits are frequently used by security agencies for automatic recognition of a person. There are numerous biometric traits used for person...  相似文献   
62.
Sensor networks comprise of sensor nodes with limited battery power that are deployed at different geographical locations to monitor physical events. Information gathering is a typical but an important operation in many applications of wireless sensor networks (WSNs). It is necessary to operate the sensor network for longer period of time in an energy efficient manner for gathering information. One of the popular WSN protocol, named low energy adaptive clustering hierarchy (LEACH) and its variants, aim to prolong the network lifetime using energy efficient clustering approach. These protocols increase the network lifetime at the expense of reduced stability period (the time span before the first node dies). The reduction in stability period is because of the high energy variance of nodes. Stability period is an essential aspect to preserve coverage properties of the network. Higher is the stability period, more reliable is the network. Higher energy variance of nodes leads to load unbalancing among nodes and therefore lowers the stability period. Hence, it is perpetually attractive to design clustering algorithms that provides higher stability, lower energy variance and are energy efficient. In this paper to overcome the shortcomings of existing clustering protocols, a protocol named stable energy efficient clustering protocol is proposed. It balances the load among nodes using energy-aware heuristics and hence ensures higher stability period. The results demonstrate that the proposed protocol significantly outperforms LEACH and its variants in terms of energy variance and stability period.  相似文献   
63.

Wireless communication networks have much data to sense, process, and transmit. It tends to develop a security mechanism to care for these needs for such modern-day systems. An intrusion detection system (IDS) is a solution that has recently gained the researcher’s attention with the application of deep learning techniques in IDS. In this paper, we propose an IDS model that uses a deep learning algorithm, conditional generative adversarial network (CGAN), enabling unsupervised learning in the model and adding an eXtreme gradient boosting (XGBoost) classifier for faster comparison and visualization of results. The proposed method can reduce the need to deploy extra sensors to generate fake data to fool the intruder 1.2–2.6%, as the proposed system generates this fake data. The parameters were selected to give optimal results to our model without significant alterations and complications. The model learns from its dataset samples with the multiple-layer network for a refined training process. We aimed that the proposed model could improve the accuracy and thus, decrease the false detection rate and obtain good precision in the cases of both the datasets, NSL-KDD and the CICIDS2017, which can be used as a detector for cyber intrusions. The false alarm rate of the proposed model decreases by about 1.827%.

  相似文献   
64.
Wireless Personal Communications - Distributed denial of service (DDoS) attacks disrupt the availability of cloud services. The detection of these attacks is a major challenge in the cloud...  相似文献   
65.
Wireless Personal Communications - A Greedy Perimeter Coordinator Routing and Mobility Awareness (GPCR-MA) vehicular routing is a widely accepted routing protocol for VANET (Vehicular Ad hoc...  相似文献   
66.
Wireless Personal Communications - This paper proposes an combined method for manifold preservation and Subspace Eigenvectors(SE) based regression in high dimensional (HD) images. We studied...  相似文献   
67.
Microbial biofilm formation on implantable devices causes chronic infections that cannot be treated with existing antimicrobials. Quorum sensing inhibitors (QSIs) have recently emerged as novel antimicrobials for the prevention of biofilm formation. But blocking QS alone is insufficient to inhibit biofilm-associated chronic infections. Herein, chitosan hollow nanospheres are capped by bacteria-responsive β-casein to form a synergistic antifouling nanosystem consisting of a QSI and bactericide. β-casein is degraded by protease in a bacteria-colonized microenvironment in situ thus, QSI and bactericide are released sequentially. The release of QSI sensitises bacteria effectively through reduction of surface hydrophobicity, eDNA content, and lipopolysaccharide production in biofilms, amplifying the chemotherapeutic action of the bactericide. Compared to the uncoated surface, the coated surface inhibits biofilm formation and removes preformed biofilms of Pseudomonas aeruginosa PAO1 and methicillin-resistant Staphylococcus aureus by 1.8 logs and 1.9 logs of biomass inhibition, respectively. The coated catheters are found to stay clean for 30 days under artificial urine flow, while the uncoated catheters are clogged by bacterial biofilms within 5 days. Finally, the long term antifouling activity in vivo is confirmed. Overall, the nanosystem is devoted to making urinary catheters resistant to bacterial biofilm formation for the long term.  相似文献   
68.
In life testing, the failure-time distributions are often specified by choosing an appropriate hazard-rate function. The class of life-time distribution characterized by a linear hazard-rate includes the one-parameter exponential and Rayleigh distributions. Usually the parameters of the linear hazard-rate model are estimated by the method of least squares. This work is concerned with Bayes estimation of the two-parameters from a type-2 censored sample. Monte Carlo simulation is used to compare the Bayes risk of the regression estimator with the minimum Bayes risk. Discrete mixtures of decreasing failure rate distributions are known to have decreasing failure rates. The authors prove that the result holds for continuous mixtures as well  相似文献   
69.
A small-signal numerical analysis of pseudomorphic GaAs- and InP-based Fabry-Perot quantum-well lasers using calculated optical gain spectra with strain effects included is reported. Examination of the effect of lifetime broadening shows that the resonance frequency increases at a rate of ~250-MHz/meV reduction in the lifetime broadening for a GaAs-based strained layer laser. The modulation speed is limited by either device heating or facet damage. If the limitation is imposed by the optical power then the modulation speed increases as the laser cavity becomes shorter and the number of quantum wells increases. If the limitation is imposed by the injection current density, however, then the modulation speed decreases for the laser with shorter cavity length. The highest modulation speed is given by an optimum well number. A resonance frequency of ~16 GHz is predicted for a pseudomorphic GaAs-based laser with 30% excess In and average output power of ~5 mW  相似文献   
70.
A shrunken estimator of the Weibull shape parameter for failure censored samples is suggested. This shrunken estimator is compared with shrunken estimators previously given. Even for sample sizes of five and ten this shrunken estimator, based on failure data censored at only three and four, respectively, can be used with advantage when one has a reasonable guess for the shape parameter. This estimator has higher efficiency and nearness than other estimators  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号