首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2991篇
  免费   185篇
  国内免费   21篇
电工技术   52篇
综合类   8篇
化学工业   801篇
金属工艺   50篇
机械仪表   103篇
建筑科学   69篇
矿业工程   3篇
能源动力   230篇
轻工业   302篇
水利工程   18篇
石油天然气   54篇
无线电   296篇
一般工业技术   580篇
冶金工业   130篇
原子能技术   24篇
自动化技术   477篇
  2024年   13篇
  2023年   86篇
  2022年   156篇
  2021年   186篇
  2020年   132篇
  2019年   148篇
  2018年   170篇
  2017年   129篇
  2016年   170篇
  2015年   104篇
  2014年   160篇
  2013年   255篇
  2012年   156篇
  2011年   167篇
  2010年   138篇
  2009年   112篇
  2008年   79篇
  2007年   83篇
  2006年   72篇
  2005年   48篇
  2004年   33篇
  2003年   33篇
  2002年   35篇
  2001年   40篇
  2000年   21篇
  1999年   27篇
  1998年   54篇
  1997年   18篇
  1996年   37篇
  1995年   22篇
  1994年   20篇
  1993年   14篇
  1992年   19篇
  1991年   22篇
  1990年   13篇
  1989年   12篇
  1988年   15篇
  1987年   15篇
  1986年   20篇
  1985年   21篇
  1984年   12篇
  1983年   14篇
  1982年   15篇
  1981年   16篇
  1980年   12篇
  1979年   12篇
  1977年   14篇
  1976年   10篇
  1975年   9篇
  1973年   8篇
排序方式: 共有3197条查询结果,搜索用时 17 毫秒
51.
Cloud computing has emerged as one of the most highly discussed topics both in the academic community and in the computing industry. While most of the work that has been conducted to explore this field focuses either on establishing the basis for cloud computing or almost exclusively on the issues surrounding security and data privacy, this paper takes the first exploratory step into exploring the actual internal working of cloud computing and demonstrates its viability for organizations, more specifically educational establishments . The paper starts by introducing the most important key clouds computing concepts, including virtualization technologies, Web services and Service Oriented Architectures (SOA), and distributed computing. Light will be then shed on the impact and potential benefits of cloud computing on teaching and learning in educational institutions. The paper closes by describing building a private cloud inside educational institution and highlights its offerings for students, staff and lecturers.  相似文献   
52.
There is significant interest in the network management and industrial security community about the need to identify the “best” and most relevant features for network traffic in order to properly characterize user behaviour and predict future traffic. The ability to eliminate redundant features is an important Machine Learning (ML) task because it helps to identify the best features in order to improve the classification accuracy as well as to reduce the computational complexity related to the construction of the classifier. In practice, feature selection (FS) techniques can be used as a preprocessing step to eliminate irrelevant features and as a knowledge discovery tool to reveal the “best” features in many soft computing applications. In this paper, we investigate the advantages and disadvantages of such FS techniques with new proposed metrics (namely goodness, stability and similarity). We continue our efforts toward developing an integrated FS technique that is built on the key strengths of existing FS techniques. A novel way is proposed to identify efficiently and accurately the “best” features by first combining the results of some well-known FS techniques to find consistent features, and then use the proposed concept of support to select a smallest set of features and cover data optimality. The empirical study over ten high-dimensional network traffic data sets demonstrates significant gain in accuracy and improved run-time performance of a classifier compared to individual results produced by some well-known FS techniques.  相似文献   
53.
Feature diagrams have become commonplace in software product line engineering as a means to document variability early in the life cycle. Over the years, their application has also been extended to assist stakeholders in the configuration of software products. However, existing feature-based configuration techniques offer little support for tailoring configuration views to the profiles of the various stakeholders. In this paper, we propose a lightweight, yet formal and flexible, mechanism to leverage multidimensional separation of concerns in feature-based configuration. We propose a technique to specify concerns in feature diagrams and to generate automatically concern-specific configuration views. Three alternative visualisations are proposed. Our contributions are motivated and illustrated through excerpts from a real web-based meeting management application which was also used for a preliminary evaluation. We also report on the progress made in the development of a tool supporting multi-view feature-based configuration.  相似文献   
54.
Internet Protocol version 6 (IPv6) is the latest version of IP that goal to host 3.4 × 1038 unique IP addresses of devices in the network. IPv6 has introduced new features like Neighbour Discovery Protocol (NDP) and Address Auto-configuration Scheme. IPv6 needed several protocols like the Address Auto-configuration Scheme and Internet Control Message Protocol (ICMPv6). IPv6 is vulnerable to numerous attacks like Denial of Service (DoS) and Distributed Denial of Service (DDoS) which is one of the most dangerous attacks executed through ICMPv6 messages that impose security and financial implications. Therefore, an Intrusion Detection System (IDS) is a monitoring system of the security of a network that detects suspicious activities and deals with a massive amount of data comprised of repetitive and inappropriate features which affect the detection rate. A feature selection (FS) technique helps to reduce the computation time and complexity by selecting the optimum subset of features. This paper proposes a method for detecting DDoS flooding attacks (FA) based on ICMPv6 messages using a Binary Flower Pollination Algorithm (BFPA-FA). The proposed method (BFPA-FA) employs FS technology with a support vector machine (SVM) to identify the most relevant, influential features. Moreover, The ICMPv6-DDoS dataset was used to demonstrate the effectiveness of the proposed method through different attack scenarios. The results show that the proposed method BFPA-FA achieved the best accuracy rate (97.96%) for the ICMPv6 DDoS detection with a reduced number of features (9) to half the total (19) features. The proven proposed method BFPA-FA is effective in the ICMPv6 DDoS attacks via IDS.  相似文献   
55.
Active matrix prestressed microelectromechanical shutter displays enable outstanding optical properties as well as robust operating performance. The microelectromechanical systems (MEMS) shutter elements have been optimized for higher light outcoupling efficiency with lower operation voltage and higher pixel density. The MEMS elements have been co-fabricated with self-aligned metal-oxide thin-film transistors (TFTs). Several optimizations were required to integrate MEMS process without hampering the performance of both elements. The optimized display process requires only seven photolithographic masks with ensuring proper compatibility between MEMS shutter and metal-oxide TFT process.  相似文献   
56.
In this study, a series of donor–acceptor–donor (D-A-D) type small molecules based on the fluorene and diphenylethenyl enamine units, which are distinguished by different acceptors, as holetransporting materials (HTMs) for perovskite solar cells is presented. The incorporation of the malononitrile acceptor units is found to be beneficial for not only carrier transportation but also defects passivation via Pb–N interactions. The highest power conversion efficiency of over 22% is achieved on cells based on V1359, which is higher than that of spiro-OMeTAD under identical conditions. This st shows that HTMs prepared via simplified synthetic routes are not only a low-cost alternative to spiro-OMeTAD but also outperform in efficiency and stability state-of-art materials obtained via expensive cross-coupling methods.  相似文献   
57.

In communication industry one of the most rapidly growing area is wireless technology and its applications. The efficient access to radio spectrum is a requirement to make this communication feasible for the users that are running multimedia applications and establishing real-time connections on an already overcrowded spectrum. In recent times cognitive radios (CR) are becoming the prime candidates for improved utilization of available spectrum. The unlicensed secondary users share the spectrum with primary licensed user in such manners that the interference at the primary user does not increase from a predefined threshold. In this paper, we propose an algorithm to address the power control problem for CR networks. The proposed solution models the wireless system with a non-cooperative game, in which each player maximize its utility in a competitive environment. The simulation results shows that the proposed algorithm improves the performance of the network in terms of high SINR and low power consumption.

  相似文献   
58.
59.

The World Wide Web(WWW) comprises a wide range of information, and it is mainly operated on the principles of keyword matching which often reduces accurate information retrieval. Automatic query expansion is one of the primary methods for information retrieval, and it handles the vocabulary mismatch problem often faced by the information retrieval systems to retrieve an appropriate document using the keywords. This paper proposed a novel approach of hybrid COOT-based Cat and Mouse Optimization (CMO) algorithm named as hybrid COOT-CMO for the appropriate selection of optimal candidate terms in the automatic query expansion process. To improve the accuracy of the Cat and Mouse Optimization (CMO) algorithm, the parameters are tuned with the help of the Coot algorithm. The best suitable expanded query is identified from the available expanded query sets also known as candidate query pools. All feasible combinations in this candidate query pool should be obtained from the top retrieved documents. Benchmark datasets such as the GOV2 Test Collection, the Cranfield Collections, and the NTCIR Test Collection are utilized to assess the performance of the proposed hybrid COOT-CMO method for automatic query expansion. This proposed method surpasses the existing state-of-the-art techniques using many performance measures such as F-score, precision, and mean average precision (MAP).

  相似文献   
60.
Computational Economics - This study tries to unravel the stock market prediction puzzle using the textual analytic with the help of natural language processing (NLP) techniques and Deep-learning...  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号