首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6571篇
  免费   385篇
  国内免费   61篇
电工技术   92篇
综合类   17篇
化学工业   1338篇
金属工艺   146篇
机械仪表   234篇
建筑科学   139篇
矿业工程   30篇
能源动力   372篇
轻工业   547篇
水利工程   65篇
石油天然气   50篇
无线电   781篇
一般工业技术   1465篇
冶金工业   620篇
原子能技术   75篇
自动化技术   1046篇
  2024年   23篇
  2023年   136篇
  2022年   308篇
  2021年   505篇
  2020年   328篇
  2019年   378篇
  2018年   380篇
  2017年   331篇
  2016年   325篇
  2015年   216篇
  2014年   282篇
  2013年   513篇
  2012年   304篇
  2011年   349篇
  2010年   237篇
  2009年   189篇
  2008年   171篇
  2007年   162篇
  2006年   137篇
  2005年   105篇
  2004年   79篇
  2003年   91篇
  2002年   67篇
  2001年   54篇
  2000年   55篇
  1999年   72篇
  1998年   178篇
  1997年   140篇
  1996年   112篇
  1995年   92篇
  1994年   72篇
  1993年   66篇
  1992年   48篇
  1991年   52篇
  1990年   42篇
  1989年   42篇
  1988年   31篇
  1987年   31篇
  1986年   38篇
  1985年   37篇
  1984年   27篇
  1983年   32篇
  1982年   19篇
  1981年   16篇
  1980年   14篇
  1979年   10篇
  1978年   17篇
  1977年   19篇
  1976年   25篇
  1972年   8篇
排序方式: 共有7017条查询结果,搜索用时 328 毫秒
991.
Social media data are rapidly increasing and constitute a source of user opinions and tips on a wide range of products and services. The increasing availability of such big data on biased reviews and blogs creates challenges for customers and businesses in reviewing all content in their decision-making process. To overcome this challenge, extracting suggestions from opinionated text is a possible solution. In this study, the characteristics of suggestions are analyzed and a suggestion mining extraction process is presented for classifying suggestive sentences from online customers’ reviews. A classification using a word-embedding approach is used via the XGBoost classifier. The two datasets used in this experiment relate to online hotel reviews and Microsoft Windows App Studio discussion reviews. F1, precision, recall, and accuracy scores are calculated. The results demonstrated that the XGBoost classifier outperforms—with an accuracy of more than 80%. Moreover, the results revealed that suggestion keywords and phrases are the predominant features for suggestion extraction. Thus, this study contributes to knowledge and practice by comparing feature extraction classifiers and identifying XGBoost as a better suggestion mining process for identifying online reviews.  相似文献   
992.
With the rapid development of the mobile internet and the internet of things (IoT), the fifth generation (5G) mobile communication system is seeing explosive growth in data traffic. In addition, low-frequency spectrum resources are becoming increasingly scarce and there is now an urgent need to switch to higher frequency bands. Millimeter wave (mmWave) technology has several outstanding features—it is one of the most well-known 5G technologies and has the capacity to fulfil many of the requirements of future wireless networks. Importantly, it has an abundant resource spectrum, which can significantly increase the communication rate of a mobile communication system. As such, it is now considered a key technology for future mobile communications. MmWave communication technology also has a more open network architecture; it can deliver varied services and be applied in many scenarios. By contrast, traditional, all-digital precoding systems have the drawbacks of high computational complexity and higher power consumption. This paper examines the implementation of a new hybrid precoding system that significantly reduces both calculational complexity and energy consumption. The primary idea is to generate several sub-channels with equal gain by dividing the channel by the geometric mean decomposition (GMD). In this process, the objective function of the spectral efficiency is derived, then the basic tracking principle and least square (LS) techniques are deployed to design the proposed hybrid precoding. Simulation results show that the proposed algorithm significantly improves system performance and reduces computational complexity by more than 45% compared to traditional algorithms.  相似文献   
993.
Healthcare is a binding domain for the Internet of Things (IoT) to automate healthcare services for sharing and accumulation patient records at anytime from anywhere through the Internet. The current IP-based Internet architecture suffers from latency, mobility, location dependency, and security. The Named Data Networking (NDN) has been projected as a future internet architecture to cope with the limitations of IP-based Internet. However, the NDN infrastructure does not have a secure framework for IoT healthcare information. In this paper, we proposed a secure NDN framework for IoT-enabled Healthcare (IoTEH). In the proposed work, we adopt the services of Identity-Based Signcryption (IBS) cryptography under the security hardness Hyperelliptic Curve Cryptosystem (HCC) to secure the IoTEH information in NDN. The HCC provides the corresponding level of security using minimal computational and communicational resources as compared to bilinear pairing and Elliptic Curve Cryptosystem (ECC). For the efficiency of the proposed scheme, we simulated the security of the proposed solution using Automated Validation of Internet Security Protocols and Applications (AVISPA). Besides, we deployed the proposed scheme on the IoTEH in NDN infrastructure and compared it with the recent IBS schemes in terms of computation and communication overheads. The simulation results showed the superiority and improvement of the proposed framework against contemporary related works.  相似文献   
994.
Thermal transport investigation in colloidal suspensions is taking a significant research direction. The applications of these fluids are found in various industries, engineering, aerodynamics, mechanical engineering and medical sciences etc. A huge amount of thermal transport is essential in the operation of various industrial production processes. It is a fact that conventional liquids have lower thermal transport characteristics as compared to colloidal suspensions. The colloidal suspensions have high thermal performance due to the thermophysical attributes of the nanoparticles and the host liquid. Therefore, researchers focused on the analysis of the heat transport in nanofluids under diverse circumstances. As such, the colloidal analysis of H2O composed by γAl2O3 and Al2O3 is conducted over an elastic cylinder. The governing flow models of γAl2O3/H2O and Al2O3/H2O is reduced in the dimensionless form by adopting the described similarity transforms. The colloidal models are handled by implementing the suitable numerical technique and provided the results for the velocity, temperature and local thermal performance rate against the multiple flow parameters. From the presented results, it is shown that the velocity of Al2O3–H2O increases promptly against a high Reynolds number and it decreases for high-volume fraction. The significant contribution of the volumetric fraction is examined for thermal enhancement of nanofluids. The temperature of Al2O3–H2O and γAl2O3–H2O significantly increases against a higher ϕ. Most importantly, the analysis shows that γAl2O3–H2O has a high local thermal performance rate compared to Al2O3–H2O. Therefore, it is concluded that γAl2O3–H2O is a better heat transfer fluid and is suitable for industrial and technological uses.  相似文献   
995.
Design architecture is the edifice that strengthens the functionalities as well as the security of web applications. In order to facilitate architectural security from the web application’s design phase itself, practitioners are now adopting the novel mechanism of security tactics. With the intent to conduct a research from the perspective of security tactics, the present study employs a hybrid multi-criteria decision-making approach named fuzzy analytic hierarchy process-technique for order preference by similarity ideal solution (AHP-TOPSIS) method for selecting and assessing multi-criteria decisions. The adopted methodology is a blend of fuzzy analytic hierarchy process (fuzzy AHP) and fuzzy technique for order preference by similarity ideal solution (fuzzy TOPSIS). To establish the efficacy of this methodology, the results are obtained after the evaluation have been tested on fifteen different web application projects (Online Quiz competition, Entrance Test, and others) of the Babasaheb Bhimrao Ambedkar University, Lucknow, India. The tabulated outcomes demonstrate that the methodology of the Multi-Level Fuzzy Hybrid system is highly effective in providing accurate estimation for strengthening the security of web applications. The proposed study will help experts and developers in developing and managing security from any web application design phase for better accuracy and higher security.  相似文献   
996.
Biomechanics is the study of physiological properties of data and the measurement of human behavior. In normal conditions, behavioural properties in stable form are created using various inputs of subconscious/conscious human activities such as speech style, body movements in walking patterns, writing style and voice tunes. One cannot perform any change in these inputs that make results reliable and increase the accuracy. The aim of our study is to perform a comparative analysis between the marker-based motion capturing system (MBMCS) and the marker-less motion capturing system (MLMCS) using the lower body joint angles of human gait patterns. In both the MLMCS and MBMCS, we collected trajectories of all the participants and performed joint angle computation to identify a person and recognize an activity (walk and running). Using five state of the art machine learning algorithms, we obtained 44.6% and 64.3% accuracy in person identification using MBMCS and MLMCS respectively with an ensemble algorithm (two angles as features). In the second set of experiments, we used six machine learning algorithms to obtain 65.9% accuracy with the k-nearest neighbor (KNN) algorithm (two angles as features) and 74.6% accuracy with an ensemble algorithm. Also, by increasing features (6 angles), we obtained higher accuracy of 99.3% in MBMCS for person recognition and 98.1% accuracy in MBMCS for activity recognition using the KNN algorithm. MBMCS is computationally expensive and if we re-design the model of OpenPose with more body joint points and employ more features, MLMCS (low-cost system) can be an effective approach for video data analysis in a person identification and activity recognition process.  相似文献   
997.
Over the last decade, a significant increase has been observed in the use of web-based Information systems that process sensitive information, e.g., personal, financial, medical. With this increased use, the security of such systems became a crucial aspect to ensure safety, integrity and authenticity of the data. To achieve the objectives of data safety, security testing is performed. However, with growth and diversity of information systems, it is challenging to apply security testing for each and every system. Therefore, it is important to classify the assets based on their required level of security using an appropriate technique. In this paper, we propose an asset security classification technique to classify the System Under Test (SUT) based on various factors such as system exposure, data criticality and security requirements. We perform an extensive evaluation of our technique on a sample of 451 information systems. Further, we use security testing on a sample extracted from the resulting prioritized systems to investigate the presence of vulnerabilities. Our technique achieved promising results of successfully assigning security levels to various assets in the tested environments and also found several vulnerabilities in them.  相似文献   
998.
Congestion control is one of the main obstacles in cyberspace traffic. Overcrowding in internet traffic may cause several problems; such as high packet hold-up, high packet dropping, and low packet output. In the course of data transmission for various applications in the Internet of things, such problems are usually generated relative to the input. To tackle such problems, this paper presents an analytical model using an optimized Random Early Detection (RED) algorithm-based approach for internet traffic management. The validity of the proposed model is checked through extensive simulation-based experiments. An analysis is observed for different functions on internet traffic. Four performance metrics are taken into consideration, namely, the possibility of packet loss, throughput, mean queue length and mean queue delay. Three sets of experiments are observed with varying simulation results. The experiments are thoroughly analyzed and the best packet dropping operation with minimum packet loss is identified using the proposed model.  相似文献   
999.
Networks provide a significant function in everyday life, and cybersecurity therefore developed a critical field of study. The Intrusion detection system (IDS) becoming an essential information protection strategy that tracks the situation of the software and hardware operating on the network. Notwithstanding advancements of growth, current intrusion detection systems also experience dif- ficulties in enhancing detection precision, growing false alarm levels and identifying suspicious activities. In order to address above mentioned issues, several researchers concentrated on designing intrusion detection systems that rely on machine learning approaches. Machine learning models will accurately identify the underlying variations among regular information and irregular information with incredible efficiency. Artificial intelligence, particularly machine learning methods can be used to develop an intelligent intrusion detection framework. There in this article in order to achieve this objective, we propose an intrusion detection system focused on a Deep extreme learning machine (DELM) which first establishes the assessment of safety features that lead to their prominence and then constructs an adaptive intrusion detection system focusing on the important features. In the moment, we researched the viability of our suggested DELMbased intrusion detection system by conducting dataset assessments and evaluating the performance factors to validate the system reliability. The experimental results illustrate that the suggested framework outclasses traditional algorithms. In fact, the suggested framework is not only of interest to scientific research but also of functional importance.  相似文献   
1000.
In this study, magnetohydrodynamic (MHD) three-dimensional (3D) flow of alumina (Al2O3) and copper (Cu) nanoparticles of an electrically conducting incompressible fluid in a rotating frame has been investigated. The shrinking surface generates the flow that also has been examined. The single-phase (i.e., Tiwari and Das) model is implemented for the hybrid nanofluid transport phenomena. Results for alumina and copper nanomaterials in the water base fluid are achieved. Boundary layer approximations are used to reduce governing partial differential (PDEs) system into the system of the ordinary differential equations (ODEs). The three-stage Lobatto IIIa method in bvp4c solver is applied for solutions of the governing model. Graphical results have been shown to examine how velocity and temperature fields are influenced by various applied parameters. It has been found that there are two branches for certain values of the suction/injection parameter b: The rise in copper volumetric concentration improved the velocity of hybrid nanofluid in the upper branch. The heat transfer rate improved for the case of hybrid nanofluid as compared to the viscous fluid and simple nanofluid.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号