首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1869篇
  免费   95篇
  国内免费   15篇
电工技术   42篇
综合类   7篇
化学工业   425篇
金属工艺   39篇
机械仪表   58篇
建筑科学   73篇
矿业工程   6篇
能源动力   152篇
轻工业   180篇
水利工程   13篇
石油天然气   23篇
无线电   222篇
一般工业技术   312篇
冶金工业   110篇
原子能技术   14篇
自动化技术   303篇
  2024年   8篇
  2023年   44篇
  2022年   74篇
  2021年   99篇
  2020年   80篇
  2019年   83篇
  2018年   100篇
  2017年   102篇
  2016年   88篇
  2015年   48篇
  2014年   96篇
  2013年   171篇
  2012年   119篇
  2011年   133篇
  2010年   97篇
  2009年   101篇
  2008年   78篇
  2007年   61篇
  2006年   37篇
  2005年   24篇
  2004年   24篇
  2003年   24篇
  2002年   24篇
  2001年   23篇
  2000年   16篇
  1999年   18篇
  1998年   24篇
  1997年   25篇
  1996年   24篇
  1995年   20篇
  1994年   18篇
  1993年   6篇
  1992年   10篇
  1991年   6篇
  1990年   7篇
  1989年   4篇
  1988年   5篇
  1987年   2篇
  1986年   6篇
  1985年   11篇
  1984年   8篇
  1983年   11篇
  1982年   4篇
  1981年   1篇
  1980年   1篇
  1978年   4篇
  1977年   4篇
  1976年   4篇
  1973年   1篇
  1970年   1篇
排序方式: 共有1979条查询结果,搜索用时 353 毫秒
41.
There is a lack of appropriate guidelines for realistic user traces, mobility models, routing protocols, considerations of real-life challenges, etc. for general-purpose mobile ad hoc networks (MANET). In this paper, four laptops are used in an open field environment in four scenarios to evaluate the performances of Internet control message protocol (ICMP) based ping and transmission control protocol (TCP) based streaming video applications using optimised link state routing (OLSR) implementation in an IEEE 802.11g wireless network. Corresponding simulations are developed in Network Simulator ns-2 by setting simulation parameters according to the real experiments. Difficulties faced to regenerate real-life scenarios have been discussed and the gaps between reality and simulation are identified. A setup guideline to produce realistic simulation results has been established.  相似文献   
42.
This paper describes a component‐based framework for radio‐astronomical imaging software systems. We consider optimal re‐use strategies for packages of disparate architectures brought together within a modern component framework. In this practical case study, the legacy codes include both procedural and object‐oriented architectures. We consider also the special requirements on scientific component middleware, with a specific focus on high‐performance computing. We present an example application in this component architecture and outline future development planned for this project. Copyright © 2007 John Wiley & Sons, Ltd.  相似文献   
43.
We describe a compressing translation from SAT solver generated propositional resolution refutation proofs to classical natural deduction proofs. The resulting proof can usually be checked quicker than one that simply simulates the original resolution proof. We use this result in interactive theorem provers, to speed up reconstruction of SAT solver generated proofs. The translation is fast and scales up to large proofs with millions of inferences.  相似文献   
44.
Object detection is an essential component in automated vision-based surveillance systems. In general, object detectors are constructed using training examples obtained from large annotated data sets. The inevitable limitations of typical training data sets make such supervised methods unsuitable for building generic surveillance systems applicable to a wide variety of scenes and camera setups. In our previous work we proposed an unsupervised method for learning and detecting the dominant object class in a general dynamic scene observed by a static camera. In this paper, we investigate the possibilities to expand the applicability of this method to the problem of multiple dominant object classes. We propose an idea on how to approach this expansion, and perform an evaluation of this idea using two representative surveillance video sequences.  相似文献   
45.
The paper continues a series of papers and a monograph [33], where we have described the conceptual structures as well as the basic architecture of a knowledge-based systemCunaid.  相似文献   
46.
Meteorological changes urge engineering communities to look for sustainable and clean energy technologies to keep the environment safe by reducing CO2 emissions. The structure of these technologies relies on the deep integration of advanced data-driven techniques which can ensure efcient energy generation, transmission, and distribution. After conducting thorough research for more than a decade, the concept of the smart grid (SG) has emerged, and its practice around the world paves the ways for efcient use of reliable energy technology. However, many developing features evoke keen interest and their improvements can be regarded as the next-generation smart grid (NGSG). Also, to deal with the non-linearity and uncertainty, the emergence of data-driven NGSG technology can become a great initiative to reduce the diverse impact of non-linearity. This paper exhibits the conceptual framework of NGSG by enabling some intelligent technical features to ensure its reliable operation, including intelligent control, agent-based energy conversion, edge computing for energy management, internet of things (IoT) enabled inverter, agent-oriented demand side management, etc. Also, a study on the development of data-driven NGSG is discussed to facilitate the use of emerging data-driven techniques (DDTs) for the sustainable operation of the SG. The prospects of DDTs in the NGSG and their adaptation challenges in real-time are also explored in this paper from various points of view including engineering, technology, et al. Finally, the trends of DDTs towards securing sustainable and clean energy evolution from the NGSG technology in order to keep the environment safe is also studied, while some major future issues are highlighted. This paper can ofer extended support for engineers and researchers in the context of data-driven technology and the SG.  相似文献   
47.
Internet Protocol version 6 (IPv6) is the latest version of IP that goal to host 3.4 × 1038 unique IP addresses of devices in the network. IPv6 has introduced new features like Neighbour Discovery Protocol (NDP) and Address Auto-configuration Scheme. IPv6 needed several protocols like the Address Auto-configuration Scheme and Internet Control Message Protocol (ICMPv6). IPv6 is vulnerable to numerous attacks like Denial of Service (DoS) and Distributed Denial of Service (DDoS) which is one of the most dangerous attacks executed through ICMPv6 messages that impose security and financial implications. Therefore, an Intrusion Detection System (IDS) is a monitoring system of the security of a network that detects suspicious activities and deals with a massive amount of data comprised of repetitive and inappropriate features which affect the detection rate. A feature selection (FS) technique helps to reduce the computation time and complexity by selecting the optimum subset of features. This paper proposes a method for detecting DDoS flooding attacks (FA) based on ICMPv6 messages using a Binary Flower Pollination Algorithm (BFPA-FA). The proposed method (BFPA-FA) employs FS technology with a support vector machine (SVM) to identify the most relevant, influential features. Moreover, The ICMPv6-DDoS dataset was used to demonstrate the effectiveness of the proposed method through different attack scenarios. The results show that the proposed method BFPA-FA achieved the best accuracy rate (97.96%) for the ICMPv6 DDoS detection with a reduced number of features (9) to half the total (19) features. The proven proposed method BFPA-FA is effective in the ICMPv6 DDoS attacks via IDS.  相似文献   
48.

In communication industry one of the most rapidly growing area is wireless technology and its applications. The efficient access to radio spectrum is a requirement to make this communication feasible for the users that are running multimedia applications and establishing real-time connections on an already overcrowded spectrum. In recent times cognitive radios (CR) are becoming the prime candidates for improved utilization of available spectrum. The unlicensed secondary users share the spectrum with primary licensed user in such manners that the interference at the primary user does not increase from a predefined threshold. In this paper, we propose an algorithm to address the power control problem for CR networks. The proposed solution models the wireless system with a non-cooperative game, in which each player maximize its utility in a competitive environment. The simulation results shows that the proposed algorithm improves the performance of the network in terms of high SINR and low power consumption.

  相似文献   
49.
Journal of Intelligent Manufacturing - Deep learning-based predictive quality enables manufacturing companies to make data-driven predictions of the quality of a produced product based on process...  相似文献   
50.
The Journal of Supercomputing - Smart services are a concept that provides services to the citizens in an efficient manner. The online shopping and recommender system can play an important role for...  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号