首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2070篇
  免费   78篇
  国内免费   8篇
电工技术   10篇
综合类   3篇
化学工业   602篇
金属工艺   72篇
机械仪表   64篇
建筑科学   34篇
矿业工程   3篇
能源动力   181篇
轻工业   138篇
水利工程   13篇
石油天然气   7篇
无线电   143篇
一般工业技术   507篇
冶金工业   132篇
原子能技术   10篇
自动化技术   237篇
  2024年   4篇
  2023年   15篇
  2022年   68篇
  2021年   88篇
  2020年   67篇
  2019年   52篇
  2018年   91篇
  2017年   68篇
  2016年   75篇
  2015年   57篇
  2014年   80篇
  2013年   161篇
  2012年   103篇
  2011年   132篇
  2010年   104篇
  2009年   101篇
  2008年   111篇
  2007年   94篇
  2006年   58篇
  2005年   62篇
  2004年   41篇
  2003年   36篇
  2002年   36篇
  2001年   25篇
  2000年   16篇
  1999年   39篇
  1998年   25篇
  1997年   21篇
  1996年   28篇
  1995年   24篇
  1994年   32篇
  1993年   26篇
  1992年   25篇
  1991年   11篇
  1990年   15篇
  1989年   10篇
  1988年   10篇
  1987年   16篇
  1986年   8篇
  1985年   13篇
  1984年   6篇
  1983年   16篇
  1982年   20篇
  1981年   19篇
  1980年   16篇
  1979年   11篇
  1978年   8篇
  1977年   5篇
  1975年   2篇
  1974年   2篇
排序方式: 共有2156条查询结果,搜索用时 562 毫秒
31.
32.
This paper deals with the fuzzy set-valued functions of real variables on time scale whose values are normal, convex, upper semicontinuous and compactly supported fuzzy sets in \(\mathbb {R}^{n}\). We introduce and study the fundamental properties of new class of derivative called generalized delta derivative (\(\Delta _{g}\)-derivative) and generalized delta integral (\(\Delta _{g}\)-integral) for such fuzzy functions.  相似文献   
33.
In the network security system, intrusion detection plays a significant role. The network security system detects the malicious actions in the network and also conforms the availability, integrity and confidentiality of data information resources. Intrusion identification system can easily detect the false positive alerts. If large number of false positive alerts are created then it makes intrusion detection system as difficult to differentiate the false positive alerts from genuine attacks. Many research works have been done. The issues in the existing algorithms are more memory space and need more time to execute the transactions of records. This paper proposes a novel framework of network security Intrusion Detection System (IDS) using Modified Frequent Pattern (MFP-Tree) via K-means algorithm. The accuracy rate of Modified Frequent Pattern Tree (MFPT)-K means method in finding the various attacks are Normal 94.89%, for DoS based attack 98.34%, for User to Root (U2R) attacks got 96.73%, Remote to Local (R2L) got 95.89% and Probe attack got 92.67% and is optimal when it is compared with other existing algorithms of K-Means and APRIORI.  相似文献   
34.
Multidimensional Systems and Signal Processing - High-performance sonar systems mostly combine a large sensor array and an efficient beamformer for enhancing the overall detection capabilities and...  相似文献   
35.
The Journal of Supercomputing - In the technological era, exponential increase of unorganized text documents offers increased difficulties retrieving the most relevant data. The document clustering...  相似文献   
36.
The purpose of this work was to explore a new feature extraction method for classifying paddy seeds using a feature extraction algorithm to achieve the area ratio, horizontal–slant and front–rear angles and find whether the proposed features have high discriminating power. Another objective was to find the smallest feature set that can ensure highly accurate recognition of seeds. A total of a 100 image features were extracted, and features having significant discriminating power were identified based on the analysis of variance (ANOVA). From the 100 features, 14 features were found to have high discriminating power and from these features, six were selected as the proposed features. Experimental results show that the proposed features and removal of redundant features enhanced the discriminating power of the feature set, and that the proposed features have an excellent discriminating property for seeds. The presented features resulted in the highest classification accuracy (98.8%) when compared to other methods.  相似文献   
37.
Journal of Failure Analysis and Prevention - In the present work, mixed-mode stress intensity factor (SIF) of multiple cracks in a riveted lap joint has been determined, with and without the...  相似文献   
38.
In this paper, we consider a dynamic supply chain where a manufacturer produces and distributes a featured product through an exclusive retailer to end consumers. The manufacturer decides the product quality and wholesale price, while the retailer sets the retail price in the presence of a revenue-sharing contract and consumers’ reference quality effects. The objective of this study is to investigate the impacts of myopic behaviour regarding the reference quality on the product quality and pricing strategies and profits of both members. Our results suggest that the manufacturer’s myopia leads to a higher quality, higher price strategy and a higher quality–price ratio which benefits consumers. Meanwhile, relative to the far-sighted behaviour, myopia results in a more quality-sensitive but less price-sensitive market demand. What’s more, we find that the manufacturer is apt to act in a far-sighted way, but the retailer isn’t always willing to cooperate with a far-sighted manufacturer. Taking myopic strategies for both members is likely to gain a high profit of the whole supply chain for a relatively high marginal contribution of product quality on demand and a relatively low revenue-sharing proportion.  相似文献   
39.
A mobile ad hoc network (MANET) has abundant mobile nodes that are free to communicate independently in many locations. Many existing energy models address the inadequacy of resources based on Ad hoc On-demand Multipath Distance Vector and Optimized Link State Protocol (OLSP) routing protocols for MANET along with various parameters. The architecture of energy-efficient routing mechanisms is a challenging problem in a MANET. In this work, a novel energy-aware routing model is introduced for MANET comprising an ant colony optimization (ACO) enhanced approach to energy-efficient-optimized link state routing (named ACO–EEOLSR). Initially, the route discovery is progressed by means of neighbor estimation and also with the authentication of link stability. Parameters such as energy, distance, and hop count are employed as willingness nodes, where both the energy and distance are entrenched through the OLSP. Consequently, the hop count is applied via the ACO system that is beneficial for link stability. After the acceptance of an acknowledgement, the hop count is authorized for further performance analysis. This approach increases the Quality of Service and also uses less energy compared to other energy models. The accomplished simulation upshot depicts that the ACO–EEOLSR outperforms the EEOLSR scheme with respect to the performance metrics of energy consumption, packet delivery ratio, total remaining time, average network lifetime, and a variance of energy.  相似文献   
40.
A computer software system is designed for the segmentation and classification of benign and malignant tumor slices in brain computed tomography images. In this paper, we present a texture analysis methods to find and select the texture features of the tumor region of each slice to be segmented by support vector machine (SVM). The images considered for this study belongs to 208 benign and malignant tumor slices. The features are extracted and selected using Student's t‐test. The reduced optimal features are used to model and train the probabilistic neural network (PNN) classifier and the classification accuracy is evaluated using k fold cross validation method. The segmentation results are also compared with the experienced radiologist ground truth. Quantitative analysis between ground truth and segmented tumor is presented in terms of quantitative measure of segmentation accuracy and the overlap similarity measure of Jaccard index. The proposed system provides some newly found texture features have important contribution in segmenting and classifying benign and malignant tumor slices efficiently and accurately. The experimental results show that the proposed hybrid texture feature analysis method using Probabilistic Neural Network (PNN) based classifier is able to achieve high segmentation and classification accuracy effectiveness as measured by Jaccard index, sensitivity, and specificity.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号