全文获取类型
收费全文 | 9251篇 |
免费 | 1431篇 |
国内免费 | 946篇 |
专业分类
电工技术 | 377篇 |
综合类 | 1326篇 |
化学工业 | 240篇 |
金属工艺 | 495篇 |
机械仪表 | 815篇 |
建筑科学 | 1243篇 |
矿业工程 | 111篇 |
能源动力 | 160篇 |
轻工业 | 152篇 |
水利工程 | 64篇 |
石油天然气 | 725篇 |
武器工业 | 74篇 |
无线电 | 1483篇 |
一般工业技术 | 826篇 |
冶金工业 | 348篇 |
原子能技术 | 62篇 |
自动化技术 | 3127篇 |
出版年
2024年 | 83篇 |
2023年 | 224篇 |
2022年 | 371篇 |
2021年 | 448篇 |
2020年 | 432篇 |
2019年 | 286篇 |
2018年 | 255篇 |
2017年 | 301篇 |
2016年 | 301篇 |
2015年 | 390篇 |
2014年 | 588篇 |
2013年 | 530篇 |
2012年 | 761篇 |
2011年 | 782篇 |
2010年 | 645篇 |
2009年 | 641篇 |
2008年 | 657篇 |
2007年 | 683篇 |
2006年 | 578篇 |
2005年 | 520篇 |
2004年 | 403篇 |
2003年 | 348篇 |
2002年 | 278篇 |
2001年 | 203篇 |
2000年 | 164篇 |
1999年 | 154篇 |
1998年 | 125篇 |
1997年 | 82篇 |
1996年 | 93篇 |
1995年 | 58篇 |
1994年 | 52篇 |
1993年 | 28篇 |
1992年 | 26篇 |
1991年 | 22篇 |
1990年 | 28篇 |
1989年 | 19篇 |
1988年 | 10篇 |
1987年 | 7篇 |
1986年 | 4篇 |
1985年 | 6篇 |
1984年 | 5篇 |
1983年 | 5篇 |
1982年 | 6篇 |
1980年 | 4篇 |
1979年 | 2篇 |
1977年 | 2篇 |
1969年 | 3篇 |
1964年 | 2篇 |
1959年 | 3篇 |
1956年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
61.
随着移动通信的发展,减少通信延时成为关键性问题,因此,提出了一种使用机器学习方法的移动边缘计算(MEC)移动性管理。移动性决策基于参考信号接收功率(RSRP)值和不确定性预测器。使用神经网络建立预测器,输出不同相邻单元的RSRP平均值和标准偏差,推导了切换概率的封闭表达式。基于这些可能性,MEC服务器能够提前缓存用户服务,以便将切换期间的中断降至最低。实验结果表明,提出的方法能够满足实际需求。 相似文献
62.
With the rapid development of mobile technology and smart devices, crowdsensing has shown its large potential to collect massive data. Considering the limitation of calculation power, edge computing is introduced to release unnecessary data transmission. In edge-computing-enabled crowdsensing, massive data is required to be preliminary processed by edge computing devices (ECDs). Compared with the traditional central platform, these ECDs are limited by their own capability so they may only obtain part of relative factors and they can’t process data synthetically. ECDs involved in one task are required to cooperate to process the task data. The privacy of participants is important in crowdsensing, so blockchain is used due to its decentralization and tamper-resistance. In crowdsensing tasks, it is usually difficult to obtain the assessment criteria in advance so reinforcement learning is introduced. As mentioned before, ECDs can’t process task data comprehensively and they are required to cooperate quality assessment. Therefore, a blockchain-based framework for data quality in edge-computing-enabled crowdsensing (BFEC) is proposed in this paper. DPoR (Delegated Proof of Reputation), which is proposed in our previous work, is improved to be suitable in BFEC. Iteratively, the final result is calculated without revealing the privacy of participants. Experiments on the open datasets Adult, Blog, and Wine Quality show that our new framework outperforms existing methods in executing sensing tasks. 相似文献
63.
The advent of pixelated detectors for time‐of‐flight neutron transmission experiments has raised significant interest in terms of the potential for tomographic reconstructions of triaxial strain distributions. A recent publication by Lionheart and Withers [WRB Lionheart and PJ Withers, “Diffraction tomography of strain”, Inverse Problems, v31:045005, 2015] has demonstrated that reconstruction is not possible in the general sense; however, various special cases may exist. In this paper, we outline a process by which it is possible to tomographically reconstruct average triaxial elastic strains within individual particles in a granular assembly from a series of Bragg edge strain measurements. This algorithm is tested on simulated data in two and three dimensions and is shown to be capable of rejecting Gaussian measurement noise. Sources of systematic error that may present problems in an experimental implementation are briefly discussed. 相似文献
64.
Nucleation Crystallography of Ni Grains on CrFeNb Inoculants Investigated by Edge‐to‐Edge Matching Model in an IN718 Superalloy 下载免费PDF全文
Wenchao Yang Pengfei Qu Lin Liu Ziqi Jie Taiwen Huang Feng Wang Jun Zhang 《Advanced Engineering Materials》2018,20(2)
65.
Blockchain merges technology with the Internet of Things (IoT) for addressing security and privacy-related issues. However, conventional blockchain suffers from scalability issues due to its linear structure, which increases the storage overhead, and Intrusion detection performed was limited with attack severity, leading to performance degradation. To overcome these issues, we proposed MZWB (Multi-Zone-Wise Blockchain) model. Initially, all the authenticated IoT nodes in the network ensure their legitimacy by using the Enhanced Blowfish Algorithm (EBA), considering several metrics. Then, the legitimately considered nodes for network construction for managing the network using Bayesian-Direct Acyclic Graph (B-DAG), which considers several metrics. The intrusion detection is performed based on two tiers. In the first tier, a Deep Convolution Neural Network (DCNN) analyzes the data packets by extracting packet flow features to classify the packets as normal, malicious, and suspicious. In the second tier, the suspicious packets are classified as normal or malicious using the Generative Adversarial Network (GAN). Finally, intrusion scenario performed reconstruction to reduce the severity of attacks in which Improved Monkey Optimization (IMO) is used for attack path discovery by considering several metrics, and the Graph cut utilized algorithm for attack scenario reconstruction (ASR). UNSW-NB15 and BoT-IoT utilized datasets for the MZWB method simulated using a Network simulator (NS-3.26). Compared with previous performance metrics such as energy consumption, storage overhead accuracy, response time, attack detection rate, precision, recall, and F-measure. The simulation result shows that the proposed MZWB method achieves high performance than existing works 相似文献
66.
Internet of Vehicles (IoV) applications integrating with edge computing will significantly drive the growth of IoV. However, the contradiction between the high-speed mobility of vehicles, the delay sensitivity of corresponding IoV applications and the limited coverage and resource capacity of distributed edge servers will pose challenges to the service continuity and stability of IoV applications. IoV application migration is a promising solution that can be supported by application containerization, a technology forseamless cross-edge-server application migration without user perception. Therefore, this paper proposes the container-based IoV edge application migration mechanism, consisting of three parts. The first is the migration trigger determination algorithm for cross-border migration and service degradation migration, respectively, based on trajectory prediction and traffic awareness to improve the determination accuracy. The second is the migration target decision calculation model for minimizing the average migration time and maximizing the average service time to reduce migration times and improve the stability and adaptability of migration decisions. The third is the migration decision algorithm based on the improved artificial bee colony algorithm to avoid local optimal migration decisions. Simulation results show that the proposed migration mechanism can reduce migration times, reduce average migration time, improve average service time and enhance the stability and adaptability of IoV application services. 相似文献
67.
针对PCB图像的特点对图像进行增强处理,使得图像的边缘更加突出,灰度的对比度增加,同时滤除靠近边缘的噪声,为后续图像分割时更有效的选取阈值打下良好基础。使用二阶梯度算子获得图像的增强效果,实验表明,不仅解决了边缘附近噪声去除问题,而且有效地突出了边缘信息,图像的黑白对比分明,尤其是目标图像靠近边缘部分灰度值明显高于其他的非边缘区域。 相似文献
68.
69.
70.
Zahra YarahmadiAli Reza Ashrafi 《Computers & Mathematics with Applications》2011,62(1):319-325
The bipartite edge frustration of a graph G, denoted by φ(G), is the smallest number of edges that have to be deleted from G to obtain a bipartite spanning subgraph of G. This topological index is related to the well-known Max-cut problem, and has important applications in computing stability of fullerenes. In this paper, the bipartite edge frustration of an infinite family of fullerenes is computed. Moreover, this quantity for four classes of graphs arising from a given graph under different types of edge subdivisions is investigated. 相似文献