首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9251篇
  免费   1431篇
  国内免费   946篇
电工技术   377篇
综合类   1326篇
化学工业   240篇
金属工艺   495篇
机械仪表   815篇
建筑科学   1243篇
矿业工程   111篇
能源动力   160篇
轻工业   152篇
水利工程   64篇
石油天然气   725篇
武器工业   74篇
无线电   1483篇
一般工业技术   826篇
冶金工业   348篇
原子能技术   62篇
自动化技术   3127篇
  2024年   83篇
  2023年   224篇
  2022年   371篇
  2021年   448篇
  2020年   432篇
  2019年   286篇
  2018年   255篇
  2017年   301篇
  2016年   301篇
  2015年   390篇
  2014年   588篇
  2013年   530篇
  2012年   761篇
  2011年   782篇
  2010年   645篇
  2009年   641篇
  2008年   657篇
  2007年   683篇
  2006年   578篇
  2005年   520篇
  2004年   403篇
  2003年   348篇
  2002年   278篇
  2001年   203篇
  2000年   164篇
  1999年   154篇
  1998年   125篇
  1997年   82篇
  1996年   93篇
  1995年   58篇
  1994年   52篇
  1993年   28篇
  1992年   26篇
  1991年   22篇
  1990年   28篇
  1989年   19篇
  1988年   10篇
  1987年   7篇
  1986年   4篇
  1985年   6篇
  1984年   5篇
  1983年   5篇
  1982年   6篇
  1980年   4篇
  1979年   2篇
  1977年   2篇
  1969年   3篇
  1964年   2篇
  1959年   3篇
  1956年   1篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
61.
随着移动通信的发展,减少通信延时成为关键性问题,因此,提出了一种使用机器学习方法的移动边缘计算(MEC)移动性管理。移动性决策基于参考信号接收功率(RSRP)值和不确定性预测器。使用神经网络建立预测器,输出不同相邻单元的RSRP平均值和标准偏差,推导了切换概率的封闭表达式。基于这些可能性,MEC服务器能够提前缓存用户服务,以便将切换期间的中断降至最低。实验结果表明,提出的方法能够满足实际需求。  相似文献   
62.
With the rapid development of mobile technology and smart devices, crowdsensing has shown its large potential to collect massive data. Considering the limitation of calculation power, edge computing is introduced to release unnecessary data transmission. In edge-computing-enabled crowdsensing, massive data is required to be preliminary processed by edge computing devices (ECDs). Compared with the traditional central platform, these ECDs are limited by their own capability so they may only obtain part of relative factors and they can’t process data synthetically. ECDs involved in one task are required to cooperate to process the task data. The privacy of participants is important in crowdsensing, so blockchain is used due to its decentralization and tamper-resistance. In crowdsensing tasks, it is usually difficult to obtain the assessment criteria in advance so reinforcement learning is introduced. As mentioned before, ECDs can’t process task data comprehensively and they are required to cooperate quality assessment. Therefore, a blockchain-based framework for data quality in edge-computing-enabled crowdsensing (BFEC) is proposed in this paper. DPoR (Delegated Proof of Reputation), which is proposed in our previous work, is improved to be suitable in BFEC. Iteratively, the final result is calculated without revealing the privacy of participants. Experiments on the open datasets Adult, Blog, and Wine Quality show that our new framework outperforms existing methods in executing sensing tasks.  相似文献   
63.
The advent of pixelated detectors for time‐of‐flight neutron transmission experiments has raised significant interest in terms of the potential for tomographic reconstructions of triaxial strain distributions. A recent publication by Lionheart and Withers [WRB Lionheart and PJ Withers, “Diffraction tomography of strain”, Inverse Problems, v31:045005, 2015] has demonstrated that reconstruction is not possible in the general sense; however, various special cases may exist. In this paper, we outline a process by which it is possible to tomographically reconstruct average triaxial elastic strains within individual particles in a granular assembly from a series of Bragg edge strain measurements. This algorithm is tested on simulated data in two and three dimensions and is shown to be capable of rejecting Gaussian measurement noise. Sources of systematic error that may present problems in an experimental implementation are briefly discussed.  相似文献   
64.
In this work, the nucleation crystallography of CrFeNb intermetallic particles as a grain refiner for Ni‐based IN718 superalloys is studied using Edge‐to‐Edge Matching model. Three distinguishable orientation relationships between CrFeNb intermetallic particles and Ni grains are well predicted: , (111)Ni 1.28° from (0004)CrFeNb, , (111)Ni 1.32° from CrFeNb, and Ni//[0001]CrFeNb, (111)Ni 0.72° from CrFeNb. The results indicate that CrFeNb intermetallic particles have a strong nucleation potency as an effective grain refiner for Ni‐based superalloy and the existence of semi‐coherent interfaces between the CrFeNb intermetallic particles and Ni grains. Furthermore, the IN718 superalloy is used to experimentally validate the grain refinement effect of CrFeNb intermetallic particles, showing that its grain size is obviously refined from 8.60 to 1.23 mm. And, the corresponding heterogeneous nucleation mechanism of grain refinement at the atomic level is further identified.
  相似文献   
65.
Blockchain merges technology with the Internet of Things (IoT) for addressing security and privacy-related issues. However, conventional blockchain suffers from scalability issues due to its linear structure, which increases the storage overhead, and Intrusion detection performed was limited with attack severity, leading to performance degradation. To overcome these issues, we proposed MZWB (Multi-Zone-Wise Blockchain) model. Initially, all the authenticated IoT nodes in the network ensure their legitimacy by using the Enhanced Blowfish Algorithm (EBA), considering several metrics. Then, the legitimately considered nodes for network construction for managing the network using Bayesian-Direct Acyclic Graph (B-DAG), which considers several metrics. The intrusion detection is performed based on two tiers. In the first tier, a Deep Convolution Neural Network (DCNN) analyzes the data packets by extracting packet flow features to classify the packets as normal, malicious, and suspicious. In the second tier, the suspicious packets are classified as normal or malicious using the Generative Adversarial Network (GAN). Finally, intrusion scenario performed reconstruction to reduce the severity of attacks in which Improved Monkey Optimization (IMO) is used for attack path discovery by considering several metrics, and the Graph cut utilized algorithm for attack scenario reconstruction (ASR). UNSW-NB15 and BoT-IoT utilized datasets for the MZWB method simulated using a Network simulator (NS-3.26). Compared with previous performance metrics such as energy consumption, storage overhead accuracy, response time, attack detection rate, precision, recall, and F-measure. The simulation result shows that the proposed MZWB method achieves high performance than existing works  相似文献   
66.
Internet of Vehicles (IoV) applications integrating with edge computing will significantly drive the growth of IoV. However, the contradiction between the high-speed mobility of vehicles, the delay sensitivity of corresponding IoV applications and the limited coverage and resource capacity of distributed edge servers will pose challenges to the service continuity and stability of IoV applications. IoV application migration is a promising solution that can be supported by application containerization, a technology forseamless cross-edge-server application migration without user perception. Therefore, this paper proposes the container-based IoV edge application migration mechanism, consisting of three parts. The first is the migration trigger determination algorithm for cross-border migration and service degradation migration, respectively, based on trajectory prediction and traffic awareness to improve the determination accuracy. The second is the migration target decision calculation model for minimizing the average migration time and maximizing the average service time to reduce migration times and improve the stability and adaptability of migration decisions. The third is the migration decision algorithm based on the improved artificial bee colony algorithm to avoid local optimal migration decisions. Simulation results show that the proposed migration mechanism can reduce migration times, reduce average migration time, improve average service time and enhance the stability and adaptability of IoV application services.  相似文献   
67.
针对PCB图像的特点对图像进行增强处理,使得图像的边缘更加突出,灰度的对比度增加,同时滤除靠近边缘的噪声,为后续图像分割时更有效的选取阈值打下良好基础。使用二阶梯度算子获得图像的增强效果,实验表明,不仅解决了边缘附近噪声去除问题,而且有效地突出了边缘信息,图像的黑白对比分明,尤其是目标图像靠近边缘部分灰度值明显高于其他的非边缘区域。  相似文献   
68.
基于BBV的有向加权网络模型   总被引:1,自引:0,他引:1       下载免费PDF全文
王桂英  周健  谢飏 《计算机工程》2010,36(12):141-143
在BBV模型基础上,结合方向性和网络演化特性,提出一种有向加权网络模型。引入参数p、q,将节点强度分为入强度和出强度,根据BBV建模思想进行模型择优和演化。理论分析和数值模拟仿真结果表明,该模型的节点出入强度和出入度分布满足幂律指数为[2,3]的幂律分布,且通过调节参数可使平均路径和聚簇系数符合复杂网络特性。  相似文献   
69.
黄敏  姜静 《计算机工程》2010,36(3):195-196
镜头边界检测是进行视频内容分析的首要步骤。提出一种基于相邻尺度小波变换乘积的镜头边缘检测方法。对镜头内的每帧视频图像进行小波变换,求出各帧图像相邻尺度小波变换尺度积的模和方向。计算连续帧图像尺度积与模之间的绝对距离,得到2帧图像间的不连续值。通过自适应阈值分割,检测出镜头边界。  相似文献   
70.
The bipartite edge frustration of a graph G, denoted by φ(G), is the smallest number of edges that have to be deleted from G to obtain a bipartite spanning subgraph of G. This topological index is related to the well-known Max-cut problem, and has important applications in computing stability of fullerenes. In this paper, the bipartite edge frustration of an infinite family of fullerenes is computed. Moreover, this quantity for four classes of graphs arising from a given graph under different types of edge subdivisions is investigated.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号