首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   8888篇
  免费   813篇
  国内免费   735篇
电工技术   202篇
技术理论   1篇
综合类   359篇
化学工业   211篇
金属工艺   651篇
机械仪表   1441篇
建筑科学   250篇
矿业工程   71篇
能源动力   143篇
轻工业   313篇
水利工程   30篇
石油天然气   35篇
武器工业   19篇
无线电   718篇
一般工业技术   313篇
冶金工业   92篇
原子能技术   14篇
自动化技术   5573篇
  2024年   29篇
  2023年   220篇
  2022年   343篇
  2021年   429篇
  2020年   332篇
  2019年   239篇
  2018年   230篇
  2017年   240篇
  2016年   306篇
  2015年   357篇
  2014年   501篇
  2013年   545篇
  2012年   619篇
  2011年   762篇
  2010年   492篇
  2009年   551篇
  2008年   512篇
  2007年   570篇
  2006年   512篇
  2005年   391篇
  2004年   318篇
  2003年   305篇
  2002年   287篇
  2001年   202篇
  2000年   174篇
  1999年   157篇
  1998年   154篇
  1997年   128篇
  1996年   104篇
  1995年   94篇
  1994年   53篇
  1993年   62篇
  1992年   47篇
  1991年   28篇
  1990年   28篇
  1989年   23篇
  1988年   14篇
  1987年   11篇
  1986年   7篇
  1985年   6篇
  1984年   6篇
  1983年   8篇
  1982年   9篇
  1981年   6篇
  1980年   4篇
  1979年   2篇
  1978年   5篇
  1977年   4篇
  1976年   5篇
  1973年   2篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
71.
Accurate and real-time classification of network traffic is significant to network operation and management such as QoS differentiation, traffic shaping and security surveillance. However, with many newly emerged P2P applications using dynamic port numbers, masquerading techniques, and payload encryption to avoid detection, traditional classification approaches turn to be ineffective. In this paper, we present a layered hybrid system to classify current Internet traffic, motivated by variety of network activities and their requirements of traffic classification. The proposed method could achieve fast and accurate traffic classification with low overheads and robustness to accommodate both known and unknown/encrypted applications. Furthermore, it is feasible to be used in the context of real-time traffic classification. Our experimental results show the distinct advantages of the proposed classification system, compared with the one-step Machine Learning (ML) approach.  相似文献   
72.
In this paper, an advanced and optimized Light Gradient Boosting Machine (LGBM) technique is proposed to identify the intrusive activities in the Internet of Things (IoT) network. The followings are the major contributions: i) An optimized LGBM model has been developed for the identification of malicious IoT activities in the IoT network; ii) An efficient evolutionary optimization approach has been adopted for finding the optimal set of hyper-parameters of LGBM for the projected problem. Here, a Genetic Algorithm (GA) with k-way tournament selection and uniform crossover operation is used for efficient exploration of hyper-parameter search space; iii) Finally, the performance of the proposed model is evaluated using state-of-the-art ensemble learning and machine learning-based model to achieve overall generalized performance and efficiency. Simulation outcomes reveal that the proposed approach is superior to other considered methods and proves to be a robust approach to intrusion detection in an IoT environment.  相似文献   
73.
High Efficiency Video Coding (HEVC) surpasses its predecessors in encoding efficiency by introducing new coding tools at the cost of an increased encoding time-complexity. The Coding Tree Unit (CTU) is the main building block used in HEVC. In the HEVC standard, frames are divided into CTUs with the predetermined size of up to 64 × 64 pixels. Each CTU is then divided recursively into a number of equally sized square areas, known as Coding Units (CUs). Although this diversity of frame partitioning increases encoding efficiency, it also causes an increase in the time complexity due to the increased number of ways to find the optimal partitioning. To address this complexity, numerous algorithms have been proposed to eliminate unnecessary searches during partitioning CTUs by exploiting the correlation in the video. In this paper, existing CTU depth decision algorithms for HEVC are surveyed. These algorithms are categorized into two groups, namely statistics and machine learning approaches. Statistics approaches are further subdivided into neighboring and inherent approaches. Neighboring approaches exploit the similarity between adjacent CTUs to limit the depth range of the current CTU, while inherent approaches use only the available information within the current CTU. Machine learning approaches try to extract and exploit similarities implicitly. Traditional methods like support vector machines or random forests use manually selected features, while recently proposed deep learning methods extract features during training. Finally, this paper discusses extending these methods to more recent video coding formats such as Versatile Video Coding (VVC) and AOMedia Video 1(AV1).  相似文献   
74.
一种新的直方图核函数及在图像分类中的应用   总被引:2,自引:0,他引:2  
基于核方法的支持向量机(SVM)以其良好的推广性在图像分类等领域已经得到广泛应用,运用支持向量机的关键是设计有效的核函数。为克服传统核函数较少融合先验知识的弱点,该文提出基于数据驱动的核函数构建方法;并结合词包(BOW)模型,设计了一种基于TF-IDF规则的加权二次卡方(Weighted Quadritic Chisquared, WQC)距离的直方图核函数;在计算直方图之间距离时充分考虑到不同量化区间的不同区分性能,从而增强核函数对不同类别的区分能力。在Caltech101/256等多个经典图像数据集上的分类实验结果验证了该文方法的有效性。  相似文献   
75.
翁花群 《通信技术》2011,(11):88-90,93
数字专用无线电对讲机(DPMR,Digital Private Mobile Radio)协议是欧洲电信标准化协会推出的一种适用于民用数字对讲机系统的通信协议。首先,按照简化的开放系统互连(OSI,Open System Interconnection)分层模型对DPMR标准进行了简单的介绍。其次,以DPMR数字对讲机系统的呼叫控制功能为研究对象,详细叙述了系统的基本呼叫流程,并以有限状态机为基础设计出协议的状态转换过程;最后,以Visual C++为平台,实现该呼叫控制方案的设计过程,并给出相关设计结果。通过结果分析,进一步验证了该呼叫控制方案的可行性。  相似文献   
76.
介绍了机器视觉检测系统在半导体工业后道关键设备(切筋成型机)上的应用,对产品的自动视觉检测功能。包含检测的基本原理、使用方法和镜头、照明等关键要素的选择,以及视觉系统对产品的常见检测等。  相似文献   
77.
谢显中  黎佳  黄倩  陈杰 《电子与信息学报》2019,41(11):2549-2556
针对机器类通信(MTC)应用场景的业务特征和服务质量(QoS)要求,该文考虑基于非正交多址(NOMA)的MTC中短分组/短编码块传输,探讨MTC中基于NOMA的高可靠低迟延无线资源优化问题。首先,上行传输是基于NOMA的MTC通信的瓶颈,考虑无线蜂窝网络中支持NOMA和高可靠低迟延性能要求,该文建立了上行无线资源优化的系统模型;然后,分析上行传输迟延,导出基于距离的链路可靠性函数;进一步,以迟延、可靠性和带宽为约束下条件,提出一种最大化中心用户和速率的无线资源分配算法,并给出算法的收敛性证明和复杂度分析;最后,实验仿真验证了所提算法的性能优势。  相似文献   
78.
Identifying an unfamiliar caller's profession is important to protect citizens' personal safety and property. Owing to the limited data protection of various popular online services in some countries, such as taxi hailing and ordering takeouts, many users presently encounter an increasing number of phone calls from strangers. The situation may be aggravated when criminals pretend to be such service delivery staff, threatening the user individuals as well as the society. In addition, numerous people experience excessive digital marketing and fraudulent phone calls because of personal information leakage. However, previous works on malicious call detection only focused on binary classification, which does not work for the identification of multiple professions. We observed that web service requests issued from users' mobile phones might exhibit their application preferences, spatial and temporal patterns, and other profession-related information. This offers researchers and engineers a hint to identify unfamiliar callers. In fact, some previous works already leveraged raw data from mobile phones (which includes sensitive information) for personality studies. However, accessing users' mobile phone raw data may violate the more and more strict private data protection policies and regulations (e.g., General Data Protection Regulation). We observe that appropriate statistical methods can offer an effective means to eliminate private information and preserve personal characteristics, thus enabling the identification of the types of mobile phone callers without privacy concerns. In this paper, we develop CPFinder —- a system that exploits privacy-preserving mobile data to automatically identify callers who are divided into four categories of users: taxi drivers, delivery and takeouts staffs, telemarketers and fraudsters, and normal users (other professions). Our evaluation of an anonymized dataset of 1,282 users over a period of 3 months in Shanghai City shows that the CPFinder can achieve accuracies of more than 75.0% and 92.4% for multiclass and binary classifications, respectively.  相似文献   
79.
印制电路板生产设备紫外线曝光机的光源系统,其能耗大、使用维护成本高、含汞等缺陷,在倡导节能环保的当今,业界一直致力于改进。UV-LED面光源作为新一代绿色环保紫外线光源,为印制电路板曝光领域带来革命性的变化。文章通过分析传统平行光紫外曝光机光学系统特点,设计了一种平行光紫外线曝光机适用的UV-LED面光源系统,UV-LED灯珠光功率利用率大幅提高,光照均匀性优良,并且不改变曝光机结构的情况下,可直接安装使用。实验表明,采用了复眼式阵列光学透镜结构设计的UV-LED面光源系统,完全可替代传统平行光紫外曝光机光源。  相似文献   
80.
NETWORK INTRUSION DETECTION METHOD BASED ON RS-MSVM   总被引:1,自引:0,他引:1  
A new method called RS-MSVM (Rough Set and Multi-class Support Vector Machine) is proposed for network intrusion detection. This method is based on rough set followed by MSVM for attribute reduction and classification respectively, The number of attributes of the network data used in this paper is reduced from 41 to 30 using rough set theory. The kernel function of HVDM-RBF (Heterogeneous Value Difference Metric Radial Basis Function), based on the heterogeneous value difference metric of heterogeneous datasets, is constructed for the heterogeneous network data. HVDM-RBF and one-against-one method are applied to build MSVM. DARPA (Defense Advanced Research Projects Agency) intrusion detection evaluating data were used in the experiment. The testing results show that our method outperforms other methods mentioned in this paper on six aspects: detection accuracy, number of support vectors, false positive rate, falsc negative rate, training time and testing time.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号