首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2246篇
  免费   134篇
  国内免费   22篇
电工技术   49篇
综合类   8篇
化学工业   586篇
金属工艺   66篇
机械仪表   104篇
建筑科学   67篇
矿业工程   3篇
能源动力   144篇
轻工业   219篇
水利工程   41篇
石油天然气   28篇
武器工业   2篇
无线电   164篇
一般工业技术   404篇
冶金工业   104篇
原子能技术   17篇
自动化技术   396篇
  2024年   7篇
  2023年   69篇
  2022年   110篇
  2021年   162篇
  2020年   130篇
  2019年   144篇
  2018年   163篇
  2017年   136篇
  2016年   134篇
  2015年   95篇
  2014年   115篇
  2013年   192篇
  2012年   160篇
  2011年   147篇
  2010年   103篇
  2009年   108篇
  2008年   77篇
  2007年   59篇
  2006年   46篇
  2005年   31篇
  2004年   20篇
  2003年   20篇
  2002年   18篇
  2001年   12篇
  2000年   8篇
  1999年   13篇
  1998年   22篇
  1997年   15篇
  1996年   9篇
  1995年   8篇
  1994年   13篇
  1993年   7篇
  1992年   11篇
  1991年   5篇
  1990年   3篇
  1989年   1篇
  1988年   1篇
  1987年   6篇
  1986年   1篇
  1985年   2篇
  1984年   5篇
  1983年   2篇
  1982年   1篇
  1981年   4篇
  1980年   3篇
  1978年   1篇
  1976年   1篇
  1968年   1篇
  1959年   1篇
排序方式: 共有2402条查询结果,搜索用时 20 毫秒
1.
2.
The morphological evolution of hillocks at the unpassivated sidewalls of single-crystal metallic thin film interconnects is investigated via computer simulations using the free-moving boundary value problem. The effect of drift-diffusion anisotropy on the development of surface topographical scenarios is fully explored under the action of electromigration and capillary forces, utilizing numerous combinations of the surface texture, the drift-diffusion anisotropy and the direction of the applied electric field. The simulation studies yield analytical relationships for the velocity of the surface solitary waves and the drift velocity of electromigration-induced internal voids as a function of the applied current densities, which contain intrinsic and structural properties of the single-crystal thin films. The threshold value of the applied current density, above which electromigration-induced internal voids can be formed and may cause the catastrophic failure of interconnects by breaching, also appears explicitly in this relationship.  相似文献   
3.
We show how to construct pseudo-random permutations that satisfy a certain cycle restriction, for example that the permutation be cyclic (consisting of one cycle containing all the elements) or an involution (a self-inverse permutation) with no fixed points. The construction can be based on any (unrestricted) pseudo-random permutation. The resulting permutations are defined succinctly and their evaluation at a given point is efficient. Furthermore, they enjoy a fast forward property, i.e. it is possible to iterate them at a very small cost. Received 10 August 2000 and revised 30 September 2000 Online publication 9 April 2001  相似文献   
4.

Shear connectors play a prominent role in the design of steel-concrete composite systems. The behavior of shear connectors is generally determined through conducting push-out tests. However, these tests are costly and require plenty of time. As an alternative approach, soft computing (SC) can be used to eliminate the need for conducting push-out tests. This study aims to investigate the application of artificial intelligence (AI) techniques, as sub-branches of SC methods, in the behavior prediction of an innovative type of C-shaped shear connectors, called Tilted Angle Connectors. For this purpose, several push-out tests are conducted on these connectors and the required data for the AI models are collected. Then, an adaptive neuro-fuzzy inference system (ANFIS) is developed to identify the most influencing parameters on the shear strength of the tilted angle connectors. Totally, six different models are created based on the ANFIS results. Finally, AI techniques such as an artificial neural network (ANN), an extreme learning machine (ELM), and another ANFIS are employed to predict the shear strength of the connectors in each of the six models. The results of the paper show that slip is the most influential factor in the shear strength of tilted connectors and after that, the inclination angle is the most effective one. Moreover, it is deducted that considering only four parameters in the predictive models is enough to have a very accurate prediction. It is also demonstrated that ELM needs less time and it can reach slightly better performance indices than those of ANN and ANFIS.

  相似文献   
5.
The Journal of Supercomputing - This research presents the detection and mitigation of distributed denial of service (DDoS) in software defined networks (SDN). The proposed method consists of three...  相似文献   
6.
Combining accurate neural networks (NN) in the ensemble with negative error correlation greatly improves the generalization ability. Mixture of experts (ME) is a popular combining method which employs special error function for the simultaneous training of NN experts to produce negatively correlated NN experts. Although ME can produce negatively correlated experts, it does not include a control parameter like negative correlation learning (NCL) method to adjust this parameter explicitly. In this study, an approach is proposed to introduce this advantage of NCL into the training algorithm of ME, i.e., mixture of negatively correlated experts (MNCE). In this proposed method, the capability of a control parameter for NCL is incorporated in the error function of ME, which enables its training algorithm to establish better balance in bias-variance-covariance trade-off and thus improves the generalization ability. The proposed hybrid ensemble method, MNCE, is compared with their constituent methods, ME and NCL, in solving several benchmark problems. The experimental results show that our proposed ensemble method significantly improves the performance over the original ensemble methods.  相似文献   
7.
Given an array ofn input numbers, therange-maxima problem is that of preprocessing the data so that queries of the type what is the maximum value in subarray [i..j] can be answered quickly using one processor. We present a randomized preprocessing algorithm that runs inO(log* n) time with high probability, using an optimal number of processors on a CRCW PRAM; each query can be processed in constant time by one processor. We also present a randomized algorithm for a parallel comparison model. Using an optimal number of processors, the preprocessing algorithm runs inO( (n)) time with high probability; each query can be processed inO ( (n)) time by one processor. (As is standard, (n) is the inverse of Ackermann function.) A constant time query can be achieved by some slowdown in the performance of the preprocessing stage.  相似文献   
8.
Detailed stiffness and internal friction ( Q −1) versus temperature curves were obtained for liquid-phase-sintered silicon carbides using advanced resonant beam analysis up to 1400°C. As-sintered materials display a stable Q −1-peak near 1100°C, superimposed on an increasing background. The change of stiffness associated with the damping peak is quantitatively related to the amount of matter in pockets of the amorphous intergranular phase in which the refractory SiC matrix grains are embedded. The successful removal of the amorphous pockets by annealing at 1900°C is deduced from the disappearance of the damping peak and confirmed with transmission electron microscopy.  相似文献   
9.
Importance sampling is a technique that is commonly used to speed up Monte Carlo simulation of rare events. However, little is known regarding the design of efficient importance sampling algorithms in the context of queueing networks. The standard approach, which simulates the system using an a priori fixed change of measure suggested by large deviation analysis, has been shown to fail in even the simplest network settings. Estimating probabilities associated with rare events has been a topic of great importance in queueing theory, and in applied probability at large. In this article, we analyse the performance of an importance sampling estimator for a rare event probability in a Jackson network. This article carries out strict deadlines to a two-node Jackson network with feedback whose arrival and service rates are modulated by an exogenous finite state Markov process. We have estimated the probability of network blocking for various sets of parameters, and also the probability of missing the deadline of customers for different loads and deadlines. We have finally shown that the probability of total population overflow may be affected by various deadline values, service rates and arrival rates.  相似文献   
10.
Recently, physical layer security commonly known as Radio Frequency (RF) fingerprinting has been proposed to provide an additional layer of security for wireless devices. A unique RF fingerprint can be used to establish the identity of a specific wireless device in order to prevent masquerading/impersonation attacks. In the literature, the performance of RF fingerprinting techniques is typically assessed using high-end (expensive) receiver hardware. However, in most practical situations receivers will not be high-end and will suffer from device specific impairments which affect the RF fingerprinting process. This paper evaluates the accuracy of RF fingerprinting employing low-end receivers. The vulnerability to an impersonation attack is assessed for a modulation-based RF fingerprinting system employing low-end commodity hardware (by legitimate and malicious users alike). Our results suggest that receiver impairment effectively decreases the success rate of impersonation attack on RF fingerprinting. In addition, the success rate of impersonation attack is receiver dependent.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号