首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   890篇
  免费   55篇
  国内免费   4篇
电工技术   12篇
综合类   4篇
化学工业   192篇
金属工艺   25篇
机械仪表   51篇
建筑科学   14篇
能源动力   66篇
轻工业   113篇
水利工程   3篇
石油天然气   1篇
无线电   70篇
一般工业技术   185篇
冶金工业   49篇
原子能技术   4篇
自动化技术   160篇
  2024年   6篇
  2023年   17篇
  2022年   75篇
  2021年   92篇
  2020年   52篇
  2019年   66篇
  2018年   59篇
  2017年   50篇
  2016年   47篇
  2015年   32篇
  2014年   51篇
  2013年   64篇
  2012年   39篇
  2011年   48篇
  2010年   26篇
  2009年   28篇
  2008年   15篇
  2007年   22篇
  2006年   22篇
  2005年   17篇
  2004年   15篇
  2003年   15篇
  2002年   16篇
  2001年   7篇
  2000年   9篇
  1999年   11篇
  1998年   20篇
  1997年   6篇
  1996年   3篇
  1995年   1篇
  1994年   8篇
  1993年   1篇
  1992年   2篇
  1991年   1篇
  1989年   1篇
  1985年   2篇
  1980年   1篇
  1977年   1篇
  1973年   1篇
排序方式: 共有949条查询结果,搜索用时 0 毫秒
1.
2.
Recently, physical layer security commonly known as Radio Frequency (RF) fingerprinting has been proposed to provide an additional layer of security for wireless devices. A unique RF fingerprint can be used to establish the identity of a specific wireless device in order to prevent masquerading/impersonation attacks. In the literature, the performance of RF fingerprinting techniques is typically assessed using high-end (expensive) receiver hardware. However, in most practical situations receivers will not be high-end and will suffer from device specific impairments which affect the RF fingerprinting process. This paper evaluates the accuracy of RF fingerprinting employing low-end receivers. The vulnerability to an impersonation attack is assessed for a modulation-based RF fingerprinting system employing low-end commodity hardware (by legitimate and malicious users alike). Our results suggest that receiver impairment effectively decreases the success rate of impersonation attack on RF fingerprinting. In addition, the success rate of impersonation attack is receiver dependent.  相似文献   
3.
Multimedia Tools and Applications - The advancement in communication and computation technologies has paved a way for connecting large number of heterogeneous devices to offer specified services....  相似文献   
4.
As the number of objectives increases, the performance of the Pareto dominance-based Evolutionary Multi-objective Optimization (EMO) algorithms such as NSGA-II, SPEA2 severely deteriorates due to the drastic increase in the Pareto-incomparable solutions. We propose a sorting method which classifies these incomparable solutions into several ordered classes by using the decision maker's (DM) preference information. This is accomplished by designing an interactive evolutionary algorithm and constructing convex cones. This method allows the DMs to drive the search process toward a preferred region of the Pareto optimal front. The performance of the proposed algorithm is assessed for two, three, and four-objective knapsack problems. The results demonstrate the algorithm's ability to converge to the most preferred point. The evaluation and comparison of the results indicate that the proposed approach gives better solutions than that of NSGA-II. In addition, the approach is more efficient compared to NSGA-II in terms of the number of generations required to reach the preferred point.  相似文献   
5.
In this systematic study, dispersion-strengthening effect of the Cu–25.91Mn (wt.%), Cu–26.62Mn–8.99Al (wt.%), Cu–22.17Mn–12.32Zn (wt.%) ingot alloys have been investigated. Samples were homogenized at a high fixed temperature in different periods and cooled with different cooling rates. After processes, microanalysis of the samples were interpreted by using scanning electron microscope (SEM) and weight percentages of the elements of the occurrence phases in the samples obtained by using electron dispersion spectroscopy (EDS) technique. Additionally, some characteristic properties of the heat treated samples with different conditions of Cu–Mn, Cu–Mn–Al, Cu–Mn–Zn ingot alloys were also discussed.  相似文献   
6.
7.
Wireless Personal Communications - The development of Smart Home Controllers has seen rapid growth in recent years, especially for smart devices, that can utilize the Internet of Things (IoT)....  相似文献   
8.
Liu  Daobin  Wu  Chuanqiang  Chen  Shuangming  Ding  Shiqing  Xie  Yaofeng  Wang  Changda  Wang  Tao  Haleem  Yasir A.  ur Rehman  Zia  Sang  Yuan  Liu  Qin  Zheng  Xusheng  Wang  Yu  Ge  Binghui  Xu  Hangxun  Song  Li 《Nano Research》2018,11(4):2217-2228
Nano Research - Atomically dispersed catalysts have attracted attention in energy conversion applications because their efficiency and chemoselectivity for special catalysis are superior to those...  相似文献   
9.
Identifying fruit disease manually is time-consuming, expert-required, and expensive; thus, a computer-based automated system is widely required. Fruit diseases affect not only the quality but also the quantity. As a result, it is possible to detect the disease early on and cure the fruits using computer-based techniques. However, computer-based methods face several challenges, including low contrast, a lack of dataset for training a model, and inappropriate feature extraction for final classification. In this paper, we proposed an automated framework for detecting apple fruit leaf diseases using CNN and a hybrid optimization algorithm. Data augmentation is performed initially to balance the selected apple dataset. After that, two pre-trained deep models are fine-tuning and trained using transfer learning. Then, a fusion technique is proposed named Parallel Correlation Threshold (PCT). The fused feature vector is optimized in the next step using a hybrid optimization algorithm. The selected features are finally classified using machine learning algorithms. Four different experiments have been carried out on the augmented Plant Village dataset and yielded the best accuracy of 99.8%. The accuracy of the proposed framework is also compared to that of several neural nets, and it outperforms them all.  相似文献   
10.
In this paper, we present general formulae for the mask of (2b + 4)-point n-ary approximating as well as interpolating subdivision schemes for any integers ${b\,\geqslant\,0}$ and ${n\,\geqslant\,2}$ . These formulae corresponding to the mask not only generalize and unify several well-known schemes but also provide the mask of higher arity schemes. Moreover, the 4-point and 6-point a-ary schemes introduced by Lian [Appl Appl Math Int J 3(1):18–29, 2008] are special cases of our general formulae.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号