首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   591篇
  免费   46篇
  国内免费   4篇
电工技术   10篇
综合类   4篇
化学工业   107篇
金属工艺   13篇
机械仪表   40篇
建筑科学   5篇
能源动力   54篇
轻工业   83篇
水利工程   3篇
石油天然气   1篇
无线电   43篇
一般工业技术   148篇
冶金工业   26篇
原子能技术   1篇
自动化技术   103篇
  2024年   6篇
  2023年   14篇
  2022年   68篇
  2021年   81篇
  2020年   42篇
  2019年   50篇
  2018年   48篇
  2017年   41篇
  2016年   36篇
  2015年   23篇
  2014年   29篇
  2013年   35篇
  2012年   21篇
  2011年   26篇
  2010年   9篇
  2009年   14篇
  2008年   8篇
  2007年   12篇
  2006年   10篇
  2005年   6篇
  2004年   4篇
  2003年   7篇
  2002年   4篇
  2001年   4篇
  2000年   5篇
  1999年   4篇
  1998年   15篇
  1997年   5篇
  1996年   1篇
  1995年   1篇
  1994年   6篇
  1993年   1篇
  1992年   2篇
  1991年   1篇
  1989年   1篇
  1980年   1篇
排序方式: 共有641条查询结果,搜索用时 15 毫秒
1.
2.
Multimedia Tools and Applications - The world is facing many problems including that of traffic congestion. To highlight the issue of traffic congestion worldwide specially in urban areas and to...  相似文献   
3.
Recently, physical layer security commonly known as Radio Frequency (RF) fingerprinting has been proposed to provide an additional layer of security for wireless devices. A unique RF fingerprint can be used to establish the identity of a specific wireless device in order to prevent masquerading/impersonation attacks. In the literature, the performance of RF fingerprinting techniques is typically assessed using high-end (expensive) receiver hardware. However, in most practical situations receivers will not be high-end and will suffer from device specific impairments which affect the RF fingerprinting process. This paper evaluates the accuracy of RF fingerprinting employing low-end receivers. The vulnerability to an impersonation attack is assessed for a modulation-based RF fingerprinting system employing low-end commodity hardware (by legitimate and malicious users alike). Our results suggest that receiver impairment effectively decreases the success rate of impersonation attack on RF fingerprinting. In addition, the success rate of impersonation attack is receiver dependent.  相似文献   
4.
Multimedia Tools and Applications - The advancement in communication and computation technologies has paved a way for connecting large number of heterogeneous devices to offer specified services....  相似文献   
5.
As the number of objectives increases, the performance of the Pareto dominance-based Evolutionary Multi-objective Optimization (EMO) algorithms such as NSGA-II, SPEA2 severely deteriorates due to the drastic increase in the Pareto-incomparable solutions. We propose a sorting method which classifies these incomparable solutions into several ordered classes by using the decision maker's (DM) preference information. This is accomplished by designing an interactive evolutionary algorithm and constructing convex cones. This method allows the DMs to drive the search process toward a preferred region of the Pareto optimal front. The performance of the proposed algorithm is assessed for two, three, and four-objective knapsack problems. The results demonstrate the algorithm's ability to converge to the most preferred point. The evaluation and comparison of the results indicate that the proposed approach gives better solutions than that of NSGA-II. In addition, the approach is more efficient compared to NSGA-II in terms of the number of generations required to reach the preferred point.  相似文献   
6.
7.
Wireless Personal Communications - The development of Smart Home Controllers has seen rapid growth in recent years, especially for smart devices, that can utilize the Internet of Things (IoT)....  相似文献   
8.
Liu  Daobin  Wu  Chuanqiang  Chen  Shuangming  Ding  Shiqing  Xie  Yaofeng  Wang  Changda  Wang  Tao  Haleem  Yasir A.  ur Rehman  Zia  Sang  Yuan  Liu  Qin  Zheng  Xusheng  Wang  Yu  Ge  Binghui  Xu  Hangxun  Song  Li 《Nano Research》2018,11(4):2217-2228
Nano Research - Atomically dispersed catalysts have attracted attention in energy conversion applications because their efficiency and chemoselectivity for special catalysis are superior to those...  相似文献   
9.
Identifying fruit disease manually is time-consuming, expert-required, and expensive; thus, a computer-based automated system is widely required. Fruit diseases affect not only the quality but also the quantity. As a result, it is possible to detect the disease early on and cure the fruits using computer-based techniques. However, computer-based methods face several challenges, including low contrast, a lack of dataset for training a model, and inappropriate feature extraction for final classification. In this paper, we proposed an automated framework for detecting apple fruit leaf diseases using CNN and a hybrid optimization algorithm. Data augmentation is performed initially to balance the selected apple dataset. After that, two pre-trained deep models are fine-tuning and trained using transfer learning. Then, a fusion technique is proposed named Parallel Correlation Threshold (PCT). The fused feature vector is optimized in the next step using a hybrid optimization algorithm. The selected features are finally classified using machine learning algorithms. Four different experiments have been carried out on the augmented Plant Village dataset and yielded the best accuracy of 99.8%. The accuracy of the proposed framework is also compared to that of several neural nets, and it outperforms them all.  相似文献   
10.
In this paper, we present general formulae for the mask of (2b + 4)-point n-ary approximating as well as interpolating subdivision schemes for any integers ${b\,\geqslant\,0}$ and ${n\,\geqslant\,2}$ . These formulae corresponding to the mask not only generalize and unify several well-known schemes but also provide the mask of higher arity schemes. Moreover, the 4-point and 6-point a-ary schemes introduced by Lian [Appl Appl Math Int J 3(1):18–29, 2008] are special cases of our general formulae.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号