首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1895篇
  免费   169篇
  国内免费   14篇
工业技术   2078篇
  2024年   1篇
  2023年   38篇
  2022年   53篇
  2021年   110篇
  2020年   89篇
  2019年   120篇
  2018年   164篇
  2017年   142篇
  2016年   167篇
  2015年   94篇
  2014年   131篇
  2013年   235篇
  2012年   154篇
  2011年   114篇
  2010年   90篇
  2009年   66篇
  2008年   49篇
  2007年   43篇
  2006年   25篇
  2005年   11篇
  2004年   16篇
  2003年   16篇
  2002年   15篇
  2001年   13篇
  2000年   11篇
  1999年   5篇
  1998年   14篇
  1997年   5篇
  1996年   6篇
  1995年   14篇
  1994年   6篇
  1993年   7篇
  1992年   7篇
  1991年   5篇
  1990年   6篇
  1989年   6篇
  1988年   3篇
  1987年   2篇
  1986年   4篇
  1985年   3篇
  1984年   1篇
  1983年   3篇
  1982年   5篇
  1979年   3篇
  1975年   1篇
  1973年   2篇
  1970年   2篇
  1969年   1篇
排序方式: 共有2078条查询结果,搜索用时 609 毫秒
41.
Data aggregation is a key, yet time-consuming functionality in wireless sensor networks (WSNs). Multi-channel design is a promising technique to alleviate interference as a primary reason for long latency of TDMA aggregation scheduling. Indeed, it provides more potential of parallel transmissions over different frequency channels, thus minimizing time latency. In this paper, we focus on designing a multi-channel minimum latency aggregation scheduling protocol, named MC-MLAS, using a new joint approach for tree construction, channel assignment, and transmission scheduling. To our best knowledge, this is the first work in the literature which combines orthogonal channels and partially overlapping channels to consider the total latency involved in data aggregation. Extensive simulations verify the superiority of MC-MLAS in WSNs.  相似文献   
42.
With the increased advancements of smart industries, cybersecurity has become a vital growth factor in the success of industrial transformation. The Industrial Internet of Things (IIoT) or Industry 4.0 has revolutionized the concepts of manufacturing and production altogether. In industry 4.0, powerful Intrusion Detection Systems (IDS) play a significant role in ensuring network security. Though various intrusion detection techniques have been developed so far, it is challenging to protect the intricate data of networks. This is because conventional Machine Learning (ML) approaches are inadequate and insufficient to address the demands of dynamic IIoT networks. Further, the existing Deep Learning (DL) can be employed to identify anonymous intrusions. Therefore, the current study proposes a Hunger Games Search Optimization with Deep Learning-Driven Intrusion Detection (HGSODL-ID) model for the IIoT environment. The presented HGSODL-ID model exploits the linear normalization approach to transform the input data into a useful format. The HGSO algorithm is employed for Feature Selection (HGSO-FS) to reduce the curse of dimensionality. Moreover, Sparrow Search Optimization (SSO) is utilized with a Graph Convolutional Network (GCN) to classify and identify intrusions in the network. Finally, the SSO technique is exploited to fine-tune the hyper-parameters involved in the GCN model. The proposed HGSODL-ID model was experimentally validated using a benchmark dataset, and the results confirmed the superiority of the proposed HGSODL-ID method over recent approaches.  相似文献   
43.
The Journal of Supercomputing - Internet of Things (IoT) is an emerging paradigm that consists of numerous connected and interrelated devices with embedded sensors, exchanging data with each other...  相似文献   
44.
Journal of Intelligent Manufacturing - In recent years, driven by Industry 4.0 wave, academic research has focused on the science, engineering, and enabling technologies for intelligent and cyber...  相似文献   
45.
The Journal of Supercomputing - Fast execution of functions is an inevitable challenge in the serverless computing landscape. Inefficient dispatching, fluctuations in invocation rates, burstiness...  相似文献   
46.
In this paper, the effects of dilute charged impurity doping on electronic heat capacity (EHC) and magnetic susceptibility (MS) of a two-dimensional material ferromagnetic gapped graphene-like, MoS2, are investigated within the Green’s function approach by using the Kane-Mele Hamiltonian and self-consistent Born approximation (SCBA) at Dirac points. Our findings show that there is a critical impurity concentration (IC) and scattering strength (ISS) for each valley in EHC and MS curves. Also, we have found that the spin band gap decreases with impurity only for valley K, and \(K^{\prime }, \downarrow \) due to the existence of inversion symmetry between valleys. On the other hand, a magnetic phase transition from ferromagnetic to antiferromagnetic and paramagnetic has been observed. The increase of scattering rate of carriers in the presence of impurity is the main reason of these behaviors.  相似文献   
47.
48.
49.
Mixing sand or soil with small pieces of tire is common practice in civil engineering applications. Although the properties of the soil are changed, it is environmentally friendly and sometimes economical. Nevertheless, the mechanical behavior of such mixtures is still not fully understood and more numerical investigations are required. This paper presents a novel approach for the modeling of sand–tire mixtures based on the discrete element method. The sand grains are represented by rigid agglomerates whereas the tire grains are represented by deformable agglomerates. The approach considers both grain shape and deformability. The micromechanical parameters of the contact law are calibrated based on experimental results from the literature. The effects of tire content and confining pressure on the stress–strain response are investigated in detail by performing numerical triaxial compression tests. The main results indicate that both strength and stiffness of the samples decrease with increasing tire content. A tire contact of 40% is identified as the boundary between rubber-like and sand-like behavior.  相似文献   
50.
Classification of electroencephalogram (EEG) signals for humans can be achieved via artificial intelligence (AI) techniques. Especially, the EEG signals associated with seizure epilepsy can be detected to distinguish between epileptic and non-epileptic regions. From this perspective, an automated AI technique with a digital processing method can be used to improve these signals. This paper proposes two classifiers: long short-term memory (LSTM) and support vector machine (SVM) for the classification of seizure and non-seizure EEG signals. These classifiers are applied to a public dataset, namely the University of Bonn, which consists of 2 classes –seizure and non-seizure. In addition, a fast Walsh-Hadamard Transform (FWHT) technique is implemented to analyze the EEG signals within the recurrence space of the brain. Thus, Hadamard coefficients of the EEG signals are obtained via the FWHT. Moreover, the FWHT is contributed to generate an efficient derivation of seizure EEG recordings from non-seizure EEG recordings. Also, a k-fold cross-validation technique is applied to validate the performance of the proposed classifiers. The LSTM classifier provides the best performance, with a testing accuracy of 99.00%. The training and testing loss rates for the LSTM are 0.0029 and 0.0602, respectively, while the weighted average precision, recall, and F1-score for the LSTM are 99.00%. The results of the SVM classifier in terms of accuracy, sensitivity, and specificity reached 91%, 93.52%, and 91.3%, respectively. The computational time consumed for the training of the LSTM and SVM is 2000 and 2500 s, respectively. The results show that the LSTM classifier provides better performance than SVM in the classification of EEG signals. Eventually, the proposed classifiers provide high classification accuracy compared to previously published classifiers.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号