首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1911篇
  免费   61篇
  国内免费   8篇
工业技术   1980篇
  2024年   6篇
  2023年   15篇
  2022年   66篇
  2021年   85篇
  2020年   64篇
  2019年   48篇
  2018年   90篇
  2017年   65篇
  2016年   72篇
  2015年   54篇
  2014年   76篇
  2013年   155篇
  2012年   98篇
  2011年   122篇
  2010年   98篇
  2009年   89篇
  2008年   101篇
  2007年   82篇
  2006年   55篇
  2005年   61篇
  2004年   38篇
  2003年   34篇
  2002年   34篇
  2001年   23篇
  2000年   16篇
  1999年   36篇
  1998年   23篇
  1997年   18篇
  1996年   27篇
  1995年   22篇
  1994年   29篇
  1993年   23篇
  1992年   22篇
  1991年   11篇
  1990年   15篇
  1989年   10篇
  1988年   7篇
  1987年   12篇
  1986年   5篇
  1985年   9篇
  1984年   5篇
  1983年   9篇
  1982年   10篇
  1981年   10篇
  1980年   8篇
  1979年   6篇
  1978年   5篇
  1977年   5篇
  1975年   2篇
  1974年   2篇
排序方式: 共有1980条查询结果,搜索用时 17 毫秒
11.
12.
This paper deals with the fuzzy set-valued functions of real variables on time scale whose values are normal, convex, upper semicontinuous and compactly supported fuzzy sets in \(\mathbb {R}^{n}\). We introduce and study the fundamental properties of new class of derivative called generalized delta derivative (\(\Delta _{g}\)-derivative) and generalized delta integral (\(\Delta _{g}\)-integral) for such fuzzy functions.  相似文献   
13.
In the network security system, intrusion detection plays a significant role. The network security system detects the malicious actions in the network and also conforms the availability, integrity and confidentiality of data information resources. Intrusion identification system can easily detect the false positive alerts. If large number of false positive alerts are created then it makes intrusion detection system as difficult to differentiate the false positive alerts from genuine attacks. Many research works have been done. The issues in the existing algorithms are more memory space and need more time to execute the transactions of records. This paper proposes a novel framework of network security Intrusion Detection System (IDS) using Modified Frequent Pattern (MFP-Tree) via K-means algorithm. The accuracy rate of Modified Frequent Pattern Tree (MFPT)-K means method in finding the various attacks are Normal 94.89%, for DoS based attack 98.34%, for User to Root (U2R) attacks got 96.73%, Remote to Local (R2L) got 95.89% and Probe attack got 92.67% and is optimal when it is compared with other existing algorithms of K-Means and APRIORI.  相似文献   
14.
Multidimensional Systems and Signal Processing - High-performance sonar systems mostly combine a large sensor array and an efficient beamformer for enhancing the overall detection capabilities and...  相似文献   
15.
The Journal of Supercomputing - In the technological era, exponential increase of unorganized text documents offers increased difficulties retrieving the most relevant data. The document clustering...  相似文献   
16.
The purpose of this work was to explore a new feature extraction method for classifying paddy seeds using a feature extraction algorithm to achieve the area ratio, horizontal–slant and front–rear angles and find whether the proposed features have high discriminating power. Another objective was to find the smallest feature set that can ensure highly accurate recognition of seeds. A total of a 100 image features were extracted, and features having significant discriminating power were identified based on the analysis of variance (ANOVA). From the 100 features, 14 features were found to have high discriminating power and from these features, six were selected as the proposed features. Experimental results show that the proposed features and removal of redundant features enhanced the discriminating power of the feature set, and that the proposed features have an excellent discriminating property for seeds. The presented features resulted in the highest classification accuracy (98.8%) when compared to other methods.  相似文献   
17.
Journal of Failure Analysis and Prevention - In the present work, mixed-mode stress intensity factor (SIF) of multiple cracks in a riveted lap joint has been determined, with and without the...  相似文献   
18.
In this paper, we consider a dynamic supply chain where a manufacturer produces and distributes a featured product through an exclusive retailer to end consumers. The manufacturer decides the product quality and wholesale price, while the retailer sets the retail price in the presence of a revenue-sharing contract and consumers’ reference quality effects. The objective of this study is to investigate the impacts of myopic behaviour regarding the reference quality on the product quality and pricing strategies and profits of both members. Our results suggest that the manufacturer’s myopia leads to a higher quality, higher price strategy and a higher quality–price ratio which benefits consumers. Meanwhile, relative to the far-sighted behaviour, myopia results in a more quality-sensitive but less price-sensitive market demand. What’s more, we find that the manufacturer is apt to act in a far-sighted way, but the retailer isn’t always willing to cooperate with a far-sighted manufacturer. Taking myopic strategies for both members is likely to gain a high profit of the whole supply chain for a relatively high marginal contribution of product quality on demand and a relatively low revenue-sharing proportion.  相似文献   
19.
A mobile ad hoc network (MANET) has abundant mobile nodes that are free to communicate independently in many locations. Many existing energy models address the inadequacy of resources based on Ad hoc On-demand Multipath Distance Vector and Optimized Link State Protocol (OLSP) routing protocols for MANET along with various parameters. The architecture of energy-efficient routing mechanisms is a challenging problem in a MANET. In this work, a novel energy-aware routing model is introduced for MANET comprising an ant colony optimization (ACO) enhanced approach to energy-efficient-optimized link state routing (named ACO–EEOLSR). Initially, the route discovery is progressed by means of neighbor estimation and also with the authentication of link stability. Parameters such as energy, distance, and hop count are employed as willingness nodes, where both the energy and distance are entrenched through the OLSP. Consequently, the hop count is applied via the ACO system that is beneficial for link stability. After the acceptance of an acknowledgement, the hop count is authorized for further performance analysis. This approach increases the Quality of Service and also uses less energy compared to other energy models. The accomplished simulation upshot depicts that the ACO–EEOLSR outperforms the EEOLSR scheme with respect to the performance metrics of energy consumption, packet delivery ratio, total remaining time, average network lifetime, and a variance of energy.  相似文献   
20.
The paper presents the preparation and investigations of zirconium oxide (ZrO2) nanoparticles that were synthesized by hydrothermal method. The products were characterized by means of powder X-ray diffraction, scanning electron microscopy (SEM), transmission electron microscopy (TEM), UV-absorption spectroscopy and photoluminescence (PL) spectroscopy. The crystal structure was determined using X-ray diffraction. The morphology and the particle size were studied using (SEM) and (TEM). The spherical shaped particles were confirmed through the SEM analysis. The transmission electron microscopic analysis confirmed the formation of the nanoparticles with the particle size. The FT-IR and Raman spectrum ascertained the strong presence of ZrO2 nanoparticles. The optical properties were obtained from UV–visible absorption spectrum and also PL emission spectrum. The dielectric constant and the dielectric loss were measured as a function of frequency and temperature.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号