首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5691篇
  免费   443篇
  国内免费   56篇
工业技术   6190篇
  2024年   37篇
  2023年   216篇
  2022年   493篇
  2021年   770篇
  2020年   465篇
  2019年   526篇
  2018年   481篇
  2017年   402篇
  2016年   403篇
  2015年   238篇
  2014年   296篇
  2013年   414篇
  2012年   257篇
  2011年   320篇
  2010年   172篇
  2009年   145篇
  2008年   102篇
  2007年   91篇
  2006年   48篇
  2005年   32篇
  2004年   38篇
  2003年   29篇
  2002年   21篇
  2001年   10篇
  2000年   15篇
  1999年   16篇
  1998年   18篇
  1997年   14篇
  1996年   15篇
  1995年   17篇
  1994年   10篇
  1993年   12篇
  1992年   11篇
  1991年   9篇
  1990年   1篇
  1989年   5篇
  1988年   4篇
  1987年   6篇
  1986年   2篇
  1985年   6篇
  1984年   4篇
  1983年   2篇
  1982年   4篇
  1981年   3篇
  1980年   1篇
  1979年   3篇
  1978年   2篇
  1977年   3篇
  1961年   1篇
排序方式: 共有6190条查询结果,搜索用时 15 毫秒
61.
Carbon-coated SiC@C nanocapsules (NCs) with a hexagonal platelet-like morphology were fabricated by a simple direct current (DC) arc-discharge plasma method.The SiC@C NCs were monocrystalline,120-150 nm in size,and approximately 50 nm thick.The formation of the as-prepared SiC@C NCs included nucleation of truncated octahedral SiC seeds and subsequent anisotropic growth of the seeds into hexagonal nanoplatelets in a carbon-rich atmosphere.The disordered carbon layers on the SiC@C NCs were converted into SiO2 shells of SiC@SiO2 NCs by heat treatment at 650 ℃ in air,during which the shape and inherent characteristics of the crystalline SiC core were obtained.The interface evolution from carbon to SiO2 shells endowed the SiC@SiO2 NCs with enhanced photocatalytic activity due to the hydrophilic and transparent nature of the SiO2 shell,as well as to the photosensitive SiC nanocrystals.The band gap of the nanostructured SiC core was determined to be 2.70 eV.The SiC@SiO2 NCs degraded approximately 95% of methylene blue in 160 min under visible light irradiation.  相似文献   
62.
Zhang  Jian  Yang  Xiaokun  Deng  Hui  Qiao  Keke  Farooq  Umar  Ishaq  Muhammad  Yi  Fei  Liu  Huan  Tang  Jiang  Song  Haisheng 《纳微快报(英文)》2017,9(3):1-8
Nano-Micro Letters - A NiFe2O4/expanded graphite (NiFe2O4/EG) nanocomposite was prepared via a simple and inexpensive synthesis method. Its lithium storage properties were studied with the goal of...  相似文献   
63.
In this article, we have examined the performance of some useful capability indices using normal and non-normal distributions. The confidence intervals are calculated and mean coverage rates are observed for different capability indices. The effects of symmetry and kurtosis of parent distributions are examined on the mean coverage rates of different capability indices. Moreover, we have investigated the robustness (of confidence interval) using the median and percentile-based indices. We have considered the well-known distributions including normal, gamma, t, Weibull, and chi-squared. For these process scenarios, we have observed that some indices resist disturbance only in symmetry of the parent distribution, some resist the disturbance in symmetry and kurtosis of the distribution, and some indices don’t resist against either type of disturbance.  相似文献   
64.
There are two main types of variations, namely, common and special causes leading to in‐control and out‐of‐control states, respectively. Control charts are popular tools used to differentiate between these two states of a process. Implementation of runs rules schemes with control charts is an attractive approach for process monitoring. This study is designed to describe the methodology of runs rules schemes and discuss their implementation for different types of control charts. We have considered memory‐less charts, namely, , S, and R charts for our study purposes. It is examined that the efficiency gain depends on the number of decision points utilized to implement a given rule. Moreover, superiority of runs rules schemes may vary for different types of location and dispersion charts. An application example using a dataset is also included in the study for practical considerations. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   
65.
Construction of macro-materials with highly oriented microstructures and well-connected interfaces between building blocks is significant for a variety of applications. However, it is still challenging to confine the desired structures. Thus, well-defined building blocks would be crucial to address this issue. Herein, we present a facile process based on 1.8 nm Pd nanoclusters (NCs) to achieve centimeter-size assemblages with aligned honeycomb structures, where the diameter of a single tubular moiety is ~4 μm. Layered and disordered porous assemblages were also obtained by modulating the temperature in this system. The reconciled interactions between the NCs were crucial to the assemblages. As a comparison, 14 nm Pd nanoparticles formed only aggregates. This work highlights the approach of confining the size of the building blocks in order to better control the assembly process and improve the stability of the structures.
  相似文献   
66.
With the recent developments in the Internet of Things (IoT), the amount of data collected has expanded tremendously, resulting in a higher demand for data storage, computational capacity, and real-time processing capabilities. Cloud computing has traditionally played an important role in establishing IoT. However, fog computing has recently emerged as a new field complementing cloud computing due to its enhanced mobility, location awareness, heterogeneity, scalability, low latency, and geographic distribution. However, IoT networks are vulnerable to unwanted assaults because of their open and shared nature. As a result, various fog computing-based security models that protect IoT networks have been developed. A distributed architecture based on an intrusion detection system (IDS) ensures that a dynamic, scalable IoT environment with the ability to disperse centralized tasks to local fog nodes and which successfully detects advanced malicious threats is available. In this study, we examined the time-related aspects of network traffic data. We presented an intrusion detection model based on a two-layered bidirectional long short-term memory (Bi-LSTM) with an attention mechanism for traffic data classification verified on the UNSW-NB15 benchmark dataset. We showed that the suggested model outperformed numerous leading-edge Network IDS that used machine learning models in terms of accuracy, precision, recall and F1 score.  相似文献   
67.
The demand for cloud computing has increased manifold in the recent past. More specifically, on-demand computing has seen a rapid rise as organizations rely mostly on cloud service providers for their day-to-day computing needs. The cloud service provider fulfills different user requirements using virtualization - where a single physical machine can host multiple Virtual Machines. Each virtual machine potentially represents a different user environment such as operating system, programming environment, and applications. However, these cloud services use a large amount of electrical energy and produce greenhouse gases. To reduce the electricity cost and greenhouse gases, energy efficient algorithms must be designed. One specific area where energy efficient algorithms are required is virtual machine consolidation. With virtual machine consolidation, the objective is to utilize the minimum possible number of hosts to accommodate the required virtual machines, keeping in mind the service level agreement requirements. This research work formulates the virtual machine migration as an online problem and develops optimal offline and online algorithms for the single host virtual machine migration problem under a service level agreement constraint for an over-utilized host. The online algorithm is analyzed using a competitive analysis approach. In addition, an experimental analysis of the proposed algorithm on real-world data is conducted to showcase the improved performance of the proposed algorithm against the benchmark algorithms. Our proposed online algorithm consumed 25% less energy and performed 43% fewer migrations than the benchmark algorithms.  相似文献   
68.
Identifying fruit disease manually is time-consuming, expert-required, and expensive; thus, a computer-based automated system is widely required. Fruit diseases affect not only the quality but also the quantity. As a result, it is possible to detect the disease early on and cure the fruits using computer-based techniques. However, computer-based methods face several challenges, including low contrast, a lack of dataset for training a model, and inappropriate feature extraction for final classification. In this paper, we proposed an automated framework for detecting apple fruit leaf diseases using CNN and a hybrid optimization algorithm. Data augmentation is performed initially to balance the selected apple dataset. After that, two pre-trained deep models are fine-tuning and trained using transfer learning. Then, a fusion technique is proposed named Parallel Correlation Threshold (PCT). The fused feature vector is optimized in the next step using a hybrid optimization algorithm. The selected features are finally classified using machine learning algorithms. Four different experiments have been carried out on the augmented Plant Village dataset and yielded the best accuracy of 99.8%. The accuracy of the proposed framework is also compared to that of several neural nets, and it outperforms them all.  相似文献   
69.
Continuous improvements in very-large-scale integration (VLSI) technology and design software have significantly broadened the scope of digital signal processing (DSP) applications. The use of application-specific integrated circuits (ASICs) and programmable digital signal processors for many DSP applications have changed, even though new system implementations based on reconfigurable computing are becoming more complex. Adaptable platforms that combine hardware and software programmability efficiency are rapidly maturing with discrete wavelet transformation (DWT) and sophisticated computerized design techniques, which are much needed in today’s modern world. New research and commercial efforts to sustain power optimization, cost savings, and improved runtime effectiveness have been initiated as initial reconfigurable technologies have emerged. Hence, in this paper, it is proposed that the DWT method can be implemented on a field-programmable gate array in a digital architecture (FPGA-DA). We examined the effects of quantization on DWT performance in classification problems to demonstrate its reliability concerning fixed-point math implementations. The Advanced Encryption Standard (AES) algorithm for DWT learning used in this architecture is less responsive to resampling errors than the previously proposed solution in the literature using the artificial neural networks (ANN) method. By reducing hardware area by 57%, the proposed system has a higher throughput rate of 88.72%, reliability analysis of 95.5% compared to the other standard methods.  相似文献   
70.
Despite the planned installation and operations of the traditional IEEE 802.11 networks, they still experience degraded performance due to the number of inefficiencies. One of the main reasons is the received signal strength indicator (RSSI) association problem, in which the user remains connected to the access point (AP) unless the RSSI becomes too weak. In this paper, we propose a multi-criterion association (WiMA) scheme based on software defined networking (SDN) in Wi-Fi networks. An association solution based on multi-criterion such as AP load, RSSI, and channel occupancy is proposed to satisfy the quality of service (QoS). SDN having an overall view of the network takes the association and reassociation decisions making the handoffs smooth in throughput performance. To implement WiMA extensive simulations runs are carried out on Mininet-NS3-Wi-Fi network simulator. The performance evaluation shows that the WiMA significantly reduces the average number of retransmissions by 5%–30% and enhances the throughput by 20%–50%, hence maintaining user fairness and accommodating more wireless devices and traffic load in the network, when compared to traditional client-driven (CD) approach and state of the art Wi-Balance approach.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号