首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1951篇
  免费   164篇
  国内免费   16篇
工业技术   2131篇
  2024年   4篇
  2023年   66篇
  2022年   115篇
  2021年   179篇
  2020年   141篇
  2019年   148篇
  2018年   169篇
  2017年   137篇
  2016年   127篇
  2015年   88篇
  2014年   113篇
  2013年   171篇
  2012年   134篇
  2011年   108篇
  2010年   81篇
  2009年   79篇
  2008年   46篇
  2007年   41篇
  2006年   31篇
  2005年   16篇
  2004年   10篇
  2003年   12篇
  2002年   10篇
  2001年   2篇
  2000年   7篇
  1999年   10篇
  1998年   19篇
  1997年   9篇
  1996年   9篇
  1995年   8篇
  1994年   10篇
  1993年   4篇
  1992年   5篇
  1991年   4篇
  1990年   2篇
  1987年   3篇
  1986年   1篇
  1984年   5篇
  1983年   1篇
  1982年   1篇
  1981年   3篇
  1980年   1篇
  1968年   1篇
排序方式: 共有2131条查询结果,搜索用时 875 毫秒
41.
As telecommunication networks evolve rapidly in terms of scalability, complexity, and heterogeneity, the efficiency of fault localization procedures and the accuracy in the detection of anomalous behaviors are becoming important factors that largely influence the decision making process in large management companies. For this reason, telecommunication companies are doing a big effort investing in new technologies and projects aimed at finding efficient management solutions. One of the challenging issues for network and system management operators is that of dealing with the huge amount of alerts generated by the managed systems and networks. In order to discover anomalous behaviors and speed up fault localization processes, alert correlation is one of the most popular resources. Although many different alert correlation techniques have been investigated, it is still an active research field. In this paper, a survey of the state of the art in alert correlation techniques is presented. Unlike other authors, we consider that the correlation process is a common problem for different fields in the industry. Thus, we focus on showing the broad influence of this problem. Additionally, we suggest an alert correlation architecture capable of modeling current and prospective proposals. Finally, we also review some of the most important commercial products currently available.  相似文献   
42.
There is significant interest in the network management and industrial security community about the need to identify the “best” and most relevant features for network traffic in order to properly characterize user behaviour and predict future traffic. The ability to eliminate redundant features is an important Machine Learning (ML) task because it helps to identify the best features in order to improve the classification accuracy as well as to reduce the computational complexity related to the construction of the classifier. In practice, feature selection (FS) techniques can be used as a preprocessing step to eliminate irrelevant features and as a knowledge discovery tool to reveal the “best” features in many soft computing applications. In this paper, we investigate the advantages and disadvantages of such FS techniques with new proposed metrics (namely goodness, stability and similarity). We continue our efforts toward developing an integrated FS technique that is built on the key strengths of existing FS techniques. A novel way is proposed to identify efficiently and accurately the “best” features by first combining the results of some well-known FS techniques to find consistent features, and then use the proposed concept of support to select a smallest set of features and cover data optimality. The empirical study over ten high-dimensional network traffic data sets demonstrates significant gain in accuracy and improved run-time performance of a classifier compared to individual results produced by some well-known FS techniques.  相似文献   
43.
44.
45.
Artificial Immune System algorithms use antibodies that fully specify the solution of an optimization, learning, or pattern recognition problem. By being restricted to fully specified antibodies, an AIS algorithm cannot make use of schemata or classes of partial solutions, while sub solutions can help a lot in faster emergence of a totally good solution in many problems. To exploit schemata in artificial immune systems, this paper presents a novel algorithm that combines traditional artificial immune systems and symbiotic combination operator. The algorithm starts searching with partially specified antibodies and gradually builds more and more specified solutions till it finds complete answers. The algorithm is compared with CLONALG algorithm on several multimodal function optimization and combinatorial optimization problems and it is shown that it is faster than CLONALG on most problems and can find solutions in problems that CLONALG totally fails.  相似文献   
46.
Neural Computing and Applications - A lot of different methods are being opted for improving the educational standards through monitoring of the classrooms. The developed world uses Smart...  相似文献   
47.
Scalability is one of the most important quality attribute of software-intensive systems, because it maintains an effective performance parallel to the large fluctuating and sometimes unpredictable workload. In order to achieve scalability, thread pool system (TPS) (which is also known as executor service) has been used extensively as a middleware service in software-intensive systems. TPS optimization is a challenging problem that determines the optimal size of thread pool dynamically on runtime. In case of distributed-TPS (DTPS), another issue is the load balancing b/w available set of TPSs running at backend servers. Existing DTPSs are overloaded either due to an inappropriate TPS optimization strategy at backend servers or improper load balancing scheme that cannot quickly recover an overload. Consequently, the performance of software-intensive system is suffered. Thus, in this paper, we propose a new DTPS that follows the collaborative round robin load balancing that has the effect of a double-edge sword. On the one hand, it effectively performs the load balancing (in case of overload situation) among available TPSs by a fast overload recovery procedure that decelerates the load on the overloaded TPSs up to their capacities and shifts the remaining load towards other gracefully running TPSs. And on the other hand, its robust load deceleration technique which is applied to an overloaded TPS sets an appropriate upper bound of thread pool size, because the pool size in each TPS is kept equal to the request rate on it, hence dynamically optimizes TPS. We evaluated the results of the proposed system against state of the art DTPSs by a client-server based simulator and found that our system outperformed by sustaining smaller response times.  相似文献   
48.
49.
An environmentally friendly and rapid procedure was developed to synthesise silver nanoparticles (Ag‐NPs) by Chamaemelum nobile extract and to evaluate its in vivo anti‐inflammatory and antioxidant activities. The ultraviolet–visible absorption spectrum of the synthesised Ag‐NPs showed an absorbance peak at 422. The average size of spherical nanoparticles was 24 nm as revealed by transmission electron microscopy. Fourier transform infra‐red spectroscopy analysis supported the presence of biological active compounds involved in the reduction of Ag ion and X‐ray diffraction confirmed the crystalline structure of the metallic Ag. The anti‐inflammatory and antioxidant activity of the Ag‐NPs was investigated against carrageenan‐induced paw oedema in mice. The levels of malondialdehyde (MDA) and antioxidant enzymes superoxide dismutase, catalase, glutathione peroxidase and inflammatory cytokines tumour necrosis factor (TNF‐α), interferon gamma and interleukin (IL)‐6, IL‐1β were assessed in this respect. The results demonstrated that anti‐inflammatory activity of the Ag‐NPs might be due to the ability of the nanoparticles to reduce IL‐1β, IL‐6 and TNF‐α. Moreover, reduction of antioxidant enzymes along with an increase in MDA level shows that the anti‐inflammatory activity of the synthesised Ag‐NPs by C. nobile is attributed to its ameliorating effect on the oxidative damage.Inspec keywords: silver, nanoparticles, nanofabrication, ultraviolet spectra, visible spectra, particle size, transmission electron microscopy, Fourier transform infrared spectra, X‐ray diffraction, crystal structure, enzymes, molecular biophysics, tumours, biomedical materials, nanomedicineOther keywords: Chamaemelum nobile extract, oxidative stress, mice paw, silver nanoparticles, antiinflammatory activity, antioxidant activity, ultraviolet‐visible absorption spectrum, spherical nanoparticle size, transmission electron microscopy, Fourier transform infrared spectroscopy, biological active compounds, X‐ray diffraction, crystalline structure, carrageenan‐induced paw oedema, malondialdehyde, antioxidant enzymes, superoxide dismutase, catalase, glutathione peroxidase, inflammatory cytokines, tumour necrosis factor, interferon gamma, interleukin, IL‐1β, IL‐6, TNF‐α, MDA level, Ag  相似文献   
50.
Cell formation is a traditional problem in cellular manufacturing systems that concerns the allocation of parts, operators and machines to the cells. This paper presents a new mathematical programming model for cell formation in which operators’ personality and decision-making styles, skill in working with machines, and also job security are incorporated simultaneously. The model involves the following five objectives: (1) minimising costs of adding new machines to and removing machines from the cells at the beginning of each period, (2) minimising total cost of material handling, (3) maximising job security, (4) minimising inconsistency of operators’ decision styles in cells and (5) minimising cost of suitable skill. On account of the NP-hard nature of the proposed model, NSGA-II as a powerful meta-heuristic approach is used for solving large-sized problems. Furthermore, response surface methodology (RSM) is used for tuning the parameters. Lastly, MOPSO and two scalarization methods are employed for validation of the results obtained. To the best of our knowledge, this is the first study that presents a multi-objective mathematical model for cell formation problem considering operators’ personality and skill, addition and removal of machines and job security.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号