首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1170篇
  免费   125篇
  国内免费   79篇
电工技术   40篇
综合类   147篇
化学工业   66篇
金属工艺   19篇
机械仪表   29篇
建筑科学   29篇
矿业工程   12篇
能源动力   34篇
轻工业   16篇
水利工程   38篇
石油天然气   11篇
武器工业   23篇
无线电   201篇
一般工业技术   84篇
冶金工业   12篇
原子能技术   9篇
自动化技术   604篇
  2024年   1篇
  2023年   18篇
  2022年   58篇
  2021年   46篇
  2020年   45篇
  2019年   35篇
  2018年   35篇
  2017年   59篇
  2016年   74篇
  2015年   56篇
  2014年   107篇
  2013年   111篇
  2012年   123篇
  2011年   121篇
  2010年   78篇
  2009年   104篇
  2008年   54篇
  2007年   52篇
  2006年   40篇
  2005年   27篇
  2004年   8篇
  2003年   8篇
  2002年   15篇
  2001年   23篇
  2000年   14篇
  1999年   10篇
  1998年   6篇
  1997年   3篇
  1996年   3篇
  1995年   10篇
  1994年   3篇
  1993年   2篇
  1992年   2篇
  1991年   3篇
  1990年   2篇
  1989年   2篇
  1988年   4篇
  1987年   1篇
  1985年   2篇
  1984年   1篇
  1983年   1篇
  1980年   3篇
  1979年   1篇
  1978年   1篇
  1977年   1篇
  1968年   1篇
排序方式: 共有1374条查询结果,搜索用时 62 毫秒
71.
提出一个新的MANET(mobile ad hoc network)中基于时限撤消具有自愈能力的组密钥分发方案,通过双向散列链DDHC(dual directional hash chains)和HBT(Hash binary tree)树结构实现了组密钥之间的冗余关联和访问控制;在没有管理节点协助的情况下,利用当前发布的会话密钥信息和自身秘密信息,合法用户节点可以自主恢复出历史组密钥;通过秘密撤消多项式实现了管理节点的撤消功能;接着,提出一个改进方案。安全性和性能分析表明,新方案能够抵御没有会话交集的用户节点同谋破解攻击;在满足MANET的安全需求前提下,有效地节省网络带宽和存储资源。  相似文献   
72.
基于静态贝叶斯博弈的蠕虫攻防策略绩效评估   总被引:1,自引:0,他引:1  
现有蠕虫攻击策略(防护策略)评估方法没有考虑防护策略(攻击策略)变化对攻击策略(防护策略)绩效评估的影响,且防护策略评估忽视了策略实施成本.针对这种情况,构建了基于静态贝叶斯博弈的绩效评估模型(performance evaluation model based on static Bayesian game,简称PEM-SBG)以及对抗情形下的蠕虫攻防策略绩效评估方法.在模型PEM-SBG基础上提出的基于灰色多属性理论的防护策略绩效评估方法,综合考虑了成本类和收益类的多个评估属性,有助于提高评估过程的全面性.针对典型的蠕虫攻防场景.利用仿真工具SSFNet进行了模拟实验,验证了所提出的模型和方法的有效性.  相似文献   
73.
This paper proposes a novel method for preference relaxation in online product search, which enables consumers to make quality choices without suffering from the commonly experienced information overload. In online shopping scenarios that involve multi-attribute choice tasks, it can be difficult for consumers to process the vast amounts of information available and to make satisfactory buying decisions. In such situations consumers are likely to eliminate potentially good choices early on, using hard-constraint filtering tools. Our approach uses edge sets to identify the alternatives on the soft boundary and the principle of alternative domination to suppress the alternatives on this boundary that are irrelevant. We demonstrate how our approach outperforms existing methods for product search in a set of simulations using two sets of 2650 car advertisements and 1813 digital cameras gathered from a popular online store.  相似文献   
74.
In this paper, a four-angle-star based visualized feature generation approach, FASVFG, is proposed to evaluate the distance between samples in a 5-class classification problem. Based on the four angle star image, numerical features are generated for network visit data from KDDcup99, and an efficient intrusion detection system with less features is proposed. The FASVFG-based classifier achieves a high generalization accuracy of 94.3555% in validation experiment, and the average Mathews correlation coefficient reaches 0.8858.  相似文献   
75.
With the rapidly rising interest in geographic information system (GIS) contents, a large volume of valuable map data has been unlawfully distributed by pirates. Therefore, the secure storage and transmission of classified national digital map datasets have been increasingly threatened. As the importance of secure, large-volume map datasets has increased, vector map security techniques that focus on secure network and data encryption have been studied. These techniques are required to ensure access control and prevent illegal copying of digital maps. This paper presents perceptual encryption on the vector compression domain for copy protection and access control of vector maps. Our algorithm compresses all vector data of polylines and polygons by lossless minimum coding object (MCO) units and perceptually encrypts using two processes using the mean points and directions of MCOs. The first process changes the position of vector data by randomly permuting the mean points of MCOs, the so-called position encryption. The second process changes the geographic shape by circularly encrypting the directions of vertices in MCOs by the XOR operator. Experimental results have verified that our algorithm can encrypt GIS digital maps effectively and simply and can also improve the compression ratio, unlike general data encryption techniques, and thus, our algorithm is very effective for a large volume of GIS datasets.  相似文献   
76.
77.
Conventional time series forecast models can hardly develop the inherent rules of complex non-linear dynamic systems because the strict assumptions they need cannot always be met in reality, whereas fuzzy time series (FTS) techniques can be used even the records of times series have uncertainty and instability since they do not need strict assumptions. In previous study of FTS, the process of aggregating the past observations and assigning proper weights of fuzzy logical relationship groups are ignored, which may lead to poor forecasting accuracy since they are important aspects in time series prediction and analysis where determination of future trends depends only on past observations. In this paper, a novel high-order FTS model is constructed to make time series forecasting. Specifically, by applying the harmony search intelligence algorithm, the optimal lengths of intervals are tuned. Moreover, regularly increasing monotonic quantifiers are employed on fuzzy sets to obtain the weights of ordered weighted aggregation. Simultaneously, the weights of right-hand side of fuzzy logical relationship groups are explored to compensate the presence of bias in the prediction. In the part of empirical analysis, the developed model was applied to predict three well-known time series: numbers of enrollment of Alabama University, TAIEX and electricity load demand of New South Wales and the results obtained were compared with several counterparts, including some old and recently developed models. Experimental results demonstrate that the developed model cannot only achieve higher accuracy of prediction, but also capture the fuzzy features and characters.  相似文献   
78.
Since the advent of the microcomputer in the 1970s and the Internet in the early 1990s, the Information Age has revolutionized modern society and daily life and reshaped the health education and health promotion (HEHP) fields. Microcomputers have evolved from a rare commodity to a standard expectation for HEHP professional preparation, program development, and delivery of services and information. To examine microcomputer use in both historical and contemporary perspective, this article identifies and evaluates the first publications that explored possible application of microcomputers and computer-assisted instruction in the HEHP field. A historiographic review was conducted between January 1960 and December 1989 and by applying search strategies to ten academic electronic databases. Articles were evaluated for subject matter, article type, target audience, and applicability to the HEHP fields using these constructs: Effectiveness, cost-containment, instructional, pilot test, tailoring, and theory. The article sample was carefully reviewed, tabulated, and evaluated. The search procedure identified 39 articles which met the search parameters and demonstrated applicability with one or more core constructs. Effectiveness and tailoring emerged as the most prominent constructs associated with HEHP; a call to action was the most common article type. What was apparent during the search period and relevant today is the necessary rejection of a single method for microcomputer application. A relationship between target audiences and the populations they served is also apparent in the early literature.  相似文献   
79.
We present an exact method, based on an arc-flow formulation with side constraints, for solving bin packing and cutting stock problems—including multi-constraint variants—by simply representing all the patterns in a very compact graph. Our method includes a graph compression algorithm that usually reduces the size of the underlying graph substantially without weakening the model.Our formulation is equivalent to Gilmore and Gomory׳s, thus providing a very strong linear relaxation. However, instead of using column-generation in an iterative process, the method constructs a graph, where paths from the source to the target node represent every valid packing pattern.The same method, without any problem-specific parameterization, was used to solve a large variety of instances from several different cutting and packing problems. In this paper, we deal with vector packing, bin packing, cutting stock, cardinality constrained bin packing, cutting stock with cutting knife limitation, bin packing with conflicts, and other problems. We report computational results obtained with many benchmark test datasets, some of them showing a large advantage of this formulation with respect to the traditional ones.  相似文献   
80.
A limestone mine in Ohio has had instability problems that have led to massive roof falls extending to the surface. This study focuses on the role that weak, moisture-sensitive floor has in the instability issues.Previous NIOSH research related to this subject did not include analysis for weak floor or weak bands and recommended that when such issues arise they should be investigated further using a more advanced analysis. Therefore, to further investigate the observed instability occurring on a large scale at the Ohio mine, FLAC3 D numerical models were employed to demonstrate the effect that a weak floor has on roof and pillar stability. This case study will provide important information to limestone mine operators regarding the impact of weak floor causing the potential for roof collapse, pillar failure, and subsequent subsidence of the ground surface.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号