全文获取类型
收费全文 | 11207篇 |
免费 | 1409篇 |
国内免费 | 1252篇 |
专业分类
电工技术 | 462篇 |
综合类 | 1291篇 |
化学工业 | 126篇 |
金属工艺 | 128篇 |
机械仪表 | 597篇 |
建筑科学 | 228篇 |
矿业工程 | 182篇 |
能源动力 | 37篇 |
轻工业 | 68篇 |
水利工程 | 74篇 |
石油天然气 | 58篇 |
武器工业 | 109篇 |
无线电 | 4076篇 |
一般工业技术 | 385篇 |
冶金工业 | 81篇 |
原子能技术 | 18篇 |
自动化技术 | 5948篇 |
出版年
2024年 | 39篇 |
2023年 | 154篇 |
2022年 | 245篇 |
2021年 | 327篇 |
2020年 | 389篇 |
2019年 | 291篇 |
2018年 | 282篇 |
2017年 | 405篇 |
2016年 | 463篇 |
2015年 | 518篇 |
2014年 | 926篇 |
2013年 | 858篇 |
2012年 | 844篇 |
2011年 | 826篇 |
2010年 | 727篇 |
2009年 | 697篇 |
2008年 | 812篇 |
2007年 | 915篇 |
2006年 | 720篇 |
2005年 | 718篇 |
2004年 | 621篇 |
2003年 | 540篇 |
2002年 | 411篇 |
2001年 | 382篇 |
2000年 | 189篇 |
1999年 | 131篇 |
1998年 | 103篇 |
1997年 | 86篇 |
1996年 | 75篇 |
1995年 | 79篇 |
1994年 | 38篇 |
1993年 | 12篇 |
1992年 | 15篇 |
1991年 | 7篇 |
1990年 | 7篇 |
1989年 | 5篇 |
1988年 | 5篇 |
1987年 | 2篇 |
1986年 | 1篇 |
1985年 | 2篇 |
1980年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 296 毫秒
71.
High accuracy path tracking for vehicles in presence of sliding: Application to farm vehicle automatic guidance for agricultural tasks 总被引:1,自引:0,他引:1
Roland Lenain Benoit Thuilot Christophe Cariou Philippe Martinet 《Autonomous Robots》2006,21(1):79-97
When designing an accurate automated guidance system for vehicles, a major problem is sliding and pseudo-sliding effects. This is especially the case in agricultural applications, where five-centimetre accuracy with respect to the desired trajectory is required, although the vehicles are moving on slippery ground. It has been established that RTK GPS was a very suitable sensor to achieve automated guidance with such high precision: several control laws have been designed for vehicles equipped with this sensor, and provide the expected guidance accuracy as long as the vehicles do not slide. In previous work, further control developments have been proposed to take sliding into account: guidance accuracy in slippery environments has been shown to be preserved, except transiently at the beginning/end of curves. In this paper, the design of this control law is first recalled and discussed. A Model Predictive Control method is then applied in order to preserve accuracy of guidance even during these curvature transitions. Finally, the overall control scheme is implemented, and improvements with respect to previous guidance laws are demonstrated through full-scale experiments. 相似文献
72.
Mou Weimin; Biocca Frank; Owen Charles B.; Tang Arthur; Xiao Fan; Lim Lynette 《Canadian Metallurgical Quarterly》2004,10(4):238
In 3 experiments, the authors investigated spatial updating in augmented reality environments. Participants learned locations of virtual objects on the physical floor. They were turned to appropriate facing directions while blindfolded before making pointing judgments (e.g., "Imagine you are facing X. Point to Y"). Experiments manipulated the angular difference between the learning heading and the imagined heading and between the actual heading and the imagined heading. The effect of actual-imagined on pointing latency was observed for naive users but not for users with brief training or instructions concerning the fact that objects can move with body movements. The results indicated that naive users used an environment-stabilized reference frame to access information arrays, but with experience and instruction the nature of the representation changed from an environment stabilized to a body stabilized reference frame. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
73.
杨宇航 《计算机工程与设计》2004,25(8):1278-1281
论述了采用直接序列扩频技术设计的便携式无线图像传输系统原理,结构,关键技术和安全保密方法等。系统具有通信质量好、性能稳定、安全性高,便于机动等优点,适合于需要经常改变安装位置的情况,是多种情况下图像传输的理想选择。 相似文献
74.
XIAN He-qun FENG Deng-guo 《通讯和计算机》2007,4(3):44-51
Even with attractive computational advantages, mobile agent technology has not developed its full potential due to various security issues. This paper proposes a method called Private Key Consignment to solve the problem of how to protect the data carried by mobile agents. It exploits new functionalities and mechanism provided by the trusted computing technology, and adopts both public key and symmetric key cryptographic means for data and key protection. The most notable feature of this method is that it protects the private key of the agent by consigning it to a tamper proof hardware, thus, enabling convenient and secure use of the private key. It provides a new scheme of mobile agents' data protection. 相似文献
75.
随着网络的迅猛发展,管理网技术的相关研究也越来越得到广泛重视,传统的集中式管理方法在可扩展性、可靠性、灵活性方面存在一定的不足。基于移动代理的分布式网络管理方案可以很好地解决这些问题。网管站派遣移动代理到各被管节点上去收集数据和执行网管操作,这样可以分散网络管理站的工作量和降低网络的流量,并提升网络管理系统的主动性。 相似文献
76.
The mobile agent is a fundamental building block of the mobile computing paradigm. In mobile agent security, oblivious transfer
(OT) from a trusted party can be used to protect the agent’s privacy and the hosts’ privacy. In this paper, we introduce a
new cryptographic primitive called Verifiable Distributed Oblivious Transfer (VDOT), which allows us to replace a single trusted party with a group of threshold trusted servers. The design of VDOT uses a novel
technique called consistency verification of encrypted secret shares. VDOT protects the privacy of both the sender and the receiver against malicious attacks of the servers. We also show the
design of a system to apply VDOT to protect the privacy of mobile agents. Our design partitions an agent into the general
portion and the security-sensitive portion. We also implement the key components of our system. As far as we know, this is
the first effort to implement a system that protects the privacy of mobile agents. Our preliminary evaluation shows that protecting
mobile agents not only is possible, but also can be implemented efficiently.
This work was supported in part by the DoD University Research Initiative (URI) program administered by the Office of Naval
Research under grant N00014-01-1-0795. Sheng Zhong was supported by ONR grant N00014-01-1-0795 and NSF grants ANI-0207399
and CCR-TC-0208972. Yang Richard Yang was supported in part by NSF grant ANI-0207399. A preliminary version of this paper
was presented at the DialM-POMC Joint Workshop on Foundations of Mobile Computing in 2003.
Sheng Zhong received his Ph.D. in computer science from Yale University in the year of 2004. He holds an assistant professor position
at SUNY Buffalo and is currently on leave for postdoctoral research at the Center for Discrete Mathematics and Theoretical
Computer Science (DIMACS). His research interests, on the practical side, are security and incentives in data mining, databases,
and wireless networks. On the theoretical side, he is interested in cryptography and game theory.
Yang Richard Yang is an Assistant Professor of Computer Science at Yale University. His research interests include computer networks, mobile
computing, wireless networking, sensor networks, and network security. He leads the LAboratory of Networked Systems (LANS)
at Yale. His recent awards include a Schlumberger Fellowship and a CAREER Award from the National Science Foundation. He received
his B.E. degree from Tsinghua University (1993), and his M.S. and Ph.D. degrees from the University of Texas at Austin (1998
and 2001). 相似文献
77.
78.
介绍了863智能机器人型号之一-以核工业为应用背景的“勇士号”遥控移动式机器人的作业内容及其主要功能指标,分析了该型号的总体设计思想,同时概括总结了其操作性能,移动性能及计算机系统等方面的技术特点。 相似文献
79.
在对比分析了传统辅助水刹车与气控盘式辅助刹车的特性后,重点对气控盘式辅助刹车进行了数学分析,得到了该辅助刹车的制动扭矩取决于施加的气体压力,与钻具质量无关,冷却液的流量应同钻柱质量保持正比关系,可精确控制下钻速度并易于实现自动送钻功能。得出了气控盘式辅助刹车更适用于车载钻机的结论。 相似文献
80.