首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   12895篇
  免费   1672篇
  国内免费   1459篇
电工技术   490篇
技术理论   1篇
综合类   1444篇
化学工业   132篇
金属工艺   130篇
机械仪表   605篇
建筑科学   239篇
矿业工程   191篇
能源动力   41篇
轻工业   78篇
水利工程   76篇
石油天然气   61篇
武器工业   107篇
无线电   4917篇
一般工业技术   403篇
冶金工业   47篇
原子能技术   19篇
自动化技术   7045篇
  2024年   20篇
  2023年   167篇
  2022年   259篇
  2021年   338篇
  2020年   410篇
  2019年   309篇
  2018年   313篇
  2017年   449篇
  2016年   502篇
  2015年   579篇
  2014年   1011篇
  2013年   959篇
  2012年   976篇
  2011年   986篇
  2010年   911篇
  2009年   875篇
  2008年   1045篇
  2007年   1171篇
  2006年   937篇
  2005年   907篇
  2004年   735篇
  2003年   599篇
  2002年   447篇
  2001年   387篇
  2000年   187篇
  1999年   130篇
  1998年   91篇
  1997年   81篇
  1996年   67篇
  1995年   80篇
  1994年   37篇
  1993年   14篇
  1992年   15篇
  1991年   7篇
  1990年   8篇
  1989年   4篇
  1988年   5篇
  1987年   2篇
  1985年   2篇
  1980年   1篇
  1967年   1篇
  1965年   2篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
81.
研究调查了Ekman流对浮游植物生态动力过程的驱动机制。采用新的光学遥感算法提取浮游植物光学有效信息。该算法结合了近红外波段的浮游植物荧光信号以及可见光部分的弹性散射的辐射传输模型,通过两次迭代优化算法,提取浮游植物光学信号。采用辐射传输软件Hydrolight对海水水下光场进行了数值模拟,并结合新算法对模拟数据进行了对比分析。结果表明,新算法较好地表征了浮游植物叶绿素光学参数。利用MERIS光学遥感数据并结合了动力学参数,利用该算法分析了强台风尼格对我国海域浮游植物分布的影响。研究结果表明,Ekman流是我国海域浮游植物分布异常的原因之一。  相似文献   
82.
Recently, the routing problem in vehicular ad hoc networks is one of the most vital research. Despite the variety of the proposed approaches and the development of communications technologies, the routing problem in VANET suffers from the high speed of vehicles and the repetitive failures in communications. In this paper, we adjusted the well‐known K‐medoids clustering algorithm to improve the network stability and to increase the lifetime of all established links. First, the number of clusters and the initial cluster heads will not be selected randomly as usual, but based on mathematical formula considering the environment size and the available transmission ranges. Then the assignment of nodes to clusters in both k‐medoids phases will be carried out according to several metrics including direction, relative speed, and proximity. To the best of our knowledge, our proposed model is the first that introduces the new metric named “node disconnection frequency.” This metric prevents nodes with volatile and suspicious behavior to be elected as a new CH. This screening ensures that the new CH retains its property as long as possible and thus increases the network stability. Empirical results confirm that in addition to the convergence speed that characterizes our adjusted K‐medoids clustering algorithm (AKCA), the proposed model achieves more stability and robustness when compared with most recent approaches designed for the same objective.  相似文献   
83.
随着无源光网络的发展,光纤-无线网络能同时支持集中式云和边缘云计算技术,成为一种具有发展前景的网络结构。但是,现有的基于光纤-无线网络的任务协同计算卸载研究主要以最小化移动设备的能耗为目标,忽略了实时性高的任务的需求。针对实时性高的任务,提出了以最小化任务的总处理时间为目标的集中式云和边缘云协同计算卸载问题,并对其进行形式化描述。同时,通过将该问题归约为装箱问题,从而证明其为NP难解问题。提出一个启发式协同计算卸载算法,该算法通过比较不同卸载策略的任务处理时间,优先选择时间最短的任务卸载策略。同时,提出一个定制的遗传算法,获得一个更优的任务卸载策略。实验结果表明,与现有的算法相比,本文提出的启发式算法得到的任务卸载策略平均减少4.34%的任务总处理时间,而定制的遗传算法的卸载策略平均减少18.41%的任务总处理时间。同时,定制的遗传算法的卸载策略与本文提出的启发式算法相比平均减少14.49%的任务总处理时间。  相似文献   
84.
We drew on the unified theory of acceptance and use of technology (UTAUT2) model, and perceived risk construct to propose an integrated model to explain continuance usage of mobile shopping applications. Espoused national cultural values of individualism/collectivism, masculinity/femininity, power distance, uncertainty avoidance, and long-term/short-term orientation act as moderators to examine the influence of within-culture variation on app usage. Findings reveal habit as the strongest predictor of both continuance intention and use behaviour, but interestingly perceived risk did not influence the post-acceptance behaviour of users significantly. Individualism/collectivism, masculinity/femininity, and long-term/short-term orientation espoused cultural values significantly moderated the relationships in the model. Noteworthy theoretical and managerial implications of the research are discussed further.  相似文献   
85.
ABSTRACT

Intrusion in a host may cause damage to the critical memory, which contains important official files or databases. The mobile agent, a piece of code that makes parallel run on host, migrates through the network and performs the requested action. In this paper, we declare a new intrusion detection model using Host-Based Intrusion Detection System (HIDS) for identification and recovery strategies. A memory trace model has been designed to identify the intrusion detection by using a memory tracer mobile agent. Memory Checksum plays a vital role in the identification of the intrusion. This model is designed for intrusion into a host, which alters the critical memory.  相似文献   
86.
李明  邓冬冬  黄鹤 《柴油机》2017,39(5):38-40
针对偏远地区用电难问题,设计了一种基于风力发电、光伏发电、柴油发电机组和蓄电池的移动电源车,充分考虑了电源车的技术特性、安全等问题。通过对风光柴储互补发电系统关键技术的研究,达到提高可再生能源利用率,降低排放和燃油消耗,增加移动电源系统的有效使用时间,降低系统对燃油的依赖程度,提高系统稳定性和灵活性等目标。  相似文献   
87.
The objective of this study was to assess the response to location-based services (LBS) by three key demographic groups within the United Kingdom. This study took the form of a survey of relevant demographics, attitudes and consumer behaviour undertaken via a web-based survey. Results are based on over 1200 respondents, filtered and segmented into three demographic groups who are typically early adopters of new technology. There were positive attitudes towards a range of LBS, with the major exception being location-based advertising. There were mixed views towards location-based gaming and safety camera information. There were low levels of awareness of many services. The levels of use were typically under 20% for all types of LBS.  相似文献   
88.
基于互联网点对多点通信技术理念提出的多被叫业务,实现了一个主叫用户对多个被叫用户话音通信的同时建立,有效地改善了传统话音业务点对点通信效率的不足,提高了主叫用户的呼叫接通率.具有较强的应用价值。  相似文献   
89.
A compact and user-friendly ion irradiation system controlled remotely through the Internet was developed for the execution of collaboration experiments together with researchers at remote sites. Several hardware instruments and software programs were constructed and provided for the remote control of the system and for its connection to the Internet. Surface modification and analysis experiments with this system were remotely performed through the Internet. It was confirmed from the experiments that the present ion irradiation system was precisely controlled through the Internet and could be easily and safely used for the surface modification and analysis, that the normal communication speed of around 10Mbps for the Internet was fast enough for the execution of such typical remote-controlled experiments, and also that an access to the system by a mobile phone was convenient and useful enough to check the condition of the system and experimental data.  相似文献   
90.
This article describes experiences with an application in which users read barcoded signs with camera phones to obtain content about their surroundings at seaside locations. The application was made available to the general public in support of ‘Coast’, a BBC television series about the UK coastline. The article highlights lessons from that trial in terms of what worked well and what was subject to deployment constraints. In particular, it describes how several factors affected the users’ engagement with the signs, the places, and other users: the barcode and mobile phone technologies; semantic issues such as signs’ relationships to landmarks; and practical issues such as local regulations.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号