首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3132篇
  免费   204篇
  国内免费   7篇
电工技术   40篇
化学工业   728篇
金属工艺   40篇
机械仪表   84篇
建筑科学   128篇
矿业工程   5篇
能源动力   114篇
轻工业   565篇
水利工程   29篇
石油天然气   18篇
无线电   204篇
一般工业技术   473篇
冶金工业   116篇
原子能技术   13篇
自动化技术   786篇
  2024年   5篇
  2023年   39篇
  2022年   46篇
  2021年   142篇
  2020年   115篇
  2019年   132篇
  2018年   121篇
  2017年   109篇
  2016年   142篇
  2015年   112篇
  2014年   147篇
  2013年   286篇
  2012年   236篇
  2011年   264篇
  2010年   210篇
  2009年   192篇
  2008年   179篇
  2007年   152篇
  2006年   124篇
  2005年   96篇
  2004年   77篇
  2003年   64篇
  2002年   69篇
  2001年   35篇
  2000年   33篇
  1999年   27篇
  1998年   29篇
  1997年   20篇
  1996年   13篇
  1995年   20篇
  1994年   12篇
  1993年   18篇
  1992年   8篇
  1991年   8篇
  1990年   7篇
  1989年   5篇
  1988年   3篇
  1987年   2篇
  1986年   2篇
  1985年   5篇
  1984年   4篇
  1983年   5篇
  1982年   3篇
  1981年   5篇
  1977年   5篇
  1976年   2篇
  1974年   2篇
  1973年   5篇
  1967年   1篇
  1945年   1篇
排序方式: 共有3343条查询结果,搜索用时 156 毫秒
991.
The modular exponentiation operation of the current algorithms for asymmetric cryptography is the most expensive part in terms of computational cost. The RSA algorithm, for example, uses the modular exponentiation algorithm in encryption and decryption procedure. Thus, the overall performance of those asymmetric cryptosystems depends heavily on the performance of the specific algorithm used for modular exponentiation. This work proposes new parallel algorithms to perform this arithmetical operation and determines the optimal number of processors that yields the greatest speedup. The optimal number is obtained by balancing the processing load evenly among the processors. Practical implementations are also performed to evaluate the theoretical proposals.  相似文献   
992.
The phenomenon of birefringence may be observed when light arrives at an anisotropic crystal surface and refracts through it, causing the incident light ray to split into two rays; these become polarized in mutually orthogonal directions, and two images are formed. The principal goal of this paper is the study of the directional issues involved in the behavior of light when refracting through a homogeneous, non-participating medium, including both isotropic and anisotropic media (uniaxial and, for the first time, biaxial). The paper focuses on formulating and solving the non-linear algebraic system that is obtained when the refraction process is simulated using the geometric model of Huygens. The main contribution focuses on the case of biaxial media. In the case of uniaxial media, we rely on symbolic calculus techniques to formulate and solve the problem.  相似文献   
993.
994.
This paper proposes a new method to perform real-time face pose estimation for ± 90° yaw rotations and under low light conditions. The algorithm works on the basis of a completely automatic and run-time incremental 3D face modelling. The model is initially made up upon a set of 3D points derived from stereo grey-scale images. As new areas of the subject face appear to the cameras, new 3D points are automatically added to complete the model. In this way, we can estimate the pose for a wide range of rotation angles, where typically 3D frontal points are occluded.  相似文献   
995.
In peer-to-peer (P2P) networks, trust management is a key tool to minimize the impact of malicious nodes. EigenTrust is claimed to be one of the most powerful distributed reputation management systems focused on P2P file-sharing applications. It is the theoretical base of other systems, and it has also been directly modified in an attempt to improve its performance. However, none of them give appropriate importance to all the information about transactions. This paper proposes an enhancement of EigenTrust, which considers unsatisfactory transactions in greater depth. Pos&Neg EigenTrust is able to obtain a blacklist of the identities of the malicious nodes. Therefore, it is able to significantly reduce the number of unsatisfactory transactions in the network.  相似文献   
996.
Developing fraud management policies and fraud detection systems is a vital capability for financial institutions towards minimising the effect of fraud upon customer service delivery, bottom line financial losses and the adverse impact on the organisation’s brand image reputation. Rapidly changing attacks in real-time financial service platforms continue to demonstrate fraudster’s ability to actively re-engineer their methods in response to ad hoc security protocol deployments, and highlights the distinct gap between the speed of transaction execution within streaming financial data and corresponding fraud technology frameworks that safeguard the platform. This paper presents the design of FFML, a rule-based policy modelling language and encompassing architecture for facilitating the conceptual level expression and implementation of proactive fraud controls within multi-channel financial service platforms. It is demonstrated how a domain specific language can be used to abstract the financial platform into a data stream based information model to reduce policy modelling complexity and deployment latencies through an innovative policy mapping language usable by both expert and non-expert users. FFML is part of a comprehensive suite of assistive tools and knowledge-based systems developed to support fraud analysts’ daily work of designing new high level fraud management policies, mapping into executable code of the underpinning application programming interface and deployment of active monitoring and compliance functionality within the financial platform.  相似文献   
997.
This paper focuses on the robust stability analysis of the filtered Smith predictor (FSP) dead-time compensator for uncertain processes with time-varying delays. For this purpose, a delay-dependent LMI-based condition is used to compute a maximum delay interval and tolerance to model uncertainties such that the closed-loop system remains stable. Some simulation results illustrate that the proposed controller gives larger delays intervals or better performance than similar approaches proposed in literature applied both to stable and unstable processes.  相似文献   
998.
This paper presents the design, analysis, and performance evaluation of a novel cascade observer for attitude estimation. A sensor-based observer, which resorts to rate gyro readings and a set of vector observations, estimates the rate gyro bias. Afterwards, a cascaded observer explicitly estimates the attitude in the form of a rotation matrix based on the rate gyro measurements, the vector observations, and the estimated gyro bias. The overall error dynamics are globally exponentially stable and the proposed system is computationally efficient. Finally, the resulting estimator is successfully evaluated, in simulation and experimentally, with ground truth data in both cases.  相似文献   
999.
Multi-agent systems (MAS) are a relatively new software paradigm that is being widely accepted in several application domains to address large and complex tasks. However, with the use of MAS in open, distributed and heterogeneous applications, the security issues may endanger the success of the application. The goal of this research is to identify the security issues faced by MAS and to survey the current state of the art of this field of knowledge. In order to do it, this paper examines the basic concepts of security in computing, and some characteristics of agents and multi-agent systems that introduce new threats and ways to attack. After this, some models and architectures proposed in the literature are presented and analyzed.  相似文献   
1000.
The emerging use of real-time 3D-based multimedia applications imposes strict quality of service (QoS) requirements on both access and core networks. These requirements and their impact to provide end-to-end 3D videoconferencing services have been studied within the Spanish-funded VISION project, where different scenarios were implemented showing an agile stereoscopic video call that might be offered to the general public in the near future. In view of the requirements, we designed an integrated access and core converged network architecture which provides the requested QoS to end-to-end IP sessions. Novel functional blocks are proposed to control core optical networks, the functionality of the standard ones is redefined, and the signaling improved to better meet the requirements of future multimedia services. An experimental test-bed to assess the feasibility of the solution was also deployed. In such test-bed, set-up and release of end-to-end sessions meeting specific QoS requirements are shown and the impact of QoS degradation in terms of the user perceived quality degradation is quantified. In addition, scalability results show that the proposed signaling architecture is able to cope with large number of requests introducing almost negligible delay.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号