首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   21380篇
  免费   3088篇
  国内免费   1769篇
电工技术   6475篇
综合类   1978篇
化学工业   533篇
金属工艺   321篇
机械仪表   1165篇
建筑科学   584篇
矿业工程   639篇
能源动力   598篇
轻工业   271篇
水利工程   718篇
石油天然气   245篇
武器工业   163篇
无线电   2920篇
一般工业技术   681篇
冶金工业   603篇
原子能技术   72篇
自动化技术   8271篇
  2024年   47篇
  2023年   318篇
  2022年   554篇
  2021年   731篇
  2020年   787篇
  2019年   582篇
  2018年   495篇
  2017年   727篇
  2016年   743篇
  2015年   918篇
  2014年   1527篇
  2013年   1276篇
  2012年   1662篇
  2011年   1568篇
  2010年   1258篇
  2009年   1300篇
  2008年   1320篇
  2007年   1558篇
  2006年   1274篇
  2005年   1377篇
  2004年   1158篇
  2003年   996篇
  2002年   868篇
  2001年   713篇
  2000年   576篇
  1999年   440篇
  1998年   296篇
  1997年   218篇
  1996年   215篇
  1995年   183篇
  1994年   130篇
  1993年   100篇
  1992年   65篇
  1991年   49篇
  1990年   27篇
  1989年   30篇
  1988年   27篇
  1987年   15篇
  1986年   15篇
  1985年   16篇
  1984年   13篇
  1983年   14篇
  1982年   11篇
  1981年   8篇
  1980年   9篇
  1979年   10篇
  1978年   5篇
  1977年   3篇
  1957年   1篇
  1956年   1篇
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
1.
根据煤矿井下的安全防爆要求,天线的射频发射功率受到严格限制,导致煤矿5G的基站部署密度显著高于地面场景。为了解决由此引发的交叉覆盖问题,本文提出了煤矿5G分布式MIMO组网技术,利用分布在不同位置的天线实现对用户数据的联合并行发送,不仅避免了由交叉覆盖导致的乒乓切换等负面效应,还提升了边缘区域的信号覆盖效果。在乌兰木伦煤矿的300米采煤工作面内,利用分布式MIMO组网技术实现了5G信号的无边界覆盖,上行速率不低于500Mbps,保障了煤机数据的实时有效传输。  相似文献   
2.
互联网通讯采取标准化模式主要以TCP/IP协议为载体,通讯的优越特性体现在同时具备便捷性与开放性,为办公提供很大的便利,但基于网络系统也会入侵病毒、也会给信息数据与办公体系安全性造成威胁,直接影响企业综合稳定发展。据此,为保障办公工作的顺利开展,本文对计算机网络办公自动化及安全策略进行详细分析。  相似文献   
3.
针对分布式遥感编队中的协同观测问题,本文开展了多星协同姿态控制研究。首先建立了参考航天器由对日定向到对目标凝视观测的期望姿态,设计了基于姿态、角速度偏差的比例-微分(PD)控制器,证明了闭环系统的李雅普诺夫稳定性。在此基础上,进一步建立了伴飞航天器的期望姿态,为使目标在不同航天器像平面上成像位置匹配,以伴飞航天器、参考航天器的姿态之差为基础设计了伴飞航天器的PD控制器,证明了系统的稳定性。最后,将理论结果进行了仿真验证,结果显示伴飞航天器、参考航天器姿态控制误差小于0.01°,精度满足分布式遥感多星协同观测的任务需求。  相似文献   
4.
This paper investigates the state estimation issue for a class of wireless sensor networks (WSNs) with the consideration of limited energy resources. First, a multirate estimation model is established, and then, a new event‐triggered two‐stage information fusion algorithm is developed based on the optimal fusion criterion weighted by matrices. Compared with the existing methods, the presented fusion algorithm can significantly reduce the communication cost in WSNs and save energy resources of sensors efficiently. Furthermore, by presetting a desired containment probability over the interval [0,1] with the developed event‐triggered mechanism, one can obtain a suitable compromise between the communication cost and the estimation accuracy. Finally, a numerical simulation for the WSN tracking system is given to demonstrate the effectiveness of the proposed method.  相似文献   
5.
Smart home automation provides residents with relief and convenience in everyday life and allows for self-determined aging in place. Yet, market penetration is offset by user concerns related to privacy and trust issues: With increasing system complexity, users may perceive a loss of control and fear technical unreliability. While barriers to acceptance in terms of privacy and trust are well understood when considered separately, they are hardly investigated in conjunction so far. We conducted a quantitative study using Adaptive Choice-Based Conjoint Analysis via an online questionnaire. We explored how aspects of privacy and trust determine the willingness to use smart homes from the perspective of (future) users (n = 137, 18 to 64 years of age), and also with respect to the level of automation and application field. Results show that semi-automated systems are rather preferred than fully automated smart home technology. The perceived reliability of automation is the most important acceptance determinant, followed by the location of data storage. Whereas the awareness to use (e.g., recommendations), the type of data, and application field are less important factors for the overall willingness to use smart homes. Findings inform scientists in the field of human-automation interaction and technical developers of smart home automation for technology innovation adapted to user needs.  相似文献   
6.
Edge Computing is one of the radically evolving systems through generations as it is able to effectively meet the data saving standards of consumers, providers and the workers. Requisition for Edge Computing based items have been increasing tremendously. Apart from the advantages it holds, there remain lots of objections and restrictions, which hinders it from accomplishing the need of consumers all around the world. Some of the limitations are constraints on computing and hardware, functions and accessibility, remote administration and connectivity. There is also a backlog in security due to its inability to create a trust between devices involved in encryption and decryption. This is because security of data greatly depends upon faster encryption and decryption in order to transfer it. In addition, its devices are considerably exposed to side channel attacks, including Power Analysis attacks that are capable of overturning the process. Constrained space and the ability of it is one of the most challenging tasks. To prevail over from this issue we are proposing a Cryptographic Lightweight Encryption Algorithm with Dimensionality Reduction in Edge Computing. The t-Distributed Stochastic Neighbor Embedding is one of the efficient dimensionality reduction technique that greatly decreases the size of the non-linear data. The three dimensional image data obtained from the system, which are connected with it, are dimensionally reduced, and then lightweight encryption algorithm is employed. Hence, the security backlog can be solved effectively using this method.  相似文献   
7.
Radiation therapy is a technology-driven cancer treatment modality that has experienced significant advances over the last decades, due to multidisciplinary contributions that include engineering and computing. Recent technological developments allow the use of noncoplanar volumetric modulated arc therapy (VMAT), one of the most recent photon treatment techniques, in clinical practice. In this work, an automated noncoplanar arc trajectory optimization framework designed in two modular phases is presented. First, a noncoplanar beam angle optimization algorithm is used to obtain a set of noncoplanar irradiation directions. Then, anchored in these directions, an optimization strategy is proposed to compute an optimal arc trajectory. The computational experiments considered a pool of twelve difficult head-and-neck tumor cases. It was possible to observe that, for some of these cases, the optimized noncoplanar arc trajectories led to significant treatment planning quality improvements, when compared with coplanar VMAT treatment plans. Although these experiments were done in a research environment treatment planning software (matRad), the conclusions can be of interest for a clinical setting: automated procedures can simplify the current treatment workflow, produce high-quality treatment plans, making better use of human resources and allowing for unbiased comparisons between different treatment techniques.  相似文献   
8.
针对新闻文本领域,该文提出一种基于查询的自动文本摘要技术,更加有针对性地满足用户信息需求。根据句子的TF-IDF、与查询句的相似度等要素,计算句子权重,并根据句子指示的时间给定不同的时序权重系数,使得最近发生的新闻内容具有更高的权重,最后使用最大边界相关的方法选择摘要句。通过与基于TF-IDF、Text-Rank、LDA等六种方法的对比,该摘要方法ROUGE评测指标上优于其他方法。从结合评测结果及摘要示例可以看出,该文提出的方法可以有效地从新闻文档集中摘取核心信息,满足用户查询内容的信息需求。  相似文献   
9.
The operational environment can be a valuable source of information about the behavior of software applications and their usage context. Although a single instance of an application has limited evidence of the range of the possible behaviors and situations that might be experienced in the field, the collective knowledge composed by the evidence gathered by the many instances of a same application running in several diverse user environments (eg, a browser) might be an invaluable source of information. This information can be exploited by applications able to autonomously analyze how they behave in the field and adjust their behavior accordingly. Augmenting applications with the capability to collaborate and directly share information about their behavior is challenging because it requires the definition of a fully decentralized and dependable networked infrastructure whose nodes are the user machines. The nodes of the infrastructure must be collaborative, to share information, and autonomous, to exploit the available information to change their behavior, for instance, to better accommodate the needs of the users to prevent known problems. This paper describes the initial results that we obtained with the design and the development of an infrastructure that can enable the execution of collaborative scenarios in a fully decentralized way. Our idea is to combine the agent-based paradigm, which is well suited to design collaborative and autonomous nodes, and the peer-to-peer paradigm, which is well suited to design distributed and dynamic network infrastructures. To demonstrate our idea, we augmented the popular JADE agent-based platform with a software layer that supports both the creation of a fully decentralized peer-to-peer network of JADE platforms and the execution of services within that network, thus enabling JADE multiagent systems (MASs) to behave as peer-to-peer networks. The resulting platform can be used to study the design of collaborative applications running in the field.  相似文献   
10.
The scheduling problems under distributed production or flexible assembly settings have achieved increasing attention in recent years. This paper considers scheduling the integration of these two environments and proposes an original distributed flowshop scheduling problem with flexible assembly and set-up time. Distributed production stage is deployed several homogeneous flowshop factories that process the jobs to be assembled into final products in the flexible assembly stage. The objective is to find a schedule, including a production subschedule for jobs and an assembly subschedule for products, to minimise the makespan. Such a scheduling problem involves four successive decisions: assigning jobs to production factories, sequencing jobs at every factory, designating an assembly machine for each product and sequencing products on each assembly machine. The computational model is first established, and then a constructive heuristic (TPHS) and two hybrid metaheuristics (HVNS and HPSO) are proposed. Numerical experiments have been carried out and results validate the algorithmic feasibility and effectiveness. TPHS can obtain reasonable solutions in a shorter time, while metaheuristics can report better solutions using more yet acceptable time. HPSO is statistically comparable yet less robust compared with HVNS for small-scale instances. For the large-scale case, HPSO outperforms HVNS on both effectiveness and robustness.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号