首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   83837篇
  免费   8904篇
  国内免费   5718篇
电工技术   6300篇
技术理论   4篇
综合类   7085篇
化学工业   3456篇
金属工艺   4962篇
机械仪表   4967篇
建筑科学   1570篇
矿业工程   1101篇
能源动力   863篇
轻工业   884篇
水利工程   629篇
石油天然气   558篇
武器工业   926篇
无线电   31451篇
一般工业技术   6212篇
冶金工业   1844篇
原子能技术   506篇
自动化技术   25141篇
  2024年   455篇
  2023年   1382篇
  2022年   1826篇
  2021年   2296篇
  2020年   2420篇
  2019年   1910篇
  2018年   1855篇
  2017年   2501篇
  2016年   2744篇
  2015年   3254篇
  2014年   4855篇
  2013年   4780篇
  2012年   5832篇
  2011年   5973篇
  2010年   4596篇
  2009年   4788篇
  2008年   5428篇
  2007年   5884篇
  2006年   5196篇
  2005年   4607篇
  2004年   4054篇
  2003年   3742篇
  2002年   2983篇
  2001年   2637篇
  2000年   2176篇
  1999年   1861篇
  1998年   1444篇
  1997年   1327篇
  1996年   1164篇
  1995年   953篇
  1994年   844篇
  1993年   668篇
  1992年   495篇
  1991年   376篇
  1990年   267篇
  1989年   162篇
  1988年   119篇
  1987年   48篇
  1986年   46篇
  1985年   73篇
  1984年   78篇
  1983年   49篇
  1982年   66篇
  1981年   19篇
  1980年   19篇
  1979年   22篇
  1978年   22篇
  1977年   15篇
  1959年   14篇
  1955年   13篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
1.
介绍了目前最炙手可热的REST架构风格,该风格顺应Web2.0的兴起,完美的匹配了云计算时代来临的可扩展要求,在各种应用场景中都得到了充分的表现。根据其技术特点,分析了该风格的API在移动通信网络管理中的应用,从网管系统内部、网管系统之间以及网管系统与上层APP应用之间等多方面对是否适用于REST风格以及如何在合适的位置使用REST API进行了分析。  相似文献   
2.
针对传统移动代理(MA)在监测无线传感器网络(WSNs)的感兴趣信息时产生的延迟较大和能耗较多问题,提出了基于三维胞元空间的MA双向并行(3D-BPMA)路由算法.3D-BPMA将MA与传统的客户/服务器(c/S)模式相结合,在胞元内利用C/S模式搜集信息,在单层胞元系统和路由器与路由器之间采用MA双向并行的策略进行传输.仿真结果表明:3D-BPMA与LCF,DSG-MIP算法相比减少了平均响应时间和网络平均能耗,提高了MA发送率.  相似文献   
3.
现今国内的数字集群网络发展存在局限性、差异性,还远没有达到“网”状分布的程度,因此,共网数字集群发展空间巨大、前景广阔。通过列举共网数字集群系统在龙嘉国际机场和长春雷锋车队的成功应用案例,探讨了我国共网数字集群系统应用的可行性和必要性。  相似文献   
4.
Massive Open Online Courses (MOOCs) are becoming an essential source of information for both students and teachers. Noticeably, MOOCs have to adapt to the fast development of new technologies; they also have to satisfy the current generation of online students. The current MOOCs’ Management Systems, such as Coursera, Udacity, edX, etc., use content management platforms where content are organized in a hierarchical structure. We envision a new generation of MOOCs that support interpretability with formal semantics by using the SemanticWeb and the online social networks. Semantic technologies support more flexible information management than that offered by the current MOOCs’ platforms. Annotated information about courses, video lectures, assignments, students, teachers, etc., can be composed from heterogeneous sources, including contributions from the communities in the forum space. These annotations, combined with legacy data, build foundations for more efficient information discovery in MOOCs’ platforms. In this article we review various Collaborative Semantic Filtering technologies for building Semantic MOOCs’ management system, then, we present a prototype of a semantic middle-sized platform implemented at Western Kentucky University that answers these aforementioned requirements.  相似文献   
5.
6.
Evaluation of kinetic distribution and behaviors of nanoparticles in vivo provides crucial clues into their roles in living organisms. Extracellular vesicles are evolutionary conserved nanoparticles, known to play important biological functions in intercellular, inter‐species, and inter‐kingdom communication. In this study, the first kinetic analysis of the biodistribution of outer membrane vesicles (OMVs)—bacterial extracellular vesicles—with immune‐modulatory functions is performed. OMVs, injected intraperitoneally, spread to the whole mouse body and accumulate in the liver, lung, spleen, and kidney within 3 h of administration. As an early systemic inflammation response, increased levels of TNF‐α and IL‐6 are observed in serum and bronchoalveolar lavage fluid. In addition, the number of leukocytes and platelets in the blood is decreased. OMVs and cytokine concentrations, as well as body temperature are gradually decreased 6 h after OMV injection, in concomitance with the formation of eye exudates, and of an increase in ICAM‐1 levels in the lung. Following OMV elimination, most of the inflammatory signs are reverted, 12 h post‐injection. However, leukocytes in bronchoalveolar lavage fluid are increased as a late reaction. Taken together, these results suggest that OMVs are effective mediators of long distance communication in vivo.  相似文献   
7.
Private information retrieval(PIR) is an important privacy protection issue of secure multi-party computation, but the PIR protocols based on classical cryptography are vulnerable because of new technologies,such as quantum computing and cloud computing. The quantum private queries(QPQ) protocols available, however, has a high complexity and is inefficient in the face of large database. This paper, based on the QKD technology which is mature now, proposes a novel QPQ protocol utilizing the key dilution and auxiliary parameter. Only N quits are required to be sent in the quantum channel to generate the raw key, then the straight k bits in the raw key are added bitwise to dilute the raw key, and a final key is consequently obtained to encrypt the database. By flexible adjusting of auxiliary parameters θ and k, privacy is secured and the query success ratio is improved. Feasibility and performance analyses indicate that the protocol has a high success ratio in first-trial query and is easy to implement, and that the communication complexity of O(N) is achieved.  相似文献   
8.
We investigate the problem of efficient wireless power transfer in wireless sensor networks. In our approach, special mobile entities (called the Mobile Chargers) traverse the network and wirelessly replenish the energy of sensor nodes. In contrast to most current approaches, we envision methods that are distributed and use limited network information. We propose four new protocols for efficient charging, addressing key issues which we identify, most notably (i) what are good coordination procedures for the Mobile Chargers and (ii) what are good trajectories for the Mobile Chargers. Two of our protocols (DC, DCLK) perform distributed, limited network knowledge coordination and charging, while two others (CC, CCGK) perform centralized, global network knowledge coordination and charging. As detailed simulations demonstrate, one of our distributed protocols outperforms a known state of the art method, while its performance gets quite close to the performance of the powerful centralized global knowledge method.  相似文献   
9.
Social media-based screening is a well-known practice to both recruiters and job seekers. Little is known, however, about how job seekers present themselves on social media, i.e. ‘self-disclosure’, for employment purposes. This study builds on the theories of hyperpersonal computer-mediated communication, self-efficacy and social exchange to examine job seekers’ professional online image concerns, social media self-efficacy, and perceptions of social media effectiveness in the job search as predictors of inappropriate and career-oriented self-disclosures on these media. Findings from a sample of 3374 Italian respondents showed that career-oriented self-disclosure was predicted by all three factors, whereas inappropriate self-disclosure was only predicted by social media self-efficacy. Furthermore, the relationship between professional online image concerns and inappropriate self-disclosure was moderated by age, education and work experience, but not by gender. Theoretical and practical implications are discussed, and directions for future research are suggested.  相似文献   
10.
Sleep modes are widely accepted as an effective technique for energy-efficient networking: by adequately putting to sleep and waking up network resources according to traffic demands, a proportionality between energy consumption and network utilization can be approached, with important reductions in energy consumption. Previous studies have investigated and evaluated sleep modes for wireless access networks, computing variable percentages of energy savings. In this paper we characterize the maximum energy saving that can be achieved in a cellular wireless access network under a given performance constraint. In particular, our approach allows the derivation of realistic estimates of the energy-optimal density of base stations corresponding to a given user density, under a fixed performance constraint. Our results allow different sleep mode proposals to be measured against the maximum theoretically achievable improvement. We show, through numerical evaluation, the possible energy savings in today’s networks, and we further demonstrate that even with the development of highly energy-efficient hardware, a holistic approach incorporating system level techniques is essential to achieving maximum energy efficiency.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号