首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   34459篇
  免费   3725篇
  国内免费   3666篇
电工技术   2737篇
技术理论   7篇
综合类   2894篇
化学工业   585篇
金属工艺   182篇
机械仪表   1027篇
建筑科学   1287篇
矿业工程   640篇
能源动力   463篇
轻工业   427篇
水利工程   506篇
石油天然气   242篇
武器工业   177篇
无线电   7291篇
一般工业技术   743篇
冶金工业   339篇
原子能技术   88篇
自动化技术   22215篇
  2024年   130篇
  2023年   429篇
  2022年   863篇
  2021年   1199篇
  2020年   1139篇
  2019年   821篇
  2018年   736篇
  2017年   864篇
  2016年   953篇
  2015年   1141篇
  2014年   2660篇
  2013年   2213篇
  2012年   2927篇
  2011年   3439篇
  2010年   2431篇
  2009年   2322篇
  2008年   2503篇
  2007年   2794篇
  2006年   2483篇
  2005年   2164篇
  2004年   1718篇
  2003年   1576篇
  2002年   1128篇
  2001年   765篇
  2000年   629篇
  1999年   474篇
  1998年   323篇
  1997年   235篇
  1996年   176篇
  1995年   118篇
  1994年   99篇
  1993年   74篇
  1992年   55篇
  1991年   29篇
  1990年   30篇
  1989年   30篇
  1988年   26篇
  1987年   9篇
  1986年   18篇
  1985年   25篇
  1984年   30篇
  1983年   24篇
  1982年   18篇
  1981年   8篇
  1980年   5篇
  1979年   4篇
  1977年   2篇
  1957年   1篇
  1956年   1篇
  1955年   1篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
Private information retrieval(PIR) is an important privacy protection issue of secure multi-party computation, but the PIR protocols based on classical cryptography are vulnerable because of new technologies,such as quantum computing and cloud computing. The quantum private queries(QPQ) protocols available, however, has a high complexity and is inefficient in the face of large database. This paper, based on the QKD technology which is mature now, proposes a novel QPQ protocol utilizing the key dilution and auxiliary parameter. Only N quits are required to be sent in the quantum channel to generate the raw key, then the straight k bits in the raw key are added bitwise to dilute the raw key, and a final key is consequently obtained to encrypt the database. By flexible adjusting of auxiliary parameters θ and k, privacy is secured and the query success ratio is improved. Feasibility and performance analyses indicate that the protocol has a high success ratio in first-trial query and is easy to implement, and that the communication complexity of O(N) is achieved.  相似文献   
2.
本文对运营商信息安全集中管控架构演进和信息安全管控策略面临的问题进行了深入分析,提出了信息安全集中管控架构的演进方向建议及对信息安全监控策略工作优化的若干意见。  相似文献   
3.
社会经济的快速发展促进了科学技术水平的显著提升,社会生产生活各个领域当中对计算机网络的应用程度不断提升,当前,网络已经成为了人们日常生活与工作的重要组成部分。为此,加强对网络安全等因素影响研究就显得格外重要。网络环境关系着用户的使用质量,更加影响人们的工作效率,加强对网络安全技术的研究时解决相关问题的核心内容。本文针对网络安全威胁因素以及常见的网络安全技术进行了简要分析。  相似文献   
4.
Online configuration of large-scale systems such as networks requires parameter optimization within a limited amount of time, especially when configuration is needed as a response to recover from a failure in the system. To quickly configure such systems in an online manner, we propose a Probabilistic Trans-Algorithmic Search (PTAS) framework which leverages multiple optimization search algorithms in an iterative manner. PTAS applies a search algorithm to determine how to best distribute available experiment budget among multiple optimization search algorithms. It allocates an experiment budget to each available search algorithm and observes its performance on the system-at-hand. PTAS then probabilistically reallocates the experiment budget for the next round proportional to each algorithm’s performance relative to the rest of the algorithms. This “roulette wheel” approach probabilistically favors the more successful algorithm in the next round. Following each round, the PTAS framework “transfers” the best result(s) among the individual algorithms, making our framework a trans-algorithmic one. PTAS thus aims to systematize how to “search for the best search” and hybridize a set of search algorithms to attain a better search. We use three individual search algorithms, i.e., Recursive Random Search (RRS) (Ye and Kalyanaraman, 2004), Simulated Annealing (SA) (Laarhoven and Aarts, 1987), and Genetic Algorithm (GA) (Goldberg, 1989), and compare PTAS against the performance of RRS, GA, and SA. We show the performance of PTAS on well-known benchmark objective functions including scenarios where the objective function changes in the middle of the optimization process. To illustrate applicability of our framework to automated network management, we apply PTAS on the problem of optimizing link weights of an intra-domain routing protocol on three different topologies obtained from the Rocketfuel dataset. We also apply PTAS on the problem of optimizing aggregate throughput of a wireless ad hoc network by tuning datarates of traffic sources. Our experiments show that PTAS successfully picks the best performing algorithm, RRS or GA, and allocates the time wisely. Further, our results show that PTAS’ performance is not transient and steadily improves as more time is available for search.  相似文献   
5.
Wireless Body Area Networks (WBANs) are envisaged to play crucial role in psychological, medical and non-medical applications. This paper presents iM-SIMPLE; a reliable, and power efficient routing protocol with high throughput for WBAN. We deploy sensor nodes on human body to measure the physiological parameters such as blood pressure, temperature, glucose, lactic acid, EMG, acceleration, pressure, and position. Data from sensors is forwarded to intermediate node, from where it is transmitted to sink. An end user can access the required information available at sink via internet. To minimize energy consumption of the network, we utilize multi-hop mode of communication. A cost function is introduced to select the forwarder; node with high residual energy and least distance to sink has minimum cost function value and is selected. Residual energy parameter balances the energy consumption among the sensor nodes, and least distance improves packet delivery to sink because of reduced less path loss. We formulate the minimum energy consumption and high throughput problems as an Integer Linear Program. In order to support mobility, we also consider two body postures. Simulation results confirm the performance advantage of iM-SIMPLE compared to contemporary schemes in terms of maximizing stability period and throughput of the network.  相似文献   
6.
姚琳元  宋飞  张宏科 《电子学报》2015,43(3):557-567
无源光网络(Passive Optical Network,PON)作为当今接入网的主要技术解决方案,具有带宽使用效率高、传输距离远、抗干扰能力强等特点.通过研究PON技术的发展动态,本文首先归纳了各种PON技术的产生背景和应用特点,整理出各技术间的连接关系及主要标准;其次介绍了PON技术的帧结构,并对带宽、波长、传输模式等PON技术的主要参数进行了汇总;然后将国内外研究热点进行划分,围绕媒体访问控制协议、帧结构、动态带宽分配算法、节能机制等关键技术,阐述了其研究现状及在PON中的重要作用;最后对PON技术的发展趋势进行了展望.  相似文献   
7.
This article sounds the alarm that a significant build-out of efficient lighting and renewable energy technologies may be endangered by shortages of rare earths and rare earth permanent magnets. At the moment, China is the predominant supplier of both and its recent rare earth industrial policies combined with its own growing demand for rare earths have caused widespread concern. To diversify supplies, new mining—outside of China—is needed. But what many observers of the “rare earth problem” overlook is that China also dominates in (1) the processing of rare earths, particularly the less abundant heavy rare earths, and (2) the supply chains for permanent magnets. Heavy rare earths and permanent magnets are critical for many renewable energy technologies, and it will require decades to develop new non-Chinese deposits, processing capacity, and supply chains. This article clarifies several misconceptions, evaluates frequently proposed solutions, and urges policy makers outside of China to undertake measures to avert a crisis, such as greater support for research and development and for the cultivation of intellectual capital.  相似文献   
8.
The influence of network density on the strain hardening behaviour of amorphous polymers is studied. The network density of polystyrene is altered by blending with poly(2,6-dimethyl-1,4-phenylene-oxide) and by cross-linking during polymerisation. The network density is derived from the rubber-plateau modulus determined by dynamic mechanical thermal analysis. Subsequently uniaxial compression tests are performed to obtain the intrinsic deformation behaviour and, in particular, the strain hardening modulus. At room temperature, the strain hardening modulus proves to be proportional to the network density, irrespective of the nature of the network, i.e. physical entanglements or chemical cross-links. With increasing temperature, the strain hardening modulus is observed to decrease. This decrease appears to be related to the influence of thermal mobility of the chains, determined by the distance to the glass-transition temperature (TTg).  相似文献   
9.
基于ISO/IEC17799标准建立了一个综合的信息系统风险分析框架,并运用模糊多准则决策(FMCDM)方法计算信息安全风险,根据风险等级矩阵(RLM)对信息资产风险进行级别划分,最终建立评估信息资产相关风险的完整模型。  相似文献   
10.
徐玉 《世界电信》2004,17(10):29-32
主要对各国3G许可证与使用技术标准的抽绑政策.各国对2G/3G网络漫游的管制规定。以及3G网络之间共享的种类及实施方式等方面做了详尽的讲解,并进行比较和分析。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号