首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   36092篇
  免费   4978篇
  国内免费   4136篇
电工技术   2945篇
技术理论   9篇
综合类   3213篇
化学工业   573篇
金属工艺   172篇
机械仪表   991篇
建筑科学   1227篇
矿业工程   721篇
能源动力   497篇
轻工业   474篇
水利工程   646篇
石油天然气   289篇
武器工业   243篇
无线电   7575篇
一般工业技术   1185篇
冶金工业   312篇
原子能技术   98篇
自动化技术   24036篇
  2024年   287篇
  2023年   791篇
  2022年   1273篇
  2021年   1549篇
  2020年   1679篇
  2019年   1223篇
  2018年   1145篇
  2017年   1396篇
  2016年   1588篇
  2015年   1825篇
  2014年   3538篇
  2013年   2769篇
  2012年   3382篇
  2011年   3347篇
  2010年   2334篇
  2009年   2302篇
  2008年   2416篇
  2007年   2602篇
  2006年   2119篇
  2005年   1824篇
  2004年   1431篇
  2003年   1249篇
  2002年   814篇
  2001年   619篇
  2000年   433篇
  1999年   294篇
  1998年   194篇
  1997年   143篇
  1996年   128篇
  1995年   83篇
  1994年   84篇
  1993年   46篇
  1992年   52篇
  1991年   30篇
  1990年   27篇
  1989年   22篇
  1988年   21篇
  1987年   10篇
  1986年   15篇
  1985年   25篇
  1984年   22篇
  1983年   23篇
  1982年   14篇
  1981年   6篇
  1980年   6篇
  1979年   7篇
  1977年   4篇
  1976年   2篇
  1972年   2篇
  1959年   2篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
介绍了目前最炙手可热的REST架构风格,该风格顺应Web2.0的兴起,完美的匹配了云计算时代来临的可扩展要求,在各种应用场景中都得到了充分的表现。根据其技术特点,分析了该风格的API在移动通信网络管理中的应用,从网管系统内部、网管系统之间以及网管系统与上层APP应用之间等多方面对是否适用于REST风格以及如何在合适的位置使用REST API进行了分析。  相似文献   
2.
Private information retrieval(PIR) is an important privacy protection issue of secure multi-party computation, but the PIR protocols based on classical cryptography are vulnerable because of new technologies,such as quantum computing and cloud computing. The quantum private queries(QPQ) protocols available, however, has a high complexity and is inefficient in the face of large database. This paper, based on the QKD technology which is mature now, proposes a novel QPQ protocol utilizing the key dilution and auxiliary parameter. Only N quits are required to be sent in the quantum channel to generate the raw key, then the straight k bits in the raw key are added bitwise to dilute the raw key, and a final key is consequently obtained to encrypt the database. By flexible adjusting of auxiliary parameters θ and k, privacy is secured and the query success ratio is improved. Feasibility and performance analyses indicate that the protocol has a high success ratio in first-trial query and is easy to implement, and that the communication complexity of O(N) is achieved.  相似文献   
3.
This research proposes ACARDS (Augmented-Context bAsed RecommenDation Service) framework that is able to utilize knowledge over the Linked Open Data (LOD) cloud to recommend context-based services to users. To improve the level of user satisfaction with the result of the recommendation, the ACARDS framework implements a novel recommendation algorithm that can utilize the knowledge over the LOD cloud. In addition, the noble algorithm is able to use new concepts like the enriched tags and the augmented tags that originate from the hashtags on the SNSs materials. These tags are utilized to recommend the most appropriate services in the user’s context, which can change dynamically. Last but not least, the ACARDS framework implements the context-based reshaping algorithm on the augmented tag cloud. In the reshaping process, the ACARDS framework can recommend the highly receptive services in the users’ context and their preferences. To evaluate the performance of the ACARDS framework, we conduct four kinds of experiments using the Instagram materials and the LOD cloud. As a result, we proved that the ACARDS framework contributes to increasing the query efficiency by reducing the search space and improving the user satisfaction on the recommended services.  相似文献   
4.
本文对运营商信息安全集中管控架构演进和信息安全管控策略面临的问题进行了深入分析,提出了信息安全集中管控架构的演进方向建议及对信息安全监控策略工作优化的若干意见。  相似文献   
5.
Fault detection, isolation and optimal control have long been applied to industry. These techniques have proven various successful theoretical results and industrial applications. Fault diagnosis is considered as the merge of fault detection (that indicates if there is a fault) and fault isolation (that determines where the fault is), and it has important effects on the operation of complex dynamical systems specific to modern industry applications such as industrial electronics, business management systems, energy, and public sectors. Since the resources are always limited in real-world industrial applications, the solutions to optimally use them under various constraints are of high actuality. In this context, the optimal tuning of linear and nonlinear controllers is a systematic way to meet the performance specifications expressed as optimization problems that target the minimization of integral- or sum-type objective functions, where the tuning parameters of the controllers are the vector variables of the objective functions. The nature-inspired optimization algorithms give efficient solutions to such optimization problems. This paper presents an overview on recent developments in machine learning, data mining and evolving soft computing techniques for fault diagnosis and on nature-inspired optimal control. The generic theory is discussed along with illustrative industrial process applications that include a real liquid level control application, wind turbines and a nonlinear servo system. New research challenges with strong industrial impact are highlighted.  相似文献   
6.
Computer-Supported Collaborative Learning (CSCL) is concerned with how Information and Communication Technology (ICT) might facilitate learning in groups which can be co-located or distributed over a network of computers such as Internet. CSCL supports effective learning by means of communication of ideas and information among learners, collaborative access of essential documents, and feedback from instructors and peers on learning activities. As the cloud technologies are increasingly becoming popular and collaborative learning is evolving, new directions for development of collaborative learning tools deployed on cloud are proposed. Development of such learning tools requires access to substantial data stored in the cloud. Ensuring efficient access to such data is hindered by the high latencies of wide-area networks underlying the cloud infrastructures. To improve learners’ experience by accelerating data access, important files can be replicated so a group of learners can access data from nearby locations. Since a cloud environment is highly dynamic, resource availability, network latency, and learner requests may change. In this paper, we present the advantages of collaborative learning and focus on the importance of data replication in the design of such a dynamic cloud-based system that a collaborative learning portal uses. To this end, we introduce a highly distributed replication technique that determines optimal data locations to improve access performance by minimizing replication overhead (access and update). The problem is formulated using dynamic programming. Experimental results demonstrate the usefulness of the proposed collaborative learning system used by institutions in geographically distributed locations.  相似文献   
7.
Load testing of applications is an important and costly activity for software provider companies. Classical solutions are very difficult to set up statically, and their cost is prohibitive in terms of both human and hardware resources. Virtualized cloud computing platforms provide new opportunities for stressing an application's scalability, by providing a large range of flexible and less expensive (pay‐per‐use model) computation units. On the basis of these advantages, load testing solutions could be provided on demand in the cloud. This paper describes a Benchmark‐as‐a‐Service solution that automatically scales the load injection platform and facilitates its setup according to load profiles. Our approach is based on: (i) virtualization of the benchmarking platform to create self‐scaling injectors; (ii) online calibration to characterize the injector's capacity and impact on the benched application; and (iii) a provisioning solution to appropriately scale the load injection platform ahead of time. We also report experiments on a benchmark illustrating the benefits of this system in terms of cost and resource reductions. Copyright © 2013 John Wiley & Sons, Ltd.  相似文献   
8.
社会经济的快速发展促进了科学技术水平的显著提升,社会生产生活各个领域当中对计算机网络的应用程度不断提升,当前,网络已经成为了人们日常生活与工作的重要组成部分。为此,加强对网络安全等因素影响研究就显得格外重要。网络环境关系着用户的使用质量,更加影响人们的工作效率,加强对网络安全技术的研究时解决相关问题的核心内容。本文针对网络安全威胁因素以及常见的网络安全技术进行了简要分析。  相似文献   
9.
魏庆宾 《人民长江》2015,46(10):77-82
大坝运行监测易受自然环境和监测条件影响,存在时间和空间上的变异性,监测数据具有不确定性。以云理论的随机性和不确定性分析方法为基础,并与空间数据辐射思想相结合,建立了云滴概率密度分布估计模型,然后导出云概率密度分布函数,依据样本监测数据推求母体空间数据的分布特征,并设计了基于逆向云算法云变换的计算程序。分析陆浑水库1979~1999年测压管监测数据和位移变形数据的云概率密度分布特征和云数字特征,得出了20 a来大坝的数据分布特征和运行状态。监测数据分析结果表明,云概率密度分布估计不仅能有效合理地分析大坝的运行状态,而且能够依据云数字特征来判断监测状态和监测环境的异常变化。   相似文献   
10.
This article sounds the alarm that a significant build-out of efficient lighting and renewable energy technologies may be endangered by shortages of rare earths and rare earth permanent magnets. At the moment, China is the predominant supplier of both and its recent rare earth industrial policies combined with its own growing demand for rare earths have caused widespread concern. To diversify supplies, new mining—outside of China—is needed. But what many observers of the “rare earth problem” overlook is that China also dominates in (1) the processing of rare earths, particularly the less abundant heavy rare earths, and (2) the supply chains for permanent magnets. Heavy rare earths and permanent magnets are critical for many renewable energy technologies, and it will require decades to develop new non-Chinese deposits, processing capacity, and supply chains. This article clarifies several misconceptions, evaluates frequently proposed solutions, and urges policy makers outside of China to undertake measures to avert a crisis, such as greater support for research and development and for the cultivation of intellectual capital.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号