首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5866篇
  免费   855篇
  国内免费   798篇
电工技术   547篇
综合类   597篇
化学工业   187篇
金属工艺   52篇
机械仪表   248篇
建筑科学   507篇
矿业工程   91篇
能源动力   49篇
轻工业   71篇
水利工程   42篇
石油天然气   67篇
武器工业   43篇
无线电   1181篇
一般工业技术   268篇
冶金工业   81篇
原子能技术   16篇
自动化技术   3472篇
  2024年   33篇
  2023年   122篇
  2022年   184篇
  2021年   237篇
  2020年   258篇
  2019年   184篇
  2018年   175篇
  2017年   214篇
  2016年   236篇
  2015年   340篇
  2014年   521篇
  2013年   402篇
  2012年   576篇
  2011年   596篇
  2010年   464篇
  2009年   472篇
  2008年   457篇
  2007年   497篇
  2006年   330篇
  2005年   273篇
  2004年   205篇
  2003年   176篇
  2002年   122篇
  2001年   118篇
  2000年   72篇
  1999年   39篇
  1998年   37篇
  1997年   34篇
  1996年   19篇
  1995年   22篇
  1994年   21篇
  1993年   10篇
  1992年   6篇
  1991年   15篇
  1990年   10篇
  1989年   4篇
  1988年   7篇
  1987年   3篇
  1986年   4篇
  1985年   5篇
  1984年   6篇
  1983年   2篇
  1981年   2篇
  1980年   1篇
  1979年   2篇
  1978年   1篇
  1977年   1篇
  1971年   2篇
  1964年   1篇
  1956年   1篇
排序方式: 共有7519条查询结果,搜索用时 15 毫秒
1.
Mosquito-borne Zika virus (ZIKV) became a real threat to human health due to the lack of vaccine and effective antiviral treatment. The virus has recently been responsible for a global outbreak leading to millions of infected cases. ZIKV complications were highlighted in adults with Guillain–Barré syndrome and in newborns with increasing numbers of congenital disorders ranging from mild developmental delays to fatal conditions. The ability of ZIKV to establish a long-term infection in diverse organs including the kidneys has been recently documented but the consequences of such a viral infection are still debated. Our study aimed to determine whether the efficiency of ZIKV growth in kidney cells relates to glucose concentration. Human kidney HK-2 cells were infected with different ZIKV strains in presence of normal and high glucose concentrations. Virological assays showed a decrease in viral replication without modifying entry steps (viral binding, internalization, fusion) under high glucose conditions. This decrease replication was associated with a lower virus progeny and increased cell viability when compared to ZIKV-infected HK-2 cells in normal glucose concentration. In conclusion, we showed for the first time that an elevated glucose level influences ZIKV replication level with an effect on kidney cell survival.  相似文献   
2.
针对现有海量点云可视化方法存在索引构建时间长、内存占用大等问题,研究一种八叉树索引结合OSG分页结点的快速可视化方法,可在占用较小内存的基础上快速建立点云索引并实时调度。采用八叉树索引结构对海量点云进行数据组织,建立各层级的八叉树结点并以文件映射的方式分块保存,对结点文件重组织转换为支持OSG渲染引擎的多分辨率点云数据。采用基于OSG分页结点的实时调度技术,对海量点云进行高质量可视化。与目前两款主流的点云数据处理商业软件进行实验对比分析,结果表明所提方法具有索引建立速度快、内存占用小等优点,同时可视化交互更加流畅,适用于各种配置计算机下海量点云数据的调度管理与实时可视化。  相似文献   
3.
Intrusion Detection Networks (IDN) are distributed cyberdefense systems composed of different nodes performing local detection and filtering functions, as well as sharing information with other nodes in the IDN. The security and resilience of such cyberdefense systems are paramount, since an attacker will try to evade them or render them unusable before attacking the end systems. In this paper, we introduce a system model for IDN nodes in terms of their logical components, functions, and communication channels. This allows us to model different IDN node roles (e.g., detectors, filters, aggregators, correlators, etc.) and architectures (e.g., hierarchical, centralized, fully distributed, etc.). We then introduce a threat model that considers adversarial actions executed against particular IDN nodes, and also the propagation of such actions throughout connected nodes. Based on such models, we finally introduce a countermeasure allocation model based on a multi-objective optimization algorithm to obtain optimal allocation strategies that minimize both risk and cost. Our experimental results obtained through simulation with different IDN architectures illustrate the benefit of our framework to design and reconfigure cyberdefense systems optimally.  相似文献   
4.
Attribute Allocation and Retrieval Scheme for Large-Scale Sensor Networks   总被引:1,自引:0,他引:1  
Wireless sensor network is an emerging technology that enables remote monitoring of large geographical regions. In this paper, we address the problem of distributing attributes over such a large-scale sensor network so that the cost of data retrieval is minimized. The proposed scheme is a data-centric storage scheme where the attributes are distributed over the network depending on the correlations between them. The problem addressed here is similar to the Allocation Problem of distributed databases. In this paper, we have defined the Allocation Problem in the context of sensor networks and have proposed a scheme for finding a good distribution of attributes to the sensor network. We also propose an architecture for query processing given such a distribution of attributes. We analytically determine the conditions under which the proposed architecture is beneficial and present simulation results to demonstrate the same. To the best of our knowledge, this is the first attempt to determine an allocation of attributes over a sensor network based on the correlations between attributes.  相似文献   
5.
A real-time distributed database system (RTDDBS) must maintain the consistency constraints of objects and must also guarantee the time constraints imposed by each request arriving at the system. Such a time constraint of a request is usually defined as a deadline period, which means that the request must be serviced on or before its time constraint. Servicing these requests may incur I/O costs, control-message transferring costs or data-message transferring costs. As a result, in our work, we first present a mathematical model that considers all these costs. Using this cost model, our objective is to service all the requests on or before their respective deadline periods and minimize the total servicing cost. To this end, from theoretical standpoint, we design a dynamic object replication algorithm, referred to as Real-time distributed dynamic Window Mechanism (RDDWM), that adapts to the random patterns of read-write requests. Using competitive analysis, from practical perspective, we study the performance of RDDWM algorithm under two different extreme conditions, i.e., when the deadline period of each request is sufficiently long and when the deadline period of each request is very short. Several illustrative examples are provided for the ease of understanding. Recommended by: Ashfaq Khokhar  相似文献   
6.
介绍了文档数据库Lotus Domino/Notes的特点.对其文档处理的核心,即Notes文档的ID构成机制作了系统剖析.并在此基础上分析了如何在文档复制中运用ID的不同组件以及如何运用API程序访问文档ID等。  相似文献   
7.
Internally buffered multistage interconnection network architectures have been widely used in parallel computer systems and large switching fabrics. Migration from electrical domain to optical domain has raised the necessity of developing node architectures with optical buffers. Cascaded fibre delay line architectures can be seen as possible realizations of output and shared buffering in a 2 × 2‐switching element. These approaches can be used as buffered node architecture in a Banyan like interconnect. In this paper, we investigate and compare these approaches by using simulation methods. Different performance metrics, such as normalized throughput, average packet delay, packet loss rate and buffer utilization have been used under uniform and non‐uniform traffic models. Results show that the TC‐chain node Banyan network offer an improved normalized throughput and average packet delay performances under both traffic models without disrupting first‐in‐first‐out order of arrivals. The switched delay‐line requires fewer switching elements than TC and TTC architectures but at the cost of high packet delay. Copyright © 2004 John Wiley & Sons, Ltd.  相似文献   
8.
超媒体系统中的人工智能方法   总被引:3,自引:0,他引:3  
一、什么是超媒体近年来迅速崛起的多媒体(multimedia)技术,是一种使计算机具有交互式地综合处理和管理文字、图形、图象、声音、视频等多种媒体能力的技术,必将使计算机技术发生一  相似文献   
9.
单片机破解的常用方法及应对策略   总被引:2,自引:0,他引:2  
介绍了单片机内部密码破解的常用方法,重点说明了侵入型攻击/物理攻击方法的详细步骤,最后,从应用角度出发,提出了对付破解的几点建议。  相似文献   
10.
黄卷潜  李丽娟 《工程力学》2007,24(7):110-115
讨论了桥梁、工业厂房和大型公共建筑中较多采用的单层多跨刚架在移动荷载作用下影响量的计算方法。以工程中计算连续梁的一次力矩分配法的概念和思路为基础,建立了结构中杆端真实抗转刚度和结点转角传递的概念及其相应计算公式,提出了一种单层多跨刚架超静定结构影响量的精确计算方法。算例表明,该方法较之传统的计算方法简捷,且既便于手算,也利于编制通用程序用于电算。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号