全文获取类型
收费全文 | 64168篇 |
免费 | 7713篇 |
国内免费 | 6025篇 |
专业分类
电工技术 | 5627篇 |
技术理论 | 2篇 |
综合类 | 6143篇 |
化学工业 | 4183篇 |
金属工艺 | 1249篇 |
机械仪表 | 3223篇 |
建筑科学 | 2958篇 |
矿业工程 | 1158篇 |
能源动力 | 1271篇 |
轻工业 | 2163篇 |
水利工程 | 982篇 |
石油天然气 | 1761篇 |
武器工业 | 787篇 |
无线电 | 11290篇 |
一般工业技术 | 4169篇 |
冶金工业 | 1732篇 |
原子能技术 | 642篇 |
自动化技术 | 28566篇 |
出版年
2024年 | 249篇 |
2023年 | 751篇 |
2022年 | 1487篇 |
2021年 | 1825篇 |
2020年 | 2072篇 |
2019年 | 1812篇 |
2018年 | 1669篇 |
2017年 | 2082篇 |
2016年 | 2307篇 |
2015年 | 2616篇 |
2014年 | 3940篇 |
2013年 | 4229篇 |
2012年 | 4726篇 |
2011年 | 5307篇 |
2010年 | 3893篇 |
2009年 | 3900篇 |
2008年 | 4095篇 |
2007年 | 4858篇 |
2006年 | 4352篇 |
2005年 | 3836篇 |
2004年 | 3114篇 |
2003年 | 2900篇 |
2002年 | 2398篇 |
2001年 | 1911篇 |
2000年 | 1605篇 |
1999年 | 1232篇 |
1998年 | 925篇 |
1997年 | 770篇 |
1996年 | 578篇 |
1995年 | 477篇 |
1994年 | 377篇 |
1993年 | 312篇 |
1992年 | 219篇 |
1991年 | 179篇 |
1990年 | 138篇 |
1989年 | 117篇 |
1988年 | 88篇 |
1987年 | 76篇 |
1986年 | 64篇 |
1985年 | 62篇 |
1984年 | 56篇 |
1983年 | 39篇 |
1982年 | 41篇 |
1981年 | 32篇 |
1980年 | 26篇 |
1979年 | 23篇 |
1978年 | 12篇 |
1977年 | 13篇 |
1964年 | 12篇 |
1956年 | 11篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
This article presents a new method for pairing devices securely. The commitment-based authentication uses a fuzzy secret that the devices only know approximately. Its novel feature is time-based opening of commitments in a single round. We also introduce a new source for the fuzzy secret: synchronized drawing with two fingers of the same hand on two touch screens or surfaces. The drawings are encoded as strings and compared with an edit-distance metric. A prototype implementation of this surprisingly simple and natural pairing mechanism shows that it accurately differentiates between true positives and man-in-the-middle attackers. 相似文献
2.
Computer-Supported Collaborative Learning (CSCL) is concerned with how Information and Communication Technology (ICT) might facilitate learning in groups which can be co-located or distributed over a network of computers such as Internet. CSCL supports effective learning by means of communication of ideas and information among learners, collaborative access of essential documents, and feedback from instructors and peers on learning activities. As the cloud technologies are increasingly becoming popular and collaborative learning is evolving, new directions for development of collaborative learning tools deployed on cloud are proposed. Development of such learning tools requires access to substantial data stored in the cloud. Ensuring efficient access to such data is hindered by the high latencies of wide-area networks underlying the cloud infrastructures. To improve learners’ experience by accelerating data access, important files can be replicated so a group of learners can access data from nearby locations. Since a cloud environment is highly dynamic, resource availability, network latency, and learner requests may change. In this paper, we present the advantages of collaborative learning and focus on the importance of data replication in the design of such a dynamic cloud-based system that a collaborative learning portal uses. To this end, we introduce a highly distributed replication technique that determines optimal data locations to improve access performance by minimizing replication overhead (access and update). The problem is formulated using dynamic programming. Experimental results demonstrate the usefulness of the proposed collaborative learning system used by institutions in geographically distributed locations. 相似文献
3.
We study a two-agent scheduling problem in a two-machine permutation flowshop with learning effects. The objective is to minimize the total completion time of the jobs from one agent, given that the maximum tardiness of the jobs from the other agent cannot exceed a bound. We provide a branch-and-bound algorithm for the problem. In addition, we present several genetic algorithms to obtain near-optimal solutions. Computational results indicate that the algorithms perform well in either solving the problem or efficiently generating near-optimal solutions. 相似文献
4.
Online configuration of large-scale systems such as networks requires parameter optimization within a limited amount of time, especially when configuration is needed as a response to recover from a failure in the system. To quickly configure such systems in an online manner, we propose a Probabilistic Trans-Algorithmic Search (PTAS) framework which leverages multiple optimization search algorithms in an iterative manner. PTAS applies a search algorithm to determine how to best distribute available experiment budget among multiple optimization search algorithms. It allocates an experiment budget to each available search algorithm and observes its performance on the system-at-hand. PTAS then probabilistically reallocates the experiment budget for the next round proportional to each algorithm’s performance relative to the rest of the algorithms. This “roulette wheel” approach probabilistically favors the more successful algorithm in the next round. Following each round, the PTAS framework “transfers” the best result(s) among the individual algorithms, making our framework a trans-algorithmic one. PTAS thus aims to systematize how to “search for the best search” and hybridize a set of search algorithms to attain a better search. We use three individual search algorithms, i.e., Recursive Random Search (RRS) (Ye and Kalyanaraman, 2004), Simulated Annealing (SA) (Laarhoven and Aarts, 1987), and Genetic Algorithm (GA) (Goldberg, 1989), and compare PTAS against the performance of RRS, GA, and SA. We show the performance of PTAS on well-known benchmark objective functions including scenarios where the objective function changes in the middle of the optimization process. To illustrate applicability of our framework to automated network management, we apply PTAS on the problem of optimizing link weights of an intra-domain routing protocol on three different topologies obtained from the Rocketfuel dataset. We also apply PTAS on the problem of optimizing aggregate throughput of a wireless ad hoc network by tuning datarates of traffic sources. Our experiments show that PTAS successfully picks the best performing algorithm, RRS or GA, and allocates the time wisely. Further, our results show that PTAS’ performance is not transient and steadily improves as more time is available for search. 相似文献
5.
6.
Wireless Body Area Networks (WBANs) are envisaged to play crucial role in psychological, medical and non-medical applications. This paper presents iM-SIMPLE; a reliable, and power efficient routing protocol with high throughput for WBAN. We deploy sensor nodes on human body to measure the physiological parameters such as blood pressure, temperature, glucose, lactic acid, EMG, acceleration, pressure, and position. Data from sensors is forwarded to intermediate node, from where it is transmitted to sink. An end user can access the required information available at sink via internet. To minimize energy consumption of the network, we utilize multi-hop mode of communication. A cost function is introduced to select the forwarder; node with high residual energy and least distance to sink has minimum cost function value and is selected. Residual energy parameter balances the energy consumption among the sensor nodes, and least distance improves packet delivery to sink because of reduced less path loss. We formulate the minimum energy consumption and high throughput problems as an Integer Linear Program. In order to support mobility, we also consider two body postures. Simulation results confirm the performance advantage of iM-SIMPLE compared to contemporary schemes in terms of maximizing stability period and throughput of the network. 相似文献
7.
It is the aim of this paper to examine the effects of conditioning time on the flotation of hematite using three technical grade fatty acid reagents as providing additional evidence on their mechanism of interaction with the hematite surface. Various mechanisms have been postulated as occurring as conditioning time is increased. Both physical (e.g. conditioning time and power input) and chemical (nature, dispersion and solubility of the adsorbing species) contribute to the mechanisms of attachment of collector. In this paper, the mechanism of attachment of oleate to hematite can be readily explained by chemisorption, but the mechanism of attachment of lauric acid appears to be physical adsorption at neutral pH. The flotation of hematite with a mixture of tallow-type fatty acids (palmitic, stearic and oleic acids) is very sensitive to conditioning time, and suggests that, even though flotation is very effective at short conditioning times, it is very susceptible to the presence of fines and their associated high surface areas. It is therefore obvious that both the physical and chemical conditions contribute to the mechanisms of adsorption of fatty acids on iron-containing oxide minerals and must be understood in order to optimise the flotation of these minerals in an industrial situation. 相似文献
8.
无源光网络(Passive Optical Network,PON)作为当今接入网的主要技术解决方案,具有带宽使用效率高、传输距离远、抗干扰能力强等特点.通过研究PON技术的发展动态,本文首先归纳了各种PON技术的产生背景和应用特点,整理出各技术间的连接关系及主要标准;其次介绍了PON技术的帧结构,并对带宽、波长、传输模式等PON技术的主要参数进行了汇总;然后将国内外研究热点进行划分,围绕媒体访问控制协议、帧结构、动态带宽分配算法、节能机制等关键技术,阐述了其研究现状及在PON中的重要作用;最后对PON技术的发展趋势进行了展望. 相似文献
9.
Many models of spoken word recognition posit the existence of lexical and sublexical representations, with excitatory and inhibitory mechanisms used to affect the activation levels of such representations. Bottom-up evidence provides excitatory input, and inhibition from phonetically similar representations leads to lexical competition. In such a system, long words should produce stronger lexical activation than short words, for 2 reasons: Long words provide more bottom-up evidence than short words, and short words are subject to greater inhibition due to the existence of more similar words. Four experiments provide evidence for this view. In addition, reaction-time-based partitioning of the data shows that long words generate greater activation that is available both earlier and for a longer time than is the case for short words. As a result, lexical influences on phoneme identification are extremely robust for long words but are quite fragile and condition-dependent for short words. Models of word recognition must consider words of all lengths to capture the true dynamics of lexical activation. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
10.
基于承包商预期收益不变的不平衡报价模型 总被引:1,自引:0,他引:1
在招标实践中,通常采用最低价中标原则,使得投标人不得不压低其投标价格。基于承包商预期收益不变的不平衡报价模型,是在“工程量清单报价”的条件下,考虑到施工中工程量的变化及施工顺序的影响,体现了资金的时间价值,在保持承包商预期收益不变的前提下,通过调整各分项工程的单价,来降低工程报价,以增加中标机会而建立的。所建立的模型简单,易于操作,并配以具体的工程实例,通过计算机求得其最优解,可供承包商投标报价时参考。 相似文献