首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2274篇
  免费   297篇
  国内免费   255篇
电工技术   208篇
综合类   257篇
化学工业   16篇
金属工艺   8篇
机械仪表   90篇
建筑科学   20篇
矿业工程   15篇
能源动力   8篇
轻工业   8篇
水利工程   30篇
石油天然气   9篇
武器工业   14篇
无线电   549篇
一般工业技术   47篇
冶金工业   44篇
原子能技术   9篇
自动化技术   1494篇
  2024年   9篇
  2023年   13篇
  2022年   36篇
  2021年   28篇
  2020年   46篇
  2019年   44篇
  2018年   50篇
  2017年   42篇
  2016年   61篇
  2015年   92篇
  2014年   129篇
  2013年   127篇
  2012年   172篇
  2011年   176篇
  2010年   139篇
  2009年   168篇
  2008年   202篇
  2007年   221篇
  2006年   185篇
  2005年   202篇
  2004年   159篇
  2003年   122篇
  2002年   112篇
  2001年   52篇
  2000年   57篇
  1999年   31篇
  1998年   29篇
  1997年   28篇
  1996年   25篇
  1995年   13篇
  1994年   12篇
  1993年   14篇
  1992年   4篇
  1991年   4篇
  1990年   5篇
  1989年   1篇
  1988年   5篇
  1986年   3篇
  1984年   3篇
  1982年   1篇
  1975年   1篇
  1966年   1篇
  1961年   1篇
  1959年   1篇
排序方式: 共有2826条查询结果,搜索用时 109 毫秒
1.
Text messages are characterised by a casual language style, ‘textese’ (e.g., c u on thurs). This study investigated adolescents’ perceptions of the use of different levels of textese in digital messages which varied in their intended recipient (friend, teacher). Grade 8 students in Australia (N = 90, aged 13–14 years) each read six text messages purportedly written by a fellow student, and rated the extent to which they agreed (on a 7-point Likert scale) that the message writer was intelligent, paid attention to detail, used an appropriate writing style, and was friendly. Overall, participants rated message senders most favourably on all measures when they used no textese, and least favourably when they used high levels of textese. This pattern was even stronger when messages were addressed to teachers rather than same-aged friends. The findings suggest that adolescents are sensitive to both writing style and recipient when considering digital messages.  相似文献   
2.
The healthcare system needs to track and monitor patients’ status and information. One of the most important requirements is that the patient is able to access the service anywhere at any time. Systems are being developed using the Internet to monitor patients’ status, and in some areas, especially rural areas and motorways, the Internet may not be available, even though the mobile network is available. In some cases, the network might be overloaded, so the patient information cannot be delivered to the hospital or medical centre. We propose a new method that uses the spare extension of the random access channel (RACH), which is carried by physical random access channel (PRACH) to send the patient information to the medical centre. We present the mathematical model of the channel and compare the results with another system from 3GPP to evaluate the results. The results show that the proposed method needs less time to transmit the patient’s information.  相似文献   
3.
针对软件定义网络中,控制器无法保证下发的网络策略能够在转发设备上得到正确执行的安全问题,提出一种新的转发路径监控安全方案。首先以控制器的全局视图能力为基础,设计了基于OpenFlow协议的路径凭据交互处理机制;然后采用哈希链和消息验证码作为生成和处理转发路径凭据信息的关键技术;最后在此基础上,对Ryu控制器和Open vSwitch开源交换机进行深度优化,添加相应处理流程,建立轻量级的路径安全机制。测试结果表明,该机制能够有效保证数据转发路径安全,吞吐量消耗比SDN数据层可信转发方案(SDNsec)降低20%以上,更适用于路径复杂的网络环境,但时延和CPU使用率的浮动超过15%,有待进一步优化。  相似文献   
4.
A log statement is one of the key tactics for a developer to record and monitor important run-time behaviors of our system in a development phase and a maintenance phase. It composes of a message for stating log contents, and a log level (eg, debug or warn) to denote the severity of a message and controlling its visibility at run time. In spite of its usefulness, a developer does not tend to deeply consider which log level is appropriate in writing source code, which causes the system to be unmaintainable. To address this issue, this paper proposes an automatic approach to validating the appropriateness of the log level in consideration of the semantic and syntactic features and recommending a proper alternative log level. We first build the semantic feature vector to quantify the semantic similarity among application log messages using the word vector space, and the syntactic feature vector to capture the application context that surrounds the log statement. Based on the feature vectors and machine learning techniques, the log level is automatically validated, and an alternative log level is recommended if the log level is invalid. For the evaluation, we collected 22 open-source projects from three application domains, and obtained the 77% of precision and 75% of recall in validating the log levels. Also, our approach showed 6% higher accuracy than that of the developer group who has 7 to 8 years of work experience, and 72% of the developers accepted our recommendation.  相似文献   
5.
对武器中火控系统应用惯性技术的原因、特点进行了简要的介绍,并对火控系统中的基准设备的配置方案进行了简单的介绍。  相似文献   
6.
提出一种基于GSM短消息的远程监测系统,应用于没有供电及有线通信条件下的天然气长输管道野外阀门井内管道压力和燃气泄漏情况的远程监测。在确定系统总体设计的基础上,设计了以GSM模块、单片机为核心的硬件系统和以数据采集、发送及处理为主的软件系统,充分考虑了野外供电和现场电气防爆问题。  相似文献   
7.
This paper deals with the issue of preparation of the aiming angles with the use of tabular firing tables and needed determination of the ballistic elements μB (ballistic wind wB Wxm WzB, ballistic (virtual) temperature τB, ballistic density ρB) from the standardized met messages. The weighting factors are used for the calculation of ballistic elementsμB that are incorporated into the trajectory calculations characteristics of weapon and ammunition. Two different methodologies practically used in the praxis are analysed and compared. For the comparison of the two methodologies the reference height of trajectory determined from the weighting factor functions is employed. On the basis of the analyses conducted, the potential for further increase in accuracy of these aiming angles preparation methods is pointed out.  相似文献   
8.
陈伟  陈先玉 《兵工自动化》2012,31(11):44-45
针对实时系统采用的FAT文件系统存在的写入速度慢和重复写入同一位置等问题,提出一种实时系统消息类数据存储方法。在分析存储系统特点的基础上,从文件结构、文件初始化、文件打开、消息写入和消息查询5个方面建立消息类数据存储方法。结果表明,该方法既能有效保存数据,又能保证系统实时性。  相似文献   
9.
Co-Drive on-board traffic information system is a complementary tool providing a dynamic management of transportation infrastructure and traffic as well as the diffusion of accurate real-time information about the road environment and motorists’ driving behaviour. The aim of this study was to examine drivers’ acceptability of Co-Drive by investigating the impact of traffic information provided via on-board display devices on motorists’ beliefs and behaviour.  相似文献   
10.
Olaf Ostwald 《Cryptologia》2017,41(5):395-421
“Breaking German Army Ciphers” is the title of a Cryptologia article from 2005, describing the lucky survival of several hundred authentic Enigma messages of World War II, and an account of a ciphertext-only cryptanalysis of a large number of these messages, leaving only a few (mostly short messages) unbroken. After reviewing the work done, and investigating the reasons for both lucky breaks and close misses, the modern ciphertext-only attack on Enigma messages is improved, especially on genuine ones with short lengths and/or many garbles. The difficulties of a proper measure for the candidate’s closeness to a plaintext are clarified. The influence on the decryption process of an empty plugboard and one with only a few correct plugs is examined. The method is extended by a partial exhaustion of the plugboard combined with an optimized hillclimbing strategy. The newly designed software succeeds in breaking formerly unbroken messages.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号