首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   24565篇
  免费   2853篇
  国内免费   2744篇
电工技术   1355篇
技术理论   14篇
综合类   3657篇
化学工业   397篇
金属工艺   151篇
机械仪表   1240篇
建筑科学   4590篇
矿业工程   223篇
能源动力   244篇
轻工业   204篇
水利工程   430篇
石油天然气   67篇
武器工业   102篇
无线电   3616篇
一般工业技术   2064篇
冶金工业   586篇
原子能技术   32篇
自动化技术   11190篇
  2024年   76篇
  2023年   372篇
  2022年   645篇
  2021年   722篇
  2020年   902篇
  2019年   720篇
  2018年   670篇
  2017年   840篇
  2016年   923篇
  2015年   1082篇
  2014年   1979篇
  2013年   2276篇
  2012年   2075篇
  2011年   2070篇
  2010年   1670篇
  2009年   1786篇
  2008年   1790篇
  2007年   1917篇
  2006年   1599篇
  2005年   1286篇
  2004年   1035篇
  2003年   795篇
  2002年   648篇
  2001年   496篇
  2000年   342篇
  1999年   288篇
  1998年   217篇
  1997年   182篇
  1996年   113篇
  1995年   124篇
  1994年   80篇
  1993年   56篇
  1992年   55篇
  1991年   42篇
  1990年   39篇
  1989年   30篇
  1988年   20篇
  1987年   10篇
  1986年   15篇
  1985年   23篇
  1984年   22篇
  1983年   18篇
  1982年   11篇
  1981年   10篇
  1980年   6篇
  1966年   6篇
  1965年   6篇
  1958年   6篇
  1957年   10篇
  1956年   5篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
Accurate and timely network traffic measurement is essential for network status monitoring, network fault analysis, network intrusion detection, and network security management. With the rapid development of the network, massive network traffic brings severe challenges to network traffic measurement. However, existing measurement methods suffer from many limitations for effectively recording and accurately analyzing big-volume traffic. Recently, sketches, a family of probabilistic data structures that employ hashing technology for summarizing traffic data, have been widely used to solve these problems. However, current literature still lacks a thorough review on sketch-based traffic measurement methods to offer a comprehensive insight on how to apply sketches for fulfilling various traffic measurement tasks. In this paper, we provide a detailed and comprehensive review on the applications of sketches in network traffic measurement. To this end, we classify the network traffic measurement tasks into four categories based on the target of traffic measurement, namely cardinality estimation, flow size estimation, change anomaly detection, and persistent spreader identification. First, we briefly introduce these four types of traffic measurement tasks and discuss the advantages of applying sketches. Then, we propose a series of requirements with regard to the applications of sketches in network traffic measurement. After that, we perform a fine-grained classification for each sketch-based measurement category according to the technologies applied on sketches. During the review, we evaluate the performance, advantages and disadvantages of current sketch-based traffic measurement methods based on the proposed requirements. Through the thorough review, we gain a number of valuable implications that can guide us to choose and design proper traffic measurement methods based on sketches. We also review a number of general sketches that are highly expected in modern network systems to simultaneously perform multiple traffic measurement tasks and discuss their performance based on the proposed requirements. Finally, through our serious review, we summarize a number of open issues and identify several promising research directions.  相似文献   
2.
Against the background of smart manufacturing and Industry 4.0, how to achieve real-time scheduling has become a problem to be solved. In this regard, automatic design for shop scheduling based on hyper-heuristics has been widely studied, and a number of reviews and scheduling algorithms have been presented. Few studies, however, have specifically discussed the technical points involved in algorithm development. This study, therefore, constructs a general framework for automatic design for shop scheduling strategies based on hyper-heuristics, and various state-of-the-art technical points in the development process are summarized. First, we summarize the existing types of shop scheduling strategies and classify them using a new classification method. Second, we summarize an automatic design algorithm for shop scheduling. Then, we investigate surrogate-assisted methods that are popular in the current algorithm field. Finally, current problems and challenges are discussed, and potential directions for future research are proposed.  相似文献   
3.
Five-axis machining plays an important role in manufacturing by dint of its high efficiency and accuracy. While two rotation axes benefit the flexibility of machining, it also brings limitations and challenges. In order to further balance machining precision and efficiency, an improved feedrate scheduling method is presented considering geometric error and kinematic constraints for the Non Uniform Rational B-Spline (NURBS) interpolation in five-axis machining. A simplification method is proposed to calculate the geometric error which describes the deviation between the ideal tool path and the real tool path induced by the non-linear movement. A linear relation between geometric error and feedrate is built to limit the feedrate. The constraints determined by single axis kinematic performance and tangential kinematic performance are also considered. Under these constraints, a constrained feedrate profile is determined. Aiming to get more constant feedrate in the difficult-to-machine areas, this work proposes a scheduling method which combines morphological filtering and S-shape acceleration/deceleration (acc/dec) mode. Simulations and experiments are performed to compare the proposed feedrate scheduling method with two previous feedrate scheduling method and the results prove that the proposed feedrate scheduling method is reliable and effective.  相似文献   
4.
The recent trend of integration among new network services such as the long-term evolution (LTE) based on internet protocol (IP) needs reputable analyses and prediction information on the internet traffic. The IP along with increased internet traffics due to expanding new service platforms such as smartphones will reflect policies such as network QoS according to new services. The establishment of monitoring methods and analysis plans is thus required for the development of internet traffics that will analyze their status and predict their future. The paper with the speed of Internet traffic model is developed for monitoring the state of the experiment and verified. The problem is that the proposed service Internet service provider (ISP) to resolve the conflict between the occurrences can be considerably Internet traffic and that the state of data may be helpful in understanding. The paper advancement policy to reflect the network traffic volume of Internet services and users irradiation with increased traffic due to the development and management of the analysis was carried out experimental measurements.  相似文献   
5.
Short-term generation scheduling is an important function in daily operational planning of power systems. It is defined as optimal scheduling of power generators over a scheduling period while respecting various generator constraints and system constraints. Objective of the problem includes costs associated with energy production, start-up cost and shut-down cost along with profits. The resulting problem is a large scale nonlinear mixed-integer optimization problem for which there is no exact solution technique available. The solution to the problem can be obtained only by complete enumeration, often at the cost of a prohibitively computation time requirement for realistic power systems. This paper presents a hybrid algorithm which combines Lagrangian Relaxation (LR) together with Evolutionary Algorithm (EA) to solve the problem in cooperative and competitive energy environments. Simulation studies were carried out on different systems containing various numbers of units. The outcomes from different algorithms are compared with that from the proposed hybrid algorithm and the advantages of the proposed algorithm are briefly discussed.  相似文献   
6.
带关键字搜索的公钥加密(PEKS)是一种有用的加密原语,它允许用户将在加密数据上搜索的功能委托给不可信的第三方服务器,而不影响原始数据的安全性和隐私性。但是,由于缺乏对于数据的加密以及解密能力,PEKS方案不能单独进行使用,必须与标准的公钥加密方案(PKE)相结合。因此,Baek等人在2006年引入了一种新的加密原语,称为结合PKE和PEKS的加密方案(PKE+PEKS),它同时提供了PKE和PEKS的功能。目前,已有文献提出了几种PKE+PEKS方案。然而,他们都没有考虑关键字猜测攻击的问题。本文提出一个新的高效且能够抵抗关键字猜测攻击的PKE+PEKS方案,与已有方案相比,该方案在性能上有很大的提升,并且在生成关键字和数据密文时,不需要使用双线性对,极大地降低了计算和存储成本。安全性分析表明,本文中所提出的方案能够满足密文隐私安全性、陷门不可区分性和抗关键字猜测攻击的安全性。效率分析表明,本分提出的方案更加高效。  相似文献   
7.
Few jurisdictions have translated internationally agreed social impact assessment (SIA) principles into statutory provisions. Governments and regulatory bodies tend to provide developers with high-level frameworks, or require that social impacts be ‘considered’, without specifying how this is to be done. In Australia, this lack of clarity leaves all parties uncertain about requirements for SIA. The New South Wales (NSW) Government’s 2017 release of the SIA guideline for State-significant mining, petroleum and extractive industry development represents an attempt to clarify requirements and provide guidance. In this paper, we describe the process of bringing this guideline to fruition from the perspective of being directly involved in its development, and highlight the challenges involved in integrating leading-practice principles into the state’s pre-existing policy framework. While the guideline represents a significant advance in policy-based SIA guidance, some aspects leave room for improvement. The real test of the guideline’s impact will lie in its influence on SIA practice in NSW, and ultimately in social outcomes for communities affected by resources projects.  相似文献   
8.
针对跨数据中心的资源调度问题,提出了一种基于组合双向拍卖(PCDA)的资源调度方案。首先,将云资源拍卖分为三个部分:云用户代理报价、云资源提供商要价、拍卖代理组织拍卖;其次,在定义用户的优先级及任务紧迫度的基础上,在拍卖过程中估算每一个工作发生的服务等级协议(SLA)违规并以此计算云提供商的收益,同时每轮竞拍允许成交多项交易;最终达到根据用户等级合理分配云资源调度的效果。仿真实验结果表明该算法保证了竞拍成功率,与传统一次拍卖成交一项的组合双向拍卖方案相比,PCDA在竞拍时间段产生的能耗降低了35.00%,拍卖云提供商的利润提高了约38.84%。  相似文献   
9.
The integration of planning and scheduling decisions in rigorous mathematical models usually results in large scale problems. In order to tackle the problem complexity, decomposition techniques based on duality and information flows between a master and a set of subproblems are widely applied. In this sense, ontologies improve information sharing and communication in enterprises and can even represent holistic mathematical models facilitating the use of analytic tools and providing higher flexibility for model building. In this work, we exploit this ontologies’ capability to address the optimal integration of planning and scheduling using a Lagrangian decomposition approach. Scheduling/planning sub-problems are created for each facility/supply chain entity and their dual solution information is shared by means of the ontological framework. Two case studies based on a STN representation of supply chain planning and scheduling models are presented to emphasize the advantages and limitations of the proposed approach.  相似文献   
10.
Drunk drivers are a menace to themselves and to other road users, as drunk driving significantly increases the risk of involvement in road accidents and the probability of severe or fatal injuries. Although injuries and fatalities related to road accidents have decreased in recent decades, the prevalence of drunk driving among drivers killed in road accidents has remained stable, at around 25% or more during the past 10 years. Understanding drunk driving, and in particular, recidivism, is essential for designing effective countermeasures, and accordingly, the present study aims at identifying the differences between non-drunk drivers, drunk driving non-recidivists and drunk driving recidivists with respect to their demographic and socio-economic characteristics, road accident involvement and other traffic and non-traffic-related law violations. This study is based on register-data from Statistics Denmark and includes information from 2008 to 2012 for the entire population, aged 18 or older, of Denmark. The results from univariate and multivariate statistical analyses reveal a five year prevalence of 17% for drunk driving recidivism, and a significant relation between recidivism and the drunk drivers’ gender, age, income, education, receipt of an early retirement pension, household type, and residential area. Moreover, recidivists are found to have a higher involvement in alcohol-related road accidents, as well as other traffic and, in particular, non-traffic-related offences. These findings indicate that drunk driving recidivism is more likely to occur among persons who are in situations of socio-economic disadvantage and marginalisation. Thus, to increase their effectiveness, preventive measures aiming to reduce drunk driving should also address issues related to the general life situations of the drunk driving recidivists that contribute to an increased risk of drunk driving recidivism.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号