首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1397篇
  免费   48篇
  国内免费   10篇
电工技术   47篇
综合类   7篇
化学工业   317篇
金属工艺   39篇
机械仪表   63篇
建筑科学   65篇
能源动力   112篇
轻工业   105篇
水利工程   12篇
石油天然气   16篇
无线电   119篇
一般工业技术   256篇
冶金工业   58篇
原子能技术   7篇
自动化技术   232篇
  2024年   9篇
  2023年   30篇
  2022年   37篇
  2021年   81篇
  2020年   80篇
  2019年   100篇
  2018年   105篇
  2017年   114篇
  2016年   90篇
  2015年   76篇
  2014年   92篇
  2013年   138篇
  2012年   82篇
  2011年   96篇
  2010年   67篇
  2009年   64篇
  2008年   42篇
  2007年   25篇
  2006年   20篇
  2005年   16篇
  2004年   10篇
  2003年   11篇
  2002年   8篇
  2001年   10篇
  2000年   5篇
  1999年   4篇
  1998年   4篇
  1997年   6篇
  1996年   2篇
  1995年   4篇
  1994年   5篇
  1992年   3篇
  1991年   1篇
  1990年   1篇
  1989年   1篇
  1988年   3篇
  1987年   4篇
  1986年   1篇
  1985年   1篇
  1982年   3篇
  1981年   1篇
  1980年   1篇
  1976年   2篇
排序方式: 共有1455条查询结果,搜索用时 0 毫秒
101.
The Journal of Supercomputing - With the expansion in the use of IoT, increasing the efficiency of these networks has become even more significant. Objects need reliable communications at suitable...  相似文献   
102.
Increasingly, software systems are constructed by integrating and composing multiple existing applications. The resulting complexity increases the need for self-management of the system. However, adding autonomic behavior to composite systems is difficult, especially when the constituent components are heterogeneous and they were not originally designed to support such interactions. Moreover, entangling the code for self-management with the code for the business logic of the original applications may actually increase the complexity of the systems, counter to the desired goal. In this paper, we address autonomization of composite systems that use CORBA, one of the first widely used middleware platforms introduced more than 17 years ago that is still commonly used in numerous systems. We propose a model, called Adaptive CORBA Template (ACT), that enables autonomic behavior to be added to CORBA applications automatically and transparently, that is, without requiring any modifications to the code implementing the business logic of the original applications. To do so, ACT uses “generic” interceptors, which are added to CORBA applications at startup time and enable autonomic behavior to be introduced later at runtime. We have developed ACT/J, a prototype of ACT in Java. We describe a case study in which ACT/J is used to introduce three types of autonomic behavior (self-healing, self-optimization, and self-configuration) to a distributed surveillance application.  相似文献   
103.
104.
Multimedia Tools and Applications - Constant increasing of visual information necessitates most efficient image compression schemes for saving storage space or reducing required transmission...  相似文献   
105.
The issue of exponential stability analysis of continuous‐time switched singular systems consisting of a family of stable and unstable subsystems with time‐varying delay is investigated in this paper. It is very difficult to analyze the stability of such systems because of the existence of time‐delay and unstable subsystems. In this regard, on the basis of the free‐weighting matrix approach, by constructing the new Lyapunov‐like Krasovskii functional, and using the average dwell‐time approach, delay‐dependent sufficient conditions are derived and formulated in terms of LMIs to check the exponential stability of such systems. This paper also highlights the relationship between the average dwell‐time of the switched singular time‐delay system, its stability, exponential convergence rate of differential states, and algebraic states. Finally, a numerical example is given to confirm the analytical results and illustrate the effectiveness of the proposed strategy. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   
106.
In order to evaluate performance of protocols for ad hoc networks, the protocols have to be tested under realistic conditions. These conditions may include a reasonable transmission range, a limited buffer size, and realistic movement of mobile users (mobility models). In this paper, we propose a new and realistic type of random mobility models in which the mobile node has to decelerate to reach the point of direction change and accelerates with a defined acceleration to reach its intended speed. This realistic mobility model is proposed based on random mobility models. In reality, mobile objects tend to change their speed when they are going to change their direction, i.e. decelerate when approaching a direction change point and accelerate when they start their movement in a new direction. Therefore, in this paper, we implement this behavior in random mobility models which lack such specification. In fact, this paper represents our effort to use this accelerated movement to anticipate a probable direction change of a mobile node with reasonable confidence. The simulation type of this paper is based on traces produced by a mobility trace generator tool. We use a data mining concept called association rule mining to find any possible correlations between accelerated movement of mobile node and the probability that mobile node wants to change its direction. We calculate confidence and lift parameters for this matter, and simulate this mobility model based on random mobility models. These simulations show a meaningful correlation between occurrence of an accelerated movement and event of mobile node's direction change.  相似文献   
107.
108.
Jun et al. (Bull Korean Math Soc 35(1):53–61, 1998) introduced the notion of associative filters in lattice implication algebra and studied some of its properties. In this paper, we show that there is no associative filter in lattice implication algebra.  相似文献   
109.
In cloud computing, services play key roles. Services are well defined and autonomous components. Nowadays, the demand of using Fuzzy inference as a service is increasing in the domain of complex and critical systems. In such systems, along with the development of the software, the cost of detecting and fixing software defects increases. Therefore, using formal methods, which provide clear, concise, and mathematical interpretation of the system, is crucial for the design of these Fuzzy systems. To obtain this goal, we introduce the Fuzzy Inference Cloud Service (FICS) and propose a novel discipline for formal modeling of the FICS. The FICS provides the service of Fuzzy inference to the consumers. We also introduce four novel formal verification tests, which allow strict analysis of certain behavioral disciplines in the FICS as follows: (1) Internal consistency, which analyzes the service in a strict and delicate manner; (2) Deadlock freeness; (3) Divergence freeness; and (4) Goal reach ability. The four tests are discussed and the FICS is verified to ensure that it can pass all these tests.  相似文献   
110.
In wireless ad hoc networks cooperation among nodes cannot always be assumed since nodes with limited resources and different owners are capable of making independent decisions. Cooperation problems in topology control and packet forwarding tasks have been mostly studied separately but these two tasks are not independent. Considering a joint cooperation problem by taking into account dependencies between tasks will result in more reliable and efficient networks. In this paper topology control definition is extended to cover cooperation problem in both packet forwarding and topology control in a single problem. In this definition nodes have to adjust their transmission power and decide on their relay role. This paper models the interactions of nodes as a potential game with two-dimensional utility function. The presented model, named TCFORCE (Topology Control packet FORwarding Cooperation Enforcement), preserves the network connectivity and reduces the energy consumption by providing cooperative paths between all pairs of nodes in the network.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号