首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   53267篇
  免费   4227篇
  国内免费   1987篇
电工技术   2778篇
技术理论   5篇
综合类   2994篇
化学工业   9231篇
金属工艺   3214篇
机械仪表   3232篇
建筑科学   3767篇
矿业工程   1732篇
能源动力   1689篇
轻工业   3764篇
水利工程   861篇
石油天然气   3722篇
武器工业   396篇
无线电   5769篇
一般工业技术   6397篇
冶金工业   2953篇
原子能技术   657篇
自动化技术   6320篇
  2024年   192篇
  2023年   849篇
  2022年   1468篇
  2021年   2270篇
  2020年   1648篇
  2019年   1425篇
  2018年   1623篇
  2017年   1763篇
  2016年   1575篇
  2015年   2083篇
  2014年   2683篇
  2013年   3102篇
  2012年   3311篇
  2011年   3616篇
  2010年   3207篇
  2009年   2877篇
  2008年   2822篇
  2007年   2740篇
  2006年   2896篇
  2005年   2483篇
  2004年   1553篇
  2003年   1354篇
  2002年   1279篇
  2001年   1004篇
  2000年   1203篇
  1999年   1480篇
  1998年   1177篇
  1997年   1009篇
  1996年   1009篇
  1995年   878篇
  1994年   699篇
  1993年   457篇
  1992年   370篇
  1991年   294篇
  1990年   238篇
  1989年   196篇
  1988年   172篇
  1987年   105篇
  1986年   89篇
  1985年   60篇
  1984年   52篇
  1983年   36篇
  1982年   32篇
  1981年   29篇
  1980年   17篇
  1979年   7篇
  1978年   7篇
  1977年   10篇
  1976年   14篇
  1975年   4篇
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
991.
In this paper, we focus on the need for secure and efficient localization for wireless sensor networks in adversarial settings. An attack-resistant and efficient localization scheme is developed, which extends the scheme proposed in [1]. The method offers strong defense against not only distance reduction attacks but also distance enlargement attacks. Furthermore, our method does not employ any device-dependent variables, hence yields more accurate localization. An attack-driven model is also specified using Petri net. It provides a formal method for the verification of our scheme when considering distance enlargement attacks. The state analysis shows that the potential insecure states are unreachable, implying that the model can offer strong defense against these attacks. To the best of our knowledge, it is the first time that the Petri net has been introduced to validate security scheme for wireless sensor networks in the literature.  相似文献   
992.
The robust stochastic stability, stabilization and H control for mode‐dependent time‐delay discrete Markovian jump singular systems with parameter uncertainties are discussed. Based on the restricted system equivalent (r.s.e.) transformation and by introducing new state vectors, the singular system is transformed into a standard linear system, and delay‐dependent linear matrix inequalities (LMIs) conditions for the mode‐dependent time‐delay discrete Markovian jump singular systems to be regular, causal and stochastically stable, and stochastically stable with γ‐disturbance attenuation are obtained, respectively. With these conditions, robust stabilization problem and robust H control problem are solved, and the LMIs sufficient conditions are obtained. A numerical example illustrates the effectiveness of the method given in the paper. Copyright © 2008 John Wiley & Sons, Ltd.  相似文献   
993.
As a fundamental component in wireless networks, location management consists of two operations: location update and paging. These two supplementary operations enable the mobile user ubiquitous mobility. However, in case of failed location update, a significant consequence is the obsolete location identity in the network databases and thereafter the incapability in establishing the valid route for the potential call connection, which will seriously degrade the network quality-of-service (QoS). This issue is not theoretically studied in the literature. In this paper, we perform a quantitative analysis of the location management effect on QoS in the wireless networks. The metrics call blocking probability and the average number of blocked calls are introduced to reflect the QoS. For the sake of general applicability, the performance metrics are formulated with the relaxed tele-traffic parameters. Namely, the call inter-arrival time, cell residence time, location area residence time and location update inter-arrival time follow a general probability density function. The formulae are additionally specified in the static and several dynamic location management mechanisms. Numerical examples are presented to show the interaction between the performance metrics and location management schemes. The discussions on the sensitivity of tele-parameters are also given.  相似文献   
994.
A cable-driven parallel manipulator is a manipulator whose end-effector is driven by a number of parallel cables instead of rigid links. Since cables always have more flexibility than rigid links, a cable manipulator bears a concern of possible vibration. Thus, investigation of vibration of cable manipulators caused by cable flexibility is important for applications requiring high system stiffness or bandwidth. This paper provides a vibration analysis of general 6-DOF cable-driven parallel manipulators. Based on the analysis of the natural frequencies of the multibody system, the study demonstrates that a cable manipulator can be designed stiff enough for special applications like the cable-manipulator based hardware-in-the-loop simulation of contact dynamics. Moreover, under an excitation, a cable may vibrate not only in its axial direction, but also in its transversal direction. The paper also analyzes the vibration of cable manipulators caused by cable flexibilities in both axial and transversal directions. It is shown that the vibration of a cable manipulator due to the transversal vibration of cables can be ignored comparing to that due to the axial flexibility of cables.  相似文献   
995.
Flexible-body modeling with geometric nonlinearities remains a hot topic of research by applications in multibody system dynamics undergoing large overall motions. However, the geometric nonlinear effects on the impact dynamics of flexible multibody systems have attracted significantly less attention. In this paper, a point-surface impact problem between a rigid ball and a pivoted flexible beam is investigated. The Hertzian contact law is used to describe the impact process, and the dynamic equations are formulated in the floating frame of reference using the assumed mode method. The two important geometric nonlinear effects of the flexible beam are taken into account, i.e., the longitudinal foreshortening effect due to the transverse deformation, and the stress stiffness effect due to the axial force. The simulation results show that good consistency can be obtained with the nonlinear finite element program ABAQUS/Explicit if proper geometric nonlinearities are included in the floating frame formulation. Specifically, only the foreshortening effect should be considered in a pure transverse impact for efficiency, while the stress stiffness effect should be further considered in an oblique case with much more computational effort. It also implies that the geometric nonlinear effects should be considered properly in the impact dynamic analysis of more general flexible multibody systems.  相似文献   
996.
The robust stability and robust stabilization for time‐delay discrete singular systems with parameter uncertainties is discussed. A delay‐dependent linear matrix inequality (LMI) condition for the time‐delay discrete systems to be nonsingular and stable is given. Based on this condition and the restricted system equivalent transformation, the delay‐dependent LMI condition is proposed for the time‐delay discrete singular systems to be admissible. With this condition, the problems of robust stability and robust stabilization are solved, and the delay‐dependent LMI conditions are obtained. Numerical examples illustrate the effectiveness of the method given in the paper. Copyright © 2009 John Wiley and Sons Asia Pte Ltd and Chinese Automatic Control Society  相似文献   
997.
一种基于多Agent的分布式入侵检测系统设计   总被引:1,自引:0,他引:1  
在分析现有基于Agent的入侵检测系统的基础上,提出了一种基于多Agent分布式入侵检测系统模型。该模型采用了分布检测、分布响应的模式,各Agent之间具有良好的相对独立性。通过多Agent技术的思想建立系统总体结构,给出了模型的各个组成部分,并对结构中各种Agent与中心控制台的功能设计进行了分析。同时对涉及到特征匹配算法、动态选举算法、协同算法进行了初步的设计与分析。系统可充分利用各Agent的协同完成入侵检测任务,实时响应,可有效地改进传统IDS。  相似文献   
998.
基于Windows系统的木马程序隐蔽行径分析   总被引:1,自引:1,他引:0  
文章介绍了特洛伊木马的基本概念、分类及特点。针对基于Windows系统的木马分别从木马运行形式、木马通信形式、木马启动方式、以及木马程序在宿主机磁盘上的隐蔽技术进行了分析,为已知和未知木马的防范和检测提供参考。  相似文献   
999.
In this paper, we provide an overview of challenges in mobile search and ranking, and envision the fundamental features that should be satisfied. We argue that two principles will help improve the relevance and quality of mobile search and ranking: the first one is to examine both intrinsic content features and context of items (usage statistics and social features, etc.); and the second one lies in that no algorithms can replace the objectivity of a human being—let users define the sites that they feel are relevant, leverage their social networks, and over time see their results become highly personalized. Specifically, wireless-virtualcommunity-based mobile search and ranking architecture is proposed in this paper, in which communities act as a first class abstraction for information sharing. Then, we introduce briefly the potential procedures of achieving high relevance and quality in mobile search and ranking based on wireless virtual community.  相似文献   
1000.
在Excel环境下,采用逐级计算法,模拟了逆流和错流两种工艺下水多级萃取甲苯 乙醚的理论级数、各级萃取相与萃余相浓度和萃取率,最终获得了两种工艺的优化溶剂比.优化的工艺结果是相对于错流操作,当逆流操作的实际溶剂比可取1.38倍最小溶剂比时,可提高萃取相浓度8.5百分点,降低萃取相流率约1/2,减少萃取剂用量2/3.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号