首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   186110篇
  免费   18891篇
  国内免费   10605篇
电工技术   12493篇
技术理论   16篇
综合类   14788篇
化学工业   29224篇
金属工艺   10427篇
机械仪表   11765篇
建筑科学   14563篇
矿业工程   5341篇
能源动力   5110篇
轻工业   16466篇
水利工程   4417篇
石油天然气   8743篇
武器工业   1996篇
无线电   22439篇
一般工业技术   20184篇
冶金工业   7997篇
原子能技术   2236篇
自动化技术   27401篇
  2024年   981篇
  2023年   3275篇
  2022年   6558篇
  2021年   8665篇
  2020年   6670篇
  2019年   5146篇
  2018年   5572篇
  2017年   6438篇
  2016年   5734篇
  2015年   8420篇
  2014年   10421篇
  2013年   12502篇
  2012年   13659篇
  2011年   14835篇
  2010年   13089篇
  2009年   12393篇
  2008年   12199篇
  2007年   11154篇
  2006年   10365篇
  2005年   8385篇
  2004年   5850篇
  2003年   4856篇
  2002年   4860篇
  2001年   4291篇
  2000年   3337篇
  1999年   3121篇
  1998年   2378篇
  1997年   1988篇
  1996年   1745篇
  1995年   1444篇
  1994年   1107篇
  1993年   911篇
  1992年   691篇
  1991年   561篇
  1990年   388篇
  1989年   343篇
  1988年   269篇
  1987年   165篇
  1986年   159篇
  1985年   117篇
  1984年   64篇
  1983年   64篇
  1982年   70篇
  1981年   59篇
  1980年   63篇
  1979年   43篇
  1977年   21篇
  1976年   22篇
  1973年   16篇
  1951年   25篇
排序方式: 共有10000条查询结果,搜索用时 71 毫秒
991.
介绍了一种串口/以太网嵌入式网关的设计方案,详细讨论了串口可靠通信的实现方法,并在开源操作系统RT-Thread和微处理器S3C2440开发板的软硬件平台上实现。网关实际应用于一个无线传感器网络项目,实验表明该网关能实现可靠的数据通信。  相似文献   
992.
本文提出一种负载均衡模型,此模型不仅考虑AP的信号强度,而且要考虑现有AP已接入无线工作站的数量还有连接质量因素。除此之外,还讨论了实现此模型的无线协议的扩充。  相似文献   
993.
This paper formulates and studies a model of complex dynamical networks with switching topology and coupling delays. Based on the hybrid control and Lyapunov function, the stability and robust H control of such networks with impulsive and switching effects, which have not been studied before, are addressed with some criteria derived. Examples are given to illustrate the effectiveness of the theoretical results. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   
994.
In this paper, we propose a framework for human action analysis from video footage. A video action sequence in our perspective is a dynamic structure of sparse local spatial–temporal patches termed action elements, so the problems of action analysis in video are carried out here based on the set of local characteristics as well as global shape of a prescribed action. We first detect a set of action elements that are the most compact entities of an action, then we extend the idea of Implicit Shape Model to space time, in order to properly integrate the spatial and temporal properties of these action elements. In particular, we consider two different recipes to construct action elements: one is to use a Sparse Bayesian Feature Classifier to choose action elements from all detected Spatial Temporal Interest Points, and is termed discriminative action elements. The other one detects affine invariant local features from the holistic Motion History Images, and picks up action elements according to their compactness scores, and is called generative action elements. Action elements detected from either way are then used to construct a voting space based on their local feature representations as well as their global configuration constraints. Our approach is evaluated in the two main contexts of current human action analysis challenges, action retrieval and action classification. Comprehensive experimental results show that our proposed framework marginally outperforms all existing state-of-the-arts techniques on a range of different datasets.  相似文献   
995.
Since Boolean network is a powerful tool in describing the genetic regulatory networks, accompanying the development of systems biology, the analysis and control of Boolean networks have attracted much attention from biologists, physicists, and systems scientists. From mathematical point of view, the dynamics of a Boolean (control) network is a discrete-time logical dynamic process. This paper surveys a recently developed technique, called the algebraic approach, based on semi-tensor product. The new technique can deal with not only Boolean networks, which allow each node to take two values, but also k-valued networks, which allow each node to take k different values, and mix-valued networks, which allow nodes to take different numbers of values.The paper provides a comprehensive introduction to the new technique, including (1) mathematical background of this new technique – semi-tensor product of matrices and the matrix expression of logic; (2) dynamic models of Boolean networks, and general (multi- or mix-valued) logical networks; (3) the topological structure of Boolean networks and general networks; (4) the basic control problems of Boolean/general control networks, which include the controllability, observability, realization, stability and stabilization, disturbance decoupling, identification and optimization, etc.; (5) some other related applications.  相似文献   
996.
P2P based live streaming has been gaining popularity. The new generation P2P live streaming systems not only attract a large number of viewers, but also support better video quality by streaming the content at higher bit-rate. In this paper, we propose a novel P2P streaming framework, called Hierarchically Clustered P2P Video Streaming, or HCPS, that can support the streaming rate approaching the optimal upper bound while accommodating large viewer population. The scalability comes with the hierarchical overlay architecture by grouping peers into clusters and forming a hierarchy among them. Peers are assigned to appropriate cluster so as to balance the bandwidth resources across clusters and maximize the supportable streaming rate. Furthermore, individual peers perform distributed queue-based scheduling algorithms to determine how to retrieve data chunks from source and neighboring peers, and how to utilize its uplink bandwidth to serve data chunks to other peers. We show that queue-based scheduling algorithms allow to fully utilize peers’ uplink bandwidths, and HCPS supports the streaming rate close to the optimum in practical network environment. The prototype of HCPS is implemented and various design issues/tradeoffs are investigated. Experiments over the PlanetLab further demonstrate the effectiveness of HCPS design.  相似文献   
997.
Cognitive Radio (CR), first proposed by Mitola, has the potential to improve spectrum utilization by allowing secondary transmission in licensed primary networks, as long as the secondary transmissions do not interfere with the operation of the primary users (PUs) in the primary network. Although it is fundamental to the viability of this burgeoning technology, security aspects of CR have so far received scant attention from researchers. Initial research on CR has largely focused on the issues of resource allocation, spectrum sensing and management while security considerations are often added as an afterthought. As a result, many proposed solutions for CR, have introduced significant security gaps, intensifying the effects of selfishness, inequity, unavailability, or even malicious behaviors. This has posed challenges to quality-of-service (QoS) provisioning in Cognitive Radio Network (CRN) in the face of various network attacks like node masquerading, packet mislabeling and deliberate packet dropping. Since existing routing protocols assume that nodes will forward packets in good faith, the presence of selfish nodes coupled with the dynamic behavior of PUs can lead to excessive packet losses, high delays or even the complete failure of routing protocols in secondary networks. In this paper, we propose a cross-layer Altruistic Differentiated Service Protocol (ADSP) for the dynamic CRNs to address the QoS provisioning issue in CRNs with selfish nodes coexistence. Simulation results demonstrate that the ADSP can achieve much better performance in terms of lower delay, higher throughput and better delivery ratio for the traffic originating from collaborative nodes compared to other cognitive routing protocols in the presence of selfish nodes.  相似文献   
998.
There are a lot of heterogeneous ontologies in semantic web, and the task of ontology mapping is to find their semantic relationship. There are integrated methods that only simply combine the similarity values which are used in current multi-strategy ontology mapping. The semantic information is not included in them and a lot of manual intervention is also needed, so it leads to that some factual mapping relations are missed. Addressing this issue, the work presented in this paper puts forward an ontology matching approach, which uses multi-strategy mapping technique to carry on similarity iterative computation and explores both linguistic and structural similarity. Our approach takes different similarities into one whole, as a similarity cube. By cutting operation, similarity vectors are obtained, which form the similarity space, and by this way, mapping discovery can be converted into binary classification. Support vector machine (SVM) has good generalization ability and can obtain best compromise between complexity of model and learning capability when solving small samples and the nonlinear problem. Because of the said reason, we employ SVM in our approach. For making full use of the information of ontology, our implementation and experimental results used a common dataset to demonstrate the effectiveness of the mapping approach. It ensures the recall ration while improving the quality of mapping results.  相似文献   
999.
在卫星观测中,经常由于各种原因导致短时间内无法提取目标卫星数据,使控制系统无法继续对其保持高精度跟踪和控制。文章主要研究ARIMA模型在卫星遥测数据短期预测中的应用。使用Matlab软件进行ARIMA模型参数计算,再使用SPSS软件执行数据预测,并进行残差分析,通过实例验证,短时期内的预测数据精度较高。  相似文献   
1000.
随着科技的快速发展,设备系统的复杂程度越来越高,多信号流模型是系统测试性分析的常用模型,为解决复杂系统建模分析时对其各分系统信息保密问题,提出了一种基于多信号流模型的模型封装与解包方法。该方法首先确定了封装模块数据信息并实现封装,然后构建封装模块测试信息描述表,描述了封装模块内部故障、内部测试与外部信息的关系以及封装模块本身对外部信息的影响,实现了模块的解包。实验表明,该描述方法可以有效地屏蔽了被封装的分系统模型的技术信息,有利于各分系统设计者之间的信息保密,同时利用该描述方法,还可以有效地减少测试性分析所需的时间。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号