首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   76744篇
  免费   5960篇
  国内免费   3139篇
电工技术   3846篇
技术理论   10篇
综合类   4549篇
化学工业   13409篇
金属工艺   4229篇
机械仪表   4806篇
建筑科学   6488篇
矿业工程   2186篇
能源动力   2233篇
轻工业   4989篇
水利工程   1286篇
石油天然气   4761篇
武器工业   603篇
无线电   8760篇
一般工业技术   9645篇
冶金工业   3863篇
原子能技术   874篇
自动化技术   9306篇
  2024年   288篇
  2023年   1226篇
  2022年   2134篇
  2021年   2869篇
  2020年   2268篇
  2019年   1952篇
  2018年   2145篇
  2017年   2468篇
  2016年   2231篇
  2015年   2992篇
  2014年   3613篇
  2013年   4325篇
  2012年   4743篇
  2011年   5061篇
  2010年   4373篇
  2009年   4089篇
  2008年   4030篇
  2007年   3986篇
  2006年   4188篇
  2005年   3614篇
  2004年   2528篇
  2003年   2186篇
  2002年   2105篇
  2001年   1872篇
  2000年   1929篇
  1999年   2189篇
  1998年   1939篇
  1997年   1575篇
  1996年   1512篇
  1995年   1156篇
  1994年   1076篇
  1993年   747篇
  1992年   582篇
  1991年   462篇
  1990年   346篇
  1989年   275篇
  1988年   251篇
  1987年   155篇
  1986年   115篇
  1985年   80篇
  1984年   40篇
  1983年   37篇
  1982年   41篇
  1981年   22篇
  1980年   18篇
  1979年   5篇
  1978年   1篇
  1976年   1篇
  1959年   2篇
  1951年   1篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
991.
基于虚拟模糊集的PID参数整定器的仿真研究   总被引:1,自引:0,他引:1  
该文中给出的模糊整定器是在虚拟模糊集概念的基础上实现的。该方法首先根据Z-N整规则,按照过程的开环阶跃响应设置初始参数,然后基于闭环控制系统的响应特性,利用模糊系统精确整定控制器参数。模糊控制规则知识库由整定知识和专家经验规则构成。其中整定知识可通过对一典型过程的参数整定来自动提取。最后给出的数字仿真结果证明该方法的有效性。  相似文献   
992.
该文根据弹道理论建立了雷则弹道导弹的仿真模型,并对雷达跟踪的导弹弹道数据进行了处理,预报了它的落点范围,并与理论落点进行比较,给出了落点精度。仿真结果表明:雷达对导弹的探测数据经过一数据处理,所得到的落点比较精确。  相似文献   
993.
IP spoofing hinders the efficiency of DDoS defenses. While recent proposals of IP spoofing prevention mechanisms are weak at filtering spoofing packets due to the complexity in maintaining source IP spaces and the low incentive of deployments. To address this problem, we propose an efficient mechanism to extend the range of inter-domain IP spoofing prevention called MASK. Source MASK nodes inform destination MASK nodes about the source IP spaces and labels of their neighbor Stub-ASes in order to implement the marking and verification of packets towards the Stub-ASes, and limit the number of MASK peers through the propagation of BGP updates so as to reduce the overheads of computing and storing of labels. By utilizing the method of extending the spoofing prevention to Stub-ASes, MASK can not only enlarge the domain of the spoofing prevention service, but also filter spoofing packets in advance. Through analysis and simulations, we demonstrate MASK's accuracy and effectiveness.  相似文献   
994.
文中论述了P2P技术的概念、结构和应用,以及P2P标准化的推进,对P2P技术的发展进行了展望。  相似文献   
995.
Broadcast-based peer-to-peer (P2P) networks, including flat (for example, Gnutella) and two-layer superpeer implementations (for example, Kazaa), are extremely popular nowadays due to their simplicity, ease of deployment, and versatility. The unstructured network topology, however, contains many cyclic paths, which introduce numerous duplicate messages in the system. Although such messages can be identified and ignored, they still consume a large proportion of the bandwidth and other resources, causing bottlenecks in the entire network. In this paper, we describe the distributed cycle minimization protocol (DCMP), a dynamic fully decentralized protocol that significantly reduces the duplicate messages by eliminating unnecessary cycles. As queries are transmitted through the peers, DCMP identifies the problematic paths and attempts to break the cycles while maintaining the connectivity of the network. In order to preserve the fault resilience and load balancing properties of unstructured P2P systems, DCMP avoids creating a hierarchical organization. Instead, it applies cycle elimination symmetrically around some powerful peers to keep the average path length small. The overall structure is constructed fast with very low overhead. With the information collected during this process, distributed maintenance is performed efficiently even if peers quit the system without notification. The experimental results from our simulator and the prototype implementation on PlanetLab confirm that DCMP significantly improves the scalability of unstructured P2P systems without sacrificing their desirable properties. Moreover, due to its simplicity, DCMP can be easily implemented in various existing P2P systems and is orthogonal to the search algorithms.  相似文献   
996.
An efficient and distributed scheme for file mapping or file lookup is critical in decentralizing metadata management within a group of metadata servers. This paper presents a novel technique called Hierarchical Bloom Filter Arrays (HBA) to map filenames to the metadata servers holding their metadata. Two levels of probabilistic arrays, namely, the Bloom filter arrays with different levels of accuracies, are used on each metadata server. One array, with lower accuracy and representing the distribution of the entire metadata, trades accuracy for significantly reduced memory overhead, whereas the other array, with higher accuracy, caches partial distribution information and exploits the temporal locality of file access patterns. Both arrays are replicated to all metadata servers to support fast local lookups. We evaluate HBA through extensive trace-driven simulations and implementation in Linux. Simulation results show our HBA design to be highly effective and efficient in improving the performance and scalability of file systems in clusters with 1,000 to 10,000 nodes (or superclusters) and with the amount of data in the petabyte scale or higher. Our implementation indicates that HBA can reduce the metadata operation time of a single-metadata-server architecture by a factor of up to 43.9 when the system is configured with 16 metadata servers.  相似文献   
997.
In the paper, we prove that is compatible with p}, the set of commutant of p, and , the projection commutant of a, are all normal sub-effect algebras of a compressible effect algebra E, and is a direct retraction on E} is a normal sub-effect algebra of an effect algebra E. Moreover, we answer an open question in Gudder’s (Rep Math Phys 54:93–114, 2004), Compressible effect algebras, Rep Math Phys, by showing that the cartesian product of an infinite number of E i is a compressible effect algebra if and only if each E i is a compressible effect algebra. This work was supported by the SF of Education Department of Shaanxi Province (Grant No. 07JK267), P. R. China.  相似文献   
998.
In a large-scale mobile gaming environment with limited wireless network bandwidth, efficient mechanisms for state update are crucial to allow graceful real-time interaction for a large number of players. By using the state updating threshold as a key parameter that bridges the resulting state distortion and the network traffic, we are able to study the fundamental traffic-distortion tradeoffs via both theoretical modeling and numerical analysis using real game traces. We consider a WiMAX link model, where the bandwidth allocation is driven by the underlying physical layer link quality as well as application layer gaming behaviors. Such a cross-layer optimization problem can be solved using standard convex programming techniques. By exploring the temporal locality of gaming behavior, we also propose a prediction method for on-line bandwidth adaptation. Using real data traces from a multiplayer driving game, TORCS, the proposed network-aware bandwidth allocation method (NABA) is able to achieve significant reduction in state distortion compared to two baselines: uniform and proportional policies.  相似文献   
999.
基于SOPC技术的校园信息显示系统   总被引:1,自引:0,他引:1  
可编程片上系统SOPC是Altera公司近年来提出的一种灵活、高效的片上系统解决方案.介绍以液晶显示模块LCD为系统主要外设,利用SOPC技术实现校园信息显示系统的软、硬件设计思路,给出汉字与图形综合显示的软件设计的主要程序,对于SOPC系统的研究、开发具有较好的工程应用与参考价值.  相似文献   
1000.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号