首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1126篇
  免费   69篇
  国内免费   15篇
电工技术   25篇
综合类   4篇
化学工业   255篇
金属工艺   28篇
机械仪表   39篇
建筑科学   33篇
能源动力   84篇
轻工业   103篇
水利工程   3篇
石油天然气   4篇
武器工业   1篇
无线电   116篇
一般工业技术   284篇
冶金工业   66篇
原子能技术   22篇
自动化技术   143篇
  2023年   27篇
  2022年   77篇
  2021年   90篇
  2020年   67篇
  2019年   64篇
  2018年   80篇
  2017年   53篇
  2016年   71篇
  2015年   45篇
  2014年   56篇
  2013年   89篇
  2012年   50篇
  2011年   65篇
  2010年   33篇
  2009年   43篇
  2008年   31篇
  2007年   36篇
  2006年   21篇
  2005年   27篇
  2004年   11篇
  2003年   8篇
  2002年   5篇
  2001年   7篇
  2000年   6篇
  1999年   6篇
  1998年   19篇
  1997年   13篇
  1996年   8篇
  1995年   6篇
  1994年   12篇
  1993年   8篇
  1992年   3篇
  1991年   7篇
  1990年   5篇
  1989年   6篇
  1988年   3篇
  1987年   4篇
  1986年   2篇
  1985年   3篇
  1984年   3篇
  1983年   5篇
  1982年   2篇
  1981年   2篇
  1980年   4篇
  1979年   5篇
  1978年   8篇
  1977年   3篇
  1976年   4篇
  1974年   2篇
  1966年   1篇
排序方式: 共有1210条查询结果,搜索用时 0 毫秒
991.
Over the years, multihop Wireless Mesh Networks (WMNs) are providing cost effective services to the end users such as Video on demand (VoD), Voice over IP (VoIP), and Video conferencing in an efficient manner. Most of these services require an efficient service selection mechanism that can provide Quality of Service (QoS) in presence of various constraints such as delay, jitter, and service availability. In presence of these constraints, multi-constraint QoS aware service selection in WMNs is an NP-hard problem. In this paper, we propose an ant colony based multi constraints QoS aware service selection (QSS) algorithm. In the proposed algorithm, ants are launched from source node. The best path is chosen based upon the defined cost effective (CE) metric in presence of constraints. The constraints are chosen both from network and user perspectives. The goodness of the chosen path is determined by the CE metric. Moreover, ants are not launched randomly from the source node. They are launched based upon the guided search evaluation (GSE) criterion. This criterion is also used if the two paths have the same CE metric. The simulation results show that the proposed algorithm is more effective than the earlier improved ant colony QoS routing algorithm (IAQR) algorithm with respect to convergence, end-to-end delay (jitter), and service availability. Specifically, the service availability increases by 35–50% in the proposed QoS aware scheme compared to IAQR algorithm.  相似文献   
992.
A novel, carbon nanotube field effect transistor (CNTFET) based fully differential first order all pass filter (FDFAPF) circuit configuration is presented. The FDFAPF uses CNTFET based negative transconductors (NTs) and positive transconductors (PTs) in its realization. The proposed circuit topology employs two PTs, two NTs, two resistors and one capacitor. All the passive components of the realized topology are grounded. Active only fully differential first order all pass filter (AO-FDFAPF) topology is also derived from the proposed FDFAPF. The electronic tunability of the AO-FDFAPF is obtained by controlling the employed CNTFET based varactor. A tunabilty of pole frequency in the range of 10.5 to 26 GHz is obtained. Both the circuits are potential candidates for high frequency fully differential analog signal processing applications. As compared to prior state-of-the-art works, both the realized topologies have achieved highest pole frequency and lowest power dissipation. Moreover, they utilize compact circuit structures and suitable for low voltage applications. Moreover, both topologies work equally well in the deep submicron. The proposed filters are analyzed and verified through HPSPICE simulations by utilizing Stanford CNTFET model at 16 nm technology node. It is observed that the proposed circuit simulation outcomes verify the theory.  相似文献   
993.
The Journal of Supercomputing - Recently, Service-level agreement (SLA) is deemed to be an integral aspect for on-demand provisioning of scalable resources on Cloud. SLA defines important...  相似文献   
994.
A Bayesian game is a game of incomplete information in which the rules of the game are not fully known to all players. We consider the Bayesian game of Battle of Sexes that has several Bayesian Nash equilibria and investigate its outcome when the underlying probability set is obtained from generalized Einstein–Podolsky–Rosen experiments. We find that this probability set, which may become non-factorizable, results in a unique Bayesian Nash equilibrium of the game.  相似文献   
995.
In parallel adaptive mesh refinement (AMR) computations the problem size can vary significantly during a simulation. The goal here is to explore the performance implications of dynamically varying the number of processors proportional to the problem size during simulation. An emulator has been developed to assess the effects of this approach on parallel communication, parallel runtime and resource consumption. The computation and communication models used in the emulator are described in detail. Results using the emulator with different AMR strategies are described for a test case. Results show for the test case, varying the number of processors, on average, reduces the total parallel communications overhead from 16 to 19% and improves parallel runtime time from 4 to 8%. These results also show that on average resource utilization improves more than 37%.  相似文献   
996.
Various organizations collect data about individuals for various reasons, such as service improvement. In order to mine the collected data for useful information, data publishing has become a common practice among those organizations and data analysts, research institutes, or simply the general public. The quality of published data significantly affects the accuracy of the data analysis and thus affects decision making at the corporate level. In this study, we explore the research area of privacy-preserving data publishing, i.e., publishing high-quality data without compromising the privacy of the individuals whose data are being published. Syntactic privacy models, such as k-anonymity, impose syntactic privacy requirements and make certain assumptions about an adversary’s background knowledge. To address this shortcoming, we adopt differential privacy, a rigorous privacy model that is independent of any adversary’s knowledge and insensitive to the underlying data. The published data should preserve individuals’ privacy, yet remain useful for analysis. To maintain data utility, we propose DiffMulti, a workload-aware and differentially private algorithm that employs multidimensional generalization. We devise an efficient implementation to the proposed algorithm and use a real-life data set for experimental analysis. We evaluate the performance of our method in terms of data utility, efficiency, and scalability. When compared to closely related existing methods, DiffMulti significantly improved data utility, in some cases, by orders of magnitude.  相似文献   
997.
In the standard approach to quantum games, players’ strategic moves are local unitary transformations on an entangled state that is subsequently measured. Players’ payoffs are then obtained as expected values of the entries in the payoff matrix of the classical game on a set of quantum probabilities obtained from the quantum measurement. In this paper, we approach quantum games from a diametrically opposite perspective. We consider a classical three-player symmetric game along with a known expression for a set of quantum probabilities relevant to a tripartite Einstein–Podolsky–Rosen (EPR) experiment that depends on three players’ directional choices in the experiment. We define the players’ strategic moves as their directional choices in an EPR setting and then express their payoff relations in the resulting quantum game in terms of their directional choices, the entries of the payoff matrix, and the quantum probability distribution relevant to the tripartite EPR experiment.  相似文献   
998.
Shared ontologies describe concepts and relationships to resolve semantic conflicts amongst users accessing multiple autonomous and heterogeneous information sources. We contend that while ontologies are useful in semantic reconciliation, they do not guarantee correct classification of semantic conflicts, nor do they provide the capability to handle evolving semantics or a mechanism to support a dynamic reconciliation process. Their limitations are illustrated through a conceptual analysis of several prominent examples used in heterogeneous database systems and in natural language processing. We view semantic reconciliation as a nonmonotonic query-dependent process that requires flexible interpretation of query context, and as a mechanism to coordinate knowledge elicitation while constructing the query context. We propose a system that is based on these characteristics, namely the SCOPES (Semantic Coordinator Over Parallel Exploration Spaces) system. SCOPES takes advantage of ontologies to constrain exploration of a remote database during the incremental discovery and refinement of the context within which a query can be answered. It uses an Assumption-based Truth Maintenance System (ATMS) to manage the multiple plausible contexts which coexist while the semantic reconciliation process is unfolding, and the Dempster-Shafer (DS) theory of belief to model the likelihood of these plausible contexts.  相似文献   
999.
1000.
This paper addresses output-feedback-based distributed adaptive consensus control of multi-agent systems having Lipschitz nonlinear dynamics. Distributed dynamic protocols are designed based on the relative outputs of neighbouring agents and the adaptive coupling weights, under which consensus is reached between the nonlinear systems for all undirected connected communication topologies. Extension to the case of Lipschitz nonlinear multi-agent systems subjected to external disturbances is further studied, and a robust adaptive fully distributed consensus protocol is suggested. By application of a decoupling technique, necessary and sufficient conditions for the existence of these consensus protocols are provided in terms of linear matrix inequalities. Finally, numerical simulation results are demonstrated to validate the effectiveness of the theoretical results.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号