首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   115206篇
  免费   4023篇
  国内免费   1900篇
电工技术   3044篇
技术理论   1篇
综合类   4281篇
化学工业   16758篇
金属工艺   6569篇
机械仪表   5011篇
建筑科学   4692篇
矿业工程   1540篇
能源动力   2007篇
轻工业   5958篇
水利工程   1855篇
石油天然气   2017篇
武器工业   272篇
无线电   13117篇
一般工业技术   20231篇
冶金工业   3970篇
原子能技术   665篇
自动化技术   29141篇
  2024年   179篇
  2023年   653篇
  2022年   1288篇
  2021年   1536篇
  2020年   1196篇
  2019年   980篇
  2018年   15392篇
  2017年   14474篇
  2016年   10863篇
  2015年   1974篇
  2014年   1951篇
  2013年   2084篇
  2012年   5182篇
  2011年   11475篇
  2010年   10045篇
  2009年   7314篇
  2008年   8512篇
  2007年   9315篇
  2006年   1758篇
  2005年   2539篇
  2004年   1998篇
  2003年   2056篇
  2002年   1366篇
  2001年   826篇
  2000年   918篇
  1999年   856篇
  1998年   694篇
  1997年   580篇
  1996年   522篇
  1995年   443篇
  1994年   333篇
  1993年   255篇
  1992年   239篇
  1991年   168篇
  1990年   128篇
  1989年   115篇
  1988年   93篇
  1987年   52篇
  1985年   35篇
  1968年   43篇
  1967年   33篇
  1966年   42篇
  1965年   45篇
  1960年   30篇
  1959年   35篇
  1958年   37篇
  1957年   36篇
  1956年   34篇
  1955年   63篇
  1954年   68篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
The openness of a Mobile Adhoc network (MANET) makes it vulnerable to various attacks that can breach privacy, and this demands a privacy protection system. In this paper, we propose a privacy protection system with flexible and adaptable policies to protect privacy during data transfer based on application and context attributes. We also provide the performance analysis model to test the suitability of policies for maintaining privacy, which is essential for the real-time implementation of this system in a resource-limited MANET. Finally, the proposed privacy protection system is compared with previous works using simulations, and the results obtained show the effectiveness of the proposed privacy protection system.  相似文献   
992.
Aim at improving the energy saving and transmission efficiency of directional drilling rig, the load sensing technology and constant-pressure variable technique are adopted to enable the system to provide the required pressure and flow rate according to the load variation. In order to research the dynamic characteristics of hydraulic control systems, the background and working principle of the load sensing technology were introduced. The dynamic mathematical model of load sensing system is established based on the hydraulic principle. The directional drilling rig mainly consists of two basic circuits: rotary circuit and feed circuit. The dynamic characteristics of rotary circuit are mainly studied. In addition, the hydraulic system of kilometres directional rig is simulated with the software of AMESim. The simulation results show that the load sensing pump could output its required flow and outlet pressure adapted to the load pressure in real time, thus effectively improving the efficiency of the hydraulic system. Furthermore, to verify the validity of the mathematical model and the simulation analysis, an experimental platform of the load sensing hydraulic system was built. The dynamic performance test of load sensing hydraulic system was performed by using the platform. The experimental results demonstrated that the load sensing hydraulic system could output its required flow and pressure when the working condition changed. Finally, they also illustrate the validity of the proposed approach.  相似文献   
993.
Recently, there are some problems in the centralized management, such as centralized management, heavy burden, excessive number of virtual machine migration, lack of mutual cooperation mechanism between nodes, can’t adapt to the cluster of change. The existing distributed management methods exist between the nodes have less cooperation mechanism and only simple communication, quality of service is no obvious improvement, system can save energy consumption is not obvious. According to the behavior characteristics of the fish, this paper presents an artificial fish to achieve mutual cooperation of nodes in the distributed management method.  相似文献   
994.
Many solutions are proposed to identify or prevent the attacks in a Mobile Ad hoc Network. However, sometimes these systems detect false attacks. This could lead to loss of resources in a mobile ad hoc network and cause a downgrade in quality of service. Hence mobile ad hoc networks need a system to confirm the attack before taking further actions. In our work presented in this paper, we propose an attack confirm system for a malicious attacker, called the Black-hole attacker. We present our Black-hole attack Confirmation System, which identifies and confirms the black-hole attack in a mobile ad hoc network using honeypot. The honeypot intelligently identifies all the possible types of black-hole attack using the Black-hole Attack tree, and confirms the attack using the Attack History Database. Together, the Black-hole Attack tree, and Attack History Database aid the honeypot in reducing the false alarms in the mobile ad hoc network. We have simulated the proposed system in several mobile ad hoc network environments of varying sizes of nodes and applications. On several occasions the results have demonstrated that the proposed system is efficient in confirming the black-hole attack and saving the resources and minimizing the path re-establishment.  相似文献   
995.
996.
This paper concerns the parameter identification methods of multivariate pseudo-linear autoregressive systems. A multivariate recursive generalized least squares algorithm is presented as a comparison. By using the data filtering technique, a multivariate pseudo-linear autoregressive system is transformed into a filtered system model and a filtered noise model, and a filtering based multivariate recursive generalized least squares algorithm is developed for estimating the parameters of these two models. The proposed algorithm achieves a higher computational efficiency than the multivariate recursive generalized least squares algorithm, and the simulation results prove that the proposed method is effective.  相似文献   
997.
Cognitive radio (CR) has been considered as a promising technology to enhance spectrum efficiency via opportunistic transmission at link level. Basic CR features allow secondary users (SUs) to transmit only when the licensed channel is not occupied by primary users (PUs). However, waiting for an idle time slot may lead to large packet delays and high energy consumption. We further consider that the SU may decide, at any moment, to use another dedicated way of communication (4G) in order to transmit his packets. Thus, we consider an Opportunistic Spectrum Access (OSA) mechanism that takes into account packet delay and energy consumption. We formulate the OSA problem as a Partially Observable Markov Decision Process (POMDP) by explicitly considering the energy consumption as well as packets’ delay, which are often ignored in existing OSA solutions. Specifically, we consider a POMDP with an average reward criterion. We derive structural properties of the value function and we show the existence of optimal strategies in the class of the threshold strategies. For implementation purposes, we propose online learning mechanisms that estimate the PU activity and determine the appropriate threshold strategy on the fly. In particular, numerical illustrations validate our theoretical findings.  相似文献   
998.
Recently, Multi-sink Wireless Sensor Networks (WSNs) have received more and more attention due to their significant advantages over the single sink WSNs such as improving network throughput, balancing energy consumption, and prolonging network lifetime. Object tracking is regarded as one of the key applications of WSNs due to its wide real-life applications such as wildlife animal monitoring and military area intrusion detection. However, many object tracking researches usually focus on how to track the location of objects accurately, while few researches focus on data reporting. In this work, we propose an efficient data reporting method for object tracking in multi-sink WSNs. Due to the limited energy resource of sensor nodes, it seems especially important to design an energy efficient data reporting algorithm for object tracking in WSNs. Moreover, the reliable data transmission is an essential aspect that should be considered when designing a WSN for object tracking application, where the loss of data packets will affect the accuracy of the tracking and location estimation of a mobile object. In addition, congestion in WSNs has negative impact on the performance, namely, decreased throughput, increased per-packet energy consumption and delay, thus congestion control is an important issue in WSNs. Consequentially, this paper aims to achieve both minimum energy consumption in reporting operation and balanced energy consumption among sensor nodes for WSN lifetime extension. Furthermore, data reliability is considered in our model where the sensed data can reach the sink node in a more reliable way. Finally, this paper presents a solution that sufficiently exerts the underloaded nodes to alleviate congestion and improve the overall throughput in WSNs. This work first formulates the problem as 0/1 Integer Linear Programming problem, and proposes a Reliable Energy Balance Traffic Aware greedy Algorithm in multi-sink WSNs (REBTAM) to solve the optimization problem. Through simulation, the performance of the proposed approach is evaluated and analyzed compared with the previous work which is related to our topic such as DTAR, NBPR, and MSDDGR protocols.  相似文献   
999.
In this paper, we derive the capacity of the asymmetric \({\text{Z}}^{2}\)-channel, which has been presented for the first time as an optimization problem. Similar to the Z-Channel, the proposed \({\text{Z}}^{2}\)-channel can be modelled as a practical interference wireless channel. In addition, the capacity behavior of \({\text{Z}}^{2}\)-channel is discussed and some examples and simulation results for the capacity is presented. Also a code plan has been applied for \({\text{Z}}^{2}\)-channel, based on repetition code to simulate its performance and compare it with the original Z-channel. In conclusion, simulation results show that the \({\text{Z}}^{2}\)-channel can be used widely for different operating points.  相似文献   
1000.
Energy consumption is one of the important issues in wireless sensor network that rely on non chargeable batteries for power. Also, the sensor network has to maintain a desired sensing coverage area along with periodically sending of the sensed data to the base station. Therefore, coverage and the lifetime are the two important issues that need to be addressed. Effective deployment of wireless sensors is a major concern as the coverage and lifetime of any wireless sensor network depends on it. In this paper, we propose the design of a Probability Density Function (PDF) targeting the desired coverage, and energy efficient node deployment scheme. The suitability of the proposed PDF based node distribution to model the network architecture considered in this work has been analyzed. The PDF divides the deployment area into concentric coronas and provides a probability of occurrence of a node within any corona. Further, the performance of the proposed PDF is evaluated in terms of the coverage, the number of transmissions of packets and the lifetime of the network. The scheme is compared with the existing node deployment schemes based on various distributions. The percentage gain of the proposed PDF based node deployment is 32\(\%\) more than that when compared with the existing schemes. Thus, the simulation results obtained confirm the schemes superiority over the other existing schemes.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号