首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   19270篇
  免费   1338篇
  国内免费   748篇
电工技术   1336篇
综合类   960篇
化学工业   1467篇
金属工艺   789篇
机械仪表   716篇
建筑科学   966篇
矿业工程   262篇
能源动力   381篇
轻工业   803篇
水利工程   290篇
石油天然气   400篇
武器工业   146篇
无线电   1506篇
一般工业技术   1107篇
冶金工业   484篇
原子能技术   318篇
自动化技术   9425篇
  2024年   87篇
  2023年   273篇
  2022年   522篇
  2021年   760篇
  2020年   496篇
  2019年   394篇
  2018年   385篇
  2017年   445篇
  2016年   392篇
  2015年   582篇
  2014年   870篇
  2013年   868篇
  2012年   1595篇
  2011年   3061篇
  2010年   1824篇
  2009年   1599篇
  2008年   1350篇
  2007年   1120篇
  2006年   962篇
  2005年   973篇
  2004年   804篇
  2003年   767篇
  2002年   453篇
  2001年   200篇
  2000年   144篇
  1999年   115篇
  1998年   58篇
  1997年   50篇
  1996年   34篇
  1995年   24篇
  1994年   31篇
  1993年   19篇
  1992年   16篇
  1991年   17篇
  1990年   10篇
  1989年   11篇
  1988年   12篇
  1987年   11篇
  1986年   5篇
  1985年   2篇
  1984年   2篇
  1983年   1篇
  1981年   2篇
  1980年   3篇
  1979年   3篇
  1959年   1篇
  1951年   3篇
排序方式: 共有10000条查询结果,搜索用时 11 毫秒
71.
This paper investigates packet scheduling in the context of Self-Optimizing Networks, and demonstrates how to improve coverage dynamically by adjusting the scheduling strategy. We focus on α-fair schedulers, and we provide methods for calculating the scheduling gain, including several closed form formulas. Scheduling gain is analyzed for different fading models, with a particular focus on the frequency-selective channel. We then propose a coverage-capacity self-optimization algorithm based on α-fair schedulers. A use case illustrates the implementation of the algorithm and simulation results show that important coverage gains are achieved at the expense of very little computing power.  相似文献   
72.
Security countermeasures help ensure the confidentiality, availability, and integrity of information systems by preventing or mitigating asset losses from Cybersecurity attacks. Due to uncertainty, the financial impact of threats attacking assets is often difficult to measure quantitatively, and thus it is difficult to prescribe which countermeasures to employ. In this research, we describe a decision support system for calculating the uncertain risk faced by an organization under cyber attack as a function of uncertain threat rates, countermeasure costs, and impacts on its assets. The system uses a genetic algorithm to search for the best combination of countermeasures, allowing the user to determine the preferred tradeoff between the cost of the portfolio and resulting risk. Data collected from manufacturing firms provide an example of results under realistic input conditions.  相似文献   
73.
This paper explores the impacts of essential elements of management on IT application maturity (ITAM). A game theoretical model is established to show that a firm's IT application maturity should match with its essential elements of management. In order to further validate the analytical result, a data set with 137 firms was collected via a survey instrument. Using reliability and factor analysis on the dataset, a four-dimension measurement construct of IT application maturity is proposed together with a three-dimension measurement construct of essential elements of management. Empirical analysis is then conducted to address research questions on the impacts of essential elements of management on IT application maturity. It is found that while a firm's strategic cooperation capability has no significant effect on IT application maturity, its internal coordination capability positively influences all four dimensions of IT application maturity. For the firm's execution capability, although it shows no significant effect on the overall IT application maturity, it does positively affect the technology and man-machine synergy dimensions of IT application maturity. The findings of this study offer practical guidance for organizations to better align their IT application maturity with essential elements of management.  相似文献   
74.
75.
Association redefinition is a UML construct that permits us to define an association end more specifically in a particular context. Concretely, it allows specifying some additional participation and cardinality constraints on the association. Association refinements, which have been studied and used by many authors in conceptual modelling languages prior to UML, are closely related to association redefinitions. They also permit to refine the ends of an association adding participation and cardinality constraints. In this paper, we analyze and compare the semantics of both concepts and propose to extend the semantics of association redefinitions in UML to cover all the constraints that may be expressed by association refinements in other conceptual modelling languages. Additionally, we present how to integrate previous results on validation of association refinements to UML and how to generate code for a relational technology platform. Finally, we provide a prototype tool to verify the feasibility of the approach.  相似文献   
76.
Every organisation exists or is created for the achievement of one or more goals. To ensure continued success, the organisation should monitor its performance with respect to the formulated goals. In practice the performance of an organisation is often evaluated by estimating its performance indicators. In most existing approaches for organisation modelling the relation between performance indicators and goals remains implicit. This paper proposes a formal framework for modelling goals based on performance indicators and defines mechanisms for establishing goal satisfaction, which enable evaluation of organisational performance. Methodological and analysis issues related to goals are also discussed in the paper. The described framework is a part of a general framework for organisation modelling and analysis.  相似文献   
77.
In this paper, a new approach to the optimal retrieval of the ocean color based on the variational method is developed by setting up a rational target functional combining with the Broydor Fletcher, Goldfarb, Shanno (BFGS) optimal algorithm. The numerical tests and the exemplary retrievals are carried out and compared with the statistical retrievals and the optimal retrievals based on the genetic algorithm. The results show that this approach enjoys a higher accuracy as compared to the statistical method and a higher efficiency as compared to the genetic algorithm. The optimal retrieval method presented in this paper provides a new idea for the ocean color inversion and could also be used as a reference for the direct assimilation of the satellite data into the ecological models.  相似文献   
78.
A pervasive application domain today is one in which independently developed real-time components participate in a dynamic and decentralized way from distributed environments. Several challenges arise from this domain, related with participant heterogeneity, transient behavior, scalability or quality of service. The use of standards is important here, where a multidiscipline approach is required. We propose ServiceDDS, a framework that combines different standard technologies to solve the problems related with the integration of components into the described environment. ServiceDDS is based on DDS to support dynamic distributed interactions, XMPP to provide Web access, and RTSJ for real-time performance.  相似文献   
79.
The parallelism attained by the use of Field Programmable Gate Arrays (FPGAs) has shown remarkable potential for accelerating control systems applications. This comes at a time when well established methods based on inherited serial Central Processor Units (CPUs) cannot guarantee solutions for the increasing execution speed demands. However, the transition from serial to parallel architectures represents a tremendous challenge due to overwhelming numbers of unexplored options and conflicting factors. The work presented achieves a parallelisation characterisation for generic MIMO systems using stand-alone FPGA implementations. The main contribution is that a very fine subset of possible serial/parallel implementations is obtained. This is used to achieve a flexible trade-off between cost and performance. Automatic optimisation of latency, occupied FPGA area and execution speed is attained and justified in respect to most of the feasible scenarios.  相似文献   
80.
The International Society of Automation recently released ISA100.11a as an open standard for reliable wireless networks for industrial automation. ISA100.11a uses the TDMA scheme in the medium access layer to provide deterministic services. However, ISA100.11a adopts the CSMA-CA mechanism with priorities for retransmission from failure on dedicated links, sporadic data, and network configuration.This paper evaluates ISA100.11a CSMA-CA by simulation, considering the effects of backoff procedures and priority settings to probability of collision and successful use of slots. It's demonstrated that a high number of priority classes enable better network utilization resulting in less number of packets exceeding their lifetime.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号