首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   93177篇
  免费   9812篇
  国内免费   5506篇
电工技术   6983篇
技术理论   2篇
综合类   7825篇
化学工业   13715篇
金属工艺   5268篇
机械仪表   6219篇
建筑科学   7468篇
矿业工程   3006篇
能源动力   2563篇
轻工业   8756篇
水利工程   2264篇
石油天然气   3997篇
武器工业   1039篇
无线电   10628篇
一般工业技术   9842篇
冶金工业   3814篇
原子能技术   1319篇
自动化技术   13787篇
  2024年   573篇
  2023年   1866篇
  2022年   3717篇
  2021年   4915篇
  2020年   3742篇
  2019年   2903篇
  2018年   3164篇
  2017年   3537篇
  2016年   3092篇
  2015年   4510篇
  2014年   5670篇
  2013年   6497篇
  2012年   7296篇
  2011年   7380篇
  2010年   6778篇
  2009年   6291篇
  2008年   6105篇
  2007年   5805篇
  2006年   5096篇
  2005年   4158篇
  2004年   2948篇
  2003年   2115篇
  2002年   1981篇
  2001年   1568篇
  2000年   1474篇
  1999年   1235篇
  1998年   759篇
  1997年   665篇
  1996年   604篇
  1995年   488篇
  1994年   387篇
  1993年   262篇
  1992年   200篇
  1991年   164篇
  1990年   110篇
  1989年   112篇
  1988年   77篇
  1987年   50篇
  1986年   46篇
  1985年   14篇
  1984年   26篇
  1983年   11篇
  1982年   13篇
  1981年   22篇
  1980年   26篇
  1979年   9篇
  1977年   3篇
  1976年   3篇
  1959年   11篇
  1951年   12篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
91.
本文以政府部门计算机网络和网站在运行中碰到的安全问题,阐述了如何建设相对安全的网控中心,并对因特网上发布信息的网站所受到的各种攻击作出了说明,以及如何采用各种技术方法和措施填补漏洞、防范攻击,保障网站安全。  相似文献   
92.
The Body-Centered Cubic (BCC) and Face-Centered Cubic (FCC) lattices have been analytically shown to be more efficient sampling lattices than the traditional Cartesian Cubic (CC) lattice, but there has been no estimate of their visual comparability. Two perceptual studies (each with N = 12 participants) compared the visual quality of images rendered from BCC and FCC lattices to images rendered from the CC lattice. Images were generated from two signals: the commonly used Marschner-Lobb synthetic function and a computed tomography scan of a fish tail. Observers found that BCC and FCC could produce images of comparable visual quality to CC, using 30-35 percent fewer samples. For the images used in our studies, the L(2) error metric shows high correlation with the judgement of human observers. Using the L(2) metric as a proxy, the results of the experiments appear to extend across a wide range of images and parameter choices.  相似文献   
93.
Many side-effecting programming activities, such as profiling and tracing, can be formulated as crosscutting concerns and be framed as side-effecting aspects in the aspect-oriented programming paradigm. The benefit gained from this separation of concerns is particularly evident in purely functional programming, as adding such aspects using techniques such as monadification will generally lead to crosscutting changes. This paper presents an approach to provide side-effecting aspects for lazy purely functional languages in a user transparent fashion. We propose a simple yet direct state manipulation construct for developing side-effecting aspects and devise a systematic monadification scheme to translate the woven code to monadic style purely functional code. Furthermore, we present a static and dynamic semantics of the aspect programs and reason about the correctness of our monadification scheme with respect to them.  相似文献   
94.
Artificial immune systems (AIS) are computational systems inspired by the principles and processes of the vertebrate immune system. The AIS‐based algorithms typically exploit the immune system's characteristics of learning and adaptability to solve some complicated problems. Although, several AIS‐based algorithms have proposed to solve multi‐objective optimization problems (MOPs), little focus have been placed on the issues that adaptively use the online discovered solutions. Here, we proposed an adaptive selection scheme and an adaptive ranks clone scheme by the online discovered solutions in different ranks. Accordingly, the dynamic information of the online antibody population is efficiently exploited, which is beneficial to the search process. Furthermore, it has been widely approved that one‐off deletion could not obtain excellent diversity in the final population; therefore, a k‐nearest neighbor list (where k is the number of objectives) is established and maintained to eliminate the solutions in the archive population. The k‐nearest neighbors of each antibody are founded and stored in a list memory. Once an antibody with minimal product of k‐nearest neighbors is deleted, the neighborhood relations of the remaining antibodies in the list memory are updated. Finally, the proposed algorithm is tested on 10 well‐known and frequently used multi‐objective problems and two many‐objective problems with 4, 6, and 8 objectives. Compared with five other state‐of‐the‐art multi‐objective algorithms, namely NSGA‐II, SPEA2, IBEA, HYPE, and NNIA, our method achieves comparable results in terms of convergence, diversity metrics, and computational time.  相似文献   
95.
In this paper, a novel structure is derived for efficient implementation of digital filters as well as minimizing the finite word length (FWL) errors. Such a structure is actually an improved version of that reported previously. The performance of this new structure and the famous normalized lattice structure are analyzed by deriving the corresponding expression for the roundoff noise gain. Design examples are presented to illustrate the behavior of the proposed structure and to compare it with some existing ones. It is shown that the proposed structure outperforms the others in terms of minimizing roundoff noise as well as implementation efficiency.  相似文献   
96.
This article proposes an asymmetric topology for transmit/receive (T/R) switches and more importantly presents a comparative study of both LC‐tuned and resistive body‐floating techniques for improving the power‐handling capability of the T/R switches in the same 0.18‐μm triple‐well CMOS. It is shown from simulations and measurements that the switches adopting either technique achieve comparable performances. For instance, the switch employing the LC‐tuned body‐floating technique exhibits insertion loss of 1.5 dB, isolation of 23.5 dB, and power‐handling capability of 22.5 dBm at 5.2 GHz, whereas the switch using the resistive body‐floating technique exhibits insertion loss of 1.3 dB, isolation of 24 dB, and power‐handling capability of 22.2 dBm, respectively. Therefore, one can conclude that the asymmetric topology with the resistive body‐floating technique is more suitable for designing T/R switches for wireless local area network applications as it consumes smaller silicon area. © 2010 Wiley Periodicals, Inc. Int J RF and Microwave CAE, 2010.  相似文献   
97.
The information overload on the World Wide Web results in the underuse of some existing e‐government services within the business domain. Small‐to‐medium businesses (SMBs), in particular, are seeking “one‐to‐one'' e‐services from government in current highly competitive markets, and there is an imperative need to develop Web personalization techniques to provide business users with information and services specific to their needs, rather than an undifferentiated mass of information. This paper focuses on how e‐governments can support businesses on the problem of selecting a trustworthy business partner to perform reliable business transactions. In the business partner selection process, trust or reputation information is crucial and has significant influence on a business user's decision regarding whether or not to do business with other business entities. For this purpose, an intelligent trust‐enhanced recommendation approach to provide personalized government‐to‐business (G2B) e‐services, and in particular, business partner recommendation e‐services for SMBs is proposed. Accordingly, in this paper, we develop (1) an implicit trust filtering recommendation approach and (2) an enhanced user‐based collaborative filtering (CF) recommendation approach. To further exploit the advantages of the two proposed approaches, we develop (3) a hybrid trust‐enhanced CF recommendation approach (TeCF) that integrates both the proposed implicit trust filtering and the enhanced user‐based CF recommendation approaches. Empirical results demonstrate the effectiveness of the proposed approaches, especially the hybrid TeCF recommendation approach in terms of improving accuracy, as well as in dealing with very sparse data sets and cold‐start users. © 2011 Wiley Periodicals, Inc.  相似文献   
98.
Preventive measures sometimes fail to defect malicious attacks. With attacks on data-intensive applications becoming an ever more serious threat, intrusion tolerant database systems are a significant concern. The main objective of such systems is to detect attacks, and to assess and repair the damage in a timely manner. This paper focuses on efficient damage assessment and repair in distributed database systems. The complexity caused by data partition, distributed transaction processing, and failures makes intrusion recovery much more challenging than in centralized database systems. This paper identifies the key challenges and presents an efficient algorithm for distributed damage assessment and repair.  相似文献   
99.
陈静怡  冯伟  吴杰 《计算机工程与设计》2011,32(7):2286-2289,2293
为了兼顾服务器端的内存消耗和有效性,在分析了现有端到端冗余流量消除技术中的指纹选择算法后,提出了贪婪指纹选择算法。该算法认为两个数据包中相同片段的邻接片段很有可能也是相同的,基于这一原理,邻接片段的指纹也将被选为代表指纹,有效地避免了在服务器端缓存整个数据包,大大减少了服务器端的内存消耗。仿真实验结果表明,该算法与现有的指纹选择算法相比,能够大大减少服务器端和用户终端的内存消耗,同时冗余消除率在10%-50%之间,与现有算法相近,证明了该算法的有效性。  相似文献   
100.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号