首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   181144篇
  免费   15951篇
  国内免费   8542篇
电工技术   11511篇
技术理论   13篇
综合类   11750篇
化学工业   29677篇
金属工艺   10009篇
机械仪表   11335篇
建筑科学   13859篇
矿业工程   5497篇
能源动力   5382篇
轻工业   12704篇
水利工程   3322篇
石油天然气   10814篇
武器工业   1414篇
无线电   21780篇
一般工业技术   21774篇
冶金工业   8771篇
原子能技术   1943篇
自动化技术   24082篇
  2024年   933篇
  2023年   3517篇
  2022年   6532篇
  2021年   8699篇
  2020年   6536篇
  2019年   5173篇
  2018年   5822篇
  2017年   6508篇
  2016年   5782篇
  2015年   7698篇
  2014年   9505篇
  2013年   11397篇
  2012年   12392篇
  2011年   13020篇
  2010年   11099篇
  2009年   10457篇
  2008年   9965篇
  2007年   9194篇
  2006年   9363篇
  2005年   8011篇
  2004年   5332篇
  2003年   4490篇
  2002年   4018篇
  2001年   3611篇
  2000年   3543篇
  1999年   4161篇
  1998年   3468篇
  1997年   2935篇
  1996年   2743篇
  1995年   2216篇
  1994年   1802篇
  1993年   1298篇
  1992年   1049篇
  1991年   786篇
  1990年   569篇
  1989年   468篇
  1988年   369篇
  1987年   252篇
  1986年   211篇
  1985年   130篇
  1984年   116篇
  1983年   86篇
  1982年   86篇
  1981年   68篇
  1980年   63篇
  1979年   29篇
  1978年   25篇
  1977年   24篇
  1976年   26篇
  1975年   16篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
891.
892.
如今随着大家对知识产权保护的重视,使得对于自己程序的加壳保护也变得越来越普遍。除此之外,这一技术也被广泛用于病毒和木马之中,使其不易被杀毒软件查杀。其中,PE文件的加壳尤为常见,若想对其进一步的研究,脱壳是必不可少的。本文首先介绍了PE文件结构和现阶段的加壳技术,其次阐述了脱壳原理和常见方法。  相似文献   
893.
Oracle数据库应用是一门实践性很强的课程,本文首先阐述了课程改革的思路,并从课程内容设置、教学模式、教学方法、考核方式、课程资料建设等方面进行了深入的研究与实践,提高了课程的教学质量和教学效果。  相似文献   
894.
近几年来随着计算机虚拟化技术的迅速发展,基于完全虚拟化技术的安全监控应运而生,它不仅能确保监控工具的有效性、牢固性,而且监控技术易于实现.本文将从安全监控架构中内核、内核可加戢模块两个方面存在的问题对基于完全虚拟化的安全监控技术进行探析.  相似文献   
895.
Driver intention detection is an important component in human-centric driver assistance systems. This article proposes a novel method for detecting driver normal and emergency left- or right-lane-changing intentions by using driver models based on the queuing network cognitive architecture. Driver lane-changing and lane-keeping models are developed and used to simulate driver behavior data associated with 5 kinds of intentions (i.e., normal and emergency left- or right-lane-changing and lane-keeping intentions). The differences between 5 sets of simulated behavior data and the collected actual behavior data are computed, and the intention associated with the smallest difference is determined as the detection outcome. The experimental results from 14 drivers in a driving simulator show that the method can detect normal and emergency lane-changing intentions within 0.325 s and 0.268 s of the steering maneuver onset, respectively, with high accuracy (98.27% for normal lane changes and 90.98% for emergency lane changes) and low false alarm rate (0.294%).  相似文献   
896.
The main contribution of this paper is to completely characterize the dynamic behavior of the discrete‐time double integrator with a saturated locally stabilizing linear state feedback law. In continuous‐time setting, any linear state feedback control law that locally stabilizes the double integrator also globally stabilizes the system in the presence of actuator saturation. In discrete‐time setting, the equivalent of the double integrator does not have the same property. In this paper, we completely characterize the global behavior of saturated locally stabilizing linear state feedback laws for the discrete‐time double integrator. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   
897.
Interaction and communication between humans with smart mobile devices are a new trend of development in Internet of Things (IoT). With the powerful sensing capability of smart device and human mobility, various services could be provided by building a trusted chain between service requesters and suppliers. The cognition of social relations between mobile nodes is the basis of final mobile-aware services. It involves many decision factors, such as time, space and activity patterns. Using social network theory, a new cognitive model for social relations of mobile nodes in IoT is proposed. Firstly, nodes' social relations are reasoned and quantified from multiple perspectives based on the summary of social characteristics of mobile nodes and the definition of different decision factors. Then the location factor, interconnection factor, service evaluation factor and feedback aggregation factor are defined to solve the shortcomings in existing quantitative models. Finally, the weight distribution is set up by information entropy and rough set theory for these decision factors; it can overcome the shortage of traditional methods, in which the weight is set up by subjective ways and hence their dynamic adaptability is poor. We compare our cognitive model to existing models using MIT dataset by defining a variety of test indicators, such as network overall density (NOD), the degree center potential (DCP), the network distribution index (EI), etc. Simulation results show that, the cognitive model has better internal structure and significant validity in network analysis, and thus can provide mobile-aware service effectively in dynamic environment.  相似文献   
898.
Network watermarking schemes have been proposed to trace secret network attack flows transferred through stepping stones as well as anonymous channels. However, most existing network flow watermark detection techniques focus on a fixed sample size of network data to achieve the required accuracy. Irrespective of the uncertainty or information content of successive observations, such detection techniques will result in low efficiency of watermark detection. We herein propose a novel sequential watermark detection model (SWDM) supporting three sequential detectors for efficient traceback of network attack flows. By exploiting the sequential probability ratio test approach, we first propose the intuitive paired-intervals-based optimum watermark detector (POWD) and the single-interval-based optimum watermark detector (SOWD) under the assumption of known parameters of the observed attack flow. We then propose the sequential sign watermark detector (SSWD) that operates on two-level quantized observations for nonparametric watermark detection. Based on our SWDM model, a statistical analysis of sequential detectors, with no assumptions or limitations concerning the distribution of the timing of packets, proves their effectiveness despite traffic timing perturbations. The experiments using a large number of synthetically-generated SSH traffic flows demonstrate that there is a significant advantage in using our sequential watermark detectors based on the proposed SWDM model over the existing fixed sample size watermark detector (FSWD). Compared to the FSWD detector, the POWD detector achieves almost 28% savings in the average number of packets. Especially, given the required probability of detection errors, the SOWD detector and the SSWD detector can achieve almost 47% and 29% savings, respectively, in the average number of required packets, thus resulting in not only guaranteed rates of detection errors but also high efficiency of flow traceback.  相似文献   
899.
Topology control can enhance energy efficiency and prolong network lifetime for wireless sensor networks. Several studies that attempted to solve the topology control problem focused only on topology construction or maintenance. This work designs a novel distributed and reliable energy-efficient topology control (RETC) algorithm for topology construction and maintenance in real application environments. Particularly, many intermittent links and accidents may result in packet loss. A reliable topology can ensure connectivity and energy efficiency, prolonging network lifetime. Thus, in the topology construction phase, a reliable topology is generated to increase network reachable probability. In the topology maintenance phase, this work applies a novel dynamic topology maintenance scheme to balance energy consumption using a multi-level energy threshold. This topology maintenance scheme can trigger the topology construction algorithm to build a new network topology with high reachable probability when needed. Experimental results demonstrate the superiority of the RETC algorithm in terms of average energy consumption and network lifetime.  相似文献   
900.
As social media services such as Twitter and Facebook are gaining popularity, the amount of information published from those services is explosively growing. Most of them use feeds to facilitate distribution of a huge volume of content they publish. In this context, many users subscribe to feeds to acquire up-to-date information through feed aggregation services, and recent real-time search engines also increasingly utilize feeds to promptly find recent web content when it is produced. Accordingly, it is necessary for such services to effectively fetch feeds for minimizing fetching delay, while at the same time maximizing the number of fetched entries. Fetching delay is a time lag between entry publication and retrieval, which is primarily incurred by finiteness of fetching resources. In this paper, we consider a polling-based approach among the methods applicable to fetching feeds, which bases on a specific schedule for visiting feeds. While the existing polling-based approaches have focused on the allocation of fetching resources to feeds in order to either reduce the fetching delay or increase the number of fetched entries, we propose a resource allocation policy that can optimize both objectives. Extensive experiments have been carried out to evaluate the proposed model, in comparison with the existing alternative methods.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号