全文获取类型
收费全文 | 3192篇 |
免费 | 311篇 |
国内免费 | 558篇 |
专业分类
电工技术 | 97篇 |
综合类 | 320篇 |
化学工业 | 118篇 |
金属工艺 | 45篇 |
机械仪表 | 142篇 |
建筑科学 | 60篇 |
矿业工程 | 27篇 |
能源动力 | 86篇 |
轻工业 | 22篇 |
水利工程 | 7篇 |
石油天然气 | 10篇 |
武器工业 | 51篇 |
无线电 | 858篇 |
一般工业技术 | 147篇 |
冶金工业 | 80篇 |
原子能技术 | 11篇 |
自动化技术 | 1980篇 |
出版年
2024年 | 1篇 |
2023年 | 24篇 |
2022年 | 29篇 |
2021年 | 43篇 |
2020年 | 42篇 |
2019年 | 44篇 |
2018年 | 66篇 |
2017年 | 192篇 |
2016年 | 251篇 |
2015年 | 182篇 |
2014年 | 285篇 |
2013年 | 271篇 |
2012年 | 265篇 |
2011年 | 283篇 |
2010年 | 285篇 |
2009年 | 363篇 |
2008年 | 215篇 |
2007年 | 279篇 |
2006年 | 288篇 |
2005年 | 171篇 |
2004年 | 64篇 |
2003年 | 52篇 |
2002年 | 44篇 |
2001年 | 56篇 |
2000年 | 55篇 |
1999年 | 42篇 |
1998年 | 20篇 |
1997年 | 19篇 |
1996年 | 14篇 |
1995年 | 8篇 |
1994年 | 7篇 |
1993年 | 6篇 |
1992年 | 11篇 |
1991年 | 6篇 |
1990年 | 2篇 |
1989年 | 2篇 |
1988年 | 17篇 |
1987年 | 14篇 |
1986年 | 22篇 |
1985年 | 5篇 |
1984年 | 3篇 |
1983年 | 1篇 |
1982年 | 1篇 |
1981年 | 2篇 |
1980年 | 4篇 |
1979年 | 1篇 |
1978年 | 1篇 |
1977年 | 2篇 |
1973年 | 1篇 |
排序方式: 共有4061条查询结果,搜索用时 15 毫秒
81.
Rachid El-Azouzi Francesco De Pellegrini Habib B.A. Sidi Vijay Kamble 《Computer Networks》2013,57(4):1003-1018
In this paper, we apply evolutionary games to non-cooperative forwarding control in Delay Tolerant Networks (DTNs). The main focus is on mechanisms to rule the participation of the relays to the delivery of messages in DTNs. Thus, we express the success probability as a function of the competition that takes place within a large population of mobiles, and we characterize the effect of reward-based mechanisms on the performance of such systems. Devices acting as active relays, in fact, sacrifice part of their batteries in order to support message replication and thus increase the probability to reach the destination. In our scheme, a relay can choose the strategy by which they participate to the message relaying. A mobile that participates receives a unit of reward based on the reward mechanism selected by the network. A utility function is introduced as the difference between the expected reward and the energy cost, i.e., the cost spent by the relay to sustain forwarding operations. We show how the evolution dynamics and the equilibrium behavior (called Evolutionary Stable Strategy – ESS) are influenced by the characteristics of inter contact time, energy expenditure and pricing characteristics.We extend our analysis to mechanisms that the system can introduce in order to have the message delivered to the destination with high probability within a given deadline and under energy constraints which bound the number of released copies per message. Finally, we apply our findings in order to devise decentralized forwarding algorithms that are rooted in the theory of stochastic approximations. Thus, we demonstrate that the ESS can be attained without complete knowledge of the system state and letting the source monitor number of released copies per message only. We provide extensive numerical results to validate the proposed scheme. 相似文献
82.
The fundamental challenge in opportunistic networking, regardless of the application, is when and how to forward a message. Rank-based forwarding techniques currently represent one of the most promising methods for addressing this message forwarding challenge. While these techniques have demonstrated great efficiency in performance, they do not address the rising concern of fairness amongst various nodes in the network. Higher ranked nodes typically carry the largest burden in delivering messages, which creates a high potential of dissatisfaction amongst them. In this paper, we adopt a real-trace driven approach to study and analyze the trade-offs between efficiency, cost, and fairness of rank-based forwarding techniques in mobile opportunistic networks.Our work comprises three major contributions. First, we quantitatively analyze the trade-off between fair and efficient environments. Second, we demonstrate how fairness coupled with efficiency can be achieved based on real mobility traces. Third, we propose FOG, a real-time distributed framework to ensure efficiency–fairness trade-off using local information. Our framework, FOG, enables state-of-the-art rank-based opportunistic forwarding algorithms to ensure a better fairness–efficiency trade-off while maintaining a low overhead. Within FOG, we implement two real-time distributed fairness algorithms; Proximity Fairness Algorithm (PFA), and Message Context Fairness Algorithm (MCFA). Our data-driven experiments and analysis show that mobile opportunistic communication between users may fail with the absence of fairness in participating high-ranked nodes, and an absolute fair treatment of all users yields inefficient communication performance. Finally our analysis shows that FOG-based algorithms ensure relative equality in the distribution of resource usage among neighbor nodes while keeping the success rate and cost performance near optimal. 相似文献
83.
Many network applications requires access to most up-to-date information. An update event makes the corresponding cached data item obsolete, and cache hits due to obsolete data items become simply useless to those applications. Frequently accessed but infrequently updated data items should get higher preference while caching, and infrequently accessed but frequently updated items should have lower preference. Such items may not be cached at all or should be evicted from the cache to accommodate items with higher preference. In wireless networks, remote data access is typically more expensive than in wired networks. Hence, an efficient caching scheme considers both data access and update patterns can better reduce data transmissions in wireless networks. In this paper, we propose a step-wise optimal update-based replacement policy, called the Update-based Step-wise Optimal (USO) policy, for wireless data networks to optimize transmission cost by increasing effective hit ratio. Our cache replacement policy is based on the idea of giving preference to frequently accessed but infrequently updated data, and is supported by an analytical model with quantitative analysis. We also present results from our extensive simulations. We demonstrate that (1) the analytical model is validated by the simulation results and (2) the proposed scheme outperforms the Least Frequently Used (LFU) scheme in terms of effective hit ratio and communication cost. 相似文献
84.
85.
This paper proposes a simple and stateless active queue management (AQM) scheme, called geometric CHOKe (gCHOKe), to protect responsive flows from unresponsive ones. gCHOKe has its root in and is a generalization of the original CHOKe. It provides an additional power of protection, achieved by introducing an extra flow matching trial following each successful flow comparison of packets. The maximum number of comparisons permitted for an arrival can be controlled by a parameter called maxcomp. The quality of flow protection improves with maxcomp. Compared to the plain CHOKe (which is just the simplest case of gCHOKe), our analysis and simulations show that the scheme can achieve over 20% improvement in the bounds of both bandwidth and buffer space used by an aggressive flow. In addition, up to 14% of the total link capacity can be saved from the unresponsive flow, allowing responsive or rate-adaptive flows to obtain a better share of resources in the router. 相似文献
86.
Andrea Caiti Vincenzo Calabrò Andrea Munafò Gianluca Dini Angelica Lo Duca 《野外机器人技术杂志》2013,30(2):237-253
The EU‐funded project UAN (Underwater Acoustic Network) was aimed at conceiving, developing, and testing at sea an innovative and operational concept for integrating underwater and above‐water sensors in a unique communication system to protect offshore and coastline critical infrastructures. This work gives details on the underwater part of the project. It introduces a set of original security features and gives details on the integration of autonomous underwater vehicles (AUVs) as mobile nodes of the network and as surveillance assets, acoustically controlled by the command and control center to respond against intrusions. Field results are given of the final UAN project sea trial, UAN11, held in May 2011 in Norway. During the experimental activities, a UAN composed of four fixed nodes, two AUVs, and one mobile node mounted on the supporting research vessel was operated continuously and integrated into a global protection system. In this article, the communication performance of the network is reported in terms of round‐trip time, packet loss, and average delivery ratio. The major results of the experiment can be thus summarized: the implemented network structure was successful in continuously operating over five days with nodes seamlessly entering and exiting the network; the performance of the network varied greatly with fluctuations in the acoustic channel; the addition of security features induced a minor degradation in network performance with respect to channel variation; the AUVs were successfully controlled from a remote station through acoustic signals routed by the network. © 2013 Wiley Periodicals, Inc. 相似文献
87.
HSV自适应混合高斯模型的运动目标检测 总被引:3,自引:1,他引:2
在目前的计算机视觉应用中,从视频序列中提取出运动目标是一个研究热点。针对传统方法在复杂多变环境下不能很好地检测出运动目标且运算量较大的问题,根据HSV颜色空间的特点,提出了一种基于HSV颜色空间的自适应混合高斯背景建模和阴影消除的方法。首先,在传统的混合高斯背景建模的基础上,引入了一种新的混合高斯模型高斯成分个数的自适应选择策略以提高建模的效率。其次,根据阴影在HSV向量空间的特点,融入了一种新的阴影消除方法,以检测出带阴影的运动目标。该方法能够快速准确地建立背景模型,准确分割前景目标。与传统的阴影消除方法相比,该方法可以在不需要设置阂值的情况下,对运动目标的阴影进行很好的消除,有很好的鲁棒性和实用性。 相似文献
88.
89.
本文主要介绍运用PLC技术设计开发的立体仓库。系统采用松下FP0系列PLC,结合组态王软件的远程监控,实现了计算机的实时控制,提高了系统运行的效率及安全可靠性。 相似文献
90.
随着煤矿安全的数字化管理,基于3D技术的煤矿系统虚拟现实成为煤矿安全中进行安全培训的重要技术手段。本文以OGRE引擎为软件开发环境设计煤矿安全虚拟现实3D软件,阐述OGRE的软件结构、煤矿安全虚拟现实3D软件的构成、3D模型的建模方法和实现方式,设计具有运动功能的3D模型的操作和控制方法。对煤矿安全管理和数字化煤矿的建设具有现实意义。 相似文献