首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7194篇
  免费   281篇
  国内免费   65篇
电工技术   537篇
综合类   34篇
化学工业   560篇
金属工艺   197篇
机械仪表   224篇
建筑科学   49篇
矿业工程   26篇
能源动力   515篇
轻工业   47篇
水利工程   5篇
石油天然气   13篇
武器工业   7篇
无线电   2345篇
一般工业技术   817篇
冶金工业   43篇
原子能技术   56篇
自动化技术   2065篇
  2024年   21篇
  2023年   206篇
  2022年   177篇
  2021年   235篇
  2020年   377篇
  2019年   261篇
  2018年   358篇
  2017年   886篇
  2016年   738篇
  2015年   514篇
  2014年   590篇
  2013年   408篇
  2012年   340篇
  2011年   237篇
  2010年   212篇
  2009年   262篇
  2008年   136篇
  2007年   192篇
  2006年   208篇
  2005年   86篇
  2004年   80篇
  2003年   78篇
  2002年   116篇
  2001年   104篇
  2000年   83篇
  1999年   82篇
  1998年   35篇
  1997年   31篇
  1996年   33篇
  1995年   25篇
  1994年   23篇
  1993年   28篇
  1992年   12篇
  1991年   17篇
  1990年   11篇
  1989年   13篇
  1988年   38篇
  1987年   86篇
  1986年   59篇
  1985年   26篇
  1984年   16篇
  1983年   13篇
  1982年   12篇
  1981年   9篇
  1980年   15篇
  1979年   8篇
  1978年   8篇
  1977年   8篇
  1973年   5篇
  1965年   5篇
排序方式: 共有7540条查询结果,搜索用时 0 毫秒
31.
Neural Computing and Applications - Grouping the sensor nodes into clusters is an effective way to organize wireless sensor networks and to prolong the networks’ lifetime. This paper presents...  相似文献   
32.
33.
Multi-agent systems have emerged as a very significant platform in provisioning distributed and collaborative services to critical applications. Such applications require ubiquitous agent presence in the environment for monitoring, collecting data, communication, and subsequent data analysis, where the sensitivity of the application's nature cannot be understated. Recent advances in the field of autonomous, ubiquitous, intelligent and distributed computing have led to corresponding developments in the use of collaborating multi-agents to protect critical infrastructures. Such systems have witnessed crucial demand for deployment in diverse application scenarios such as E-commerce, E-health, Network Intrusion Detection, Telematics and Transport Systems, Environmental Monitoring, as well as for distributed information processing in general. Critical infrastructures have longed for a distributed system in place for their uninterrupted and accurate operations. Multi-agents have provided one such approach towards addressing the issue of protecting such infrastructures through collaborative and distributed information processing. In this paper, a state-of-the-art on the use of multi-agent based systems for protecting five most common critical infrastructures, is presented.  相似文献   
34.
A wireless sensor network (WSN) is composed of a group of small power-constrained nodes with functions of sensing and communication, which can be scattered over a vast region for the purpose of detecting or monitoring some special events. The first challenge encountered in WSNs is how to cover a monitoring region perfectly. Coverage and connectivity are two of the most fundamental issues in WSNs, which have a great impact on the performance of WSNs. Optimized deployment strategy, sleep scheduling mechanism, and coverage radius cannot only reduce cost, but also extend the network lifetime. In this paper, we classify the coverage problem from different angles, describe the evaluation metrics of coverage control algorithms, analyze the relationship between coverage and connectivity, compare typical simulation tools, and discuss research challenges and existing problems in this area.  相似文献   
35.
The IEEE 802.3az standard provides a new low power mode that Ethernet network interfaces can use to save energy when there is no traffic to transmit. Simultaneously with the final standard approval, several algorithms were proposed to govern the physical interface state transition between the normal active mode and the new low power mode. In fact, the standard leaves this sleeping algorithm unspecified to spur competition among different vendors and achieve the greatest energy savings. In this paper, we try to bring some light to the most well known sleeping algorithms, providing mathematical models for the expected energy savings and the average packet delay inflicted on outgoing traffic. We will then use the models to derive optimum configuration parameters for them under given efficiency constraints.  相似文献   
36.
This paper proposes a nodal ant colony optimization (NACO) technique to solve profit based unit commitment problem (PBUCP). Generation companies (GENCOs) in a competitive restructured power market, schedule their generators with an objective to maximize their own profit without any regard for system social benefit. Power and reserve prices become important factors in decision process. Ant colony optimization that mimics the behavior of ants foraging activities is suitably implemented to search the UCP search space. Here a search space consisting of optimal combination of binary nodes for unit ON/OFF status is represented for the movement of the ants to maintain good exploration and exploitation search capabilities. The proposed model help GENCOs to make decisions on the quantity of power and reserve that must be put up for sale in the markets and also to schedule generators in order to receive the maximum profit. The effectiveness of the proposed technique for PBUCP is validated on 10 and 36 generating unit systems available in the literature. NACO yields an increase of profit, greater than 1.5%, in comparison with the basic ACO, Muller method and hybrid LR-GA.  相似文献   
37.
Silicon - In the present report, a photonic crystal based micro-ring resonator (MRR) structure is proposed which is very compact in size and has very fast response and is employed for temperature...  相似文献   
38.
研究了不同含量的碳纳米管及0.8%稀土Y对高Ni含量Ti(C,N)基金属陶瓷组织性能的影响.将不同成分的试样分别于1400℃、1410 ℃、1420℃真空烧结,测试抗弯强度、洛氏硬度,观察背散射电子形貌、断口形貌并做能谱分析.结果表明,加入质量分数(下同)为0.8%Y及0.3%~1.0%的碳纳米管时,碳纳米管含量为0.5%的组织较均匀,芯壳结构明显,抗弯强度及硬度均较高.  相似文献   
39.
In order to offer context-aware and personalized information, intelligent processing techniques are necessary. Different initiatives considering many contexts have been proposed, but users preferences need to be learned to offer contextualized and personalized services, products or information. Therefore, this paper proposes an agent-based architecture for context-aware and personalized event recommendation based on ontology and the spreading algorithm. The use of ontology allows to define the domain knowledge model, while the spreading activation algorithm learns user patterns by discovering user interests. The proposed agent-based architecture was validated with the modeling and implementation of eAgora? application, which was illustrated at the pervasive university context.  相似文献   
40.
For monitoring online manufacturing processes, the proportion of weights imposed on each type of product’s defects (nonconformities or demerits) has a profoundly effective impact on control charts’ performance. Apparently, the demerit-chart approach is superior than the widely-used c-chart scheme, because it allows us to place relative precise weights (real numbers) on defects according to their distinctly inferior degrees affecting the product quality so that the abnormal variations of processes can be literally exposed. However, in many applications, the seriousness of defects is evaluated partially or entirely by the inspectors’ perceptive judgement or knowledge, so with the precise-weight assignment, the demerit rating mechanism is considered to be somewhat constrained and subjective which inevitably leads to the targeted manufacturing process with limited and possibly biased information for online surveillance. To cope with the drawback, a demerit-fuzzy rating system and monitoring scheme is proposed in this paper. We first incorporate fuzzy weights (fuzzy numbers) to properly reflect the severity measures of defects which are categorized linguistically. Then, based on properties of fuzzy set theory and proposed approaches for fuzzy-number ranking, we develop the demerit-fuzzy charting scheme which is capable of discriminating process conditions into multi-intermittent statuses between in-control and out-of-control. This approach improves the traditional process control techniques with the binary-classification restraint for the process conditions. Finally, the proposed demerit-fuzzy rating system, monitoring scheme, and classification is elucidated by an application in garment industry to monitor textile-stitching nonconformities conditions.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号