全文获取类型
收费全文 | 4675篇 |
免费 | 752篇 |
国内免费 | 359篇 |
专业分类
电工技术 | 483篇 |
技术理论 | 1篇 |
综合类 | 809篇 |
化学工业 | 139篇 |
金属工艺 | 70篇 |
机械仪表 | 285篇 |
建筑科学 | 497篇 |
矿业工程 | 292篇 |
能源动力 | 126篇 |
轻工业 | 139篇 |
水利工程 | 306篇 |
石油天然气 | 120篇 |
武器工业 | 104篇 |
无线电 | 339篇 |
一般工业技术 | 412篇 |
冶金工业 | 171篇 |
原子能技术 | 6篇 |
自动化技术 | 1487篇 |
出版年
2024年 | 40篇 |
2023年 | 93篇 |
2022年 | 159篇 |
2021年 | 173篇 |
2020年 | 190篇 |
2019年 | 187篇 |
2018年 | 156篇 |
2017年 | 185篇 |
2016年 | 223篇 |
2015年 | 235篇 |
2014年 | 358篇 |
2013年 | 346篇 |
2012年 | 369篇 |
2011年 | 383篇 |
2010年 | 279篇 |
2009年 | 316篇 |
2008年 | 316篇 |
2007年 | 337篇 |
2006年 | 321篇 |
2005年 | 229篇 |
2004年 | 173篇 |
2003年 | 133篇 |
2002年 | 124篇 |
2001年 | 71篇 |
2000年 | 64篇 |
1999年 | 51篇 |
1998年 | 40篇 |
1997年 | 44篇 |
1996年 | 27篇 |
1995年 | 17篇 |
1994年 | 28篇 |
1993年 | 20篇 |
1992年 | 18篇 |
1991年 | 8篇 |
1990年 | 9篇 |
1989年 | 11篇 |
1988年 | 4篇 |
1987年 | 3篇 |
1986年 | 4篇 |
1985年 | 2篇 |
1984年 | 5篇 |
1983年 | 4篇 |
1982年 | 5篇 |
1981年 | 3篇 |
1964年 | 3篇 |
1961年 | 3篇 |
1959年 | 2篇 |
1956年 | 2篇 |
1955年 | 3篇 |
1954年 | 1篇 |
排序方式: 共有5786条查询结果,搜索用时 0 毫秒
51.
LEACH协议是提出较早、较为完整的无线传感器网络协议之一。在LEACH协议的基础上,借鉴生物免疫系统的原理,提出了一种新的适用于无线传感器网络的免疫体系结构。为构建这个体系,提出了基于覆盖面的备份簇头选举算法,嵌入数字基因的免疫应答算法,以及各状态节点的转换机制。备份簇头的引入,大大降低了恶意簇头对整个簇造成的破坏,免疫应答算法通过各功能节点的相互协作,能够有效地抵御恶意节点的攻击,减小和消除恶意数据的影响。仿真验证了该体系的有效性,在提高了安全性的同时,并不影响网络的生命期。 相似文献
52.
Mark L. Darby Michael NikolaouJames Jones Doug Nicholson 《Journal of Process Control》2011,21(6):874-884
The practice of implementing real-time optimization (RTO) using a rigorous steady-state model, in conjunction with model predictive control (MPC), dates back to the late 1980s. Since then, numerous projects have been implemented in refinery and chemical plants, and RTO has received significant attention in the industrial and academic literature. This history affords us the opportunity to assess the impact and success of RTO technology in the process industries. We begin with a discussion of the role RTO serves in the hierarchy of control and optimization decision making in the plant, and outline the key steps of the RTO layer and the coordination with MPC. Where appropriate, we point out the different approaches that have been used in practice and discuss the success factors that directly relate to the success of RTO within an organization. We also discuss alternative approaches that have been used to alleviate some of the challenges associated with implementing RTO and which may be appropriate for those unwilling to commit to the traditional RTO approach. Lastly, we provide suggestions for improvement to motivate further research. 相似文献
53.
对测试用例的可复用性度量进行研究,构建测试用例可复用性评估模型,通过分析转化得到易于度量的层次分析模型。通过层次分析模型构建权重比较矩阵,再进行相关属性的度量,并可进一步开展自动的测试用例可复用性度量。 相似文献
54.
Making optimal use of available resources has always been of interest to humankind, and different approaches have been used in an attempt to make maximum use of existing resources. Limitations of capital, manpower, energy, etc., have led managers to seek ways for optimally using such resources. In fact, being informed of the performance of the units under the supervision of a manager is the most important task with regard to making sensible decisions for managing them. Data envelopment analysis (DEA) suggests an appropriate method for evaluating the efficiency of homogeneous units with multiple inputs and multiple outputs. DEA models classify decision making units (DMUs) into efficient and inefficient ones. However, in most cases, managers and researchers are interested in ranking the units and selecting the best DMU. Various scientific models have been proposed by researchers for ranking DMUs. Each of these models has some weakness(es), which makes it difficult to select the appropriate ranking model. This paper presents a method for ranking efficient DMUs by the voting analytic hierarchy process (VAHP). The paper reviews some ranking models in DEA and discusses their strengths and weaknesses. Then, we provide the method for ranking efficient DMUs by VAHP. Finally we give an example to illustrate our approach and then the new method is employed to rank efficient units in a real world problem. 相似文献
55.
基于模糊层次分析法的计算机网络安全评价 总被引:2,自引:0,他引:2
根据计算机网络的特点及网络安全涉及的因素,建立计算机网络安全评价的层次结构模型,运用基于三角模糊数的模糊层次分析法实现对网络安全的综合量化评价。实例的计算结果表明模糊层次分析法适用于定性判断的量化综合,它为计算机网络安全评价提供了一种探索性方法。 相似文献
56.
The main objective of this paper is to propose an approach within the AHP framework for tackling the uncertainty and imprecision of service evaluations during pre-negotiation stages, where the expert’s comparison judgments are represented as fuzzy triangular numbers. A fuzzy prioritization method, which derives crisp priorities from consistent and inconsistent fuzzy comparison matrices, is described. The fuzzy analytic hierarchy process (FAHP)-based decision-making method can provide decision makers or buyer a valuable reference for evaluating software quality. A case study demonstrates the effectiveness of the proposed scheme. Importantly, the proposed scheme can assist decision makers in assessing the feasibility of digital video recorder system to management public space, making it highly applicable for academic and commercial purposes. 相似文献
57.
一种用于评估多核处理器存储层次性能的模型,使用排队论建模,求解速度快,可以在设计早期给出不同配置参数对处理器整体性能的影响,从而调整存储层次结构,优化设计. 相似文献
58.
59.
60.