首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   29984篇
  免费   1932篇
  国内免费   1020篇
电工技术   358篇
技术理论   1篇
综合类   1957篇
化学工业   11973篇
金属工艺   632篇
机械仪表   423篇
建筑科学   1968篇
矿业工程   957篇
能源动力   231篇
轻工业   4274篇
水利工程   172篇
石油天然气   3063篇
武器工业   170篇
无线电   641篇
一般工业技术   2418篇
冶金工业   740篇
原子能技术   203篇
自动化技术   2755篇
  2024年   106篇
  2023年   238篇
  2022年   521篇
  2021年   560篇
  2020年   566篇
  2019年   500篇
  2018年   499篇
  2017年   718篇
  2016年   751篇
  2015年   785篇
  2014年   1335篇
  2013年   1414篇
  2012年   1878篇
  2011年   1991篇
  2010年   1477篇
  2009年   1576篇
  2008年   1429篇
  2007年   2081篇
  2006年   2116篇
  2005年   2002篇
  2004年   1742篇
  2003年   1563篇
  2002年   1315篇
  2001年   1177篇
  2000年   970篇
  1999年   829篇
  1998年   667篇
  1997年   470篇
  1996年   351篇
  1995年   336篇
  1994年   277篇
  1993年   202篇
  1992年   152篇
  1991年   97篇
  1990年   78篇
  1989年   72篇
  1988年   22篇
  1987年   25篇
  1986年   11篇
  1985年   6篇
  1984年   6篇
  1983年   3篇
  1982年   5篇
  1981年   3篇
  1980年   7篇
  1978年   1篇
  1977年   1篇
  1976年   1篇
  1957年   1篇
  1951年   2篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
151.
按一定的标准规范实现的Agent平台是开发Agent技术应用的基础。在分析了MASIF和FIPA两种Agent规范的基础上,讨论了开发融合这两种规范的Agent平台涉及的主要技术,描述了融合两种规范的开放式Agent平台YTSC-F参照模型。  相似文献   
152.
针对传统的网络故障诊断方法普遍具有自适应差、误报率高等的不足,提出了一种结合免疫算法和agent技术的网络故障诊断方法。在分布式环境中,按照网络的不同特征和环境差异,利用不同功能、不同类别的agent进行故障诊断,同时各agent之间能够互相协作,彼此进行信息交流,和采集数据,从而对所获得的故障类型进行诊断。实验证明,该方法能够对网络故障类型进行有效的判定,对以后大型网络故障诊断是一个很好的借鉴。  相似文献   
153.
In this paper, a dynamic offer generating unit and cognitive layer are suggested for artificial agents based negotiation systems. For this purpose, first, adaptive time and behavior dependent tactics are developed taking advantages from time continuity and dynamics aspects (features) integrated in their modeling. Then, a negotiation strategy (bilateral over single issue) based on these two tactics is suggested. Second, a cognitive negotiation model for a negotiator agent is developed using Win-Lose and Win-Win orientations which will be formed based on personality factors. Afterwards, an experimental validation is conducted for testing applicability of time dependent tactics, the effect of offering time, and the effect of cognitive orientations (Win-Lose and Win-Win) on final negotiation outcomes. The results prove the applicability of the suggested time and behavior dependent tactics as well as the proposed cognitive negotiation model.  相似文献   
154.
The existence of heterogeneous mobile agent systems hinders the interoperability of mobile agents. Several solutions exist, but they are limited in some aspects. This article proposes a full interoperability solution, in the context of the IEEE-FIPA agent standards, composed of three parts. The first part is a simple language-independent agent interface that enables agents to visit locations with different types of middlewares. The second part is a set of design models for the middlewares to support agents developed for different programming languages and architectures. And the third part is a method based on agents with multiple codes and a common agent data encoding mechanism to enable interoperability between middlewares that do not support the same programming languages. Furthermore two agent interoperability implementations, and its corresponding performance comparison, carried out over the JADE and AgentScape agent middlewares are presented.  相似文献   
155.
Semantic Web society was initially focused only on data, but then gradually moved toward knowledge. If a vision of the Semantic Web is to enhance humans' decision-making assisted by machines, a missing but important part is knowledge about constraints on data and concepts represented by ontology. This paper proposes a Semantic Web Constraint Language (SWCL) based on OWL, and shows its effectiveness in representing and solving an internet shopper's decision-making problems by implementing a shopping agent in the Semantic Web environment.  相似文献   
156.
The speed and convenience of the Internet has facilitated dynamic development in electronic commerce in recent years. E-commerce technologies and applications are widely studied by expert researchers. Mobile agent is considered to have high potential in e-commerce; it has been attracting wide attention in recent years. Mobile agent has high autonomy and mobility; it can move unbridled in different runtime environments carrying out assigned tasks while automatically detecting its current environment and responding accordingly. The above qualities make mobile agent very suitable for use in e-commerce. The Internet is an open environment, but transfer of confidential data should be conducted only over a secure environment. So, to transfer information over the Internet, a secure Internet environment is absolutely essential. Therefore, the security of present Internet environment must be improved. During its execution, a mobile agent needs to roam around on the Internet between different servers, and it may come in contact with other mobile agents or hosts; it may also need to interact with them. So, a mobile agent might come to harm when it meets a malicious host, and the confidentiality of data could also be compromised. To tackle the above problems, this paper proposes a security scheme for mobile agents. It is designed to ensure the safety of mobile agents on the Internet, and it also has access control and key management to ensure security and data confidentiality. Volker and Mehrdad [R. Volker, J.S. Mehrdad, Access Control and Key Management for Mobile Agents, “Computer Graphics”, Vol. 22, No. 4, August 1998, pp. 457–461] have already proposed an access control and key management scheme for mobile agents, but it needs large amount of space. So, this paper proposes a new scheme that uses the concepts of Chinese Remainder Theorem [F.H. Kuo, V.R.L. Shen, T.S. Chen, F. Lai, A Cryptographic Key Assignment Scheme for Dynamic Access Control in a User Hierarchy, “IEE Proceeding on Computers & Digital Techniques”, Vol. 146, No. 5, Sept. 1999, pp. 235–240., T.S. Chen, Y.F. Chung, Hierarchical Access Control Based on Chinese Remainder Theorem and Symmetric Algorithm, ”Computers & Security”, Vol. 21, No. 6, 2002, pp. 565–570., U.P. Lei, S.C. Wang, A Study of the Security of Mambo et al.'s Proxy Signature Scheme Based on the Discrete Logarithm Problem, June 2004], hierarchical structure and Superkey [S.G. Akl, P.D. Taylor, Cryptographic Solution to a Problem of Access Control in a Hierarchy, “ACM Transactions on Computer Systems”, Vol. 1, No. 3, August 1983, pp. 239–248]. A security and performance analysis of the proposed scheme shows that the scheme effectively protects mobile agents.  相似文献   
157.
Modern businesses are facing the challenge of effectively coordinating their supply chains from upstream to downstream services. It is a complex problem to search, schedule, and coordinate a set of services from a large number of service resources under various constraints and uncertainties. Existing approaches to this problem have relied on complete information regarding service requirements and resources, without adequately addressing the dynamics and uncertainties of the environments. The real-world situations are complicated as a result of ambiguity in the requirements of the services, the uncertainty of solutions from service providers, and the interdependencies among the services to be composed. This paper investigates the complexity of supply chain formation and proposes an agent-mediated coordination approach. Each agent works as a broker for each service type, dedicated to selecting solutions for each service as well as interacting with other agents in refining the decision making to achieve compatibility among the solutions. The coordination among agents concerns decision making at strategic, tactical, and operational level. At the strategic level, agents communicate and negotiate for supply chain formation; at the tactical level, argumentation is used by agents to communicate and understand the preferences and constraints of each other; at the operational level, different strategies are used for selecting the preferences. Based on this approach, a prototype has been implemented with simulated experiments highlighting the effectiveness of the approach.  相似文献   
158.
In a network, one of the important problems is making an efficient routing decision. Many studies have been carried out on making a decision and several routing algorithms have been developed. In a network environment, every node has a routing table and these routing tables are used for making routing decisions. Nowadays, intelligent agents are used to make routing decisions. Intelligent agents have been inspired by social insects such as ants. One of the intelligent agent types is self a cloning ant. In this study, a self cloning ant colony approach is used. Self cloning ants are a new synthetic ant type. This ant assesses the situation and multiplies through cloning or destroying itself. It is done by making a routing decision and finding the optimal path. This study explains routing table updating by using the self cloning ant colony approach. In a real net, this approach has been used and routing tables have been created and updated for every node.  相似文献   
159.
One major goal of functional genomics has been to identify and analyze molecular interactions in a cellular context to better understand the underlying design principles and mechanisms. To investigate into a PPI network from both topological and functional points of view, this work proposes a methodology that exploits ontology-based biological knowledge for network analysis. To speed up the procedure, an agent-based framework is also presented for supporting distributed computing. The preliminary results show that through the knowledge obtained from gene ontology, our work in analyzing building blocks of PPI networks can give a higher resolution than that of previous ones. Also our agent-based framework can successfully speed up the task of network analysis in an adaptive manner.  相似文献   
160.
针对分级移动自组织网络(MANET)中的安全检测问题,拓展分布式协作IDS,提出一种基于代理的分级MANET入侵检测系统。该系统采用分簇检测和簇间联合检测的方法,为分级MANET防护提供一种新的入侵检测方案。实例分析和实验仿真结果证明,该检测系统有效。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号