全文获取类型
收费全文 | 29984篇 |
免费 | 1932篇 |
国内免费 | 1020篇 |
专业分类
电工技术 | 358篇 |
技术理论 | 1篇 |
综合类 | 1957篇 |
化学工业 | 11973篇 |
金属工艺 | 632篇 |
机械仪表 | 423篇 |
建筑科学 | 1968篇 |
矿业工程 | 957篇 |
能源动力 | 231篇 |
轻工业 | 4274篇 |
水利工程 | 172篇 |
石油天然气 | 3063篇 |
武器工业 | 170篇 |
无线电 | 641篇 |
一般工业技术 | 2418篇 |
冶金工业 | 740篇 |
原子能技术 | 203篇 |
自动化技术 | 2755篇 |
出版年
2024年 | 106篇 |
2023年 | 238篇 |
2022年 | 521篇 |
2021年 | 560篇 |
2020年 | 566篇 |
2019年 | 500篇 |
2018年 | 499篇 |
2017年 | 718篇 |
2016年 | 751篇 |
2015年 | 785篇 |
2014年 | 1335篇 |
2013年 | 1414篇 |
2012年 | 1878篇 |
2011年 | 1991篇 |
2010年 | 1477篇 |
2009年 | 1576篇 |
2008年 | 1429篇 |
2007年 | 2081篇 |
2006年 | 2116篇 |
2005年 | 2002篇 |
2004年 | 1742篇 |
2003年 | 1563篇 |
2002年 | 1315篇 |
2001年 | 1177篇 |
2000年 | 970篇 |
1999年 | 829篇 |
1998年 | 667篇 |
1997年 | 470篇 |
1996年 | 351篇 |
1995年 | 336篇 |
1994年 | 277篇 |
1993年 | 202篇 |
1992年 | 152篇 |
1991年 | 97篇 |
1990年 | 78篇 |
1989年 | 72篇 |
1988年 | 22篇 |
1987年 | 25篇 |
1986年 | 11篇 |
1985年 | 6篇 |
1984年 | 6篇 |
1983年 | 3篇 |
1982年 | 5篇 |
1981年 | 3篇 |
1980年 | 7篇 |
1978年 | 1篇 |
1977年 | 1篇 |
1976年 | 1篇 |
1957年 | 1篇 |
1951年 | 2篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
151.
按一定的标准规范实现的Agent平台是开发Agent技术应用的基础。在分析了MASIF和FIPA两种Agent规范的基础上,讨论了开发融合这两种规范的Agent平台涉及的主要技术,描述了融合两种规范的开放式Agent平台YTSC-F参照模型。 相似文献
152.
针对传统的网络故障诊断方法普遍具有自适应差、误报率高等的不足,提出了一种结合免疫算法和agent技术的网络故障诊断方法。在分布式环境中,按照网络的不同特征和环境差异,利用不同功能、不同类别的agent进行故障诊断,同时各agent之间能够互相协作,彼此进行信息交流,和采集数据,从而对所获得的故障类型进行诊断。实验证明,该方法能够对网络故障类型进行有效的判定,对以后大型网络故障诊断是一个很好的借鉴。 相似文献
153.
Arash Bahrammirzaee Author VitaeAmine Chohra Author Vitae Kurosh MadaniAuthor Vitae 《Neurocomputing》2011,74(16):2698-2709
In this paper, a dynamic offer generating unit and cognitive layer are suggested for artificial agents based negotiation systems. For this purpose, first, adaptive time and behavior dependent tactics are developed taking advantages from time continuity and dynamics aspects (features) integrated in their modeling. Then, a negotiation strategy (bilateral over single issue) based on these two tactics is suggested. Second, a cognitive negotiation model for a negotiator agent is developed using Win-Lose and Win-Win orientations which will be formed based on personality factors. Afterwards, an experimental validation is conducted for testing applicability of time dependent tactics, the effect of offering time, and the effect of cognitive orientations (Win-Lose and Win-Win) on final negotiation outcomes. The results prove the applicability of the suggested time and behavior dependent tactics as well as the proposed cognitive negotiation model. 相似文献
154.
J. Cucurull Author Vitae R. Martí Author Vitae Author Vitae S. Robles Author Vitae Author Vitae 《Journal of Systems and Software》2009,82(12):1927-1940
The existence of heterogeneous mobile agent systems hinders the interoperability of mobile agents. Several solutions exist, but they are limited in some aspects. This article proposes a full interoperability solution, in the context of the IEEE-FIPA agent standards, composed of three parts. The first part is a simple language-independent agent interface that enables agents to visit locations with different types of middlewares. The second part is a set of design models for the middlewares to support agents developed for different programming languages and architectures. And the third part is a method based on agents with multiple codes and a common agent data encoding mechanism to enable interoperability between middlewares that do not support the same programming languages. Furthermore two agent interoperability implementations, and its corresponding performance comparison, carried out over the JADE and AgentScape agent middlewares are presented. 相似文献
155.
Semantic Web society was initially focused only on data, but then gradually moved toward knowledge. If a vision of the Semantic Web is to enhance humans' decision-making assisted by machines, a missing but important part is knowledge about constraints on data and concepts represented by ontology. This paper proposes a Semantic Web Constraint Language (SWCL) based on OWL, and shows its effectiveness in representing and solving an internet shopper's decision-making problems by implementing a shopping agent in the Semantic Web environment. 相似文献
156.
The speed and convenience of the Internet has facilitated dynamic development in electronic commerce in recent years. E-commerce technologies and applications are widely studied by expert researchers. Mobile agent is considered to have high potential in e-commerce; it has been attracting wide attention in recent years. Mobile agent has high autonomy and mobility; it can move unbridled in different runtime environments carrying out assigned tasks while automatically detecting its current environment and responding accordingly. The above qualities make mobile agent very suitable for use in e-commerce. The Internet is an open environment, but transfer of confidential data should be conducted only over a secure environment. So, to transfer information over the Internet, a secure Internet environment is absolutely essential. Therefore, the security of present Internet environment must be improved. During its execution, a mobile agent needs to roam around on the Internet between different servers, and it may come in contact with other mobile agents or hosts; it may also need to interact with them. So, a mobile agent might come to harm when it meets a malicious host, and the confidentiality of data could also be compromised. To tackle the above problems, this paper proposes a security scheme for mobile agents. It is designed to ensure the safety of mobile agents on the Internet, and it also has access control and key management to ensure security and data confidentiality. Volker and Mehrdad [R. Volker, J.S. Mehrdad, Access Control and Key Management for Mobile Agents, “Computer Graphics”, Vol. 22, No. 4, August 1998, pp. 457–461] have already proposed an access control and key management scheme for mobile agents, but it needs large amount of space. So, this paper proposes a new scheme that uses the concepts of Chinese Remainder Theorem [F.H. Kuo, V.R.L. Shen, T.S. Chen, F. Lai, A Cryptographic Key Assignment Scheme for Dynamic Access Control in a User Hierarchy, “IEE Proceeding on Computers & Digital Techniques”, Vol. 146, No. 5, Sept. 1999, pp. 235–240., T.S. Chen, Y.F. Chung, Hierarchical Access Control Based on Chinese Remainder Theorem and Symmetric Algorithm, ”Computers & Security”, Vol. 21, No. 6, 2002, pp. 565–570., U.P. Lei, S.C. Wang, A Study of the Security of Mambo et al.'s Proxy Signature Scheme Based on the Discrete Logarithm Problem, June 2004], hierarchical structure and Superkey [S.G. Akl, P.D. Taylor, Cryptographic Solution to a Problem of Access Control in a Hierarchy, “ACM Transactions on Computer Systems”, Vol. 1, No. 3, August 1983, pp. 239–248]. A security and performance analysis of the proposed scheme shows that the scheme effectively protects mobile agents. 相似文献
157.
Minhong Wang Huaiqing Wang Doug Vogel Kuldeep Kumar Dickson K.W. Chiu 《Engineering Applications of Artificial Intelligence》2009,22(7):1046-1055
Modern businesses are facing the challenge of effectively coordinating their supply chains from upstream to downstream services. It is a complex problem to search, schedule, and coordinate a set of services from a large number of service resources under various constraints and uncertainties. Existing approaches to this problem have relied on complete information regarding service requirements and resources, without adequately addressing the dynamics and uncertainties of the environments. The real-world situations are complicated as a result of ambiguity in the requirements of the services, the uncertainty of solutions from service providers, and the interdependencies among the services to be composed. This paper investigates the complexity of supply chain formation and proposes an agent-mediated coordination approach. Each agent works as a broker for each service type, dedicated to selecting solutions for each service as well as interacting with other agents in refining the decision making to achieve compatibility among the solutions. The coordination among agents concerns decision making at strategic, tactical, and operational level. At the strategic level, agents communicate and negotiate for supply chain formation; at the tactical level, argumentation is used by agents to communicate and understand the preferences and constraints of each other; at the operational level, different strategies are used for selecting the preferences. Based on this approach, a prototype has been implemented with simulated experiments highlighting the effectiveness of the approach. 相似文献
158.
In a network, one of the important problems is making an efficient routing decision. Many studies have been carried out on
making a decision and several routing algorithms have been developed. In a network environment, every node has a routing table
and these routing tables are used for making routing decisions. Nowadays, intelligent agents are used to make routing decisions.
Intelligent agents have been inspired by social insects such as ants. One of the intelligent agent types is self a cloning
ant. In this study, a self cloning ant colony approach is used. Self cloning ants are a new synthetic ant type. This ant assesses
the situation and multiplies through cloning or destroying itself. It is done by making a routing decision and finding the
optimal path. This study explains routing table updating by using the self cloning ant colony approach. In a real net, this
approach has been used and routing tables have been created and updated for every node. 相似文献
159.
Wen-Shyong Tzou Wei-Po Lee Bingchiang Jeng 《Expert systems with applications》2009,36(10):12605-12612
One major goal of functional genomics has been to identify and analyze molecular interactions in a cellular context to better understand the underlying design principles and mechanisms. To investigate into a PPI network from both topological and functional points of view, this work proposes a methodology that exploits ontology-based biological knowledge for network analysis. To speed up the procedure, an agent-based framework is also presented for supporting distributed computing. The preliminary results show that through the knowledge obtained from gene ontology, our work in analyzing building blocks of PPI networks can give a higher resolution than that of previous ones. Also our agent-based framework can successfully speed up the task of network analysis in an adaptive manner. 相似文献
160.