首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3193篇
  免费   531篇
  国内免费   585篇
电工技术   176篇
综合类   325篇
化学工业   50篇
金属工艺   57篇
机械仪表   477篇
建筑科学   178篇
矿业工程   52篇
能源动力   21篇
轻工业   85篇
水利工程   37篇
石油天然气   13篇
武器工业   36篇
无线电   284篇
一般工业技术   270篇
冶金工业   54篇
原子能技术   2篇
自动化技术   2192篇
  2024年   47篇
  2023年   101篇
  2022年   160篇
  2021年   213篇
  2020年   205篇
  2019年   174篇
  2018年   155篇
  2017年   168篇
  2016年   182篇
  2015年   207篇
  2014年   259篇
  2013年   282篇
  2012年   246篇
  2011年   261篇
  2010年   227篇
  2009年   200篇
  2008年   183篇
  2007年   234篇
  2006年   159篇
  2005年   168篇
  2004年   125篇
  2003年   114篇
  2002年   75篇
  2001年   45篇
  2000年   29篇
  1999年   16篇
  1998年   9篇
  1997年   13篇
  1996年   11篇
  1995年   9篇
  1994年   7篇
  1993年   4篇
  1992年   5篇
  1991年   1篇
  1990年   4篇
  1989年   3篇
  1988年   2篇
  1987年   1篇
  1986年   2篇
  1985年   1篇
  1980年   1篇
  1955年   1篇
排序方式: 共有4309条查询结果,搜索用时 15 毫秒
31.
Designing a trusted and secure routing solution in an untrustworthy scenario is always a challenging problem. Lack of physical security and low trust levels among nodes in an ad hoc network demands a secure end-to-end route free of any malicious entity. This is particularly challenging when malicious nodes collude with one another to disrupt the network operation. In this paper we have designed a secure routing solution to find an end-to-end route free of malicious nodes with collaborative effort from the neighbors. We have also extended the solution to secure the network against colluding malicious nodes, which, to the best of our knowledge, is the first such solution proposed. We have also proposed a framework for computing and distributing trusts that can be used with out trusted routing protocol. Our proposed framework is unique and different from the other schemes in that it tries to analyze the psychology of the attacker and quantifies the behavior in the computational model. Extensive simulation has been carried out to evaluate the design of our protocol. Partially funded by Department of Defense Award No. H98230-04-C-0460, Department of Transportation Project No. FL-26-7102-00 and National Science Foundation Grant Nos. ANI-0123950 and CCR-0196557. Tirthankar Ghosh is a PhD candidate in the Telecommunications and Information Technology Institute at Florida International University. His area of research is routing security and trust computation in wireless ad hoc and sensor networks. He received his Bachelor of Electrical Engineering from Jadavpur University, India and Masters in Computer Engineering from Florida International University. Dr. Niki Pissinou received her Ph.D. in Computer Science from the University of Southern California, her M.S. in Computer Science from the University of California at Riverside, and her B.S.I.S.E. in Industrial and Systems Engineering from The Ohio State University. She is currently a tenured professor and the director of the Telecommunication & Information Technology Institute at FIU. Previously Dr. Pissinou was a tenured faculty at the Center for Advanced Computer Studies at the University of Louisiana at Lafayette where she was also the director of the Telecommunication & Information & Technology Laboratory partially funded by NASA, and the co-director of the NOMAD: A Wireless and Nomadic Laboratory partially funded by NSF, and the Advanced Network Laboratory. Dr. Pissinou is active in the fields computer networks, information technology and distributed systems. Dr. Kami (Sam) Makki has earned his Ph.D. in Computer Science from the University of Queensland in Brisbane Australia, his Masters degree in Computer Science and Engineering from the University of New South Wales in Sydney Australia, and his Bachelor and Masters Degrees in Civil Engineering from the University of Tehran Iran. Before joining the department of Electrical Engineering and Computer Science at the University of Toledo he has held a number of academic positions and research appointments at the Queensland University of Technology in Brisbane, Royal Melbourne Institution of Technology in Melbourne and at The University of Queensland in Brisbane Australia. He is an active researcher in the fields of distributed systems, databases, mobile and wireless communications, and has more than 30 publications in peerreviewed journals and international proceedings. He has served as a chair and technical program committee member and reviewer for a number of IEEE and ACM sponsored technical conferences and has received a number of achievement awards.  相似文献   
32.
针对雷达研制过程中结构系统涉及到的刚强度、散热、流场模拟、模态、振动特性、疲劳寿命等仿真问题及其现状,提出了应用协同仿真技术来进行现有的仿真工具软件、数据、流程和人员整合,搭建一套协同的虚拟产品开发环境,并阐述了该协同仿真环境的内涵和详细功能需求.结合目前的技术水平,指出了该协同仿真环境应具备的基本功能,提出了可行的实施思路,给出了某典型产品的协同仿真流程,最后提出了通过协同仿真环境对仿真模型进行成熟度管理办法,实现仿真经验积累.  相似文献   
33.
随着数字化、网络化和三维技术的发展,雷达的结构设计从传统的CAD/CAE向全三维数字化协同设计和仿真的方向发展。本文对舰栽雷达结构数字化样机的建设进行了探索。通过协同研发平台实现了雷达研制过程中过程、工具、数据、知识的一体化管理,提高了雷达结构设计效率和质量。  相似文献   
34.
本文以我校电子信息工程专业本科人才培养为例,建立了以电子信息工程专业为基础的协同式多模式应用型本科人才培养体系。我们针对多种培养模式,积极探索并实践了课程体系改革,初步形成了适应区域经济社会发展的协同式人才培养新模式。  相似文献   
35.
针对复杂产品研制过程中的方案评价问题展开研究,并基于Web构建一个集成多种决策方法、算法和工具的可扩展的协同环境,支持各学科专家对方案进行比较、评价和决策。它提供层次化评价指标体系的构建及管理功能,建立并集成了层次分析法、理想点法等多种可供专家选择的决策方法模型以满足不同的问题和需求。另外还对评价系统的总体结构及相关关键技术进行了详细介绍。  相似文献   
36.
The existing collaborative recommendation algorithms have lower robustness against shilling attacks.With this problem in mind,in this paper we propose a robust collaborative recommendation algorithm based on k-distance and Tukey M-estimator.Firstly,we propose a k-distancebased method to compute user suspicion degree(USD).The reliable neighbor model can be constructed through incorporating the user suspicion degree into user neighbor model.The influence of attack profiles on the recommendation results is reduced through adjusting similarities among users.Then,Tukey M-estimator is introduced to construct robust matrix factorization model,which can realize the robust estimation of user feature matrix and item feature matrix and reduce the influence of attack profiles on item feature matrix.Finally,a robust collaborative recommendation algorithm is devised by combining the reliable neighbor model and robust matrix factorization model.Experimental results show that the proposed algorithm outperforms the existing methods in terms of both recommendation accuracy and robustness.  相似文献   
37.
基于Web的异地协同开发的质量控制系统.可以使参与产品研发的各种人员通过平台完成软件开发中质量管理工作.本文通过对异地协作开发的质量管理的分析,提出一种基于Web的协同设计平台的框架结构,并利用ASP.NET的WEB数据库访问技术可开发一个功能齐全、性能稳定的质量控制系统。  相似文献   
38.
针对用户兴趣偏好多变问题,提出一种兴趣特征权重随时间而变化的迭代计算方法。构造了用户兴趣特征与主题类间的二部图关系,并在此基础上提出了一种基于主题的用户兴趣聚类算法(TBC),改变了聚类对象"非此即彼"的硬划分方式。该算法所形成的基于主题的用户兴趣域结构,不仅充分表达了用户的多域兴趣特征和域间主题的联系,还能适应用户兴趣变化。实验表明,TBC算法比传统的K-Means算法以及属于软划分方式的FCM聚类具有更好的用户兴趣划分效果,并且在个性化推荐服务中表现出更高的推荐质量和效率。  相似文献   
39.
基于网络的协同系统是提升产品协同设计能力的可行途径,采用基于网络的疏松耦合式协同设计框架,建立模块化、基于网络的协同设计系统的通用模型,能够改善企业与企业间在线协同产品开发的困难局面,增强产品协同研发效率。  相似文献   
40.
楼俐  徐诚  张飞猛 《兵工学报》2011,32(7):812-818
针对目前大型CAD软件的协同支持工具协作功能有限,分发模型数据量过大,无法实现高效响应设计问题,结合自动武器快速协同设计的实时性需求,在可配置可复用的模块参数化设计方法的基础上,建立了基于网络协同的自动武器三维模型数据结构一致性保持及映射机制.利用与平台无关的结构化信息描述手段描述特征模型和三维建模参数化造型数据及相关...  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号