全文获取类型
收费全文 | 21786篇 |
免费 | 1366篇 |
国内免费 | 858篇 |
专业分类
电工技术 | 333篇 |
技术理论 | 1篇 |
综合类 | 1572篇 |
化学工业 | 7447篇 |
金属工艺 | 531篇 |
机械仪表 | 332篇 |
建筑科学 | 1647篇 |
矿业工程 | 662篇 |
能源动力 | 176篇 |
轻工业 | 3223篇 |
水利工程 | 156篇 |
石油天然气 | 2389篇 |
武器工业 | 136篇 |
无线电 | 589篇 |
一般工业技术 | 1310篇 |
冶金工业 | 610篇 |
原子能技术 | 168篇 |
自动化技术 | 2728篇 |
出版年
2024年 | 59篇 |
2023年 | 134篇 |
2022年 | 348篇 |
2021年 | 371篇 |
2020年 | 376篇 |
2019年 | 289篇 |
2018年 | 310篇 |
2017年 | 482篇 |
2016年 | 541篇 |
2015年 | 565篇 |
2014年 | 975篇 |
2013年 | 962篇 |
2012年 | 1366篇 |
2011年 | 1453篇 |
2010年 | 1020篇 |
2009年 | 1143篇 |
2008年 | 1039篇 |
2007年 | 1614篇 |
2006年 | 1587篇 |
2005年 | 1567篇 |
2004年 | 1325篇 |
2003年 | 1230篇 |
2002年 | 1046篇 |
2001年 | 929篇 |
2000年 | 727篇 |
1999年 | 625篇 |
1998年 | 478篇 |
1997年 | 322篇 |
1996年 | 257篇 |
1995年 | 247篇 |
1994年 | 181篇 |
1993年 | 124篇 |
1992年 | 93篇 |
1991年 | 65篇 |
1990年 | 55篇 |
1989年 | 46篇 |
1988年 | 16篇 |
1987年 | 18篇 |
1986年 | 9篇 |
1985年 | 2篇 |
1984年 | 3篇 |
1983年 | 2篇 |
1982年 | 1篇 |
1981年 | 2篇 |
1980年 | 2篇 |
1979年 | 1篇 |
1977年 | 1篇 |
1976年 | 1篇 |
1957年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
211.
分析了移动代理技术具有的智能、平台无关、分布灵活、低数据流量和多代理合作等特点,探讨了移动代理技术应用于入侵检测系统中的优势.在系统设计中利用了移动代理的自主性和移动性弥补了入侵检测系统的缺陷、考虑到移动代理的安全性,提出了一个相关的安全性系统模型、 相似文献
212.
213.
The multi mobile agent collaboration planning model was constructed based on the mobile agent load balancing and total network energy consumption index.In order to prolong the network lifetime,the network node dormancy mechanism based on WSN network coverage was put forward,using fewer worked nodes to meet the requirements of network coverage.According to the multi mobile agent collaborative planning technical features,the multi-objective discrete social spider optimization algorithm (MDSSO) with Pareto optimal solutions was designed.The interpolation learning and exchange variations particle updating strategy was redefined,and the optimal set size was adjusted dynamically,which helps to improve the accuracy of MDSSO.Simulation results show that the proposed algorithm can quickly give the WSN multi mobile agent path planning scheme,and compared with other schemes,the network total energy consumption has reduced by 15%,and the network lifetime has increased by 23%. 相似文献
214.
Lylia Alouache Nga Nguyen Makhlouf Aliouat Rachid Chelouah 《International Journal of Communication Systems》2020,33(15)
We propose in this paper a Hybrid Software‐Defined Networking‐based Geographical Routing Protocol (HSDN‐GRA) with a clustering approach. It takes into account three different criteria to select the best relay to send data: (1) the contact duration between vehicles, (2) the available load of each vehicle, (3) and the log of encountered communication errors embedded in each cluster head. The multi‐criteria strategy allows the selection of the most reliable vehicles by avoiding communication problems and ensuring connection availability. Once the hybrid control plane has found out the next eligible neighbor, the data plane will be in charge of dividing and sending data. To validate our approach, HSDN‐GRA has been modeled and implemented in JADE, a multi‐agent platform, to be compared to other multi‐agent based protocols. Simulation results show that HSDN‐GRA achieves good performance with respect to the average routing overhead, the packet drop rate, and the throughput. 相似文献
215.
Guobin Qi Fang Hu Kenry Kok Chan Chong Min Wu Yunn Hwen Gan Bin Liu 《Advanced functional materials》2020,30(31)
The recognition and inactivation of specific pathogenic bacteria remain an enormous scientific challenge and an important therapeutic goal. Therefore, materials that can selectively target and kill specific pathogenic bacteria, without harming beneficial strains are highly desirable. Here, a material platform is reported that exploits bacteria as a template to synthesize polymers with aggregation‐induced emission (AIE) characteristic by copper‐catalyzed atom transfer radical polymerization for self‐selective killing of the bacteria that templates them with no antimicrobial resistance. The bacteria‐templated polymers show very weak fluorescence in aqueous media, however, the fluorescence is turned on upon recognition of the bacteria used as the template to synthesize the polymer even at a low concentration of 600 ng mL?1. Moreover, the incorporated AIE fluorogens (AIEgens) can act as an efficient photosensitizer for reactive oxygen species (ROS) generation after bacteria surface binding, which endows the templated polymers with the capability for selective bacterial killing. The bacterium‐templated synthesis is generally applicable to a wide range of bacteria, including clinically isolated multidrug‐resistant bacterial strains. It is envisioned that the bacterium‐templated method provides a new strategy for bacteria‐specific diagnostic and therapeutic applications. 相似文献
216.
ESB环境中基于代理的可信服务模型 总被引:1,自引:0,他引:1
针对ESB环境下安全隐患的特定需求,提出了基于代理的可信服务模型.模型在ESB的节点上部署一个可信服务模型的代理,采用位运算计算服务的信任度,整合最可信的服务运行流程.在符合ESB规范以及不影响性能的前提下,可以提高系统运行的稳定性和安全性.在SynchroESB平台上的应用,证明该模型的可行性、正确性和健壮性. 相似文献
217.
Kuo-Ming Chao Muhammad Younas Nick Godwin Pen-Choug Sun 《International Journal of Wireless Information Networks》2006,13(2):141-150
The popularity of grid services has widened their application to numerous domains and increased the utilization of computational resources. In order to create more incentives for the resources owners to lease their resources and prevent users from wasting the resources, the introduction of a market-oriented grid is inevitable. However, the issues for the negotiation between service provider and consumer over the supply and demand of resources can be complex, with highly interdependent issues. In this research, a simulated automated negotiation mechanism including a co-evolutionary mechanism and a modified game theory approach is proposed, to assist them in reaching an agreement over the conflicting issues. In the proposed architecture, the co-evolution process is able to reduce the multiple dimensional search space into a two-dimension search space and identify the appropriate negotiation strategies for the negotiating agents to form a payoff matrix which can be used for the game theory related stage of their interaction. The multiple stage negotiation process is introduced to improve the negotiation result. In this paper, an application which requires a large amount of computational resources to process the data generated from mobile devises is used to demonstrate that the proposed system is able to resolve the conflicts and obtain a valid solution. 相似文献
218.
The mobile agent is a fundamental building block of the mobile computing paradigm. In mobile agent security, oblivious transfer
(OT) from a trusted party can be used to protect the agent’s privacy and the hosts’ privacy. In this paper, we introduce a
new cryptographic primitive called Verifiable Distributed Oblivious Transfer (VDOT), which allows us to replace a single trusted party with a group of threshold trusted servers. The design of VDOT uses a novel
technique called consistency verification of encrypted secret shares. VDOT protects the privacy of both the sender and the receiver against malicious attacks of the servers. We also show the
design of a system to apply VDOT to protect the privacy of mobile agents. Our design partitions an agent into the general
portion and the security-sensitive portion. We also implement the key components of our system. As far as we know, this is
the first effort to implement a system that protects the privacy of mobile agents. Our preliminary evaluation shows that protecting
mobile agents not only is possible, but also can be implemented efficiently.
This work was supported in part by the DoD University Research Initiative (URI) program administered by the Office of Naval
Research under grant N00014-01-1-0795. Sheng Zhong was supported by ONR grant N00014-01-1-0795 and NSF grants ANI-0207399
and CCR-TC-0208972. Yang Richard Yang was supported in part by NSF grant ANI-0207399. A preliminary version of this paper
was presented at the DialM-POMC Joint Workshop on Foundations of Mobile Computing in 2003.
Sheng Zhong received his Ph.D. in computer science from Yale University in the year of 2004. He holds an assistant professor position
at SUNY Buffalo and is currently on leave for postdoctoral research at the Center for Discrete Mathematics and Theoretical
Computer Science (DIMACS). His research interests, on the practical side, are security and incentives in data mining, databases,
and wireless networks. On the theoretical side, he is interested in cryptography and game theory.
Yang Richard Yang is an Assistant Professor of Computer Science at Yale University. His research interests include computer networks, mobile
computing, wireless networking, sensor networks, and network security. He leads the LAboratory of Networked Systems (LANS)
at Yale. His recent awards include a Schlumberger Fellowship and a CAREER Award from the National Science Foundation. He received
his B.E. degree from Tsinghua University (1993), and his M.S. and Ph.D. degrees from the University of Texas at Austin (1998
and 2001). 相似文献
219.
基于移动代理和信任机制的网格作业管理 总被引:1,自引:1,他引:1
介绍了网络计算环境下的作业管理,引入了移动代理技术和信任机制,并进行了深入分析,对所用到的关键技术进行了详细的解释,说明了基于移动代理和信任机制的网格作业管理运行步骤. 相似文献
220.
丈章给出一种基于移动组的全序可靠多播协议-MGTOM(Mobile-group-based Totally Ordered Reliable Multicast)协议,借助于逻辑令牌环来实现.MGTOM协议实现了移动组多播的原子性和全序性,原子性用于保证多播消息能够最终传递到移动组内的所有移动Agent,全序性则保证任意一对多播消息都按照相同顺序被所有组内移动Agent传递.在多播算法中,为了保证原子性,所有收到多播消息的组成员必须回复,然后持有令牌的组成员作为Sequencer,对多播消息进行排序. 相似文献