首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   21994篇
  免费   1408篇
  国内免费   832篇
电工技术   342篇
技术理论   1篇
综合类   1611篇
化学工业   7433篇
金属工艺   531篇
机械仪表   331篇
建筑科学   1664篇
矿业工程   665篇
能源动力   195篇
轻工业   3111篇
水利工程   391篇
石油天然气   2402篇
武器工业   136篇
无线电   590篇
一般工业技术   1312篇
冶金工业   617篇
原子能技术   169篇
自动化技术   2733篇
  2024年   60篇
  2023年   138篇
  2022年   359篇
  2021年   376篇
  2020年   391篇
  2019年   301篇
  2018年   325篇
  2017年   495篇
  2016年   548篇
  2015年   576篇
  2014年   1000篇
  2013年   997篇
  2012年   1379篇
  2011年   1475篇
  2010年   1020篇
  2009年   1155篇
  2008年   1051篇
  2007年   1604篇
  2006年   1590篇
  2005年   1570篇
  2004年   1320篇
  2003年   1212篇
  2002年   1043篇
  2001年   921篇
  2000年   727篇
  1999年   625篇
  1998年   483篇
  1997年   327篇
  1996年   264篇
  1995年   248篇
  1994年   187篇
  1993年   130篇
  1992年   99篇
  1991年   70篇
  1990年   56篇
  1989年   48篇
  1988年   19篇
  1987年   18篇
  1986年   9篇
  1985年   4篇
  1984年   3篇
  1983年   2篇
  1982年   1篇
  1981年   2篇
  1980年   2篇
  1979年   1篇
  1977年   1篇
  1976年   1篇
  1957年   1篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
111.
Non-center network computing environments have some unique characteristics, such as instability, heterogeneity, autonomy, distribution and openness, which bring serious issues of security and reliability. This article proposes a brand-new credibility protection mechanism for resource sharing and collaboration in non-center network computing environments. First, the three-dimensional hierarchical classified topology (3DHCT) is proposed, which provides a basic framework for realizations of the identity credibility, the behavior credibility and the capability credibility. Next, the agent technology is utilized to construct the credibility protection model. This article also proposes a new comprehensive credibility evaluation algorithm with simple, efficient, quantitative and able to meet the requirements of evaluating behavior credibility and the capability credibility evaluation as well. The Dempster-Shafer theory of evidence and the combination rule are used to achieve the evaluation of the capability credibility. The behavior credibility is evaluated with the current and historical performance of nodes for providers and consumers to realize more accurate prediction. Based on the non-center network computing simulation test platform, simulation is been conducted to test the performance and validity of the proposed algorithms. Experiment and analysis show that the proposed algorithms are suitable for large-scale, dynamic network computing environments, and able to maintain the credibility for networks without relying on central node, make a non-center network gradually evolve into an orderly, stable and reliable computing environment efficiently.  相似文献   
112.
随着基于网络的服务的迅速增长,入侵检测系统的检测性能已变的越来越重要。为了提高入侵检测系统的检测率和降低其误报率,本文通过将网管系统和入侵检测系统相结合,提出了一种用于分布式入侵检测系统的层次化协作模型,提供集成化的检测、报告和响应功能。在检测引擎的实现上,使用了信息管理库(MIB)作为数据源,可有效检测流量为基础的攻击模式。应用结果表明,该模型可有效增强网络管理的安全性能,提高入侵检测系统的效率。  相似文献   
113.
A recently developed multi‐functional phosphotriazine‐based polymer is used as a matrix for embedding γ‐Fe2O3 nanoparticles as well as a suitable chemical template for surface modification with silver nanoparticles. For the primary magnetic modification, maghemite nanoparticles are surface modified with oleic acid in order to render them organophilic and to prevent the aggregation of the nanoparticles. This aggregation could occur as the polymer synthesis, based on reaction of phosphonitrilic chlorine and 1,4‐phenylenediamine, takes place in toluene. The surface active amine units of the polymer structure enable the reduction of silver cations to silver nanoparticles, which are well attached and finely dispersed on its surface. The developed nanocomposite represents one of the few magnetically controllable antibacterial agents based on silver nanoparticles. Magnetic measurements reveal the completely suppressed interactions among maghemite nanoparticles because of their perfect surface coating with an organic surfactant and fine dispersion inside the polymer matrix. This magnetic nanocomposite exhibits a high antibacterial and antifungal activity as proven by tests with nine bacterial strains and four candida (yeast genus) species. For the majority of the tested species, the minimum‐inhibition concentrations are below 100 mg L?1, which is comparable to their equivalent minimum‐inhibition concentrations in colloidal silver systems.  相似文献   
114.
本文介绍使用CT101型补偿收缩剂在天生港挡浪墙加高加固工程中应用的工艺情况。现场检测资料表明:采用该添加剂可以有效地把新旧混凝士结合好,强度达到要求。该挡浪墙经受了1997-08的11号台风考验。  相似文献   
115.
提出了移动代理数据卸载策略,对无线传感器网络中现有移动代理规划路径进行优化,根据卸载规则决定是否将数据分组分离通过优化的卸载路径传递,卸载数据的移动代理通过原路径访问数据源节点.使用移动代理经典算法IEMF(itinerary energy minimum for first-source-selection)进行大量的仿真实验,结果显示,提出的数据卸载策略能有效地解决数据源节点能量消耗过快的问题,延长数据源节点的生存期.  相似文献   
116.
为了使网格技术能更好的支撑上层应用,增强网格中间件的灵活性和调度效率。提出了一种基于代理的网格中间件体系结构,该中间件在设计上充分利用代理的可移动性和可控管理提高网格底层资源的利用率。最后在电信客户价值分析业务的实现框架基础上,给出网格中间件中任务分解、任务执行和服务聚合等策略,本研究结果可以提供高效、安全和可控的上层应用开发。  相似文献   
117.
随着网络和移动智能体技术的不断发展,如何在网络资源中找到自己需要的服务成为一个热门话题。描述以一种移动的多智能体系统,并且在进行系统底层通信、智能体在网络环境移动、智能体与服务器之间通信应用CORBA。服务器接受任务,派遣服务请求智能体在网络环境中寻找能为自己提供服务的服务器,完成向服务器预订服务任务。给出系统接受任务后派遣请求智能体的工作流程及服务器接受智能体访问的流程。  相似文献   
118.
ESB环境中基于代理的可信服务模型   总被引:1,自引:0,他引:1  
针对ESB环境下安全隐患的特定需求,提出了基于代理的可信服务模型.模型在ESB的节点上部署一个可信服务模型的代理,采用位运算计算服务的信任度,整合最可信的服务运行流程.在符合ESB规范以及不影响性能的前提下,可以提高系统运行的稳定性和安全性.在SynchroESB平台上的应用,证明该模型的可行性、正确性和健壮性.  相似文献   
119.
The multi mobile agent collaboration planning model was constructed based on the mobile agent load balancing and total network energy consumption index.In order to prolong the network lifetime,the network node dormancy mechanism based on WSN network coverage was put forward,using fewer worked nodes to meet the requirements of network coverage.According to the multi mobile agent collaborative planning technical features,the multi-objective discrete social spider optimization algorithm (MDSSO) with Pareto optimal solutions was designed.The interpolation learning and exchange variations particle updating strategy was redefined,and the optimal set size was adjusted dynamically,which helps to improve the accuracy of MDSSO.Simulation results show that the proposed algorithm can quickly give the WSN multi mobile agent path planning scheme,and compared with other schemes,the network total energy consumption has reduced by 15%,and the network lifetime has increased by 23%.  相似文献   
120.
We propose in this paper a Hybrid Software‐Defined Networking‐based Geographical Routing Protocol (HSDN‐GRA) with a clustering approach. It takes into account three different criteria to select the best relay to send data: (1) the contact duration between vehicles, (2) the available load of each vehicle, (3) and the log of encountered communication errors embedded in each cluster head. The multi‐criteria strategy allows the selection of the most reliable vehicles by avoiding communication problems and ensuring connection availability. Once the hybrid control plane has found out the next eligible neighbor, the data plane will be in charge of dividing and sending data. To validate our approach, HSDN‐GRA has been modeled and implemented in JADE, a multi‐agent platform, to be compared to other multi‐agent based protocols. Simulation results show that HSDN‐GRA achieves good performance with respect to the average routing overhead, the packet drop rate, and the throughput.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号