首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   12275篇
  免费   701篇
  国内免费   660篇
电工技术   589篇
技术理论   1篇
综合类   705篇
化学工业   82篇
金属工艺   127篇
机械仪表   380篇
建筑科学   197篇
矿业工程   96篇
能源动力   56篇
轻工业   44篇
水利工程   30篇
石油天然气   26篇
武器工业   61篇
无线电   4142篇
一般工业技术   305篇
冶金工业   68篇
原子能技术   44篇
自动化技术   6683篇
  2024年   16篇
  2023年   70篇
  2022年   114篇
  2021年   159篇
  2020年   187篇
  2019年   113篇
  2018年   151篇
  2017年   231篇
  2016年   275篇
  2015年   307篇
  2014年   596篇
  2013年   489篇
  2012年   663篇
  2011年   818篇
  2010年   647篇
  2009年   809篇
  2008年   914篇
  2007年   1037篇
  2006年   1046篇
  2005年   990篇
  2004年   854篇
  2003年   891篇
  2002年   715篇
  2001年   503篇
  2000年   412篇
  1999年   242篇
  1998年   116篇
  1997年   80篇
  1996年   56篇
  1995年   49篇
  1994年   26篇
  1993年   20篇
  1992年   13篇
  1991年   9篇
  1990年   2篇
  1989年   9篇
  1988年   3篇
  1987年   1篇
  1984年   2篇
  1983年   1篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
11.
本文介绍JavaFX平台架构和JavaFX Script脚本语言的特点讨论了图片考察应用并给出了技术的实现方案。  相似文献   
12.
薛方芳 《福建电脑》2009,25(8):120-120
随着时间的推移,已经证明,TCP/IP是制造自动化环境中主机之间传输数据与控制信息的一种可靠方法。TCP/IP已经使得制造工厂扩大了它们的自动化范围,这在十几年前是不能想象的。  相似文献   
13.
This paper proposes an improved sine–cosine algorithm (ISCA) based 2-DOF-PID controller for load frequency control. A three-area test system is built for study, while some physical constraints (nonlinearities) are considered for the investigation of a realistic power system. The proposed method is used as the parameter optimizer of the LFC controller in different scenarios. The 2-DOF-PID controllers are used because of their capability of fast disturbance rejection without significant increase of overshoot in set-point tracking. The 2-DOF-PID controllers’ efficacy is observed by examining the responses with the outcomes obtained with PID and FOPID controllers. The simulation results with the suggested scheme are correlated with some of the existing algorithms, such as SCA, SSA, ALO, and PSO in three different scenarios, i.e., a disturbance in two areas, in three areas, and in the presence of physical constraints. In addition, the study is extended to a four-area power system. Statistical analysis is performed using the Wilcoxon Sign Rank Test (WSRT) on 20 independent runs. This confirms the supremacy of the proposed method.  相似文献   
14.
Dimitris  Nikos  Costas   《Computers & Security》2009,28(7):578-591
Any application or service utilizing the Internet is exposed to both general Internet attacks and other specific ones. Most of the times the latter are exploiting a vulnerability or misconfiguration in the provided service and/or in the utilized protocol itself. Consequently, the employment of critical services, like Voice over IP (VoIP) services, over the Internet is vulnerable to such attacks and, on top of that, they offer a field for new attacks or variations of existing ones. Among the various threats–attacks that a service provider should consider are the flooding attacks, at the signaling level, which are very similar to those against TCP servers but have emerged at the application level of the Internet architecture. This paper examines flooding attacks against VoIP architectures that employ the Session Initiation Protocol (SIP) as their signaling protocol. The focus is on the design and implementation of the appropriate detection method. Specifically, a bloom filter based monitor is presented and a new metric, named session distance, is introduced in order to provide an effective protection scheme against flooding attacks. The proposed scheme is evaluated through experimental test bed architecture under different scenarios. The results of the evaluation demonstrate that the required time to detect such an attack is negligible and also that the number of false alarms is close to zero.  相似文献   
15.
Recent developments in the area of decentralized and infrastructureless systems opened avenues for novel applications. Along with these new technologies, new questions regarding their operational bounds in terms of e.g. scalability and security arose. Due to the sparse presence of real-world decentralized and infrastructureless systems, new protocols and applications have to be scrutinized by means of simulation, in (small-scale) testbeds, and by analytical models. In this paper, we discuss challenges of evaluating security mechanisms for mobile ad hoc networks and peer-to-peer systems. We focus on harmonizing predictions of analytical models and results obtained from simulation studies and testbed experiments.  相似文献   
16.
There is huge diversity among navigation and path-planning problems in the real world because of the enormous number and great variety of assumptions about the environments, constraints, and tasks imposed on a robot. To deal with this diversity, we propose a new solution to the path-planning and navigation of a mobile robot. In our approach, we formulated the following two problems at each time-step as discrete optimization problems: (1) estimation of a robot's location, and (2) action decision. For the first problem, we minimize an objective function that includes a data term, a constraint term, and a prediction term. This approach is an approximation of Markov localization. For the second problem, we define and minimize another objective function that includes a goal term, a smoothness term, and a collision term. Simulation results show the effectiveness of our approach. This work was presented in part at the Fifth International Symposium on Artificial Life and Robotics, Oita, Japan, January 26–28, 2000  相似文献   
17.
周Wei刚 《现代计算机》2001,(8):57-59,64
通过一个实例介绍基于VSAT的移动指挥系统的设计,阐述了系统的基本结构单元与数据接口,最后,指出系统建设的注意要点。  相似文献   
18.
This paper presents a novel distributed control scheme of multiple robotic vehicles. Each robotic vehicle in this scheme has its own coordinate system, and it senses its relative position and orientation to others, in order to make group formations. Although there exists no supervisor and each robotic vehicle has only relative position feedback from the others in the local area around itself, all the robotic vehicles are stabilized, which we have succeeded in proving mathematically only in the cases where the attractions between the robots are symmetrical. Each robotic vehicle especially has a two-dimensional control input referred to as a “formation vector” and the formation is controllable by the vectors. The validity of this scheme is supported by computer simulations.  相似文献   
19.
周志钊  韩正之 《计算机工程》2001,27(12):92-93,99
分析了CDPD、无线局域网、移动IP协议等几种用于实现计算机通信过程中的移动和方案,指出各自的特点和适用的范围。通过比较阐明了移动IP作为未来移动因特网的主要解决方案的优越性和其发展的必然性。  相似文献   
20.
介绍了冷轧不锈钢生产过程中的计算机管理系统,给出了系统的硬件配置及系统集成方案.该系统对冷轧不锈钢生产过程当中的所有生产、物流信息进行综合管理,具有较好的推广及应用价值.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号