全文获取类型
收费全文 | 12275篇 |
免费 | 701篇 |
国内免费 | 660篇 |
专业分类
电工技术 | 589篇 |
技术理论 | 1篇 |
综合类 | 705篇 |
化学工业 | 82篇 |
金属工艺 | 127篇 |
机械仪表 | 380篇 |
建筑科学 | 197篇 |
矿业工程 | 96篇 |
能源动力 | 56篇 |
轻工业 | 44篇 |
水利工程 | 30篇 |
石油天然气 | 26篇 |
武器工业 | 61篇 |
无线电 | 4142篇 |
一般工业技术 | 305篇 |
冶金工业 | 68篇 |
原子能技术 | 44篇 |
自动化技术 | 6683篇 |
出版年
2024年 | 16篇 |
2023年 | 70篇 |
2022年 | 114篇 |
2021年 | 159篇 |
2020年 | 187篇 |
2019年 | 113篇 |
2018年 | 151篇 |
2017年 | 231篇 |
2016年 | 275篇 |
2015年 | 307篇 |
2014年 | 596篇 |
2013年 | 489篇 |
2012年 | 663篇 |
2011年 | 818篇 |
2010年 | 647篇 |
2009年 | 809篇 |
2008年 | 914篇 |
2007年 | 1037篇 |
2006年 | 1046篇 |
2005年 | 990篇 |
2004年 | 854篇 |
2003年 | 891篇 |
2002年 | 715篇 |
2001年 | 503篇 |
2000年 | 412篇 |
1999年 | 242篇 |
1998年 | 116篇 |
1997年 | 80篇 |
1996年 | 56篇 |
1995年 | 49篇 |
1994年 | 26篇 |
1993年 | 20篇 |
1992年 | 13篇 |
1991年 | 9篇 |
1990年 | 2篇 |
1989年 | 9篇 |
1988年 | 3篇 |
1987年 | 1篇 |
1984年 | 2篇 |
1983年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
11.
张宗升 《电脑编程技巧与维护》2009,(16):6-7,10
本文介绍JavaFX平台架构和JavaFX Script脚本语言的特点讨论了图片考察应用并给出了技术的实现方案。 相似文献
12.
随着时间的推移,已经证明,TCP/IP是制造自动化环境中主机之间传输数据与控制信息的一种可靠方法。TCP/IP已经使得制造工厂扩大了它们的自动化范围,这在十几年前是不能想象的。 相似文献
13.
Design of a 2-DOF-PID controller using an improved sine–cosine algorithm for load frequency control of a three-area system with nonlinearities 下载免费PDF全文
This paper proposes an improved sine–cosine algorithm (ISCA) based 2-DOF-PID controller for load frequency control. A three-area test system is built for study, while some physical constraints (nonlinearities) are considered for the investigation of a realistic power system. The proposed method is used as the parameter optimizer of the LFC controller in different scenarios. The 2-DOF-PID controllers are used because of their capability of fast disturbance rejection without significant increase of overshoot in set-point tracking. The 2-DOF-PID controllers’ efficacy is observed by examining the responses with the outcomes obtained with PID and FOPID controllers. The simulation results with the suggested scheme are correlated with some of the existing algorithms, such as SCA, SSA, ALO, and PSO in three different scenarios, i.e., a disturbance in two areas, in three areas, and in the presence of physical constraints. In addition, the study is extended to a four-area power system. Statistical analysis is performed using the Wilcoxon Sign Rank Test (WSRT) on 20 independent runs. This confirms the supremacy of the proposed method. 相似文献
14.
Any application or service utilizing the Internet is exposed to both general Internet attacks and other specific ones. Most of the times the latter are exploiting a vulnerability or misconfiguration in the provided service and/or in the utilized protocol itself. Consequently, the employment of critical services, like Voice over IP (VoIP) services, over the Internet is vulnerable to such attacks and, on top of that, they offer a field for new attacks or variations of existing ones. Among the various threats–attacks that a service provider should consider are the flooding attacks, at the signaling level, which are very similar to those against TCP servers but have emerged at the application level of the Internet architecture. This paper examines flooding attacks against VoIP architectures that employ the Session Initiation Protocol (SIP) as their signaling protocol. The focus is on the design and implementation of the appropriate detection method. Specifically, a bloom filter based monitor is presented and a new metric, named session distance, is introduced in order to provide an effective protection scheme against flooding attacks. The proposed scheme is evaluated through experimental test bed architecture under different scenarios. The results of the evaluation demonstrate that the required time to detect such an attack is negligible and also that the number of false alarms is close to zero. 相似文献
15.
Ralf Steinmetz Author VitaeAndré KönigAuthor Vitae 《Performance Evaluation》2011,68(9):750-767
Recent developments in the area of decentralized and infrastructureless systems opened avenues for novel applications. Along with these new technologies, new questions regarding their operational bounds in terms of e.g. scalability and security arose. Due to the sparse presence of real-world decentralized and infrastructureless systems, new protocols and applications have to be scrutinized by means of simulation, in (small-scale) testbeds, and by analytical models. In this paper, we discuss challenges of evaluating security mechanisms for mobile ad hoc networks and peer-to-peer systems. We focus on harmonizing predictions of analytical models and results obtained from simulation studies and testbed experiments. 相似文献
16.
There is huge diversity among navigation and path-planning problems in the real world because of the enormous number and great
variety of assumptions about the environments, constraints, and tasks imposed on a robot. To deal with this diversity, we
propose a new solution to the path-planning and navigation of a mobile robot. In our approach, we formulated the following
two problems at each time-step as discrete optimization problems: (1) estimation of a robot's location, and (2) action decision.
For the first problem, we minimize an objective function that includes a data term, a constraint term, and a prediction term.
This approach is an approximation of Markov localization. For the second problem, we define and minimize another objective
function that includes a goal term, a smoothness term, and a collision term. Simulation results show the effectiveness of
our approach.
This work was presented in part at the Fifth International Symposium on Artificial Life and Robotics, Oita, Japan, January
26–28, 2000 相似文献
17.
通过一个实例介绍基于VSAT的移动指挥系统的设计,阐述了系统的基本结构单元与数据接口,最后,指出系统建设的注意要点。 相似文献
18.
This paper presents a novel distributed control scheme of multiple robotic vehicles. Each robotic vehicle in this scheme has its own coordinate system, and it senses its relative position and orientation to others, in order to make group formations. Although there exists no supervisor and each robotic vehicle has only relative position feedback from the others in the local area around itself, all the robotic vehicles are stabilized, which we have succeeded in proving mathematically only in the cases where the attractions between the robots are symmetrical. Each robotic vehicle especially has a two-dimensional control input referred to as a “formation vector” and the formation is controllable by the vectors. The validity of this scheme is supported by computer simulations. 相似文献
19.
分析了CDPD、无线局域网、移动IP协议等几种用于实现计算机通信过程中的移动和方案,指出各自的特点和适用的范围。通过比较阐明了移动IP作为未来移动因特网的主要解决方案的优越性和其发展的必然性。 相似文献
20.
介绍了冷轧不锈钢生产过程中的计算机管理系统,给出了系统的硬件配置及系统集成方案.该系统对冷轧不锈钢生产过程当中的所有生产、物流信息进行综合管理,具有较好的推广及应用价值. 相似文献