首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9801篇
  免费   1287篇
  国内免费   1101篇
电工技术   220篇
综合类   853篇
化学工业   623篇
金属工艺   130篇
机械仪表   260篇
建筑科学   217篇
矿业工程   99篇
能源动力   124篇
轻工业   320篇
水利工程   180篇
石油天然气   156篇
武器工业   42篇
无线电   2595篇
一般工业技术   611篇
冶金工业   79篇
原子能技术   48篇
自动化技术   5632篇
  2024年   26篇
  2023年   119篇
  2022年   156篇
  2021年   202篇
  2020年   299篇
  2019年   203篇
  2018年   236篇
  2017年   306篇
  2016年   360篇
  2015年   509篇
  2014年   681篇
  2013年   746篇
  2012年   832篇
  2011年   879篇
  2010年   734篇
  2009年   790篇
  2008年   786篇
  2007年   807篇
  2006年   641篇
  2005年   589篇
  2004年   485篇
  2003年   407篇
  2002年   295篇
  2001年   252篇
  2000年   184篇
  1999年   130篇
  1998年   108篇
  1997年   78篇
  1996年   70篇
  1995年   64篇
  1994年   44篇
  1993年   37篇
  1992年   31篇
  1991年   20篇
  1990年   13篇
  1989年   9篇
  1988年   8篇
  1987年   9篇
  1986年   10篇
  1985年   4篇
  1984年   9篇
  1983年   10篇
  1982年   2篇
  1981年   3篇
  1980年   5篇
  1978年   1篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
101.
Recently, physical layer security commonly known as Radio Frequency (RF) fingerprinting has been proposed to provide an additional layer of security for wireless devices. A unique RF fingerprint can be used to establish the identity of a specific wireless device in order to prevent masquerading/impersonation attacks. In the literature, the performance of RF fingerprinting techniques is typically assessed using high-end (expensive) receiver hardware. However, in most practical situations receivers will not be high-end and will suffer from device specific impairments which affect the RF fingerprinting process. This paper evaluates the accuracy of RF fingerprinting employing low-end receivers. The vulnerability to an impersonation attack is assessed for a modulation-based RF fingerprinting system employing low-end commodity hardware (by legitimate and malicious users alike). Our results suggest that receiver impairment effectively decreases the success rate of impersonation attack on RF fingerprinting. In addition, the success rate of impersonation attack is receiver dependent.  相似文献   
102.
In network-on-chip (NoC) designs, the bufferless router is more energy-efficient than the conventional router with buffers. However, in the bufferless network, deflections cause great performance loss. In this paper, three deflection models are firstly constructed for analyzing the causes of deflections. Then, we propose a low-deflection bufferless router (LDBR), in which a multi-channel network interface and a novel deflection routing based on turn model are designed for reducing the deflections during packet transmissions. Finally, LDBR is evaluated against the latest bufferless routers using synthetic and real-world traffic patterns. The experimental results exhibit that the deflection rate of LDBR network is reduced by 41% compared to other bufferless networks, and LDBR also shows superiority in cost and power consumption across all workloads.  相似文献   
103.
We study the question of routing for minimum average drop rate over unreliable servers that are susceptible to random buffer failures, which arises in unreliable data or manufacturing networks. Interestingly, we first reveal that the traditional Join-the-Shortest-Queue (JSQ) or optimal Randomized Splitting (RS) strategies are consistently outperformed by the Constant Splitting Rule (CSR) where the incoming traffic is split with a constant fraction towards the available servers.This finding motivates us to obtain the optimal splitting fraction under CSR. However, the objective function to be minimized depends on the mean queue length of the servers, whose closed-form expression is not available and often intractable for general arrival and service processes. Thus, we use non-derivative methods to solve this optimization problem by approximately evaluating the objective value at each iteration. To that end, we explicitly characterize the approximation error by utilizing the regenerating nature of unreliable buffers. By adaptively controlling the precision of this approximation, we show that our proposed algorithm converges to an optimal splitting decision in the almost sure sense. Yet, previous works on non-derivative methods assume continuous differentiability of the objective function, which is not the case in our setup. We relax this strong assumption to the case when the objective function is locally Lipschitz continuous, which is another contribution of this paper.  相似文献   
104.
Geographically distributed cloud platforms enable an attractive approach to large-scale content delivery. Storage at various sites can be dynamically acquired from (and released back to) the cloud provider so as to support content caching, according to the current demands for the content from the different geographic regions. When storage is sufficiently expensive that not all content should be cached at all sites, two issues must be addressed: how should requests for content be routed to the cloud provider sites, and what policy should be used for caching content using the elastic storage resources obtained from the cloud provider. Existing approaches are typically designed for non-elastic storage and little is known about the optimal policies when minimizing the delivery costs for distributed elastic storage.In this paper, we propose an approach in which elastic storage resources are exploited using a simple dynamic caching policy, while request routing is updated periodically according to the solution of an optimization model. Use of pull-based dynamic caching, rather than push-based placement, provides robustness to unpredicted changes in request rates. We show that this robustness is provided at low cost. Even with fixed request rates, use of the dynamic caching policy typically yields content delivery cost within 10% of that with the optimal static placement. We compare request routing according to our optimization model to simpler baseline routing policies, and find that the baseline policies can yield greatly increased delivery cost relative to optimized routing. Finally, we present a lower-cost approximate solution algorithm for our routing optimization problem that yields content delivery cost within 2.5% of the optimal solution.  相似文献   
105.
针对水文资料缺乏的中小河流,以贵溪市罗塘河下游段为例,应用MIKE软件对河流溃堤洪水演进进行了研究。采用瞬时单位线法推求断面各频率的设计洪水,并将其作为洪水演进模型的输入;利用MIKE软件建立了贵溪市罗塘河下游段的一、二维耦合水动力模型,对该河下游段溃堤洪水演进过程进行了模拟;通过模拟分析,得到了溃口流量过程和堤防保护区洪水淹没过程。研究成果可为中小河流洪水风险分析和灾害损失评估提供技术支撑。  相似文献   
106.
The physical sorption of a series of cyclophosphamide drug derivatives with formula
where x = 2, X = F (2), Cl (3), Br (4); x = 3, X = F (5), Cl (6), Br (7) and x = 4, X = F (8), Cl (9), Br (10) on the surface of fullerene C60 was studied using density functional theory (DFT) at B3LYP and B3PW91 levels. The most negative binding energies obtained using the B3LYP approach and corrected for geometrical BSSE and dispersion energies (gCP-D3-ΔEbinding) were measured for compounds 8 (among isolated drugs) and 13 (among complexes). The dipole moments of isolated drugs were obtained close to those of their complexes with C60 (∼4.0–5.5 Debye) indicating their hydrophililic nature that is an appropriate property appealing for drug delivery in biological media. The adsorption of all drugs on the surface of fullerene was endergonic with all of the ΔGadsorption > 0. The ΔHadsorption values at B3PW91 level were only negative for complexes 1416 indicating their exothermic adsorption nature. The HOMO–LUMO band gaps of complexes 1119 were about 2.7 eV and are comparable with the gap in C60 but are much smaller than the gaps in isolated drugs 210 (6.5–8.0 eV) reflecting the increase in electrical conductivities upon complexation. The QTAIM data supported the covalent character of the C–O, C–N and N–H bonds, the intermediate character of PO, P–O and P–N bonds while the electrostatic nature of PO…C(fullerene) interactions. According to the gCP-D3-ΔEbinding binding energies and ΔHadsorption values at B3LYP level, it seems that the complexes 12 and 13 can be the most promising prodrug + carrier delivery systems.

Graphical abstract

  1. Download : Download high-res image (259KB)
  2. Download : Download full-size image
  相似文献   
107.
The presented work is part of a larger research program dealing with developing tools for coupling biogeochemical models in contaminated landscapes. The specific objective of this article is to provide researchers with a data porting tool to build hexagonal raster using information from a rectangular raster data (e.g. GIS format). This tool involves a computational algorithm and an open source software (written in C). The method of extending the reticulated functions defined on 2D networks is an essential key of this algorithm and can also be used for other purposes than data porting. The algorithm allows one to build the hexagonal raster with a cell size independent from the geometry of the rectangular raster. The extended function is a bi-cubic spline which can exactly reconstruct polynomials up to degree three in each variable. We validate the method by analyzing errors in some theoretical case studies followed by other studies with real terrain elevation data. We also introduce and briefly present an iterative water routing method and use it for validation on a case with concrete terrain data.  相似文献   
108.
Moveable bubble flow control is an efficient technique to avoid deadlock for torus networks. However, it does not take into consideration the load balance feature. Therefore, this leads to inefficient resources utilization. Moreover, packets may be discarded due to the congestion of a network area. On the other hand, there are other algorithms that consider load balancing such as rHALB (r hop adaptive load-balanced)routing technique. Nonetheless, rHALB detects deadlock using the timeout threshold. This concept of deadlock detection may give incorrect responses in case the traffic is high. Therefore, packets are dropped although there is no deadlock. At the end, this affects the whole performance of the network. This paper proposes a new routing algorithm for tori interconnection networks, namely, the LBMBS (load-balanced moveable bubble scheme). LBMBS integrates both concepts of moveable bubble and rHALB in order to provide at the end a load-balanced efficient deadlock-free algorithm. The protocol details are given and compared against other routing algorithms in the literature.  相似文献   
109.
针对现有的贪婪方法不能有效处理拓扑结构中链路故障的问题,提出单链路故障和多链路故障本地化恢复策略。首先,通过利用克莱因伯格的贪婪嵌入给出单链路故障恢复策略;然后,将其扩展到多链路故障的情况;最后,在基于Python/C++的仿真环境下对提出的技术进行评估。实验结果表明,该技术仅需要非常有限的资源,且造成的路由质量损耗也有限,可以实现快速切换,可依网络生成树中链路数目扩展。该技术的可扩展性、简单性和低开销使其适合于大型网络。  相似文献   
110.
网络边布局技术是网络可视化研究的重要内容,良好的边布局能够有效地展示网络的整体结构并从中揭示出某些隐含的信息模式.为了全面地总结和分析现有网络边布局技术,首先归纳了网络边布局的主要任务,回顾了指导网络边布局的美学标准.然后将网络边布局技术归纳为3类:边路由技术、边融合技术和边集束技术,分别阐述了各类技术中典型布局方法的主要原理和特征,并重点对边集束技术进行了分类分析.最后总结了目前研究中还存在的一些问题,展望了网络边布局技术的发展前景和面临的挑战,以期为相关领域的研究者提供有益参考.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号