首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   28376篇
  免费   2890篇
  国内免费   2454篇
电工技术   1514篇
技术理论   1篇
综合类   2332篇
化学工业   1537篇
金属工艺   341篇
机械仪表   869篇
建筑科学   643篇
矿业工程   216篇
能源动力   448篇
轻工业   219篇
水利工程   225篇
石油天然气   168篇
武器工业   111篇
无线电   6593篇
一般工业技术   1570篇
冶金工业   457篇
原子能技术   53篇
自动化技术   16423篇
  2024年   143篇
  2023年   496篇
  2022年   592篇
  2021年   666篇
  2020年   830篇
  2019年   722篇
  2018年   680篇
  2017年   873篇
  2016年   1004篇
  2015年   1166篇
  2014年   1649篇
  2013年   1858篇
  2012年   1844篇
  2011年   2145篇
  2010年   1692篇
  2009年   2016篇
  2008年   2125篇
  2007年   2068篇
  2006年   1677篇
  2005年   1447篇
  2004年   1254篇
  2003年   1090篇
  2002年   967篇
  2001年   828篇
  2000年   746篇
  1999年   595篇
  1998年   513篇
  1997年   453篇
  1996年   362篇
  1995年   275篇
  1994年   214篇
  1993年   176篇
  1992年   126篇
  1991年   73篇
  1990年   53篇
  1989年   40篇
  1988年   31篇
  1987年   24篇
  1986年   19篇
  1985年   46篇
  1984年   41篇
  1983年   37篇
  1982年   41篇
  1981年   4篇
  1980年   3篇
  1979年   8篇
  1978年   4篇
  1977年   1篇
  1976年   2篇
  1951年   1篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
91.
无线传感器网络MAC协议的研究与分析   总被引:1,自引:0,他引:1       下载免费PDF全文
丁睿  南建国 《计算机工程》2009,35(19):105-107
针对不同的传感器网络应用,研究人员从不同方面提出多个无线传感器网络介质访问控制(MAC)协议,其中包括S-MAC,PMAC,DEANA,EMACs,Z—MAC以及AIMRP等协议。通过分析各类MAC典型协议特点,归纳其设计原则和分类方法,比较各协议间的性能差异,结果证明无线传感器网络MAC协议呈现多样性的特点,设计MAC协议需要兼顾能量效能和网络性能2个方面。给出MAC协议的设计策略。  相似文献   
92.
基于XML与数据库技术的权限管理   总被引:3,自引:1,他引:2       下载免费PDF全文
在基于角色的访问控制(RBAC)模型的基础上,结合XML应用特性,对权限管理中的系统和用户权限信息分别应用XML和数据库技术,设计并实现了将XML与数据库技术相结合的Web应用系统的权限管理方法,提高了Web系统权限管理的灵活性和复用性,并在实际系统中验证成功。  相似文献   
93.
This paper addresses the explicit synchronisation of heterogeneous dynamics networks via three-layer communication framework. The main contribution is to propose an explicit synchronisation algorithm, in which the synchronisation errors of all the agents are decoupled. By constructing a three-layer node model, the proposed algorithm removes the assumptions that the topology is fixed and the synchronisation process is coupled. By introducing appropriate assumptions, the algorithm leads to a class of explicit synchronisation protocols based on the states of agents in different layers. It is proved in the sense of Lyapunov that, if the dwell time is larger than a threshold, the explicit synchronisation can be achieved for closed-loop heterogeneous dynamics networks under switching topologies. The results are further extended to the cases in which the switching topologies are only frequently but not always connected. Simulation results are presented with four single-link manipulators to verify the theoretical analysis.  相似文献   
94.
The objective of this study is to provide a framework for relocating or reconfiguring existing pollution monitoring station networks by using feature selection and data mining techniques. This methodology enables a partial redesign based on the maximization of the available information that is gathered by the pollution networks by the optimal data mining technique. It also considers requirements of the decision makers, like potential target places, etc.Since this methodology is based on the quality of forecasting, it can also be useful for auditing and forecasting. A case study is included in this paper. In light of the prediction results, a new way to relocate the existing monitoring station is proposed.  相似文献   
95.
Opportunistic routing is a candidate for multihop wireless routing where the network topology and radio channels vary rapidly. However, there are not many opportunistic routing algorithms that can be implemented in a real multihop wireless network while exploiting the node mobility. It motivates us to implement an opportunistic routing, random basketball routing (BR), in a real multi-robot network to see if it can enhance the capacity of the multihop network as mobility increases. For implementation purposes, we added some features, such as destination RSSI measuring, a loop-free procedure and distributed relay probability updating, to the original BR. We carried out the experiments on a real multi-robot network and compared BR with AODV combined with CSMA/CA (routing + MAC protocol). We considered both static and dynamic scenarios. Our experiments are encouraging in that BR outperforms AODV + CSMA/CA, particularly in dynamic cases; the throughput of BR is 6.6 times higher than that of AODV + CSMA/CA. BR with dynamic networks shows 1.4 times higher throughput performance than BR with static networks. We investigate the performance of BR in the large-scale network using NS-2 simulation. We verify the effect of node density, speed, destination beacon signal and loop-free procedure. According to the large-scale simulation, the end-to-end throughput grows with the node speed.  相似文献   
96.
Recent developments in the area of decentralized and infrastructureless systems opened avenues for novel applications. Along with these new technologies, new questions regarding their operational bounds in terms of e.g. scalability and security arose. Due to the sparse presence of real-world decentralized and infrastructureless systems, new protocols and applications have to be scrutinized by means of simulation, in (small-scale) testbeds, and by analytical models. In this paper, we discuss challenges of evaluating security mechanisms for mobile ad hoc networks and peer-to-peer systems. We focus on harmonizing predictions of analytical models and results obtained from simulation studies and testbed experiments.  相似文献   
97.
This paper investigates packet scheduling in the context of Self-Optimizing Networks, and demonstrates how to improve coverage dynamically by adjusting the scheduling strategy. We focus on α-fair schedulers, and we provide methods for calculating the scheduling gain, including several closed form formulas. Scheduling gain is analyzed for different fading models, with a particular focus on the frequency-selective channel. We then propose a coverage-capacity self-optimization algorithm based on α-fair schedulers. A use case illustrates the implementation of the algorithm and simulation results show that important coverage gains are achieved at the expense of very little computing power.  相似文献   
98.
The software in modern systems has become too complex to make accurate predictions about their performance under different configurations. Real-time or even responsiveness requirements cannot be met because it is not possible to perform admission control for new or changing tasks if we cannot tell how their execution affects the other tasks already running. Previously, we proposed a resource-allocation middleware that manages the execution of tasks in a complex distributed system with real-time requirements. The middleware behavior can be modeled depending on the configuration of the tasks running, so that the performance of any given configuration can be calculated. This makes it possible to have admission control in such a system, but the model requires knowledge of run-time parameters. We propose the utilization of machine-learning algorithms to obtain the model parameters, and be able to predict the system performance under any configuration, so that we can provide a full admission control mechanism for complex software systems. In this paper, we present such an admission control mechanism, we measure its accuracy in estimating the parameters of the model, and we evaluate its performance to determine its suitability for a real-time or responsive system.  相似文献   
99.
面向高速工业无线网络的TDMA MAC协议设计与实现   总被引:1,自引:0,他引:1  
随着无线技术的发展,在工业自动化中引入无线技术已经成为一种潮流,同时TDMA机制由于可以完全避免冲突,因此在大规模高实时要求的面向车间的无线技术研究中受到了广泛关注,但现在面向车间的高速实时无线技术的研究大都局限于软件仿真。通过在商用802.11硬件上设计并实现面向车间级工业应用的高速工业无线TDMAMAC层协议,建立了一个基于TDMA的面向工业应用的高速无线网络原型系统,实验结果表明实验平台完全能够支撑毫秒级时隙调度的TDMA应用。  相似文献   
100.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号