首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   14696篇
  免费   1418篇
  国内免费   1887篇
电工技术   573篇
技术理论   2篇
综合类   827篇
化学工业   312篇
金属工艺   153篇
机械仪表   722篇
建筑科学   362篇
矿业工程   146篇
能源动力   138篇
轻工业   84篇
水利工程   106篇
石油天然气   92篇
武器工业   84篇
无线电   2646篇
一般工业技术   295篇
冶金工业   116篇
原子能技术   45篇
自动化技术   11298篇
  2024年   18篇
  2023年   127篇
  2022年   360篇
  2021年   539篇
  2020年   447篇
  2019年   274篇
  2018年   306篇
  2017年   273篇
  2016年   298篇
  2015年   438篇
  2014年   853篇
  2013年   818篇
  2012年   1071篇
  2011年   1478篇
  2010年   945篇
  2009年   832篇
  2008年   1009篇
  2007年   1181篇
  2006年   1138篇
  2005年   1051篇
  2004年   848篇
  2003年   818篇
  2002年   674篇
  2001年   470篇
  2000年   411篇
  1999年   350篇
  1998年   243篇
  1997年   186篇
  1996年   132篇
  1995年   90篇
  1994年   74篇
  1993年   60篇
  1992年   38篇
  1991年   19篇
  1990年   24篇
  1989年   24篇
  1988年   20篇
  1987年   7篇
  1986年   15篇
  1985年   5篇
  1984年   14篇
  1983年   8篇
  1982年   6篇
  1981年   3篇
  1980年   2篇
  1979年   1篇
  1977年   2篇
  1972年   1篇
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
101.
This paper addresses the problem of bandwidth allocation under the weighted maximum rate constrained link sharing policy and proves a key theory in the condition of allocation termination. We propose several algorithms with various worst-case and average-case time complexities, and evaluate their computation elapse times.  相似文献   
102.
Kevin Burns 《Information Sciences》2006,176(11):1570-1589
Bayesian inference provides a formal framework for assessing the odds of hypotheses in light of evidence. This makes Bayesian inference applicable to a wide range of diagnostic challenges in the field of chance discovery, including the problem of disputed authorship that arises in electronic commerce, counter-terrorism and other forensic applications. For example, when two documents are so similar that one is likely to be a hoax written from the other, the question is: Which document is most likely the source and which document is most likely the hoax? Here I review a Bayesian study of disputed authorship performed by a biblical scholar, and I show that the scholar makes critical errors with respect to several issues, namely: Causal Basis, Likelihood Judgment and Conditional Dependency. The scholar’s errors are important because they have a large effect on his conclusions and because similar errors often occur when people, both experts and novices, are faced with the challenges of Bayesian inference. As a practical solution, I introduce a graphical system designed to help prevent the observed errors. I discuss how this decision support system applies more generally to any problem of Bayesian inference, and how it differs from the graphical models of Bayesian Networks.  相似文献   
103.
The most efficient approach to a fair exchange is to use an off-line trusted third party (TTP for short) who gets involved only when a dispute between two parties occurs. However, exchanged secrets that are not protected properly may be exposed to the TTP when one of these two parties asks the TTP to mediate the dispute. The first work to protect exchanged secrets from TTP’s misuse was proposed by Franklin and Reiter in 1997. They provided an on-line semi-trusted third party instead of an off-line third party for a fair exchange. Their schemes forced the TTP to take part in the protocol for all the cases, and thus, deemed to be impractical.The present paper, introduces several models, including single and multiple TTPs, to focus the attention not only on security properties, but also on reliability functions. In the single TTP mode, our new scheme can protect the exchanged data through an efficient exchange protocol, whereas in the multiple TTP mode, we proposed an approach to balance the security level with the reliability of the system.  相似文献   
104.
本文结合江苏C4本地网的实际情况,说明C4本地网纳入C3本地电话网的必要性,例举了4种C3本地网的组网方式。  相似文献   
105.
传统的学校正在走向多种类型的学校,单纯的学校教育正在走向终身教育,各种形式的网络教育的兴起,使人们获得教育的机会越来越多、越来越平等。而从事计算机教学的教师无疑可以借此获得最大收益。  相似文献   
106.
Variable Rate (VR) speech coders are classified into: source-controlled VR coders where the rate is selected depending on the local character of the speech, and network-controlled VR coders where an external control signal selects the coding rate. The first category benefits from the variable rate channels used by Code Division Multiple Access (CDMA) mobile communications. The second category is indispensable for the right behaviour of the CDMA systems under conditions as high traffic levels. The VR speech coder presented in this communication exhibits both types of control. The source control is achieved by means of a Voice Activity Detector (VAD) and a phonetic classifier. The network control acts on the selection procedure of the multipulse excitation sequence to the synthesis filter. This is the main advantage of our VR MultiPulse speech coder because by means of an external signal the bit rate can be changed only every 4 msec, without transitions or distortions. Considering one-way communication, six different operating rates can be externally selected ranging from 4.8 to 9.1 kbps for the active frames; an average bit rate of 380 bps is required for the noise frames.This work has been partly funded by the Spanish Research National Plan under grant no. TIC92-0800-C05-02 and by Northern Telecom.  相似文献   
107.
The research done by the Tenet Group in multimedia networking has reached a point where it may be useful to reflect on the significance of its results for the current debate on how integrated-services internetworks should be designed. Such reflections constitute the main subject of this paper. The principles of the work and the conclusions reached so far by the Tenet researchers are discussed in the light of the conflict between the two major technologies being proposed to build future information infrastructures: namely, the Internet and the ATM technologies. The Tenet approach suggests one feasible way for resolving the conflict to the advantage of all the users of those infrastructures. This paper discusses various fundamental aspects of integrated-services network design: the choice of the service model, the type of charging policy to be adopted, and the selection of a suitable architecture.  相似文献   
108.
陶昆  吴舰 《自动化信息》2012,(3):61-62,39
针对传统花卉大棚环境参数监测系统的某些缺点,本文对基于Zigbee技术的无线传感器网络在花卉大棚中的应用可行性进行分析和研究,并建立了花卉大棚无线环境监测系统,使得该监测系统的各节点位置、监测范围、节点扩展性、节点间距离都得以改善和提高。  相似文献   
109.
随着工业以太网应用于高速列车并成为其控制网络,将可能出现带宽、吞吐量等一系列技术问题。采用基于流水线R—R的负载平衡调度算法,通过OPNET软件建模并调用该算法进行仿真。仿真结果表明,该算法在列车控制网络中的应用是可行的,能较好地解决列车控制网络的负载平衡问题。  相似文献   
110.
近距无线图像传输系统主要用于无线传感器网络中的图像采集、传输、处理和显示,本文设计并实现了一种具有较强实用性的近距无线图像传输系统。采用OV7670图像传感器作为图像数据采集器,高速低功耗的nRF24L01射频模块作为无线收发器,采用MSP430F14916位超低功耗单片机作为微处理器,所构成的系统具有功耗低、图像传输速度快等优点。作者详细阐述了该系统的硬件结构和软件设计。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号