首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9027篇
  免费   1354篇
  国内免费   1411篇
电工技术   476篇
技术理论   1篇
综合类   1260篇
化学工业   156篇
金属工艺   133篇
机械仪表   718篇
建筑科学   241篇
矿业工程   134篇
能源动力   105篇
轻工业   104篇
水利工程   93篇
石油天然气   117篇
武器工业   55篇
无线电   895篇
一般工业技术   414篇
冶金工业   131篇
原子能技术   47篇
自动化技术   6712篇
  2024年   126篇
  2023年   338篇
  2022年   496篇
  2021年   457篇
  2020年   307篇
  2019年   227篇
  2018年   229篇
  2017年   271篇
  2016年   272篇
  2015年   369篇
  2014年   485篇
  2013年   468篇
  2012年   624篇
  2011年   641篇
  2010年   540篇
  2009年   545篇
  2008年   578篇
  2007年   588篇
  2006年   555篇
  2005年   505篇
  2004年   414篇
  2003年   347篇
  2002年   294篇
  2001年   265篇
  2000年   212篇
  1999年   218篇
  1998年   194篇
  1997年   185篇
  1996年   133篇
  1995年   132篇
  1994年   105篇
  1993年   89篇
  1992年   83篇
  1991年   69篇
  1990年   60篇
  1989年   53篇
  1988年   46篇
  1987年   14篇
  1986年   22篇
  1985年   22篇
  1984年   28篇
  1983年   21篇
  1982年   18篇
  1981年   19篇
  1980年   19篇
  1979年   17篇
  1978年   16篇
  1976年   19篇
  1975年   17篇
  1973年   7篇
排序方式: 共有10000条查询结果,搜索用时 640 毫秒
61.
Computer networks face a variety of cyberattacks. Most network attacks are contagious and destructive, and these types of attacks can be harmful to society and computer network security. Security evaluation is an effective method to solve network security problems. For accurate assessment of the vulnerabilities of computer networks, this paper proposes a network security risk assessment method based on a Bayesian network attack graph (B_NAG) model. First, a new resource attack graph (RAG) and the algorithm E-Loop, which is applied to eliminate loops in the B_NAG, are proposed. Second, to distinguish the confusing relationships between nodes of the attack graph in the conversion process, a related algorithm is proposed to generate the B_NAG model. Finally, to analyze the reachability of paths in B_NAG, the measuring indexs such as node attack complexity and node state transition are defined, and an iterative algorithm for obtaining the probability of reaching the target node is presented. On this basis, the posterior probability of related nodes can be calculated. A simulation environment is set up to evaluate the effectiveness of the B_NAG model. The experimental results indicate that the B_NAG model is realistic and effective in evaluating vulnerabilities of computer networks and can accurately highlight the degree of vulnerability in a chaotic relationship.  相似文献   
62.
As the keystones of the personalized manufacturing, the Industrial Internet of Things (IIoT) consolidated with 3D printing pave the path for the era of Industry 4.0 and smart manufacturing. By resembling the age of craft manufacturing, Industry 4.0 expedites the alteration from mass production to mass customization. When distributed 3D printers (3DPs) are shared and collaborated in the IIoT, a promising dynamic, globalized, economical, and time-effective manufacturing environment for customized products will appear. However, the optimum allocation and scheduling of the personalized 3D printing tasks (3DPTs) in the IIoT in a manner that respects the customized attributes submitted for each model while satisfying not only the real-time requirements but also the workload balancing between the distributed 3DPs is an inevitable research challenge that needs further in-depth investigations. Therefore, to address this issue, this paper proposes a real-time green-aware multi-task scheduling architecture for personalized 3DPTs in the IIoT. The proposed architecture is divided into two interconnected folds, namely, allocation and scheduling. A robust online allocation algorithm is proposed to generate the optimal allocation for the 3DPTs. This allocation algorithm takes into consideration meeting precisely the customized user-defined attributes for each submitted 3DPT in the IIoT as well as balancing the workload between the distributed 3DPs simultaneously with improving their energy efficiency. Moreover, meeting the predefined deadline for each submitted 3DPT is among the main objectives of the proposed architecture. Consequently, an adaptive real-time multi-task priority-based scheduling (ARMPS) algorithm has been developed. The built ARMPS algorithm respects both the dynamicity and the real-time requirements of the submitted 3DPTs. A set of performance evaluation tests has been performed to thoroughly investigate the robustness of the proposed algorithm. Simulation results proved the robustness and scalability of the proposed architecture that surpasses its counterpart state-of-the-art architectures, especially in high-load environments.  相似文献   
63.
将图论与机器学习方法相结合的阿尔茨海默病计算机辅助中,脑网络的构建大多是基于滤波去噪后的全频段BOLD信号匹配,忽略了不同脑活动信息的差异.因此,本文提出了一种多频段脑功能网络融合模型.首先将离散小波变换应用于BOLD信号中,得到不同频域下的体素信号,而后计算同频信号的相关性,获取不同频段下相关矩阵.而后计算所有矩阵的网络特征,在特征选择后基于SVM对患者进行分类.从实验结果可以看出,分频下的脑功能网络特征与未分频网络相比能在一定程度上提高分类的准确性;体素级网络由于可以更加详细的表达脑网络的变化,其分类效果要优于脑区级.  相似文献   
64.
《网络安全法》是我国第一部关于网络安全的综合立法,与大众的互联网生活息息相关.因此,一款面向大众的《网络安全法》智能违法行为识别系统有助于规范互联网行为.然而,现有智能违法行为识别系统构建方法难以适应《网络安全法》,这是由于:首先,现有方法需要专业司法语言进行交互,不适应普通大众的语言体系.其次,现有方法需要大量的案例训练模型,不适应案例匮乏的《网络安全法》.针对这些问题,本文提出了一个面向《网络安全法》的智能违法行为识别系统.该系统主要利用知识图谱技术解决上述问题,在构建网络安全法知识图谱的基础上,通过将普通用户的自然语言与知识图谱中的违法事件实体和违法主体实体进行实体链接的方式获得更强的特征,提高违法行为识别系统在训练集较为匮乏的条件下的准确度.通过在真实数据集上的实验,表明了提出的系统的准确度有明显提高.  相似文献   
65.
针对入侵检测中存在的非确定性推理问题,文章提出一种基于二分图模型和贝叶斯网络的入侵检测方法,该方法利用二分有向图模型表示入侵和相关特征属性之间的因果拓扑关系,利用训练数据中获取模型的概率参数,最后使用最大可能解释对转化后的推理问题进行推理,并通过限定入侵同时发生的数目来提高检测效率。实验表明,该方法具有较高的检测率和很好的鲁棒性。  相似文献   
66.
Finding a path that satisfies multiple Quality-of-Service (QoS) constraints is vital to the deployment of current emerged services. However, existing algorithms are not very efficient and effective at finding such a path. Moreover, few works focus on three or more QoS constraints. In this paper, we present an enhanced version of fully polynomial time approximation scheme (EFPTAS) for multiconstrainted path optimal (MCOP) problem. Specifically, we make four major contributions. We first allow the proposed algorithm to construct an auxiliary graph, through which the QoS parameters on each of the finding path can be guaranteed not to exceed the given constraints. Then we adopt a concept, called nonlinear definition of path constraints in EFPTAS for reducing both time and space complexity. Also, we enable EFPTAS to run iteratively to facilitate a progressive refinement of the finding result. In addition to these, we identify some “deployment” issues for proposed algorithm, the essential steps that how and when the EFPTAS takes place are presented. By analyzing the proposed algorithm theoretically, we find that the presented EFPTAS can find a (1+ε)-approximation path in the network with time complexity O(|E||V|/ε) (where |E| is the number of edges and |V| is the number of nodes), which outperforms the previous best-known algorithm for MCOP. We conduct an extensive comparison between the algorithm presented in this paper and previous best-known study experimentally, our results indicate that EFPTAS can find a path with low complexity and preferable quality.  相似文献   
67.
68.
随着科技的快速发展,设备系统的复杂程度越来越高,多信号流模型是系统测试性分析的常用模型,为解决复杂系统建模分析时对其各分系统信息保密问题,提出了一种基于多信号流模型的模型封装与解包方法。该方法首先确定了封装模块数据信息并实现封装,然后构建封装模块测试信息描述表,描述了封装模块内部故障、内部测试与外部信息的关系以及封装模块本身对外部信息的影响,实现了模块的解包。实验表明,该描述方法可以有效地屏蔽了被封装的分系统模型的技术信息,有利于各分系统设计者之间的信息保密,同时利用该描述方法,还可以有效地减少测试性分析所需的时间。  相似文献   
69.
Lisp and its descendants are among the most important and widely used of programming languages. At the same time, parallelism in the architecture of computer systems is becoming commonplace. There is a pressing need to extend the technology of automatic parallelization that has become available to Fortran programmers of parallel machines, to the realm of Lisp programs and symbolic computing. In this paper we present a comprehensive approach to the compilation of Scheme programs for shared-memory multiprocessors. Our strategy has two principal components:interprocedural analysis andprogram restructuring. We introduceprocedure strings andstack configurations as a framework in which to reason about interprocedural side-effects and object lifetimes, and develop a system of interprocedural analysis, using abstract interpretation, that is used in the dependence analysis and memory management of Scheme programs. We introduce the transformations ofexit-loop translation andrecursion splitting to treat the control structures of iteration and recursion that arise commonly in Scheme programs. We propose an alternative representation for s-expressions that facilitates the parallel creation and access of lists. We have implemented these ideas in a parallelizing Scheme compiler and run-time system, and we complement the theory of our work with snapshots of programs during the restructuring process, and some preliminary performance results of the execution of object codes produced by the compiler.This work was supported in part by the National Science Foundation under Grant No. NSF MIP-8410110, the U.S. Department of Energy under Grant No. DE-FG02-85ER25001, the Office of Naval Research under Grant No. ONR N00014-88-K-0686, the U.S. Air Force Office of Scientific Research under Grant No. AFOSR-F49620-86-C-0136, and by a donation from the IBM Corportation.  相似文献   
70.
本文结合压力容器计算机辅助设计软件的研制,研究了利用AUTOCAD开发计算机辅助设计专用软件的几个关键性问题;主要有程序绘图,汉字信息、绘图数据的显示和选择以及与绘图程序的连接、专用软件的控制结构设计和内存管理等问题;提出了一整套设计新颖,使用方便,运行高效的解决方法。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号