全文获取类型
收费全文 | 3904篇 |
免费 | 680篇 |
国内免费 | 462篇 |
专业分类
电工技术 | 536篇 |
综合类 | 660篇 |
化学工业 | 32篇 |
金属工艺 | 14篇 |
机械仪表 | 105篇 |
建筑科学 | 342篇 |
矿业工程 | 68篇 |
能源动力 | 67篇 |
轻工业 | 41篇 |
水利工程 | 85篇 |
石油天然气 | 9篇 |
武器工业 | 44篇 |
无线电 | 556篇 |
一般工业技术 | 415篇 |
冶金工业 | 73篇 |
原子能技术 | 1篇 |
自动化技术 | 1998篇 |
出版年
2024年 | 57篇 |
2023年 | 128篇 |
2022年 | 190篇 |
2021年 | 233篇 |
2020年 | 258篇 |
2019年 | 232篇 |
2018年 | 203篇 |
2017年 | 181篇 |
2016年 | 208篇 |
2015年 | 225篇 |
2014年 | 301篇 |
2013年 | 290篇 |
2012年 | 330篇 |
2011年 | 287篇 |
2010年 | 256篇 |
2009年 | 260篇 |
2008年 | 256篇 |
2007年 | 279篇 |
2006年 | 213篇 |
2005年 | 170篇 |
2004年 | 117篇 |
2003年 | 81篇 |
2002年 | 68篇 |
2001年 | 46篇 |
2000年 | 32篇 |
1999年 | 15篇 |
1998年 | 19篇 |
1997年 | 14篇 |
1996年 | 15篇 |
1995年 | 8篇 |
1994年 | 5篇 |
1993年 | 10篇 |
1992年 | 11篇 |
1991年 | 5篇 |
1990年 | 3篇 |
1988年 | 2篇 |
1987年 | 3篇 |
1983年 | 3篇 |
1982年 | 3篇 |
1980年 | 3篇 |
1978年 | 3篇 |
1973年 | 2篇 |
1964年 | 2篇 |
1963年 | 3篇 |
1962年 | 1篇 |
1961年 | 1篇 |
1960年 | 4篇 |
1956年 | 1篇 |
1955年 | 2篇 |
1954年 | 1篇 |
排序方式: 共有5046条查询结果,搜索用时 15 毫秒
51.
52.
针对多导弹协同攻击的作战要求,提出一种基于对策论的制导规律。将多枚导弹看作具有联合承诺的纯合作团队,建立了导弹-目标追逃对策模型,然后将每个时刻的策略选择问题转化为矩阵对策的形式,并运用排除法求出此矩阵对策的解,由此得到多枚导弹攻击目标的实时策略选择算法。仿真结果表明,该制导规律能够使各枚导弹以包围的态势攻击目标,为实际工程应用提供了参考。 相似文献
53.
In this study, aiming at the characteristics of randomness and dynamics in Wearable Audio-o-riented BodyNets(WA-BodyNets), stochastic differ-ential game theory is applied to the investigation of the problem of transmitted power control inconsum-er electronic devices. First, astochastic differential game model is proposed for non-cooperative decen-tralized uplink power control with a wisdom regula-tion factor over WA-BodyNets with a one-hop star topology.This model aims to minimize the cost as-sociated with the novel payoff function of a player, for which two cost functions are defined: functions of inherent power radiation and accumulated power radiation damage. Second, the feedback Nash equi-librium solution of the proposed model and the con-straint of the Quality of Service (QoS) requirement of the player based on the SIR threshold are derived by solving the Fleming-Bellman-Isaacs partial dif-ferential equations. Furthermore, the Markov prop-erty of the optimal feedback strategies in this model is verified.The simulation results show that the pro-posed game model is effective and feasible for con-trolling the transmitted power of WA-BodyNets. 相似文献
54.
市场中针对女性用户玩家的游戏都有其特殊性,在视觉和听觉等直接感官方面、游戏中NPC的设置方面、游戏的情节方面以及主题游戏里面所嵌套的小游戏方面,都与一般性的手机游戏有所不同。自2017年《恋与制作人》为代表的乙女游戏风靡中国成为现象级事件之后,女性向手游不断发展——数量大幅度提升,种类多样化,游戏产品的设计流程也逐渐完善,但总体来说在理论研究方面,无论是针对此现象级事件背后所蕴含的社会因素的研究还是针对女性玩家情感心理活动的研究都相对较少,多数研究还是从游戏产业发展的角度出发,因此旨在从女性主义发展的角度出发,去研究针对女性用户玩家的游戏中所蕴含的文化修辞。除此之外,以人为核心的“沉浸式传播”贯穿生活中的方方面面,在女性手游中也将其充分体现。传播实践中,“沉浸”与“场景”常常相辅相成,在乙女游戏中,通过不同游戏场景、游戏人物的设置,玩家在玩游戏的过程中也在有意识或者无意识地接受着游戏中传递出来的价值观念和文化内容。 相似文献
55.
针对3G移动通信产业的发展问题,运用博弈论方法分析了政府、电信运营商、本土制造商和外国制造商在3G标准选择中的博弈过程,并通过研究表明:政府应该以实现国家利益最大化为前提,充分运用决策机制改变各博弈方的收益,使博弈达到均衡。 相似文献
56.
随着半导体工艺技术的发展,芯片内部集成的功能模块越来越多.各功能模块通过总线方式连接,因而片上总线仲裁架构成为制约芯片性能提高的瓶颈.通过改善片上总线仲裁器设计,能有效缓解由于各功能模块争用总线资源而引起的芯片性能下降.本文提出一种基于博弈论的片上总线仲裁机制,利用求解多人博弈问题的方法解决总线争用问题,并以片上系统的性能指标为约束条件,得到解决总线争用问题的一般模型.最后,通过仿真及实际硬件平台对算法进行测试,结果表明应用本算法的指令处理速度比应用固定优先级算法快236%,比应用轮换算法快53%. 相似文献
57.
Cooperative access among user devices by sharing wireless access bandwidth opens a new paradigm in heterogeneous networks.However,how to stimulate cooperative relay nodes forwarding service data for others and allocating corresponding bandwidth to support it are two key issues in the cooperative access.This paper proposes a Stackelberg game based framework which is benefit participants including relay nodes and client nodes.This framework generalizes the pricing based bandwidth allocation algorithm by the Stackelberg game model,which optimizes the profit of the cooperative relay nodes while guaranteeing the bandwidth requirements of client nodes.We transform the profit maximization problem into a convex problem and solve it using the convex optimization method.The simulation results demonstrate that the proposed framework and corresponding algorithms outperform the bidding weight proportional fairness and fixed value bandwidth allocation ones significantly. 相似文献
58.
After the remarkable increase of Internet users and broadband Internet subscribers at the end of the 20th century, the size of Korean Internet and e-commerce market steadily increased but the growth rate has been either stagnant or decreased. Trends of Korean Internet and e-commerce market are summarized in this paper the trends on Internet usage are introduced. Trends of online games, blogs and wireless Internet are introduced. The trends of Korean Internet market may have implications for China and Japan. 相似文献
59.
Steganalysis attack is to statistically estimate the embedded watermark in the watermarked multimedia,and the estimated watermark may be destroyed by the attacker.The existing methods of false negative probability,however,do not consider the influence of steganalysis attack.This paper proposed the game theory based false negative probability to estimate the impacts of steganalysis attack,as well as unintentional attack.Specifically,game theory was used to model the collision between the embedment and steganalysis attack,and derive the optimal building embedding/attacking strategy.Such optimal playing strategies devote to calculating the attacker destructed watermark,used for calculation of the game theory based false negative probability.The experimental results show that watermark detection reliability measured using our proposed method,in comparison,can better reflect the real scenario in which the embedded watermark undergoes unintentional attack and the attacker using steganalysis attack.This paper provides a foundation for investigating countermeasures of digital watermarking community against steganalysis attack. 相似文献
60.
Wen Tian Xiao‐Peng Ji Weiwei Liu Jiangtao Zhai Guangjie Liu Yuewei Dai Shuhua Huang 《ETRI Journal》2019,41(5):585-598
A cyber‐physical system (CPS) is a new mechanism controlled or monitored by computer algorithms that intertwine physical and software components. Advanced persistent threats (APTs) represent stealthy, powerful, and well‐funded attacks against CPSs; they integrate physical processes and have recently become an active research area. Existing offensive and defensive processes for APTs in CPSs are usually modeled by incomplete information game theory. However, honeypots, which are effective security vulnerability defense mechanisms, have not been widely adopted or modeled for defense against APT attacks in CPSs. In this study, a honeypot game‐theoretical model considering both low‐ and high‐interaction modes is used to investigate the offensive and defensive interactions, so that defensive strategies against APTs can be optimized. In this model, human analysis and honeypot allocation costs are introduced as limited resources. We prove the existence of Bayesian Nash equilibrium strategies and obtain the optimal defensive strategy under limited resources. Finally, numerical simulations demonstrate that the proposed method is effective in obtaining the optimal defensive effect. 相似文献