首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   14894篇
  免费   1821篇
  国内免费   1532篇
电工技术   716篇
综合类   1793篇
化学工业   196篇
金属工艺   209篇
机械仪表   912篇
建筑科学   725篇
矿业工程   222篇
能源动力   91篇
轻工业   125篇
水利工程   93篇
石油天然气   71篇
武器工业   204篇
无线电   4424篇
一般工业技术   650篇
冶金工业   68篇
原子能技术   26篇
自动化技术   7722篇
  2024年   85篇
  2023年   296篇
  2022年   383篇
  2021年   495篇
  2020年   572篇
  2019年   451篇
  2018年   395篇
  2017年   537篇
  2016年   608篇
  2015年   681篇
  2014年   1204篇
  2013年   1125篇
  2012年   1075篇
  2011年   1094篇
  2010年   960篇
  2009年   873篇
  2008年   1012篇
  2007年   1133篇
  2006年   896篇
  2005年   862篇
  2004年   723篇
  2003年   646篇
  2002年   487篇
  2001年   471篇
  2000年   251篇
  1999年   193篇
  1998年   173篇
  1997年   126篇
  1996年   118篇
  1995年   106篇
  1994年   59篇
  1993年   39篇
  1992年   30篇
  1991年   18篇
  1990年   19篇
  1989年   15篇
  1988年   9篇
  1987年   5篇
  1986年   3篇
  1985年   3篇
  1984年   5篇
  1983年   3篇
  1982年   2篇
  1981年   1篇
  1980年   1篇
  1979年   1篇
  1978年   1篇
  1965年   1篇
  1959年   1篇
排序方式: 共有10000条查询结果,搜索用时 296 毫秒
71.
Verifiable Distributed Oblivious Transfer and Mobile Agent Security   总被引:1,自引:0,他引:1  
The mobile agent is a fundamental building block of the mobile computing paradigm. In mobile agent security, oblivious transfer (OT) from a trusted party can be used to protect the agent’s privacy and the hosts’ privacy. In this paper, we introduce a new cryptographic primitive called Verifiable Distributed Oblivious Transfer (VDOT), which allows us to replace a single trusted party with a group of threshold trusted servers. The design of VDOT uses a novel technique called consistency verification of encrypted secret shares. VDOT protects the privacy of both the sender and the receiver against malicious attacks of the servers. We also show the design of a system to apply VDOT to protect the privacy of mobile agents. Our design partitions an agent into the general portion and the security-sensitive portion. We also implement the key components of our system. As far as we know, this is the first effort to implement a system that protects the privacy of mobile agents. Our preliminary evaluation shows that protecting mobile agents not only is possible, but also can be implemented efficiently. This work was supported in part by the DoD University Research Initiative (URI) program administered by the Office of Naval Research under grant N00014-01-1-0795. Sheng Zhong was supported by ONR grant N00014-01-1-0795 and NSF grants ANI-0207399 and CCR-TC-0208972. Yang Richard Yang was supported in part by NSF grant ANI-0207399. A preliminary version of this paper was presented at the DialM-POMC Joint Workshop on Foundations of Mobile Computing in 2003. Sheng Zhong received his Ph.D. in computer science from Yale University in the year of 2004. He holds an assistant professor position at SUNY Buffalo and is currently on leave for postdoctoral research at the Center for Discrete Mathematics and Theoretical Computer Science (DIMACS). His research interests, on the practical side, are security and incentives in data mining, databases, and wireless networks. On the theoretical side, he is interested in cryptography and game theory. Yang Richard Yang is an Assistant Professor of Computer Science at Yale University. His research interests include computer networks, mobile computing, wireless networking, sensor networks, and network security. He leads the LAboratory of Networked Systems (LANS) at Yale. His recent awards include a Schlumberger Fellowship and a CAREER Award from the National Science Foundation. He received his B.E. degree from Tsinghua University (1993), and his M.S. and Ph.D. degrees from the University of Texas at Austin (1998 and 2001).  相似文献   
72.
Ross.  AH Gilh.  KS 《电信科学》1996,12(3):6-17
本文主要讨论数字移动通信中扩频码分多址技术,阐明了CDMA体制的优越之外,分析了CDMA的关键技术,全面介绍了CDMA系统设计的基本原则和IS-95-A空中接口标准的含义。  相似文献   
73.
Previously, researchers raised the accuracy for a robot’s hand to track a specified path in Cartesian space mainly through increasing the number of knots on the path and the number of the path’s segments, which results in the heavier online computational burden for the robot controller. Aiming at overcoming this drawback, the authors propose a new kind of real-time accurate hand path tracking and joint trajectory planning method. Through selecting some extra knots on the specified hand path by a certain rule and introducing a sinusoidal function to the joint displacement equation of each segment, this method can greatly raise the path tracking accuracy of robot’s hand and does not change the number of the path’s segments. It also does not increase markedly the computational burden of robot controller. The result of simulation indicates that this method is very effective, and has important value in increasing the application of industrial robots. Foundation item: Foundation of the Robotics Laboratory, Chinese Academy of Sciences (No. RL200002) Biography of the first author: TAN Guan-zheng, Dr., professor, born in Oct. 1962, majoring in artificial intelligence, robotics and automation.  相似文献   
74.
New small‐scale dispersed generation systems, such as fuel cells and micro gas turbines, have made remarkable advances lately and they will be applied practically in the near future. Although a large number of researches on the introduction of small‐scale dispersed generation systems have been carried out, only a small number of small‐scale dispersed generation systems are considered in these researches. Therefore, little is known about problems to be solved when a large number of small‐scale dispersed generation systems are introduced into electric power systems. This paper deals with a super‐distributed energy system that consists of a great number of dispersed generation systems such as fuel cells, micro gas turbines, and so on. The behavior of a customer with a dispersed generation system is simulated as the Ising model in statistical mechanics. The necessity of a distribution network in super‐distributed energy systems is discussed based on the Ising model. The feasibility of decentralized autonomous control using vicinity information is also investigated on the basis of stability analysis of the Hopfield neural network model. © 2005 Wiley Periodicals, Inc. Electr Eng Jpn, 151(1): 43–55, 2005; Published online in Wiley InterScience ( www.interscience.wiley.com ). DOI 10.1002/eej.10368  相似文献   
75.
介绍了863智能机器人型号之一-以核工业为应用背景的“勇士号”遥控移动式机器人的作业内容及其主要功能指标,分析了该型号的总体设计思想,同时概括总结了其操作性能,移动性能及计算机系统等方面的技术特点。  相似文献   
76.
在对比分析了传统辅助水刹车与气控盘式辅助刹车的特性后,重点对气控盘式辅助刹车进行了数学分析,得到了该辅助刹车的制动扭矩取决于施加的气体压力,与钻具质量无关,冷却液的流量应同钻柱质量保持正比关系,可精确控制下钻速度并易于实现自动送钻功能。得出了气控盘式辅助刹车更适用于车载钻机的结论。  相似文献   
77.
78.
Photovoltaic (PV) cells, when integrated within a building facade, offer the possibility of generating electric power and heat for local use or export. This paper reports on a project to investigate the practical operational efficiencies that might be delivered from such facades. The results from laboratory experiments and computer simulations are presented: the former were used to develop an empirical relationship between cell temperature and power output; the latter were undertaken to assess operational efficiencies under a range of climate conditions representative of the UK.  相似文献   
79.
Planetary aerobots are a new type of telerobotic science platform that can fly and navigate in a dynamic 3-dimensional atmospheric environment, thus enabling the global in situ exploration of planetary atmospheres and surfaces. Aerobots are enabled by a new concept in planetary balloon altitude control, developed at JPL, which employs reversible-fluid changes to permit repeated excursions in altitude. The essential physics and thermodynamics ofreversible-fluid altitude control have been demonstrated in a series of altitude-control experiments conducted in the Earth's atmosphere, which are described. Aerobot altitude-control technology will be important in the exploration of seven planets and satellites in our solar system. Three of these objects—Venus, Mars, and the Saturnian satellite Titan—have accessible solid surfaces and atmospheres dominated by the dense gases nitrogen or carbon dioxide. They will be explored with aerobots using helium or hydrogen as their primary means of buoyancy. The other four planets—Jupiter, Saturn, Uranus, and Neptune—have deep atmospheres that are predominantly hydrogen. It may be possible to explore these atmospheres with aerobots inflated with atmospheric gas that is then radiatively heated from the hotter gaseous depths below. To fulfill their potential, aerobots to explore the planets will need autonomous state estimators to guide their observations and provide information to the altitude-control systems. The techniques of acquiring these data remotely are outlined. Aerobots will also use on board altitude control and navigation systems to execute complex flight paths including descent to the surface and exploiting differential wind velocities to access different latitude belts. Approaches to control of these systems are examined. The application of aerobots to Venus exploration is explored in some detail: The most ambitious mission described, the Venus Flyer Robot (VFR), would have the capability to make repeated short excursions to the high-temperature surface environment of Venus to acquire data and then return to the Earth-like upper atmosphere to communicate and recool its electronic systems. Finally a Planetary Aerobot Testbed is discussed which will conduct Earth atmospheric flights to validate autonomous-state-estimator techniques and flight-path-control techniques needed for future planetary missions.  相似文献   
80.
The area covered by a mobile ad hoc network consists of obstacles that inhibit transmission and areas where communications can take place. Physical structures, such as buildings, that block transmission, or lakes, where forwarding nodes cannot be located, are permanent obstacles. Temporary obstacles are created as mobile nodes enter or leave an area. Our hypothesis is that the spaces between nearby obstacles are bottlenecks that inhibit the flows in the network. We partition the network into areas that are encompassed by obstacles and bottlenecks. All of the nodes in an area are treated as a single super node, and the bottlenecks between areas are the links between the super nodes. As individual nodes move, the flows and paths in the model change more slowly than the paths and flows between the individual nodes. We apply flow control algorithms to the model and perform admission control within a super node based on the flows that are assigned by the flow control algorithm. We apply the model to the Columbia University campus, and use max–min, fair bottleneck flow control to assign the flows. Our hypothesis is verified for this example.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号