全文获取类型
收费全文 | 3847篇 |
免费 | 682篇 |
国内免费 | 463篇 |
专业分类
电工技术 | 537篇 |
综合类 | 661篇 |
化学工业 | 29篇 |
金属工艺 | 14篇 |
机械仪表 | 103篇 |
建筑科学 | 338篇 |
矿业工程 | 64篇 |
能源动力 | 67篇 |
轻工业 | 41篇 |
水利工程 | 85篇 |
石油天然气 | 9篇 |
武器工业 | 44篇 |
无线电 | 554篇 |
一般工业技术 | 410篇 |
冶金工业 | 73篇 |
原子能技术 | 1篇 |
自动化技术 | 1962篇 |
出版年
2024年 | 57篇 |
2023年 | 129篇 |
2022年 | 189篇 |
2021年 | 232篇 |
2020年 | 255篇 |
2019年 | 234篇 |
2018年 | 201篇 |
2017年 | 179篇 |
2016年 | 198篇 |
2015年 | 217篇 |
2014年 | 294篇 |
2013年 | 288篇 |
2012年 | 327篇 |
2011年 | 276篇 |
2010年 | 255篇 |
2009年 | 255篇 |
2008年 | 256篇 |
2007年 | 276篇 |
2006年 | 212篇 |
2005年 | 170篇 |
2004年 | 117篇 |
2003年 | 81篇 |
2002年 | 68篇 |
2001年 | 48篇 |
2000年 | 33篇 |
1999年 | 15篇 |
1998年 | 19篇 |
1997年 | 14篇 |
1996年 | 15篇 |
1995年 | 8篇 |
1994年 | 6篇 |
1993年 | 10篇 |
1992年 | 11篇 |
1991年 | 5篇 |
1990年 | 3篇 |
1988年 | 2篇 |
1987年 | 3篇 |
1983年 | 3篇 |
1982年 | 3篇 |
1980年 | 3篇 |
1978年 | 3篇 |
1973年 | 2篇 |
1964年 | 2篇 |
1963年 | 3篇 |
1962年 | 1篇 |
1961年 | 1篇 |
1960年 | 4篇 |
1956年 | 1篇 |
1955年 | 2篇 |
1954年 | 1篇 |
排序方式: 共有4992条查询结果,搜索用时 15 毫秒
31.
XU Chaofeng FAN Weimin WANG Changfeng XIN Zhanhong 《中国通信》2014,(5):136-143
Technical standard is typically characterized by network effect.The key point for a technical standard is the consumers' choice,which is based on consumers' maximum benefits.When a technical standard becomes a national standard,its interests have been integrated into the national interests.National interests are divided into economic profits and security factors.From the perspective of consumers' choice,this paper deals with the main factors which affect the result of technical standard competition- the risk and profits of intellectual property based on the assumption of bounded rationality and dynamic game theory. 相似文献
32.
33.
34.
对策论方法在信息网络资源分配中的应用 总被引:5,自引:0,他引:5
在研究复杂信息网络的资源分配问题时,网络资源提供者和用户之间对资源的使用存在不同的优化目标,导致对资源分配策略存在多种评价准则。为便于网络管理者进行分布式的资源管理和计费,采用对策论模型分析用户对资源的竞争和处理网络传输拥塞正日益受到广泛的重视。本文首先指出资源分配和计费管理的几个主要难点,比较了中心化与非中心化控制策略的差别,而后综述了采用对策论模型进行资源分配和管理的优点,重点讨论了在非中心化条件下对策均衡解与资源利用效率以及网络计费管理策略之间的关系,最后对基于对策论模型的信息网络流量控制与管理策略进行总体评述。 相似文献
35.
针对典型的第三方测试和内部测试情形进行建模,重点分析测试过程中参与方的合作关系问题.通过混合策略的贝叶斯纳什均衡给出第三方测试过程适用条件,采用沙普利值对参与方合作可能性进行探讨.根据内部测试与第三方测试过程的内在差别,利用重复博弈方法对其进行分析,提出了软件测试过程博弈分析的基本研究过程框架. 相似文献
36.
The word population is growing on a daily basis; consequently, the growth of commute and transport, developing efficient and intelligent transportation systems (ITS), has become one of the most popular requirements and the most significant attempts in modern urban areas containing large population. A key component of intelligent transportation systems is a vehicular ad hoc network. Devising internet‐based practical programs such as awareness of climatic conditions, geographical location, practical programs like on‐line payment services in the vehicular ad hoc network has led to safer driving, prevention of deadly accidents, transportation improvement, more welfare and convenience for passengers, and even offering more commercial opportunities. The special features of vehicular ad hoc network, such as intense activity, constantly‐changing topology, the vehicles' high speed, etc, will lead to challenges in gaining security. Therefore, providing vehicular ad hoc networks with security is of extreme importance in terms of users' anonymity, identification, and data privacy. In this paper, a security model is presented using a method based on evolutionary games. This method, in every vehicle, is applied as a node in the network while interacting with other vehicles; it aims at distinguishing some common attacks and defending against attackers. In this method, defending (honest) vehicles and attacking vehicles take part in an asymmetrical game; each vehicle aims at gaining the most utility and achieving its goals. The proposed method is simulated using various scenarios. The simulation results reveal that the proposed method is efficient and it reaches equilibrium and convergence at the end of the game in each scenario. 相似文献
37.
Ossama Nazih Nabil Benamar Mohamed Younis 《International Journal of Communication Systems》2020,33(9)
Opportunistic networking enables users to communicate in an environment where connectivity is intermittent or unstable. However, such networking scheme assumes that mobile nodes voluntary cooperate, which cannot be guaranteed. Some nodes can simply exhibit selfish behavior and thus diminish the effectiveness of the approach. In this paper, a game scenario is formulated in which the nodes try to convince each other to participate in packets forwarding. Each node is considered as a player in this game. When a node comes in the communication range of another, a bargaining game starts between them as part of the message forwarding process. Both players try to have a mutual agreement on a price for message forwarding. We present a new incentive mechanism called evolutionary bargaining‐based incentive scheme (EBIS) to motivate selfish nodes to cooperate in data forwarding. In EBIS, a node negotiates with other nodes to obtain an agreeable amount of credit for its forwarding service. Nodes apply a sequential bargaining game and then adapt their strategies using an evolutionary model to maximize the probability of reaching an agreement. Unlike classical bargaining games, nodes in our model are boundedly rational. In addition, we use the evolutionary stable strategy (ESS) concept to determine the adaptive strategies for the nodes. The comparison of EBIS with a benchmarked model demonstrates that EBIS performs better in terms of packet delivery ratio and average latency. 相似文献
38.
CHEN Chao-long 《中国电子科技》2006,4(4)
Cutthroat competition amid subsidiary companies of IT Group Company due to immanent characteristics of IT industry and grouping management mechanism infringes upon the collective profits. Two ways to avoid cutthroat competition of group company with game theory are studied: the assessment objective made by IT group company for subsidiary companies focuses on profits not revenue;the supervisory department of group company shall intensify law enforcement strength and give severe punishment against illegal depreciation of the subsidiary company. 相似文献
39.
Settlement of Internal Cutthroat Competition Amid IT Group Companies: Away from “Prisoners' Dilemma” of Price Wars 下载免费PDF全文
CHEN Chao-long 《电子科技学刊:英文版》2006,4(4):303-306
Cutthroat competition amid subsidiary companies of IT Group Company due to immanent characteristics of IT industry and grouping management mechanism infringes upon the collective profits. Two ways to avoid cutthroat competition of group company with game theory are studied:the assessment objective made by IT group company for subsidiary companies focuses on profits not revenue; the supervisory department of group company shall intensify law enforcement strength and give severe punishment against illegal depreciation of the subsidiary company. 相似文献
40.
无线mesh网络中的信道分配会极大地影响网络的性能。为了解决无线mesh网络中的信道分配问题,提出了一种基于博弈论的信道分配(GBCA)算法。该算法将网络中每一个节点模型化为一个博弈者,每个博弈者的策略为信道的分配方案,并将整个网络的吞吐量作为效用函数的目标,效用函数的物理意义则是在给定流量需求矩阵下传输的成功率。博弈者通过相互博弈来优化收益函数,以最大化网络吞吐量。并针对GBCA算法的不足,提出了一种改进算法———GBCA-TP算法。通过NS2.34仿真分析得出,GBCA算法和GBCA-TP算法在收敛性、分组丢失率和吞吐量上都要优于当前的算法。 相似文献