首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7751篇
  免费   1239篇
  国内免费   1072篇
电工技术   222篇
综合类   780篇
化学工业   90篇
金属工艺   92篇
机械仪表   266篇
建筑科学   140篇
矿业工程   170篇
能源动力   70篇
轻工业   14篇
水利工程   182篇
石油天然气   23篇
武器工业   34篇
无线电   2467篇
一般工业技术   380篇
冶金工业   57篇
原子能技术   9篇
自动化技术   5066篇
  2024年   29篇
  2023年   98篇
  2022年   139篇
  2021年   148篇
  2020年   219篇
  2019年   156篇
  2018年   178篇
  2017年   256篇
  2016年   308篇
  2015年   424篇
  2014年   547篇
  2013年   616篇
  2012年   703篇
  2011年   745篇
  2010年   637篇
  2009年   689篇
  2008年   686篇
  2007年   710篇
  2006年   565篇
  2005年   482篇
  2004年   394篇
  2003年   316篇
  2002年   229篇
  2001年   222篇
  2000年   144篇
  1999年   81篇
  1998年   71篇
  1997年   51篇
  1996年   42篇
  1995年   35篇
  1994年   29篇
  1993年   28篇
  1992年   21篇
  1991年   18篇
  1990年   7篇
  1989年   6篇
  1988年   2篇
  1987年   8篇
  1986年   7篇
  1985年   4篇
  1984年   5篇
  1983年   2篇
  1982年   1篇
  1980年   3篇
  1977年   1篇
排序方式: 共有10000条查询结果,搜索用时 62 毫秒
21.
In this paper, we present a performance analysis of network topologies for the optical core of IP-over-WDM networks with static wavelength routing. The performance analysis is focused on regular degree four topologies, and, for comparison purposes, degree three topologies are also considered. It is shown that the increase of the nodal degree from three (degree three topology with smallest diameter) to four (degree four topology with smallest diameter) improves the network performance if a larger number of wavelengths per link is available. However, the influence of wavelength interchange on the nodal degree gain is small. The performance of regular degree four topologies with smallest diameter is also compared with the performance of mesh–torus topologies (which are also degree four topologies), and it is shown that the blocking probability of degree four topologies with smallest diameter is about two orders of magnitude lower than the blocking probability of mesh–torus topologies. It is also presented a performance comparison of WDM-based networks with nodal degrees ranging from two to five and it is shown that the increase of the nodal degree from two to three leads to high nodal degree gains, while de increase of the nodal degree from four to five leads to low nodal degree gains. These results show that degree three and degree four topologies are very attractive for use in the optical core of IP-over-WDM networks.  相似文献   
22.
In the last three years or so we at Enterprise Platforms Group at Intel Corporation have been applying formal methods to various problems that arose during the process of defining platform architectures for Intel's processor families. In this paper we give an overview of some of the problems we have worked on, the results we have obtained, and the lessons we have learned. The last topic is addressed mainly from the perspective of platform architects.  相似文献   
23.
Floods cause environmental hazards and influence on socio‐economic activities. In this study, we evaluated the historic flood frequency at a confluence in the middle Yellow River, China. A non‐parametric, multivariate, empirical, orthogonal function matrix model, which consists of time correlation coefficients of flood discharge at different gauge stations and flood events was used for the analysis of flood frequency. The model addresses the characteristics of confluent floods such as frequency and the probability in multiple tributary rivers. Flood frequency analysis is often coupled with studies of hydrological routing processes that reduce the flood capacity of the rivers. Flood routing to the confluence were simulated using kinematic wave theory. Results of this flood frequency analysis showed that flooding frequency has intensified in the past 500 years, especially during the 19th century. Flooding in streams above the confluence was more frequent than in streams below the confluence. Over the last 2000 years, concurrent flooding in multiple tributary rivers accounted for 67.5% of the total flooding in the middle Yellow River. Simulation of flood routing processes shows that the decreased flooding capacity and elevated river bed of the shrunken main channel leads to an increased flood wave propagation time (24–52.3 h) in the study area after 1995. The model indicates that human activities, such as constructions of the Sanmenxia Dam, have changed flood routing boundary conditions and have contributed to the increased flood frequency at the confluence. Copyright © 2007 John Wiley & Sons, Ltd.  相似文献   
24.
This is the last part of a four-part survey of optimization models and solution algorithms for winter road maintenance planning. The two first parts of the survey address system design problems for winter road maintenance. The third part concentrates mainly on vehicle routing problems for spreading operations. The aim of this paper is to provide a comprehensive survey of optimization models and solution methodologies for the routing of vehicles for plowing and snow disposal operations. We also review models for the fleet sizing and fleet replacement problems.  相似文献   
25.
胡褆  薛质 《电信快报》2002,(6):9-10,26
文章介绍无线移动自组网中动态源路由策略的路由发现和路由维护,并提出改进思路和今后研究的方向。  相似文献   
26.
Radio LANs are emerging in the computing world. They are supported by distinct configurations: on the one hand radio LANs with base stations and a wired backbone, on the other hand radio LANs implementing Intra-forwarding. Adding a new node in a radio LAN with Intra-forwarding, increases the reliability, while this reliability decreases with ad hoc or hub configurations. This advantage of Intra-forwarding is quantified. Intra-forwarding, as defined in the HIPERLAN standard, is based on a hop-by-hop policy and link check procedures. It is shown how point-to-point packets and broadcast packets are forwarded. The three basic components of Intra-forwarding needed to build and update the Intra-forwarding database are described. The originality of this approach is the use of multipoint relays which enable better scalability. The correctness of the Intra-forwarding protocol is proved and its cost is evaluated.  相似文献   
27.
In this paper we propose a new protocol called time-space label switching protocol (TSL-SP) in optical burst switching (OBS), and define the terms time-space label (TSL) and time-space routing (TSR). An important concept of response time is introduced in the time label mechanism. The TSL-SP is a new technology that can quickly and efficiently forward data with a label on the optical networks. A two-dimension label switched path (TD-LSP) can be set up, that is maintained and deleted by the TSL-SP. For clearly illuminating the operation principles of the TSL-SP, we propose a new approach of orthogonal time-space coordinates in which the vertical coordinate is the space label and the horizontal coordinate is the time label. The proposed TD-LSP can dramatically reduce the routing failure probability and greatly improve the link network efficiency compared with other signaling protocols. Moreover, we define the time-space label control plane that can achieve the higher efficiency. When the TSL-SP is applied to networks, switching performance can be improved by two orders compared to the switching performance with the conventional OBS signaling protocols. The fundamental goal of TSL-SP is to band the signaling and routing functions together closely. Also, the TSL-SP can reduce the complexity of the network, support automatic service offering, and provide traffic engineering.  相似文献   
28.
MANET(Mobile Ad Hoc Network)is a collection of wireless mobile nodes forming a temporary communica-tion network without the aid of any established infrastructure or centralized administration.The lifetime of a MANETdepends on the battery resources of the mobile nodes.So energy consumption may one of important design criterions forMANET.With changing the idle model to sleep model in the grid environment,this paper proposes a new energy-awarerouting protocol.Performance simulation results show that the proposed strategy can dynamic balance the traffic load in-side the whole network,extend the lifetime of a MANET,and without decreasing the throughput ratio.  相似文献   
29.
Nodes in a mobile ad hoc network are often vulnerable to failures. The failures could be either due to fading effects, battery drainage, or as a result of compromised nodes that do not participate in network operations. Intermittent node failures can disrupt routing functionalities. As such, it is important to provide redundancy in terms of providing multiple node-disjoint paths from a source to a destination. In line with this objective, we first propose a modified version of the widely studied ad hoc on-demand distance vector routing protocol to facilitate the discovery of multiple node-disjoint paths from a source to a destination. We find that very few of such paths can be found. Furthermore, as distances between sources and destinations increase, bottlenecks inevitably occur and thus, the possibility of finding multiple paths is considerably reduced. We conclude that it is necessary to place what we call reliable nodes (in terms of both being robust to failure and being secure) in the network to support efficient routing operations. We propose a deployment strategy that determines the positions and the trajectories of these reliable nodes such that we can achieve a framework for reliably routing information. We define a notion of a reliable path which is made up of multiple segments, each of which either entirely consists of reliable nodes, or contains a preset number of multiple paths between the end points of the segment. We show that the probability of establishing a reliable path between a random source and destination pair increases tremendously even with a small number of reliable nodes when we use our algorithm to appropriately position these reliable nodes.  相似文献   
30.
冯向辉 《世界电信》2003,16(12):57-59
北电网络提供的Contivity解决方案不仅可以使用户建立各种类型的VPN,而且还可以把这些VPN集成到未来的融合话音和数据的网络中。该方案已实现了安全路由选择;可通过多种技术支持鉴权功能,从而实现安全接入;允许用户使用其各自的安全性配置文件设置;其设计中没有“后门”,重点介绍了Contivity 2700网关的主要特征及其优势。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号