首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   14135篇
  免费   1431篇
  国内免费   1338篇
电工技术   349篇
技术理论   14篇
综合类   2843篇
化学工业   154篇
金属工艺   33篇
机械仪表   192篇
建筑科学   4495篇
矿业工程   125篇
能源动力   78篇
轻工业   160篇
水利工程   202篇
石油天然气   43篇
武器工业   28篇
无线电   2287篇
一般工业技术   850篇
冶金工业   444篇
原子能技术   28篇
自动化技术   4579篇
  2024年   84篇
  2023年   201篇
  2022年   363篇
  2021年   422篇
  2020年   496篇
  2019年   373篇
  2018年   328篇
  2017年   424篇
  2016年   433篇
  2015年   528篇
  2014年   1226篇
  2013年   1075篇
  2012年   1218篇
  2011年   1265篇
  2010年   1055篇
  2009年   1035篇
  2008年   1011篇
  2007年   1136篇
  2006年   942篇
  2005年   699篇
  2004年   570篇
  2003年   450篇
  2002年   366篇
  2001年   288篇
  2000年   184篇
  1999年   139篇
  1998年   109篇
  1997年   93篇
  1996年   58篇
  1995年   60篇
  1994年   30篇
  1993年   22篇
  1992年   18篇
  1991年   14篇
  1990年   23篇
  1989年   14篇
  1988年   14篇
  1987年   8篇
  1985年   13篇
  1984年   10篇
  1983年   12篇
  1982年   11篇
  1981年   7篇
  1966年   6篇
  1965年   6篇
  1964年   5篇
  1958年   6篇
  1957年   10篇
  1956年   5篇
  1954年   4篇
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
1.
Accurate and timely network traffic measurement is essential for network status monitoring, network fault analysis, network intrusion detection, and network security management. With the rapid development of the network, massive network traffic brings severe challenges to network traffic measurement. However, existing measurement methods suffer from many limitations for effectively recording and accurately analyzing big-volume traffic. Recently, sketches, a family of probabilistic data structures that employ hashing technology for summarizing traffic data, have been widely used to solve these problems. However, current literature still lacks a thorough review on sketch-based traffic measurement methods to offer a comprehensive insight on how to apply sketches for fulfilling various traffic measurement tasks. In this paper, we provide a detailed and comprehensive review on the applications of sketches in network traffic measurement. To this end, we classify the network traffic measurement tasks into four categories based on the target of traffic measurement, namely cardinality estimation, flow size estimation, change anomaly detection, and persistent spreader identification. First, we briefly introduce these four types of traffic measurement tasks and discuss the advantages of applying sketches. Then, we propose a series of requirements with regard to the applications of sketches in network traffic measurement. After that, we perform a fine-grained classification for each sketch-based measurement category according to the technologies applied on sketches. During the review, we evaluate the performance, advantages and disadvantages of current sketch-based traffic measurement methods based on the proposed requirements. Through the thorough review, we gain a number of valuable implications that can guide us to choose and design proper traffic measurement methods based on sketches. We also review a number of general sketches that are highly expected in modern network systems to simultaneously perform multiple traffic measurement tasks and discuss their performance based on the proposed requirements. Finally, through our serious review, we summarize a number of open issues and identify several promising research directions.  相似文献   
2.
The recent trend of integration among new network services such as the long-term evolution (LTE) based on internet protocol (IP) needs reputable analyses and prediction information on the internet traffic. The IP along with increased internet traffics due to expanding new service platforms such as smartphones will reflect policies such as network QoS according to new services. The establishment of monitoring methods and analysis plans is thus required for the development of internet traffics that will analyze their status and predict their future. The paper with the speed of Internet traffic model is developed for monitoring the state of the experiment and verified. The problem is that the proposed service Internet service provider (ISP) to resolve the conflict between the occurrences can be considerably Internet traffic and that the state of data may be helpful in understanding. The paper advancement policy to reflect the network traffic volume of Internet services and users irradiation with increased traffic due to the development and management of the analysis was carried out experimental measurements.  相似文献   
3.
带关键字搜索的公钥加密(PEKS)是一种有用的加密原语,它允许用户将在加密数据上搜索的功能委托给不可信的第三方服务器,而不影响原始数据的安全性和隐私性。但是,由于缺乏对于数据的加密以及解密能力,PEKS方案不能单独进行使用,必须与标准的公钥加密方案(PKE)相结合。因此,Baek等人在2006年引入了一种新的加密原语,称为结合PKE和PEKS的加密方案(PKE+PEKS),它同时提供了PKE和PEKS的功能。目前,已有文献提出了几种PKE+PEKS方案。然而,他们都没有考虑关键字猜测攻击的问题。本文提出一个新的高效且能够抵抗关键字猜测攻击的PKE+PEKS方案,与已有方案相比,该方案在性能上有很大的提升,并且在生成关键字和数据密文时,不需要使用双线性对,极大地降低了计算和存储成本。安全性分析表明,本文中所提出的方案能够满足密文隐私安全性、陷门不可区分性和抗关键字猜测攻击的安全性。效率分析表明,本分提出的方案更加高效。  相似文献   
4.
Few jurisdictions have translated internationally agreed social impact assessment (SIA) principles into statutory provisions. Governments and regulatory bodies tend to provide developers with high-level frameworks, or require that social impacts be ‘considered’, without specifying how this is to be done. In Australia, this lack of clarity leaves all parties uncertain about requirements for SIA. The New South Wales (NSW) Government’s 2017 release of the SIA guideline for State-significant mining, petroleum and extractive industry development represents an attempt to clarify requirements and provide guidance. In this paper, we describe the process of bringing this guideline to fruition from the perspective of being directly involved in its development, and highlight the challenges involved in integrating leading-practice principles into the state’s pre-existing policy framework. While the guideline represents a significant advance in policy-based SIA guidance, some aspects leave room for improvement. The real test of the guideline’s impact will lie in its influence on SIA practice in NSW, and ultimately in social outcomes for communities affected by resources projects.  相似文献   
5.
Drunk drivers are a menace to themselves and to other road users, as drunk driving significantly increases the risk of involvement in road accidents and the probability of severe or fatal injuries. Although injuries and fatalities related to road accidents have decreased in recent decades, the prevalence of drunk driving among drivers killed in road accidents has remained stable, at around 25% or more during the past 10 years. Understanding drunk driving, and in particular, recidivism, is essential for designing effective countermeasures, and accordingly, the present study aims at identifying the differences between non-drunk drivers, drunk driving non-recidivists and drunk driving recidivists with respect to their demographic and socio-economic characteristics, road accident involvement and other traffic and non-traffic-related law violations. This study is based on register-data from Statistics Denmark and includes information from 2008 to 2012 for the entire population, aged 18 or older, of Denmark. The results from univariate and multivariate statistical analyses reveal a five year prevalence of 17% for drunk driving recidivism, and a significant relation between recidivism and the drunk drivers’ gender, age, income, education, receipt of an early retirement pension, household type, and residential area. Moreover, recidivists are found to have a higher involvement in alcohol-related road accidents, as well as other traffic and, in particular, non-traffic-related offences. These findings indicate that drunk driving recidivism is more likely to occur among persons who are in situations of socio-economic disadvantage and marginalisation. Thus, to increase their effectiveness, preventive measures aiming to reduce drunk driving should also address issues related to the general life situations of the drunk driving recidivists that contribute to an increased risk of drunk driving recidivism.  相似文献   
6.
文章介绍了新一代IP骨干网上的IP QoS实现技术,论述了集成业务(IntServ)与差分业务(DiffServ)解决方案的特点,详细介绍了相关的队列管理与排队机制。并结合多协议标签交换(MPLS)技术的最新发展,阐述了综合多协议标签交换流量工程与DiffServ技术体系端到端IP QoS的实现。  相似文献   
7.
In a packet switching network, congestion is unavoidable and affects the quality of real‐time traffic with such problems as delay and packet loss. Packet fair queuing (PFQ) algorithms are well‐known solutions for quality‐of‐service (QoS) guarantee by packet scheduling. Our approach is different from previous algorithms in that it uses hardware time achieved by sampling a counter triggered by a periodic clock signal. This clock signal can be provided to all the modules of a routing system to get synchronization. In this architecture, a variant of the PFQ algorithm, called digitized delay queuing (DDQ), can be distributed on many line interface modules. We derive the delay bounds in a single processor system and in a distributed architecture. The definition of traffic contribution improves the simplicity of the mathematical models. The effect of different time between modules in a distributed architecture is the key idea for understanding the delay behavior of a routing system. The number of bins required for the DDQ algorithm is also derived to make the system configuration clear. The analytical models developed in this paper form the basis of improvement and application to a combined input and output queuing (CIOQ) router architecture for a higher speed QoS network.  相似文献   
8.
介绍了对大桥的风向、风力和交通流量的测试依据和内容,分析了风向、风力的测试结果以及梁体在风力及交通流量等作用下的受力情况,指出钢箱梁体主要受到的力是风力。  相似文献   
9.
融合多种网络可满足用户长日寸间连接和尽可能获得较高数据传输速率的需要,但融合后的网络也将各种网络的安全缺陷带进融合网络中。这不但给融合网络的运行带进各种原有的安全问题,而且增加了一些新的安全问题。对此,文章提出了基于恢复的多重防护解决方案,并使用公钥加密算法鉴权。使用私钥对通信数据进行加密。该方案可以为系统提供可靠的安全性,并实现用户对服务的不可抵赖性。该方案还处于研究起步阶段,下一步还需要明确各层的正确行为,以及出现多个恶意节点对某个合法节点诬陷时所应采取的行动。  相似文献   
10.
基于联系国内外智能交通系统研究的具体实际,提出了建立城市智能交通实验研究中心的设想,并结合一个集成了视频和线圈信息采集方式的实验研究中心简单设计方案,对其所具有的基本功能作了初步研究和探讨。该系统兼具促进交流和有关培训等社会职能,可以作为国家智能交通事业发展过程中一种特殊的示范工程。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号