全文获取类型
收费全文 | 17528篇 |
免费 | 1959篇 |
国内免费 | 1249篇 |
专业分类
电工技术 | 1765篇 |
综合类 | 1781篇 |
化学工业 | 1294篇 |
金属工艺 | 420篇 |
机械仪表 | 621篇 |
建筑科学 | 4508篇 |
矿业工程 | 759篇 |
能源动力 | 173篇 |
轻工业 | 217篇 |
水利工程 | 829篇 |
石油天然气 | 222篇 |
武器工业 | 321篇 |
无线电 | 2464篇 |
一般工业技术 | 960篇 |
冶金工业 | 514篇 |
原子能技术 | 46篇 |
自动化技术 | 3842篇 |
出版年
2024年 | 141篇 |
2023年 | 354篇 |
2022年 | 642篇 |
2021年 | 640篇 |
2020年 | 646篇 |
2019年 | 440篇 |
2018年 | 380篇 |
2017年 | 510篇 |
2016年 | 531篇 |
2015年 | 721篇 |
2014年 | 1345篇 |
2013年 | 1015篇 |
2012年 | 1400篇 |
2011年 | 1418篇 |
2010年 | 1174篇 |
2009年 | 1188篇 |
2008年 | 1110篇 |
2007年 | 1256篇 |
2006年 | 978篇 |
2005年 | 913篇 |
2004年 | 763篇 |
2003年 | 633篇 |
2002年 | 541篇 |
2001年 | 396篇 |
2000年 | 351篇 |
1999年 | 250篇 |
1998年 | 179篇 |
1997年 | 167篇 |
1996年 | 113篇 |
1995年 | 101篇 |
1994年 | 66篇 |
1993年 | 50篇 |
1992年 | 66篇 |
1991年 | 36篇 |
1990年 | 22篇 |
1989年 | 21篇 |
1988年 | 23篇 |
1987年 | 11篇 |
1984年 | 8篇 |
1983年 | 6篇 |
1980年 | 7篇 |
1966年 | 6篇 |
1965年 | 9篇 |
1964年 | 17篇 |
1963年 | 12篇 |
1961年 | 8篇 |
1960年 | 6篇 |
1959年 | 6篇 |
1958年 | 5篇 |
1955年 | 6篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
In the Internet of Things (IoT), a huge amount of valuable data is generated by various IoT applications. As the IoT technologies become more complex, the attack methods are more diversified and can cause serious damages. Thus, establishing a secure IoT network based on user trust evaluation to defend against security threats and ensure the reliability of data source of collected data have become urgent issues, in this paper, a Data Fusion and transfer learning empowered granular Trust Evaluation mechanism (DFTE) is proposed to address the above challenges. Specifically, to meet the granularity demands of trust evaluation, time–space empowered fine/coarse grained trust evaluation models are built utilizing deep transfer learning algorithms based on data fusion. Moreover, to prevent privacy leakage and task sabotage, a dynamic reward and punishment mechanism is developed to encourage honest users by dynamically adjusting the scale of reward or punishment and accurately evaluating users’ trusts. The extensive experiments show that: (i) the proposed DFTE achieves high accuracy of trust evaluation under different granular demands through efficient data fusion; (ii) DFTE performs excellently in participation rate and data reliability. 相似文献
2.
The existing analytical average bit error rate (ABER) expression of conventional generalised spatial modulation (CGSM) does not agree well with the Monte Carlo simulation results in the low signal‐to‐noise ratio (SNR) region. Hence, the first contribution of this paper is to derive a new and easy way to evaluate analytical ABER expression that improves the validation of the simulation results at low SNRs. Secondly, a novel system termed CGSM with enhanced spectral efficiency (CGSM‐ESE) is presented. This system is realised by applying a rotation angle to one of the two active transmit antennas. As a result, the overall spectral efficiency is increased by 1 bit/s/Hz when compared with the equivalent CGSM system. In order to validate the simulation results of CGSM‐ESE, the third contribution is to derive an analytical ABER expression. Finally, to improve the ABER performance of CGSM‐ESE, three link adaptation algorithms are developed. By assuming full knowledge of the channel at the receiver, the proposed algorithms select a subset of channel gain vector (CGV) pairs based on the Euclidean distance between all CGV pairs, CGV splitting, CGV amplitudes, or a combination of these. 相似文献
3.
Most real-world vehicle nodes can be structured into an interconnected network of vehicles. Through structuring these services and vehicle device interactions into multiple types, such internet of vehicles becomes multidimensional heterogeneous overlay networks. The heterogeneousness of the overlays makes it difficult for the overlay networks to coordinate with each other to improve their performance. Therefore, it poses an interesting but critical challenge to the effective analysis of heterogeneous virtual vehicular networks. A variety of virtual vehicular networks can be easily deployed onto the native network by applying the concept of SDN (Software Defined Networking). These virtual networks reflect their heterogeneousness due to their different performance goals, and they compete for the same physical resources of the underlying network, so that a sub-optimal performance of the virtual networks may be achieved. Therefore, we propose a Deep Reinforcement Learning (DRL) approach to make the virtual networks cooperate with each other through the SDN controller. A cooperative solution based on the asymmetric Nash bargaining is proposed for co-existing virtual networks to improve their performance. Moreover, the Markov Chain model and DRL resolution are introduced to leverage the heterogeneous performance goals of virtual networks. The implementation of the approach is introduced, and simulation results confirm the performance improvement of the latency sensitive, loss-rate sensitive and throughput sensitive heterogeneous vehicular networks using our cooperative solution. 相似文献
4.
This paper presents an analytical solution to the non-uniform pressure on thick-walled cylinder. The formulation is based on the linear elasticity theory (plain strain) and stress function method. As an example, the proposed solution is used to model the stress distribution due to non-uniform steel reinforcement corrosion in concrete. The model is formulated considering different scenarios of corrosion pressure distribution. It is validated against the finite element model for different cases of non-uniform pressure distributions. The results show that the corrosion-induced cracks are likely to start just beyond the anodic zone. This is confirmed by the experimental tests on concrete cylinder exposed to non-uniform accelerated corrosion of steel reinforcement. The model can be effectively used to calculate the distribution of corrosion-induced stresses in concrete. 相似文献
5.
针对空空宽带高速通信的需求,设计了小型化机载激光通信系统。仿真分析了300 km、2.5 Gb/s无线激光链路性能,并通过运动仿真台模拟机动环境测试了系统的跟踪与通信性能,其中粗跟踪误差为533.2 μrad(1σ),精跟踪误差为3.6 μrad(1σ),测试数据传输240 s,通信误码率为2.82×10-9。仿真与实验验证了该系统用于远距离空空无线激光通信的可行性。 相似文献
6.
Online configuration of large-scale systems such as networks requires parameter optimization within a limited amount of time, especially when configuration is needed as a response to recover from a failure in the system. To quickly configure such systems in an online manner, we propose a Probabilistic Trans-Algorithmic Search (PTAS) framework which leverages multiple optimization search algorithms in an iterative manner. PTAS applies a search algorithm to determine how to best distribute available experiment budget among multiple optimization search algorithms. It allocates an experiment budget to each available search algorithm and observes its performance on the system-at-hand. PTAS then probabilistically reallocates the experiment budget for the next round proportional to each algorithm’s performance relative to the rest of the algorithms. This “roulette wheel” approach probabilistically favors the more successful algorithm in the next round. Following each round, the PTAS framework “transfers” the best result(s) among the individual algorithms, making our framework a trans-algorithmic one. PTAS thus aims to systematize how to “search for the best search” and hybridize a set of search algorithms to attain a better search. We use three individual search algorithms, i.e., Recursive Random Search (RRS) (Ye and Kalyanaraman, 2004), Simulated Annealing (SA) (Laarhoven and Aarts, 1987), and Genetic Algorithm (GA) (Goldberg, 1989), and compare PTAS against the performance of RRS, GA, and SA. We show the performance of PTAS on well-known benchmark objective functions including scenarios where the objective function changes in the middle of the optimization process. To illustrate applicability of our framework to automated network management, we apply PTAS on the problem of optimizing link weights of an intra-domain routing protocol on three different topologies obtained from the Rocketfuel dataset. We also apply PTAS on the problem of optimizing aggregate throughput of a wireless ad hoc network by tuning datarates of traffic sources. Our experiments show that PTAS successfully picks the best performing algorithm, RRS or GA, and allocates the time wisely. Further, our results show that PTAS’ performance is not transient and steadily improves as more time is available for search. 相似文献
7.
Neural Machine Translation (NMT) is an end-to-end learning approach for
automated translation, overcoming the weaknesses of conventional phrase-based translation
systems. Although NMT based systems have gained their popularity in commercial
translation applications, there is still plenty of room for improvement. Being the most
popular search algorithm in NMT, beam search is vital to the translation result. However,
traditional beam search can produce duplicate or missing translation due to its target
sequence selection strategy. Aiming to alleviate this problem, this paper proposed neural
machine translation improvements based on a novel beam search evaluation function. And
we use reinforcement learning to train a translation evaluation system to select better
candidate words for generating translations. In the experiments, we conducted extensive
experiments to evaluate our methods. CASIA corpus and the 1,000,000 pairs of bilingual
corpora of NiuTrans are used in our experiments. The experiment results prove that the
proposed methods can effectively improve the English to Chinese translation quality. 相似文献
8.
The present paper deals with the experimental assessment of the effectiveness of steel fibre reinforcement in terms of punching resistance of centrically loaded flat slabs, and to the development of an analytical model capable of predicting the punching behaviour of this type of structures. For this purpose, eight slabs of 2550 × 2550 × 150 mm3 dimensions were tested up to failure, by investigating the influence of the content of steel fibres (0, 60, 75 and 90 kg/m3) and concrete strength class (50 and 70 MPa). Two reference slabs without fibre reinforcement, one for each concrete strength class, and one slab for each fibre content and each strength class compose the experimental program. All slabs were flexurally reinforced with a grid of ribbed steel bars in a percentage to assure punching failure mode for the reference slabs. Hooked ends steel fibres provided the unique shear reinforcement. The results have revealed that steel fibres are very effective in converting brittle punching failure into ductile flexural failure, by increasing both the ultimate load and deflection, as long as adequate fibre reinforcement is assured. An analytical model was developed based on the most recent concepts proposed by the fib Mode Code 2010 for predicting the punching resistance of flat slabs and for the characterization of the behaviour of fibre reinforced concrete. The most refined version of this model was capable of predicting the punching resistance of the tested slabs with excellent accuracy and coefficient of variation of about 5%. 相似文献
9.
基于四候煤矿3108回风顺槽过F3断层期间,顶板出现严重破碎、下沉现象,提出了俯斜台阶法施工工艺,并对断层破碎带顶板采取MF-2型化学材料注浆加固以及"钢筋锚索网+U29梯形棚"联合支护措施。支护效果检验结果表明,联合支护有效控制了断层破碎区顶板下沉、破碎现象,保证了巷道顶板稳定性。 相似文献
10.
BDI模型能够很好地解决在特定环境下的Agent的推理和决策问题,但在动态和不确定环境下缺少决策和学习的能力。强化学习解决了Agent在未知环境下的决策问题,却缺少BDI模型中的规则描述和逻辑推理。针对BDI在未知和动态环境下的策略规划问题,提出基于强化学习Q-learning算法来实现BDI Agent学习和规划的方法,并针对BDI的实现模型ASL的决策机制做出了改进,最后在ASL的仿真平台Jason上建立了迷宫的仿真,仿真实验表明,在加入Q-learning学习机制后的新的ASL系统中,Agent在不确定环境下依然可以完成任务。 相似文献