首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   508篇
  免费   31篇
  国内免费   31篇
电工技术   3篇
综合类   15篇
化学工业   4篇
机械仪表   4篇
建筑科学   53篇
矿业工程   5篇
水利工程   66篇
石油天然气   5篇
武器工业   4篇
无线电   149篇
一般工业技术   10篇
冶金工业   31篇
自动化技术   221篇
  2023年   3篇
  2022年   6篇
  2021年   12篇
  2020年   11篇
  2019年   13篇
  2018年   18篇
  2017年   25篇
  2016年   21篇
  2015年   15篇
  2014年   30篇
  2013年   32篇
  2012年   27篇
  2011年   40篇
  2010年   24篇
  2009年   30篇
  2008年   38篇
  2007年   33篇
  2006年   25篇
  2005年   26篇
  2004年   26篇
  2003年   22篇
  2002年   10篇
  2001年   11篇
  2000年   8篇
  1999年   13篇
  1998年   4篇
  1997年   5篇
  1996年   5篇
  1995年   6篇
  1994年   6篇
  1993年   4篇
  1992年   6篇
  1991年   1篇
  1990年   3篇
  1989年   2篇
  1988年   4篇
  1987年   2篇
  1986年   1篇
  1985年   1篇
  1981年   1篇
排序方式: 共有570条查询结果,搜索用时 15 毫秒
1.
提出在县市级广电宽带数据网络的建设过程中,要着眼业务发展,突出高扩展性,构建基于标准、扩展灵活的主干网,实现网络建设的可持续性发展,并结合实际,从核心设备、端口、中继带宽、网络业务4个方面对扩展能力进行了阐述.  相似文献   
2.
1998年昌江发生了建国以来最大洪水,文章从天气环流背景、降雨特征等方面分析这次洪水形成的特点和发展过程。  相似文献   
3.
4.
WCDMA的MBMS技术   总被引:2,自引:0,他引:2  
主要介绍了基于WCDMA的MBMS技术,给出了其网络架构和技术难点,并对其应用给无线网络带来的影响作了一定深度的探讨。  相似文献   
5.
就电视现场直播中如何保障安全播出、各路信号同步以及保证信号质量等问题进行探讨.同时就常用于直播信号传输的微波传输系统的多种不同使用场合及使用方法作一介绍.  相似文献   
6.
It has recently been shown that authenticated Byzantine agreement, in which more than a third of the parties are corrupted, cannot be securely realized under concurrent or parallel (stateless) composition. This result puts into question any usage of authenticated Byzantine agreement in a setting where many executions take place. In particular, this is true for the whole body of work of secure multi-party protocols in the case that a third or more of the parties are corrupted. This is because these protocols strongly rely on the extensive use of a broadcast channel, which is in turn realized using authenticated Byzantine agreement. We remark that it was accepted folklore that the use of a broadcast channel (or authenticated Byzantine agreement) is actually essential for achieving meaningful secure multi-party computation whenever a third or more of the parties are corrupted. In this paper we show that this folklore is false. We present a mild relaxation of the definition of secure computation allowing abort. Our new definition captures all the central security issues of secure computation, including privacy, correctness and independence of inputs. However, the novelty of the definition is in decoupling the issue of agreement from these issues. We then show that this relaxation suffices for achieving secure computation in a point-to-point network. That is, we show that secure multi-party computation for this definition can be achieved for any number of corrupted parties and without a broadcast channel (or trusted pre-processing phase as required for running authenticated Byzantine agreement). Furthermore, this is achieved by just replacing the broadcast channel in known protocols with a very simple and efficient echo-broadcast protocol. An important corollary of our result is the ability to obtain multi-party protocols that remain secure under composition, without assuming a broadcast channel.  相似文献   
7.
The mobile ad hoc network (MANET) has recently been recognized as an attractive network architecture for wireless communication. Reliable broadcast is an important operation in MANET (e.g., giving orders, searching routes, and notifying important signals). However, using a naive flooding to achieve reliable broadcasting may be very costly, causing a lot of contention, collision, and congestion, to which we refer as the broadcast storm problem. This paper proposes an efficient reliable broadcasting protocol by taking care of the potential broadcast storm problem that could occur in the medium-access level. Existing protocols are either unreliable, or reliable but based on a too costly approach. Our protocol differs from existing protocols by adopting a low-cost broadcast, which does not guarantee reliability, as a basic operation. The reliability is ensured by additional acknowledgement and handshaking. Simulation results do justify the efficiency of the proposed protocol.  相似文献   
8.
Seepage well is an emerging Low Impact Development (LID) technology that can effectively control the storm runoff. However, its rainwater infiltration rate and storage capacity still require further enhancement. By setting a horizontal infiltration structure at the bottom of conventional rainwater seepage well (CSW), an enhanced seepage well (ESW) was proposed in this study, and its infiltration performances compared with the permeable pavement (PP) and the CSW were systemically investigated using static infiltration experiment and HYDRUS-2D simulation. The results showed that the infiltration efficiency of ESW was significantly higher than that of PP and CSW, and the process of water infiltrated through soil mainly controlled the macroscopic infiltration rate. The Nash-Sutcliff Efficient (NSE) index was used to evaluate the accuracy and reliability of the HYDRUS-2D model, and the results of NSE values greater than 0.75 (varied between 0.75 and 0.91) confirmed the applicability of HYDRUS-2D to describe correctly the hydraulic behavior of the ESW system. Simulation infiltration tests showed that the ESW performed a higher average infiltration rate and fewer total runoff volume than the CSW, indicating the effectively enhancement of the infiltration and water retention capacity of ESW, especially under heavy rainfall intensities. Additionally, the ESW system exhibited an excellent runoff-control and rainwater retention capacity in an actual rainfall scenario.  相似文献   
9.
Collision of suspended entities with surrounding molecules in a fluid environment leads to random movements of these entities, known as Brownian motion. Suppression of this motion in a Brownian ensemble has recently become essential for facilitating emerging applications in biology and in micro and nano scale self-assembled systems. How optimally this suppression can be performed remains an open question of great interest to both the natural science and the control engineering communities. In this paper, we address this question theoretically by introducing a novel “Broadcast Stochastic Receding Horizon Control” strategy for trapping an ensemble of non-interacting Brownian particles. The strategy designs a control input, independent of the number of particles, using measurements from a single particle as the only available feedback information and broadcasts it to all particles in the ensemble. We show the existence of a minimum region in which all particles can be driven and trapped indefinitely using the proposed control action. Under specific conditions, we guarantee the trapping of all particles in this region with probability 1. Finally, we demonstrate the efficacy of our control design in a simulation environment by trapping 100 Brownian particles in one, two and three dimensional homogeneous medium.  相似文献   
10.
在交换网络环境中,物理环路可以提高网络的冗余,但容易产生双向的广播环,甚至形成广播风暴,使交换机瘫痪;通过生成树协议生成根网桥,根端口,指定端口和阻塞端口,在逻辑上断开该网段,形成一个无环网络,使网络中无法产生广播环和广播风暴;当其它链路出现故障时,阻塞的端口自动恢复,逻辑断开的线路又被连通,继续传输数据。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号