首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9369篇
  免费   1334篇
  国内免费   1139篇
电工技术   887篇
技术理论   1篇
综合类   1078篇
化学工业   129篇
金属工艺   46篇
机械仪表   269篇
建筑科学   720篇
矿业工程   138篇
能源动力   216篇
轻工业   62篇
水利工程   753篇
石油天然气   126篇
武器工业   80篇
无线电   2338篇
一般工业技术   481篇
冶金工业   209篇
原子能技术   7篇
自动化技术   4302篇
  2024年   106篇
  2023年   220篇
  2022年   372篇
  2021年   449篇
  2020年   464篇
  2019年   399篇
  2018年   376篇
  2017年   449篇
  2016年   489篇
  2015年   571篇
  2014年   803篇
  2013年   769篇
  2012年   815篇
  2011年   806篇
  2010年   576篇
  2009年   561篇
  2008年   573篇
  2007年   609篇
  2006年   464篇
  2005年   376篇
  2004年   297篇
  2003年   282篇
  2002年   187篇
  2001年   145篇
  2000年   118篇
  1999年   85篇
  1998年   79篇
  1997年   65篇
  1996年   50篇
  1995年   48篇
  1994年   35篇
  1993年   33篇
  1992年   19篇
  1991年   12篇
  1990年   14篇
  1989年   13篇
  1988年   8篇
  1987年   5篇
  1986年   6篇
  1985年   17篇
  1984年   5篇
  1983年   11篇
  1982年   11篇
  1981年   4篇
  1980年   6篇
  1979年   6篇
  1976年   4篇
  1974年   3篇
  1973年   4篇
  1969年   3篇
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
1.
Redundancy allocation problem (RAP) is one of the best-developed problems in reliability engineering studies. This problem follows to optimize the reliability of a system containing s sub-systems under different constraints, including cost, weight, and volume restrictions using redundant components for each sub-system. Various solving methodologies have been used to optimize this problem, including exact, heuristic, and meta-heuristic algorithms. In this paper, an efficient multi-objective meta-heuristic algorithm based on simulated annealing (SA) is developed to solve multi-objective RAP (MORAP). This algorithm is knowledge-based archive multi-objective simulated annealing (KBAMOSA). KBAMOSA applies a memory matrix to reinforce the neighborhood structure to achieve better quality solutions. The results analysis and comparisons demonstrate the performance of the proposed algorithm for solving MORAP.  相似文献   
2.
Private information retrieval(PIR) is an important privacy protection issue of secure multi-party computation, but the PIR protocols based on classical cryptography are vulnerable because of new technologies,such as quantum computing and cloud computing. The quantum private queries(QPQ) protocols available, however, has a high complexity and is inefficient in the face of large database. This paper, based on the QKD technology which is mature now, proposes a novel QPQ protocol utilizing the key dilution and auxiliary parameter. Only N quits are required to be sent in the quantum channel to generate the raw key, then the straight k bits in the raw key are added bitwise to dilute the raw key, and a final key is consequently obtained to encrypt the database. By flexible adjusting of auxiliary parameters θ and k, privacy is secured and the query success ratio is improved. Feasibility and performance analyses indicate that the protocol has a high success ratio in first-trial query and is easy to implement, and that the communication complexity of O(N) is achieved.  相似文献   
3.
在通讯设备爆炸式增长的时代,移动边缘计算作为5G通讯技术的核心技术之一,对其进行合理的资源分配显得尤为重要。移动边缘计算的思想是把云计算中心下沉到基站部署(边缘云),使云计算中心更加靠近用户,以快速解决计算资源分配问题。但是,相对于大型的云计算中心,边缘云的计算资源有限,传统的虚拟机分配方式不足以灵活应对边缘云的计算资源分配问题。为解决此问题,提出一种根据用户综合需求变化的动态计算资源和频谱分配算法(DRFAA),采用"分治"策略,并将资源模拟成"流体"资源进行分配,以寻求较大的吞吐量和较低的传输时延。实验仿真结果显示,动态计算资源和频谱分配算法可以有效地降低用户与边缘云之间的传输时延,也可以提高边缘云的吞吐量。  相似文献   
4.
高铁移动网络覆盖是国内三大通信运营商的一个重点,而高铁隧道内移动网络覆盖更是运营商的一大难点痛点。文章根据我国中部省份某高铁线路覆盖规划实例,采用“设备+POI+泄漏电缆”模式,即三家运营商信号源设备通过同一POI(point of interface,多系统接入平台)接入,信号输出到泄漏电缆进行隧道覆盖,隧道口场坪站安装宽频切换天线对隧道外进行延伸覆盖,通过链路预算合理布置各运营商主设备信号源,从而实现隧道到室外的无缝覆盖。最后,根据已有成熟网络覆盖解决方案,对未来5G高铁隧道移动网络覆盖方案进行了探讨。  相似文献   
5.
Load testing of applications is an important and costly activity for software provider companies. Classical solutions are very difficult to set up statically, and their cost is prohibitive in terms of both human and hardware resources. Virtualized cloud computing platforms provide new opportunities for stressing an application's scalability, by providing a large range of flexible and less expensive (pay‐per‐use model) computation units. On the basis of these advantages, load testing solutions could be provided on demand in the cloud. This paper describes a Benchmark‐as‐a‐Service solution that automatically scales the load injection platform and facilitates its setup according to load profiles. Our approach is based on: (i) virtualization of the benchmarking platform to create self‐scaling injectors; (ii) online calibration to characterize the injector's capacity and impact on the benched application; and (iii) a provisioning solution to appropriately scale the load injection platform ahead of time. We also report experiments on a benchmark illustrating the benefits of this system in terms of cost and resource reductions. Copyright © 2013 John Wiley & Sons, Ltd.  相似文献   
6.
以用户为中心的可见光通信协作传输是近年来出现的新架构,这导致虚拟小区之间出现重叠。为避免导频污染问题,每个虚拟小区中的光接入点(AP)或者虚拟小区中选择相同AP的用户发送的训练序列应该是正交的。针对可见光通信中以用户为中心的协作网络,研究训练资源的正交分配问题,提出了一种新的导频分配算法,联合导频分配和用户选择问题,以期最大限度地增加虚拟小区内可被接入的用户数。分析和仿真结果表明,该导频分配方案可以有效改善导频污染问题,提高训练资源利用率,并且相比已有的导频分配方案,性能有所改进。  相似文献   
7.
Many e-commerce companies collect users’ personal data for marketing purposes despite privacy concerns. Information-collecting companies often offer a monetary reward to users to alleviate privacy concerns and ease the collection of personal information. This study focused on the negative effects of monetary rewards on both information privacy concerns (IPC) and information disclosure. A survey approach was used to collect data and 370 final responses were analysed using a two-way analysis of variance and a binomial logistic regression model. The results show that monetary rewards increase IPC when an information-collecting company requires sensitive information. Additional results indicate that building trust is a more effective way of collecting personal data. This study identifies how organisations can best execute information-collection activities and contributes additional insights for academia and practitioners.  相似文献   
8.
随着大数据和云计算的技术的深入应用,人工智能时代的机器学习和深度学习更需要日益增长的数据,因此数据安全与隐私保护变得更加迫切。本文介绍人工智能的定义以及特征,探究数据安全和隐私保护现状,分析数据安全和隐私保护面临的诸多问题,并提出在人工智能时代对数据安全和隐私保护的措施。  相似文献   
9.
The objective of this paper is to review and document the mine fleet management systems’ models and algorithms. The purpose is to understand the algorithms behind the fleet management systems and the proposed academic solutions in this area to identify any gaps in the current literature and to open up opportunities to establish research questions that need to be addressed in an integrated simulation and optimisation operational planning research framework. In this paper, we review industrial fleet management systems and the main academic algorithms behind such systems. The fleet management systems are divided into three subsequently related problems to review: shortest path, production optimisation and real-time dispatching. Finally, the limitations of current algorithms for fleet management systems are documented in terms of mining practice feasibility and optimality of the solution on large-scale problems. The results of this literature review enable us to evaluate the logical links between major components of an integrated simulation and optimisation operational planning framework with current theory of fleet management systems.  相似文献   
10.
流域泥沙灾害与泥沙资源性的研究   总被引:5,自引:0,他引:5  
泥沙灾害与泥沙资源性是流域泥沙的重要属性,二者在一定条件下可以相互转化。本文论述了泥沙淤积、泥沙冲刷、岸滩崩塌、山地崩塌与泥石流、粗沙淤积的土地沙化等泥沙灾害,指出泥沙灾害具有时空分布的不均匀性、渐变性或突发性、群发性、转化性及危害严重性等;流域泥沙资源化的主要途径包括填海造陆及造地、引洪淤灌、堤防淤临淤背、建筑材料、湿地形成(河流、湖泊与河口海岸)等,指出流域泥沙资源化及其优化配置既要解决思想观念、基本理论、目标效益等方面的问题,还要考虑与水资源联合配置问题。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号