全文获取类型
收费全文 | 4340篇 |
免费 | 268篇 |
国内免费 | 18篇 |
专业分类
电工技术 | 54篇 |
综合类 | 10篇 |
化学工业 | 949篇 |
金属工艺 | 108篇 |
机械仪表 | 160篇 |
建筑科学 | 172篇 |
矿业工程 | 8篇 |
能源动力 | 368篇 |
轻工业 | 713篇 |
水利工程 | 31篇 |
石油天然气 | 32篇 |
无线电 | 277篇 |
一般工业技术 | 887篇 |
冶金工业 | 159篇 |
原子能技术 | 47篇 |
自动化技术 | 651篇 |
出版年
2024年 | 16篇 |
2023年 | 64篇 |
2022年 | 120篇 |
2021年 | 189篇 |
2020年 | 181篇 |
2019年 | 179篇 |
2018年 | 225篇 |
2017年 | 214篇 |
2016年 | 227篇 |
2015年 | 137篇 |
2014年 | 181篇 |
2013年 | 414篇 |
2012年 | 274篇 |
2011年 | 315篇 |
2010年 | 227篇 |
2009年 | 282篇 |
2008年 | 281篇 |
2007年 | 212篇 |
2006年 | 152篇 |
2005年 | 121篇 |
2004年 | 97篇 |
2003年 | 80篇 |
2002年 | 65篇 |
2001年 | 26篇 |
2000年 | 30篇 |
1999年 | 38篇 |
1998年 | 51篇 |
1997年 | 28篇 |
1996年 | 25篇 |
1995年 | 10篇 |
1994年 | 9篇 |
1993年 | 14篇 |
1992年 | 18篇 |
1991年 | 17篇 |
1990年 | 12篇 |
1989年 | 8篇 |
1988年 | 9篇 |
1987年 | 12篇 |
1986年 | 14篇 |
1985年 | 9篇 |
1984年 | 10篇 |
1983年 | 2篇 |
1982年 | 5篇 |
1981年 | 8篇 |
1979年 | 4篇 |
1977年 | 2篇 |
1976年 | 4篇 |
1974年 | 2篇 |
1972年 | 1篇 |
1970年 | 1篇 |
排序方式: 共有4626条查询结果,搜索用时 15 毫秒
81.
82.
Organ‐On‐A‐Chip: Biomechanical Strain Exacerbates Inflammation on a Progeria‐on‐a‐Chip Model (Small 15/2017) 下载免费PDF全文
83.
84.
85.
Shahad Alyousif Mohammed Dauwed Rafal Nader Mohammed Hasan Ali Mustafa Musa Jabar Ahmed Alkhayyat 《计算机、材料和连续体(英文)》2023,75(1):531-546
The number of mobile devices accessing wireless networks is skyrocketing due to the rapid advancement of sensors and wireless communication technology. In the upcoming years, it is anticipated that mobile data traffic would rise even more. The development of a new cellular network paradigm is being driven by the Internet of Things, smart homes, and more sophisticated applications with greater data rates and latency requirements. Resources are being used up quickly due to the steady growth of smartphone devices and multimedia apps. Computation offloading to either several distant clouds or close mobile devices has consistently improved the performance of mobile devices. The computation latency can also be decreased by offloading computing duties to edge servers with a specific level of computing power. Device-to-device (D2D) collaboration can assist in processing small-scale activities that are time-sensitive in order to further reduce task delays. The task offloading performance is drastically reduced due to the variation of different performance capabilities of edge nodes. Therefore, this paper addressed this problem and proposed a new method for D2D communication. In this method, the time delay is reduced by enabling the edge nodes to exchange data samples. Simulation results show that the proposed algorithm has better performance than traditional algorithm. 相似文献
86.
Zaher Al Aghbari Ibrahim Kamel Ahmed Mustafa 《Peer-to-Peer Networking and Applications》2011,4(4):391-409
Recently, many applications have used Peer-to-Peer (P2P) systems to overcome the current problems with client/server systems
such as non-scalability, high bandwidth requirement and single point of failure. In this paper, we propose an efficient scheme
to support efficient range query processing over structured P2P systems, while balancing both the storage load and access
load. The paper proposes a rotating token scheme to balance the storage load by placing joining nodes in appropriate locations
in the identifier space to share loads with already overloaded nodes. Then, to support range queries, we utilize an order-preserving
mapping function to map keys to nodes in order preserving way and without hashing. This may result in an access load imbalance
due to non-uniform distribution of keys in the identifier space. Thus, we propose an adaptive replication scheme to relieve
overloaded nodes by shedding some load on other nodes to balance the access load. We derive a formula for estimating the overhead
of the proposed adaptive replication scheme. In this study, we carry simulation experiments with synthetic data to measure
the performance of the proposed schemes. Our simulation experiments show significant gains in both storage load balancing
and access load balancing. 相似文献
87.
In this paper, we present general formulae for the mask of (2b + 4)-point n-ary approximating as well as interpolating subdivision schemes for any integers ${b\,\geqslant\,0}$ and ${n\,\geqslant\,2}$ . These formulae corresponding to the mask not only generalize and unify several well-known schemes but also provide the mask of higher arity schemes. Moreover, the 4-point and 6-point a-ary schemes introduced by Lian [Appl Appl Math Int J 3(1):18–29, 2008] are special cases of our general formulae. 相似文献
88.
This paper addresses the problem of automated code generation for a High Level Architecture compliant federate application given its behavior model. The behavior model is a part of the architectural model of a federation that the federate can participate in. The federate behavior model is based on Live Sequence Charts, adopted as the behavioral specification formalism in the Federation Architecture Metamodel (FAMM). FAMM serves as a formal language for describing federation architectures. An objective is to help the testing of federation architecture by means of its prototype implementation early in the development lifecycle. A further objective is to help developers construct complete federate applications that are well modularized. The approach to achieve these objectives is aspect‐oriented in that the generated code, which handles the federate's interactions with a federation execution, serves as the base code, where the computation logic is to be weaved as an aspect. Copyright © 2009 John Wiley & Sons, Ltd. 相似文献
89.
Consider a manufacturing cell of two identical CNC machines and a material handling robot. Identical parts requesting the completion of a number of operations are to be produced in a cyclic scheduling environment through a flow shop type setting. The existing studies in the literature overlook the flexibility of the CNC machines by assuming that both the allocation of the operations to the machines as well as their respective processing times are fixed. Consequently, the provided results may be either suboptimal or valid under unnecessarily limiting assumptions for a flexible manufacturing cell. The allocations of the operations to the two machines and the processing time of an operation on a machine can be changed by altering the machining conditions of that machine such as the speed and the feed rate in a CNC turning machine. Such flexibilities constitute the point of origin of the current study. The allocation of the operations to the machines and the machining conditions of the machines affect the processing times which, in turn, affect the cycle time. On the other hand, the machining conditions also affect the manufacturing cost. This study is the first to consider a bicriteria model which determines the allocation of the operations to the machines, the processing times of the operations on the machines, and the robot move sequence that jointly minimize the cycle time and the total manufacturing cost. We provide algorithms for the two 1-unit cycles and test their efficiency in terms of the solution quality and the computation time by a wide range of experiments on varying design parameters. 相似文献
90.
Authentication and authorization for Grids is a challenging security issue. In this paper, key issues for the establishment
of Grid authentication and authorization infrastructures are discussed, and an overview of major Grid authentication and authorization
technologies is presented. Related to this, recent developments in Grid authentication and authorization infrastructures suggest
adoption of the Shibboleth technology which offers advantages in terms of usability, confidentiality, scalability and manageability.
When combined with advanced authorization technologies, Shibboleth-based authentication and authorization infrastructures
provide role-based, fine-grained authorization. We share our experience in constructing a Shibboleth-based authentication
and authorization infrastructure and believe that such infrastructure provides a promising solution for the security of many
application domains. 相似文献