首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   60956篇
  免费   6352篇
  国内免费   4411篇
电工技术   4601篇
技术理论   1篇
综合类   5062篇
化学工业   2889篇
金属工艺   996篇
机械仪表   4942篇
建筑科学   1101篇
矿业工程   1204篇
能源动力   825篇
轻工业   919篇
水利工程   442篇
石油天然气   496篇
武器工业   528篇
无线电   15441篇
一般工业技术   3832篇
冶金工业   621篇
原子能技术   131篇
自动化技术   27688篇
  2024年   203篇
  2023年   916篇
  2022年   1258篇
  2021年   1579篇
  2020年   1778篇
  2019年   1472篇
  2018年   1338篇
  2017年   2157篇
  2016年   2409篇
  2015年   2982篇
  2014年   4298篇
  2013年   4135篇
  2012年   4967篇
  2011年   5383篇
  2010年   3707篇
  2009年   4158篇
  2008年   4265篇
  2007年   4374篇
  2006年   3612篇
  2005年   2857篇
  2004年   2374篇
  2003年   2090篇
  2002年   1687篇
  2001年   1425篇
  2000年   1212篇
  1999年   959篇
  1998年   805篇
  1997年   860篇
  1996年   585篇
  1995年   464篇
  1994年   354篇
  1993年   270篇
  1992年   202篇
  1991年   141篇
  1990年   97篇
  1989年   61篇
  1988年   48篇
  1987年   22篇
  1986年   18篇
  1985年   43篇
  1984年   44篇
  1983年   39篇
  1982年   41篇
  1981年   6篇
  1980年   6篇
  1979年   8篇
  1978年   3篇
  1977年   2篇
  1976年   2篇
  1951年   2篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
51.
针对火山岩储层的特殊性(复杂性、离散性和随机性),应用BP神经网络技术对火山岩测井解释中岩性识别问题进行了研究。该方法的技术关键是样本集和初始权重的建立,以及模型的优选。本文提出了一种基于交会图和多元统计法的学习样本生成方法,即根据取心岩样的地球化学和岩石学研究,用交会图技术建立样本集,采用聚类分析和距离判别法确定初始权重。将研究方法应用在松辽盆地杏山地区火山岩岩性识别问题中,取得了很好的效果,岩性解释符合率高于90%。文中通过四种岩性识别处理模式的对比研究,表明赋权重处理模式为最优处理模型。在神经网络模型预测过程中,需充分利用已有的地质经验和测井曲线信息建立典型可靠的样本文件,同时考虑神经网络方法中各种因素的影响,优选模型和计算参数才能使预测结果符合实际情况。  相似文献   
52.
朱伟  宋建新 《信息技术》2006,30(3):125-128
传统的OSI分层结构无法适应无线网络环境,随着越来越多无线应用的出现,人们提出了跨层设计,其主要内容就是通过在协议栈的各层之间(主要是应用层、传输层、网络层、链路层和物理层)传递特定的信息,使协议栈能够根据无线环境的变化来实现对资源的自适应优化配置,从而更有效的利用无线网络资源,提高系统的性能。  相似文献   
53.
The design of a sylphon bellows sensor and the basic circuits of an LC-generator and of a microprocessor unit are presented. An analytical pressure–frequency conversion function and a special method of adjusting the sensor ensure an error of less than 0.05%. The dynamic range is up to 105. The instruments developed cover the ranges 103, 104, and 105 Pa.  相似文献   
54.
光纤光栅感温火灾探测报警系统在原油罐区的应用   总被引:1,自引:0,他引:1  
通过对现有罐区火灾自动报警技术的认真考察、对比,在石西集中处理站原油罐区安装了光纤光栅感温火灾探测报警系统.该报警系统的传感信号是光的波长变化,传感器及其探测系统是靠光缆连接而进入被测现场,它具有高安全性、高可靠性、高绝缘性、高抗电磁干扰性、防潮耐蚀、寿命长等其他传统火灾探测报警系统无法比拟的优越性能.阐述了其系统构成和运行效果.该系统在石西集中处理站运用效果良好.  相似文献   
55.
The rapid growth of wireless services and mobile users drives a great interest in cellular networks with a hierarchical structure. Hierarchical cellular networks (HCNs) can provide high system capacity, efficient channel utilization and inherent load-balancing capability. In this paper, we develop an analytical model and a performance analysis method for a two-layer HCN with bidirectional overflow and take-back strategies. Mobile users are divided into two classes. The call requests (including new and handoff calls) of fast and slow users are preferably assigned to the macrolayer and microlayer, respectively. A call from a fast user or slow user can overflow to its non-preferable layer if there is no channel available. The successful overflow call can be taken back to its preferable layer if a channel becomes available. Since the commonly used exponentially distributed assumption for cell residence time and then the channel occupancy time does not hold for emerging mobile networks, we model various cell residence times by general distributions to adapt to more flexible mobility environments. The channel occupancy times are derived in terms of the Laplace transforms of various cell residence times. The handoff rates, overflow rates and take-back rates of each layer are also derived in terms of the new call arrival rates and related probabilities. The stationary probabilities (and then the performance measures) are determined on the basis of the theory of multi-dimensional loss systems.  相似文献   
56.
Efficient multicast search under delay and bandwidth constraints   总被引:1,自引:0,他引:1  
The issue of a multicast search for a group of users is discussed in this study. Given the condition that the search is over only after all the users in the group are found, this problem is called the Conference Call Search (CCS) problem. The goal is to design efficient CCS strategies under delay and bandwidth constraints. While the problem of tracking a single user has been addressed by many studies, to the best of our knowledge, this study is one of the first attempts to reduce the search cost for multiple users. Moreover, as oppose to the single user tracking, for which one can always reduce the expected search delay by increasing the expected search cost, for a multicast search the dependency between the delay and the search cost is more complicated, as demonstrated in this study. We identify the key factors affecting the search efficiency, and the dependency between them and the search delay. Our analysis shows that under tight bandwidth constraints, the CCS problem is NP-hard. We therefore propose a search method that is not optimal, but has a low computational complexity. In addition, the proposed strategy yields a low search delay as well as a low search cost. The performance of the proposed search strategy is superior to the implementation of an optimal single user search on a group of users. Amotz Bar-Noy received the B.Sc. degree in 1981 in Mathematics and Computer Science and the Ph.D. degree in 1987 in Computer Science, both from the Hebrew University, Israel. From October 1987 to September 1989 he was a post-doc fellow in Stanford University, California. From October 1989 to August 1996 he was a Research Staff Member with IBM T. J. Watson Research Center, New York. From February 1995 to September 2001 he was an associate Professor with the Electrical Engineering-Systems department of Tel Aviv University, Israel. From September 1999 to December 2001 he was with AT research labs in New Jersey. Since February 2002 he is a Professor with the Computer and Information Science Department of Brooklyn College - CUNY, Brooklyn New York. Zohar Naor received the Ph.D. degree in Computer Science from Tel Aviv University, Tel Aviv, Israel, in 2000. Since 2003 he is with the University of Haifa, Israel. His areas of interests include wireless networks, resource management of computer networks, mobility, search strategies, and multiple access protocols.  相似文献   
57.
Video streaming is expected to account for a large portion of the traffic in future networks, including wireless networks. It is widely accepted that the user datagram protocol (UDP) is the preferred transport protocol for video streaming and that the transmission control protocol (TCP) is unsuitable for streaming. The widespread use of UDP, however, has a number of drawbacks, such as unfairness and possible congestion collapse, which are avoided by TCP. In this paper we investigate the use of TCP as the transport layer protocol for streaming video in a multi‐code CDMA cellular wireless system. Our approach is to stabilize the TCP throughput over the wireless links by employing a recently developed simultaneous MAC packet transmission (SMPT) approach at the link layer. We study the capacity, i.e. the number of customers per cell, and the quality of service for streaming video in the uplink direction. Our extensive simulations indicate that streaming over TCP in conjunction with SMPT gives good performance for video encoded in a closed loop, i.e. with rate control. We have also found that TCP is unsuitable (even in conjunction with SMPT) for streaming the more variable open‐loop encoded video. Copyright © 2004 John Wiley & Sons, Ltd.  相似文献   
58.
空时分组码技术结合信道编码、调制和天线分集技术,当发送天线一定时,他的解码复杂度正比于发送速率,在3G标准中,该技术有着重要的地位。对空时分组码及相关知识进行了介绍,并对可变速率的空时分组码设计进行了探讨,最后展望了空时分组码技术的应用前景。  相似文献   
59.
一种新的主动网络安全体系的设计   总被引:5,自引:0,他引:5  
尽管主动网络原型系统中设计了一些安全措施,但是它们都不具通用性且主要集中在security方面,这在主动网络必须和传统网络相兼容的情况下,阻碍了主动网络的发展。本文在定义消极型错误和积极型错误的基础上,设计了主动网络资源控制核。然后提出了集security和safety保障为一体的基于资源控制核的一种通用的主动网络安全体系,探讨了该体系应具有的特点、设计目标和可行性,并设计了主动节点的安全机制。  相似文献   
60.
哈特曼传感器测量人眼波像差的特性研究   总被引:11,自引:3,他引:8  
准确测量人眼波像差,对提高正常眼睛的视力和人眼屈光矫正手术具有重要的实验和临床 价值。对哈特曼传感器测量人眼波像差的精确性和重复性进行了研究,测量人眼离焦的精度为0.2D,波像差的平均偏差为0.065mm。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号