全文获取类型
收费全文 | 39724篇 |
免费 | 4948篇 |
国内免费 | 2808篇 |
专业分类
电工技术 | 10347篇 |
技术理论 | 1篇 |
综合类 | 3594篇 |
化学工业 | 802篇 |
金属工艺 | 702篇 |
机械仪表 | 3498篇 |
建筑科学 | 1111篇 |
矿业工程 | 950篇 |
能源动力 | 745篇 |
轻工业 | 383篇 |
水利工程 | 498篇 |
石油天然气 | 754篇 |
武器工业 | 393篇 |
无线电 | 10767篇 |
一般工业技术 | 1795篇 |
冶金工业 | 371篇 |
原子能技术 | 201篇 |
自动化技术 | 10568篇 |
出版年
2024年 | 77篇 |
2023年 | 449篇 |
2022年 | 777篇 |
2021年 | 1049篇 |
2020年 | 1299篇 |
2019年 | 938篇 |
2018年 | 942篇 |
2017年 | 1379篇 |
2016年 | 1613篇 |
2015年 | 2120篇 |
2014年 | 3339篇 |
2013年 | 2843篇 |
2012年 | 4190篇 |
2011年 | 4068篇 |
2010年 | 2956篇 |
2009年 | 2795篇 |
2008年 | 2762篇 |
2007年 | 2859篇 |
2006年 | 2327篇 |
2005年 | 1811篇 |
2004年 | 1440篇 |
2003年 | 1140篇 |
2002年 | 829篇 |
2001年 | 763篇 |
2000年 | 537篇 |
1999年 | 432篇 |
1998年 | 321篇 |
1997年 | 278篇 |
1996年 | 252篇 |
1995年 | 190篇 |
1994年 | 160篇 |
1993年 | 116篇 |
1992年 | 87篇 |
1991年 | 60篇 |
1990年 | 62篇 |
1989年 | 61篇 |
1988年 | 31篇 |
1987年 | 17篇 |
1986年 | 13篇 |
1985年 | 15篇 |
1984年 | 22篇 |
1983年 | 14篇 |
1982年 | 20篇 |
1981年 | 4篇 |
1980年 | 4篇 |
1979年 | 5篇 |
1978年 | 4篇 |
1977年 | 2篇 |
1976年 | 3篇 |
1975年 | 2篇 |
排序方式: 共有10000条查询结果,搜索用时 125 毫秒
21.
22.
智能交通的出现使得车辆自组织网络受到越来越多的关注。车辆自组织网络的动态拓扑结构变化非常剧烈,这对网络的吞吐率、传输速率等性能提出了很高的要求。提出1种具有握手机制协议的自适应多通道双时钟NP-CSMA随机多址接入协议。该协议首先区分2种P-CSMA协议,握手机制成功解决了隐藏的终端问题,双时钟机制减少了平均空闲时间,多通道机制增加通道数量和划分用户优先级的同时提高了系统吞吐率,自适应机制能够使系统在高负载下保持稳定吞吐率。还对该协议的传输速率进行了分析,得出该协议的传输速率相对较高的结论。通过平均周期方法推导吞吐率和传输速率的计算公式,仿真结果与理论推导一致。 相似文献
23.
24.
25.
在通讯设备爆炸式增长的时代,移动边缘计算作为5G通讯技术的核心技术之一,对其进行合理的资源分配显得尤为重要。移动边缘计算的思想是把云计算中心下沉到基站部署(边缘云),使云计算中心更加靠近用户,以快速解决计算资源分配问题。但是,相对于大型的云计算中心,边缘云的计算资源有限,传统的虚拟机分配方式不足以灵活应对边缘云的计算资源分配问题。为解决此问题,提出一种根据用户综合需求变化的动态计算资源和频谱分配算法(DRFAA),采用"分治"策略,并将资源模拟成"流体"资源进行分配,以寻求较大的吞吐量和较低的传输时延。实验仿真结果显示,动态计算资源和频谱分配算法可以有效地降低用户与边缘云之间的传输时延,也可以提高边缘云的吞吐量。 相似文献
26.
Bernette Maria Oosterlaken Heiner Friedrich Gijsbertus de With 《Microscopy research and technique》2022,85(1):412-417
Transmission electron microscopy (TEM) is an important analysis technique to visualize (bio)macromolecules and their assemblies, including collagen fibers. Many protocols for TEM sample preparation of collagen involve one or more washing steps to remove excess salts from the dispersion that could hamper analysis when dried on a TEM grid. Such protocols are not standardized and washing times as well as washing solvents vary from procedure to procedure, with each research group typically having their own protocol. Here, we investigate the influence of washing with water, ethanol, but also methanol and 2-propanol, for both mineralized and unmineralized collagen samples via a protocol based on centrifugation. Washing with water maintains the hydrated collagen structure and the characteristic banding pattern can be clearly observed. Conversely, washing with ethanol results in dehydration of the fibrils, often leading to aggregation of the fibers and a less obvious banding pattern, already within 1 min of ethanol exposure. As we show, this process is fully reversible. Similar observations were made for methanol and propanol. Based on these results, a standardized washing protocol for collagenous samples is proposed. 相似文献
27.
In this article, we introduce a new bi-directional dual-relay selection strategy with its bit error rate (BER) performance analysis. During the first step of the proposed strategy, two relays out of a set of N relay-nodes are selected in a way to optimize the system performance in terms of BER, based on the suggested algorithm which checks if the selected relays using the max-min criterion are the best ones. In the second step, the chosen relay-nodes perform an orthogonal space-time coding scheme using the two-phase relaying protocol to establish a bi-directional communication between the communicating terminals, leading to a significant improvement in the achievable coding and diversity gain. To further improve the overall system performance, the selected relay-nodes apply also a digital network coding scheme. Furthermore, this paper discusses the analytical approximation of the BER performance of the proposed strategy, where we prove that the analytical results match almost perfectly the simulated ones. Finally, our simulation results show that the proposed strategy outperforms the current state-of-the-art ones. 相似文献
28.
针对无线传感器网络在对移动目标节点覆盖过程中出现网络能量快速消耗问题,提出了一种基于联合节点行为策略的覆盖算法。根据网络模型建立传感器节点与目标节点从属关系,确定覆盖关联模型;利用概率理论求解邻居节点冗余覆盖度,确定最少传感器节点数量;给出了邻居节点覆盖期望值的求解方法;仿真实验表明,该算法与其他算法在网络覆盖率和网络生存周期两个性能指标上均提升了12.39%和15.01%,从而验证了算法的有效性。 相似文献
29.
Ning Wang Yinya Li Guoqing Qi Andong Sheng 《International Journal of Adaptive Control and Signal Processing》2019,33(7):1174-1188
This paper investigates the state estimation issue for a class of wireless sensor networks (WSNs) with the consideration of limited energy resources. First, a multirate estimation model is established, and then, a new event‐triggered two‐stage information fusion algorithm is developed based on the optimal fusion criterion weighted by matrices. Compared with the existing methods, the presented fusion algorithm can significantly reduce the communication cost in WSNs and save energy resources of sensors efficiently. Furthermore, by presetting a desired containment probability over the interval [0,1] with the developed event‐triggered mechanism, one can obtain a suitable compromise between the communication cost and the estimation accuracy. Finally, a numerical simulation for the WSN tracking system is given to demonstrate the effectiveness of the proposed method. 相似文献
30.
Weidong Fang Wuxiong Zhang QianQian Zhao Xiaohong Ji Wei Chen Biruk Assefa 《计算机、材料和连续体(英文)》2019,61(2):583-599
As an Industrial Wireless Sensor Network (IWSN) is usually deployed in a harsh or unattended environment, the privacy security of data aggregation is facing more and more challenges. Currently, the data aggregation protocols mainly focus on improving the efficiency of data transmitting and aggregating, alternately, the aim at enhancing the security of data. The performances of the secure data aggregation protocols are the trade-off of several metrics, which involves the transmission/fusion, the energy efficiency and the security in Wireless Sensor Network (WSN). Unfortunately, there is no paper in systematic analysis about the performance of the secure data aggregation protocols whether in IWSN or in WSN. In consideration of IWSN, we firstly review the security requirements and techniques in WSN data aggregation in this paper. Then, we give a holistic overview of the classical secure data aggregation protocols, which are divided into three categories: hop-by-hop encrypted data aggregation, end-to-end encrypted data aggregation and unencrypted secure data aggregation. Along this way, combining with the characteristics of industrial applications, we analyze the pros and cons of the existing security schemes in each category qualitatively, and realize that the security and the energy efficiency are suitable for IWSN. Finally, we make the conclusion about the techniques and approach in these categories, and highlight the future research directions of privacy preserving data aggregation in IWSN. 相似文献