全文获取类型
收费全文 | 12895篇 |
免费 | 1672篇 |
国内免费 | 1459篇 |
专业分类
电工技术 | 490篇 |
技术理论 | 1篇 |
综合类 | 1444篇 |
化学工业 | 132篇 |
金属工艺 | 130篇 |
机械仪表 | 605篇 |
建筑科学 | 239篇 |
矿业工程 | 191篇 |
能源动力 | 41篇 |
轻工业 | 78篇 |
水利工程 | 76篇 |
石油天然气 | 61篇 |
武器工业 | 107篇 |
无线电 | 4917篇 |
一般工业技术 | 403篇 |
冶金工业 | 47篇 |
原子能技术 | 19篇 |
自动化技术 | 7045篇 |
出版年
2024年 | 20篇 |
2023年 | 167篇 |
2022年 | 259篇 |
2021年 | 338篇 |
2020年 | 410篇 |
2019年 | 309篇 |
2018年 | 313篇 |
2017年 | 449篇 |
2016年 | 502篇 |
2015年 | 579篇 |
2014年 | 1011篇 |
2013年 | 959篇 |
2012年 | 976篇 |
2011年 | 986篇 |
2010年 | 911篇 |
2009年 | 875篇 |
2008年 | 1045篇 |
2007年 | 1171篇 |
2006年 | 937篇 |
2005年 | 907篇 |
2004年 | 735篇 |
2003年 | 599篇 |
2002年 | 447篇 |
2001年 | 387篇 |
2000年 | 187篇 |
1999年 | 130篇 |
1998年 | 91篇 |
1997年 | 81篇 |
1996年 | 67篇 |
1995年 | 80篇 |
1994年 | 37篇 |
1993年 | 14篇 |
1992年 | 15篇 |
1991年 | 7篇 |
1990年 | 8篇 |
1989年 | 4篇 |
1988年 | 5篇 |
1987年 | 2篇 |
1985年 | 2篇 |
1980年 | 1篇 |
1967年 | 1篇 |
1965年 | 2篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
81.
杨超宇 《激光与光电子学进展》2014,51(10):100101
研究调查了Ekman流对浮游植物生态动力过程的驱动机制。采用新的光学遥感算法提取浮游植物光学有效信息。该算法结合了近红外波段的浮游植物荧光信号以及可见光部分的弹性散射的辐射传输模型,通过两次迭代优化算法,提取浮游植物光学信号。采用辐射传输软件Hydrolight对海水水下光场进行了数值模拟,并结合新算法对模拟数据进行了对比分析。结果表明,新算法较好地表征了浮游植物叶绿素光学参数。利用MERIS光学遥感数据并结合了动力学参数,利用该算法分析了强台风尼格对我国海域浮游植物分布的影响。研究结果表明,Ekman流是我国海域浮游植物分布异常的原因之一。 相似文献
82.
Rejab Hajlaoui Eesa Alsolami Tarek Moulahi Herv Guyennet 《International Journal of Communication Systems》2019,32(12)
Recently, the routing problem in vehicular ad hoc networks is one of the most vital research. Despite the variety of the proposed approaches and the development of communications technologies, the routing problem in VANET suffers from the high speed of vehicles and the repetitive failures in communications. In this paper, we adjusted the well‐known K‐medoids clustering algorithm to improve the network stability and to increase the lifetime of all established links. First, the number of clusters and the initial cluster heads will not be selected randomly as usual, but based on mathematical formula considering the environment size and the available transmission ranges. Then the assignment of nodes to clusters in both k‐medoids phases will be carried out according to several metrics including direction, relative speed, and proximity. To the best of our knowledge, our proposed model is the first that introduces the new metric named “node disconnection frequency.” This metric prevents nodes with volatile and suspicious behavior to be elected as a new CH. This screening ensures that the new CH retains its property as long as possible and thus increases the network stability. Empirical results confirm that in addition to the convergence speed that characterizes our adjusted K‐medoids clustering algorithm (AKCA), the proposed model achieves more stability and robustness when compared with most recent approaches designed for the same objective. 相似文献
83.
随着无源光网络的发展,光纤-无线网络能同时支持集中式云和边缘云计算技术,成为一种具有发展前景的网络结构。但是,现有的基于光纤-无线网络的任务协同计算卸载研究主要以最小化移动设备的能耗为目标,忽略了实时性高的任务的需求。针对实时性高的任务,提出了以最小化任务的总处理时间为目标的集中式云和边缘云协同计算卸载问题,并对其进行形式化描述。同时,通过将该问题归约为装箱问题,从而证明其为NP难解问题。提出一个启发式协同计算卸载算法,该算法通过比较不同卸载策略的任务处理时间,优先选择时间最短的任务卸载策略。同时,提出一个定制的遗传算法,获得一个更优的任务卸载策略。实验结果表明,与现有的算法相比,本文提出的启发式算法得到的任务卸载策略平均减少4.34%的任务总处理时间,而定制的遗传算法的卸载策略平均减少18.41%的任务总处理时间。同时,定制的遗传算法的卸载策略与本文提出的启发式算法相比平均减少14.49%的任务总处理时间。 相似文献
84.
We drew on the unified theory of acceptance and use of technology (UTAUT2) model, and perceived risk construct to propose an integrated model to explain continuance usage of mobile shopping applications. Espoused national cultural values of individualism/collectivism, masculinity/femininity, power distance, uncertainty avoidance, and long-term/short-term orientation act as moderators to examine the influence of within-culture variation on app usage. Findings reveal habit as the strongest predictor of both continuance intention and use behaviour, but interestingly perceived risk did not influence the post-acceptance behaviour of users significantly. Individualism/collectivism, masculinity/femininity, and long-term/short-term orientation espoused cultural values significantly moderated the relationships in the model. Noteworthy theoretical and managerial implications of the research are discussed further. 相似文献
85.
《Information Security Journal: A Global Perspective》2013,22(2):98-103
ABSTRACT Intrusion in a host may cause damage to the critical memory, which contains important official files or databases. The mobile agent, a piece of code that makes parallel run on host, migrates through the network and performs the requested action. In this paper, we declare a new intrusion detection model using Host-Based Intrusion Detection System (HIDS) for identification and recovery strategies. A memory trace model has been designed to identify the intrusion detection by using a memory tracer mobile agent. Memory Checksum plays a vital role in the identification of the intrusion. This model is designed for intrusion into a host, which alters the critical memory. 相似文献
86.
87.
《Journal of Location Based Services》2013,7(2):112-132
The objective of this study was to assess the response to location-based services (LBS) by three key demographic groups within the United Kingdom. This study took the form of a survey of relevant demographics, attitudes and consumer behaviour undertaken via a web-based survey. Results are based on over 1200 respondents, filtered and segmented into three demographic groups who are typically early adopters of new technology. There were positive attitudes towards a range of LBS, with the major exception being location-based advertising. There were mixed views towards location-based gaming and safety camera information. There were low levels of awareness of many services. The levels of use were typically under 20% for all types of LBS. 相似文献
88.
89.
《Journal of Nuclear Science and Technology》2013,50(8):1039-1044
A compact and user-friendly ion irradiation system controlled remotely through the Internet was developed for the execution of collaboration experiments together with researchers at remote sites. Several hardware instruments and software programs were constructed and provided for the remote control of the system and for its connection to the Internet. Surface modification and analysis experiments with this system were remotely performed through the Internet. It was confirmed from the experiments that the present ion irradiation system was precisely controlled through the Internet and could be easily and safely used for the surface modification and analysis, that the normal communication speed of around 10Mbps for the Internet was fast enough for the execution of such typical remote-controlled experiments, and also that an access to the system by a mobile phone was convenient and useful enough to check the condition of the system and experimental data. 相似文献
90.
《Journal of Location Based Services》2013,7(4):256-273
This article describes experiences with an application in which users read barcoded signs with camera phones to obtain content about their surroundings at seaside locations. The application was made available to the general public in support of ‘Coast’, a BBC television series about the UK coastline. The article highlights lessons from that trial in terms of what worked well and what was subject to deployment constraints. In particular, it describes how several factors affected the users’ engagement with the signs, the places, and other users: the barcode and mobile phone technologies; semantic issues such as signs’ relationships to landmarks; and practical issues such as local regulations. 相似文献