全文获取类型
收费全文 | 7749篇 |
免费 | 957篇 |
国内免费 | 967篇 |
专业分类
电工技术 | 223篇 |
技术理论 | 4篇 |
综合类 | 1722篇 |
化学工业 | 76篇 |
金属工艺 | 16篇 |
机械仪表 | 146篇 |
建筑科学 | 1740篇 |
矿业工程 | 32篇 |
能源动力 | 45篇 |
轻工业 | 31篇 |
水利工程 | 86篇 |
石油天然气 | 48篇 |
武器工业 | 25篇 |
无线电 | 1737篇 |
一般工业技术 | 432篇 |
冶金工业 | 63篇 |
原子能技术 | 19篇 |
自动化技术 | 3228篇 |
出版年
2024年 | 21篇 |
2023年 | 94篇 |
2022年 | 199篇 |
2021年 | 228篇 |
2020年 | 270篇 |
2019年 | 191篇 |
2018年 | 170篇 |
2017年 | 223篇 |
2016年 | 250篇 |
2015年 | 323篇 |
2014年 | 643篇 |
2013年 | 528篇 |
2012年 | 747篇 |
2011年 | 726篇 |
2010年 | 632篇 |
2009年 | 593篇 |
2008年 | 602篇 |
2007年 | 696篇 |
2006年 | 541篇 |
2005年 | 425篇 |
2004年 | 332篇 |
2003年 | 278篇 |
2002年 | 236篇 |
2001年 | 203篇 |
2000年 | 109篇 |
1999年 | 80篇 |
1998年 | 76篇 |
1997年 | 60篇 |
1996年 | 42篇 |
1995年 | 44篇 |
1994年 | 24篇 |
1993年 | 13篇 |
1992年 | 11篇 |
1991年 | 11篇 |
1990年 | 6篇 |
1989年 | 8篇 |
1988年 | 3篇 |
1987年 | 5篇 |
1986年 | 3篇 |
1985年 | 5篇 |
1984年 | 4篇 |
1983年 | 4篇 |
1981年 | 2篇 |
1977年 | 2篇 |
1973年 | 2篇 |
1962年 | 1篇 |
1961年 | 1篇 |
1958年 | 1篇 |
1957年 | 1篇 |
1955年 | 1篇 |
排序方式: 共有9673条查询结果,搜索用时 15 毫秒
991.
992.
993.
994.
城市主干道交叉口交通流的模糊控制 总被引:6,自引:0,他引:6
城市主干道的交通效率,从整体上影响着整个城市的交通运作效率。该文以城市中心地带主干道交叉路口为对象,进行了交通流的模糊控制研究,提出的基于闭环模糊控制算法的智能化控制策略,有效地提高了主干道交叉口相关区域内的道路使用率。 相似文献
995.
996.
目前MPEG-4精细颗粒度可伸缩性(Fine Graruldty Scalability,FGS)编码视频正成为视频流服务的一种主要的业务流,因此,针对MPEG-4FGS视频流量进行建模对于网络性能仿真和通信网络设计具有十分重要的意义。该文首先介绍了MPEG-4FGS编码原理,然后对MPEG-4FGS视频流量的统计特性进行了分析,在此基础上,提出了基于MPEG-4FGS的视频流量模型。实验结果表明,该模型能较好地拟合原视频帧序列大小,且能根据网络带宽的动态变化进行适应的码率分配。 相似文献
997.
In this paper, a media access control (MAC) protocol is proposed for multimedia traffic in slotted CDMA wireless communication systems. The channel resource is partitioned into four compartments: video, voice and data compartments, and common resource pool (CRP) which can be used by either voice or data. Video is only permitted to use its pre-allocated channels. Besides assigning voice to its own compartment, a threshold type decision policy is introduced to regulate voice call admission control in CRP. Data can use not only data and CRP compartments, but also the idle capacity of both video and voice. The proposed protocol provides a simple and flexible resource allocation decision for the multimedia traffic such that the bandwidth can be utilized efficiently while satisfying the quality of service (QoS) requirement for each traffic category. Two mathematical analysis methods are applied to evaluate the system performance. The first, Traditional Markov Analysis (TMA) is used to calculate the video and the voice blocking probabilities, and the second, Transient Fluid Analysis (TFA) is adopted to evaluate the average data delay and the channel utilization. Computer simulations verify the accuracy of mathematical models.Miao Ma received the B.Eng. and M.Eng. degrees in Electrical Engineering from Harbin Institute of Technology, China in 1992 and 1996, respectively, and the Ph.D degree in Electrical and Electronic Engineering from Nanyang Technological University, Singapore in 2003. She is a research scientist in the Institute for Infocomm Research in Singapore. Her research interests include network security, media access control, wireless communications and computer networking.Erry Gunawan received the B.Sc. degree in electrical and electronic engineering from the University of Leeds, U.K., in 1983 and the M.B.A. and the Ph.D. degrees, both from Bradford University, in 1984 and 1988, respectively. From 1984 to 1988, he was a Satellite Communication System Engineer at Communication Systems Research Ltd., Ilkley, U.K. In 1988, he moved to Space Communication (SAT-TEL) Ltd, Northampton, U.K. He joined the School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore, in 1989, and currently, he is an Associate Professor in the same school. His research interests include the fields of digital communications, mobile and satellite communications, error coding, and spread spectrum. He has published over 60 international research papers and has been a consultant to a local company on the study of DECT system and BLUETOOTH. 相似文献
998.
Grooming of Arbitrary Traffic in Optical WDM Mesh Networks Using a Genetic Algorithm 总被引:1,自引:0,他引:1
Yueguang?JiaoEmail author Bingkun?Zhou Hanyi?Zhang Yili?Guo 《Photonic Network Communications》2005,10(2):193-198
In this paper, a genetic algorithm is proposed for grooming of arbitrary traffic in optical mesh networks. Traffic streams are routed in the wavelength division multiplexing (WDM) grooming networks that comprise both fiber links and established lightpaths. Chromosomes are split into multiple versions when multiple shortest routes are found. The selection strategy is based on a comparison between chromosomes. A variety of cost functions are proposed for the routing algorithm and two comparison methods are considered in the selection procedure. Computer simulations are performed with randomly generated traffic patterns. The results show that the algorithm is effective for traffic grooming (TG) problems, and also for routing and wavelength assignment problems. 相似文献
999.
1000.
In this work, we have proposed and studied efficient online algorithms for shared path protection under dynamic traffic conditions in survivable WDM optical mesh networks. Given a connection request, routing and wavelength assignment of a working path and a protection path for the request is formulated as two integer linear programs based on shared and dedicated path protection, respectively. The objective is to minimize the total cost of additional resources used by the working path as well as the protection path to accommodate a new connection request. We then devise two resource efficient online algorithms using pre-computed candidate routes. The first algorithm uses one candidate working path and one candidate protection path for each newly arrived connection request while the second algorithm may use multiple candidate working paths and/or multiple candidate protection paths. The selection of a pair of paths from candidate routes as well as the assignment of appropriate wavelengths to accommodate a connection request is then jointly considered to minimize the total cost of additional resources. The solutions to the ILP formulations serve as the baseline for evaluating the performance of the proposed algorithms. We have evaluated the effectiveness of the proposed online algorithms via extensive simulations in terms of the connection blocking probability and the revenue earnings improved over the dedicated path protection approach. Our simulations indicate that our proposed computationally efficient online algorithms are able to provide 100% restorability against single failures with a resource efficiency comparable to that of the optimal shared path protection. The results also show that a small increase in the number of candidate working paths or protection paths (from 1 to 3) provides better performance, but a further increase does not improve the performance significantly. Therefore, a proper balance can be struck to achieve both satisfactory performance and efficient computation.The work reported in this paper was supported in part by AFRL, the U.S. Department of Energy Early Career Award DE-FG02-03ER25580, and a DAGSI graduate scholarship. Any opinions, findings, and conclusions or recommendations expressed in this paper are those of the authors and do not necessarily reflect the views of the funding agencies. 相似文献