全文获取类型
收费全文 | 172773篇 |
免费 | 21395篇 |
国内免费 | 11398篇 |
专业分类
电工技术 | 54930篇 |
技术理论 | 11篇 |
综合类 | 15889篇 |
化学工业 | 12599篇 |
金属工艺 | 4100篇 |
机械仪表 | 9158篇 |
建筑科学 | 7126篇 |
矿业工程 | 4308篇 |
能源动力 | 13626篇 |
轻工业 | 2720篇 |
水利工程 | 8681篇 |
石油天然气 | 5119篇 |
武器工业 | 1519篇 |
无线电 | 19442篇 |
一般工业技术 | 8707篇 |
冶金工业 | 5009篇 |
原子能技术 | 3490篇 |
自动化技术 | 29132篇 |
出版年
2024年 | 849篇 |
2023年 | 2371篇 |
2022年 | 4416篇 |
2021年 | 5267篇 |
2020年 | 5857篇 |
2019年 | 4833篇 |
2018年 | 4340篇 |
2017年 | 6022篇 |
2016年 | 6575篇 |
2015年 | 7135篇 |
2014年 | 12091篇 |
2013年 | 11008篇 |
2012年 | 13563篇 |
2011年 | 14857篇 |
2010年 | 10715篇 |
2009年 | 11055篇 |
2008年 | 10810篇 |
2007年 | 12585篇 |
2006年 | 11235篇 |
2005年 | 9330篇 |
2004年 | 7658篇 |
2003年 | 6460篇 |
2002年 | 4922篇 |
2001年 | 4170篇 |
2000年 | 3486篇 |
1999年 | 2653篇 |
1998年 | 1944篇 |
1997年 | 1609篇 |
1996年 | 1524篇 |
1995年 | 1254篇 |
1994年 | 1085篇 |
1993年 | 754篇 |
1992年 | 686篇 |
1991年 | 445篇 |
1990年 | 410篇 |
1989年 | 338篇 |
1988年 | 241篇 |
1987年 | 165篇 |
1986年 | 109篇 |
1985年 | 88篇 |
1984年 | 132篇 |
1983年 | 104篇 |
1982年 | 97篇 |
1981年 | 53篇 |
1980年 | 40篇 |
1979年 | 54篇 |
1978年 | 29篇 |
1977年 | 24篇 |
1959年 | 35篇 |
1951年 | 28篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
Although rainfall input uncertainties are widely identified as being a key factor in hydrological models, the rainfall uncertainty is typically not included in the parameter identification and model output uncertainty analysis of complex distributed models such as SWAT and in maritime climate zones. This paper presents a methodology to assess the uncertainty of semi-distributed hydrological models by including, in addition to a list of model parameters, additional unknown factors in the calibration algorithm to account for the rainfall uncertainty (using multiplication factors for each separately identified rainfall event) and for the heteroscedastic nature of the errors of the stream flow. We used the Differential Evolution Adaptive Metropolis algorithm (DREAM(zs)) to infer the parameter posterior distributions and the output uncertainties of a SWAT model of the River Senne (Belgium). Explicitly considering heteroscedasticity and rainfall uncertainty leads to more realistic parameter values, better representation of water balance components and prediction uncertainty intervals. 相似文献
2.
Private information retrieval(PIR) is an important privacy protection issue of secure multi-party computation, but the PIR protocols based on classical cryptography are vulnerable because of new technologies,such as quantum computing and cloud computing. The quantum private queries(QPQ) protocols available, however, has a high complexity and is inefficient in the face of large database. This paper, based on the QKD technology which is mature now, proposes a novel QPQ protocol utilizing the key dilution and auxiliary parameter. Only N quits are required to be sent in the quantum channel to generate the raw key, then the straight k bits in the raw key are added bitwise to dilute the raw key, and a final key is consequently obtained to encrypt the database. By flexible adjusting of auxiliary parameters θ and k, privacy is secured and the query success ratio is improved. Feasibility and performance analyses indicate that the protocol has a high success ratio in first-trial query and is easy to implement, and that the communication complexity of O(N) is achieved. 相似文献
3.
We investigate the problem of efficient wireless power transfer in wireless sensor networks. In our approach, special mobile entities (called the Mobile Chargers) traverse the network and wirelessly replenish the energy of sensor nodes. In contrast to most current approaches, we envision methods that are distributed and use limited network information. We propose four new protocols for efficient charging, addressing key issues which we identify, most notably (i) what are good coordination procedures for the Mobile Chargers and (ii) what are good trajectories for the Mobile Chargers. Two of our protocols (DC, DCLK) perform distributed, limited network knowledge coordination and charging, while two others (CC, CCGK) perform centralized, global network knowledge coordination and charging. As detailed simulations demonstrate, one of our distributed protocols outperforms a known state of the art method, while its performance gets quite close to the performance of the powerful centralized global knowledge method. 相似文献
4.
A steelmaking-continuous casting (SCC) scheduling problem is an example of complex hybrid flow shop scheduling problem (HFSSP) with a strong industrial background. This paper investigates the SCC scheduling problem that involves controllable processing times (CPT) with multiple objectives concerning the total waiting time, earliness/tardiness and adjusting cost. The SCC scheduling problem with CPT is seldom discussed in the existing literature. This study is motivated by the practical situation of a large integrated steel company in which the just-in-time (JIT) and cost-cutting production strategy have become a significant concern. To address this complex HFSSP, the scheduling problem is decomposed into two subproblems: a parallel machine scheduling problem (PMSP) in the last stage and an HFSSP in the upstream stages. First, a hybrid differential evolution (HDE) algorithm combined with a variable neighborhood decomposition search (VNDS) is proposed for the former subproblem. Second, an iterative backward list scheduling (IBLS) algorithm is presented to solve the latter subproblem. The effectiveness of this bi-layer optimization approach is verified by computational experiments on well-designed and real-world scheduling instances. This study provides a new perspective on modeling and solving practical SCC scheduling problems. 相似文献
5.
本文对运营商信息安全集中管控架构演进和信息安全管控策略面临的问题进行了深入分析,提出了信息安全集中管控架构的演进方向建议及对信息安全监控策略工作优化的若干意见。 相似文献
6.
为了减小传统的最差情况设计方法引入的电压裕量,提出了一种变化可知的自适应电压缩减(AVS)技术,通过调整电源电压来降低电路功耗.自适应电压缩减技术基于检测关键路径的延时变化,基于此设计了一款预错误原位延时检测电路,可以检测关键路径延时并输出预错误信号,进而控制单元可根据反馈回的预错误信号的个数调整系统电压.本芯片采用SMIC180 nm工艺设计验证,仿真分析表明,采用自适应电压缩减技术后,4个目标验证电路分别节省功耗12.4%,11.3%,10.4%和11.6%. 相似文献
7.
社会经济的快速发展促进了科学技术水平的显著提升,社会生产生活各个领域当中对计算机网络的应用程度不断提升,当前,网络已经成为了人们日常生活与工作的重要组成部分。为此,加强对网络安全等因素影响研究就显得格外重要。网络环境关系着用户的使用质量,更加影响人们的工作效率,加强对网络安全技术的研究时解决相关问题的核心内容。本文针对网络安全威胁因素以及常见的网络安全技术进行了简要分析。 相似文献
8.
Greg A. Breed Paul M. Severns Andrew M. Edwards 《Journal of the Royal Society Interface》2015,12(103)
Lévy flights have gained prominence for analysis of animal movement. In a Lévy flight, step-lengths are drawn from a heavy-tailed distribution such as a power law (PL), and a large number of empirical demonstrations have been published. Others, however, have suggested that animal movement is ill fit by PL distributions or contend a state-switching process better explains apparent Lévy flight movement patterns. We used a mix of direct behavioural observations and GPS tracking to understand step-length patterns in females of two related butterflies. We initially found movement in one species (Euphydryas editha taylori) was best fit by a bounded PL, evidence of a Lévy flight, while the other (Euphydryas phaeton) was best fit by an exponential distribution. Subsequent analyses introduced additional candidate models and used behavioural observations to sort steps based on intraspecific interactions (interactions were rare in E. phaeton but common in E. e. taylori). These analyses showed a mixed-exponential is favoured over the bounded PL for E. e. taylori and that when step-lengths were sorted into states based on the influence of harassing conspecific males, both states were best fit by simple exponential distributions. The direct behavioural observations allowed us to infer the underlying behavioural mechanism is a state-switching process driven by intraspecific interactions rather than a Lévy flight. 相似文献
9.
Artificial bee colony (ABC) algorithm has several characteristics that make it more attractive than other bio-inspired methods. Particularly, it is simple, it uses fewer control parameters and its convergence is independent of the initial conditions. In this paper, a novel artificial bee colony based maximum power point tracking algorithm (MPPT) is proposed. The developed algorithm, does not allow only overcoming the common drawback of the conventional MPPT methods, but it gives a simple and a robust MPPT scheme. A co-simulation methodology, combining Matlab/Simulink™ and Cadence/Pspice™, is used to verify the effectiveness of the proposed method and compare its performance, under dynamic weather conditions, with that of the Particle Swarm Optimization (PSO) based MPPT algorithm. Moreover, a laboratory setup has been realized and used to experimentally validate the proposed ABC-based MPPT algorithm. Simulation and experimental results have shown the satisfactory performance of the proposed approach. 相似文献
10.
针对传统的小区内开环功率控制算法通常以提升本小区的吞吐量性能为目标,忽略了当前小区用户对邻小区用户同频干扰的问题,为提升边缘用户性能的同时兼顾系统整体性能,提出了一种LTE系统小区间上行联合功率控制(UJPC)算法。该算法采用单基站三扇区为系统模型,以最优化系统吞吐量比例公平函数为目标,首先根据最小信干噪比(SINR)约束值和用户最大发射功率这两个约束条件得到相应的数学优化模型,然后采用连续凸近似的方法求解优化问题得出各个基站所管辖的小区内所有用户的最优发射功率。仿真结果表明,与基准的开环功控方案相比,联合功控方案在保证系统平均频谱利用率的情况下能够较大幅度地提高小区边缘频谱利用率,其最佳性能增益能达到50%。 相似文献