全文获取类型
收费全文 | 28742篇 |
免费 | 4277篇 |
国内免费 | 3406篇 |
专业分类
电工技术 | 1179篇 |
技术理论 | 4篇 |
综合类 | 2906篇 |
化学工业 | 403篇 |
金属工艺 | 634篇 |
机械仪表 | 1552篇 |
建筑科学 | 627篇 |
矿业工程 | 333篇 |
能源动力 | 229篇 |
轻工业 | 226篇 |
水利工程 | 204篇 |
石油天然气 | 387篇 |
武器工业 | 218篇 |
无线电 | 7436篇 |
一般工业技术 | 1474篇 |
冶金工业 | 304篇 |
原子能技术 | 120篇 |
自动化技术 | 18189篇 |
出版年
2024年 | 65篇 |
2023年 | 538篇 |
2022年 | 794篇 |
2021年 | 1042篇 |
2020年 | 1157篇 |
2019年 | 889篇 |
2018年 | 860篇 |
2017年 | 1152篇 |
2016年 | 1296篇 |
2015年 | 1572篇 |
2014年 | 2606篇 |
2013年 | 2266篇 |
2012年 | 2565篇 |
2011年 | 2478篇 |
2010年 | 1876篇 |
2009年 | 1797篇 |
2008年 | 2038篇 |
2007年 | 2182篇 |
2006年 | 1656篇 |
2005年 | 1583篇 |
2004年 | 1280篇 |
2003年 | 1124篇 |
2002年 | 831篇 |
2001年 | 716篇 |
2000年 | 436篇 |
1999年 | 354篇 |
1998年 | 261篇 |
1997年 | 205篇 |
1996年 | 181篇 |
1995年 | 163篇 |
1994年 | 124篇 |
1993年 | 59篇 |
1992年 | 59篇 |
1991年 | 34篇 |
1990年 | 44篇 |
1989年 | 29篇 |
1988年 | 27篇 |
1987年 | 14篇 |
1986年 | 12篇 |
1985年 | 13篇 |
1984年 | 8篇 |
1983年 | 9篇 |
1982年 | 8篇 |
1980年 | 6篇 |
1979年 | 5篇 |
1977年 | 4篇 |
1976年 | 1篇 |
1975年 | 1篇 |
1972年 | 2篇 |
1959年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 25 毫秒
1.
5G系统将移动通信服务从移动电话、移动宽带和大规模机器通信扩展到新的应用领域,即所谓对通信服务有特殊要求的垂直领域。对使能未来工厂的5G能力进行了全面的分析总结,包括弹性网络架构、灵活频谱、超可靠低时延通信、时间敏感网络、安全和定位,而弹性网络架构又包括对网络切片、非公共网络、5G局域网和边缘计算的支持。希望从广度到深度,对相关的理论及技术应用做透彻、全面的梳理,对其挑战做清晰的总结,从而为相关研究和工程技术人员提供借鉴。 相似文献
2.
3.
周家荣 《电信工程技术与标准化》2021,34(9)
移动边缘云是公司“云+5G”双引擎战略的最佳契合点,边缘网络是发挥移动云“大云”产品和5G网络融合优势,实现云网统筹、构建运营商“连接+计算”核心能力的关键。运营商传统接入网存在云网割裂、分段入云和组网复杂等突出问题,难以适应边缘业务敏捷交付要求。本文通过深入分析边缘云业务特征和技术架构,对标业界主流云商建设实践,研究基于云网PoP网的边缘网络建设思路,创新性提出云网一体化规划设计和建设交付流程变革,基于云网POP统一网络和业务锚点,构建Overlay和Underlay融合双层加速网络架构,探索Spine-leaf化的新型城域接入网实现L3下沉和弹性扩容等方法,实现“云+网+应用”一体化敏捷交付的边缘网络能力。 相似文献
4.
Understanding the mechanisms leading to the rise and dissemination of antimicrobial resistance (AMR) is crucially important for the preservation of power of antimicrobials and controlling infectious diseases. Measures to monitor and detect AMR, however, have been significantly delayed and introduced much later after the beginning of industrial production and consumption of antimicrobials. However, monitoring and detection of AMR is largely focused on bacterial pathogens, thus missing multiple key events which take place before the emergence and spread of AMR among the pathogens. In this regard, careful analysis of AMR development towards recently introduced antimicrobials may serve as a valuable example for the better understanding of mechanisms driving AMR evolution. Here, the example of evolution of tet(X), which confers resistance to the next-generation tetracyclines, is summarised and discussed. Initial mechanisms of resistance to these antimicrobials among pathogens were mostly via chromosomal mutations leading to the overexpression of efflux pumps. High-level resistance was achieved only after the acquisition of flavin-dependent monooxygenase-encoding genes from the environmental microbiota. These genes confer resistance to all tetracyclines, including the next-generation tetracyclines, and thus were termed tet(X). ISCR2 and IS26, as well as a variety of conjugative and mobilizable plasmids of different incompatibility groups, played an essential role in the acquisition of tet(X) genes from natural reservoirs and in further dissemination among bacterial commensals and pathogens. This process, which took place within the last decade, demonstrates how rapidly AMR evolution may progress, taking away some drugs of last resort from our arsenal. 相似文献
5.
Edge Computing is one of the radically evolving systems through generations as it is able to effectively meet the data saving standards of consumers, providers and the workers. Requisition for Edge Computing based items have been increasing tremendously. Apart from the advantages it holds, there remain lots of objections and restrictions, which hinders it from accomplishing the need of consumers all around the world. Some of the limitations are constraints on computing and hardware, functions and accessibility, remote administration and connectivity. There is also a backlog in security due to its inability to create a trust between devices involved in encryption and decryption. This is because security of data greatly depends upon faster encryption and decryption in order to transfer it. In addition, its devices are considerably exposed to side channel attacks, including Power Analysis attacks that are capable of overturning the process. Constrained space and the ability of it is one of the most challenging tasks. To prevail over from this issue we are proposing a Cryptographic Lightweight Encryption Algorithm with Dimensionality Reduction in Edge Computing. The t-Distributed Stochastic Neighbor Embedding is one of the efficient dimensionality reduction technique that greatly decreases the size of the non-linear data. The three dimensional image data obtained from the system, which are connected with it, are dimensionally reduced, and then lightweight encryption algorithm is employed. Hence, the security backlog can be solved effectively using this method. 相似文献
6.
《Ceramics International》2022,48(8):10592-10600
Zinc oxide is widely used in gas sensors, solar cells, and photocatalysts because of its wide bandgap and exciton binding energy of 60 meV in various metal oxides. To use ZnO as a gas sensor, it is necessary to synthesize it with surface defects and a large specific surface area. In this study, hydrothermal synthesis without surfactants was employed to obtain organic-additive-free ZnO. For morphology control, we varied the ratio of the hydroxide ion concentration to the zinc ion concentration. To confirm the growth mechanism of ZnO, we performed X-ray diffraction, scanning electron microscopy, and transmission electron microscopy analyses. Raman spectroscopy and photoluminescence measurements were performed to analyze the surface properties. The Brunauer–Emmett–Teller method and probe stations were used to measure the specific surface area and sensitivity of the gas sensor, respectively. The results confirmed that flower-shaped ZnO is the most suitable gas-sensing material. 相似文献
7.
A random placement of large-scale sensor network in the outdoor environment often causes low coverage.An area coverage optimization algorithm of mobile sensor network (MSN) based on virtual force perturbation and Cuckoo search (VF-CS) was proposed.Firstly,the virtual force of the sensor nodes within the Thiessen polygon was analyzed based on the partitioning of Voronoi diagram of the monitoring area.Secondly,the force of polygon vertices and neighbor nodes was taken as the perturbation factor for updating the node’s location of the Cuckoo search (CS).Finally,the VF-CS guided the node to move so as to achieve the optimal coverage.The simulation results demonstrate that the proposed algorithm has higher coverage and shorter average moving distance of nodes than the Voronoi diagram based algorithms in literatures. 相似文献
8.
为了精确地评价纱线的表观条干均匀性,提出一种基于亚像素边缘检测的纱线条干均匀度检测方法。首先通过图像采集装置获取纱线图像;然后对纱线图像进行亚像素边缘检测获取纱线边缘点集;利用开运算对获取的边缘点集进行处理,进而获得纱线条干的边缘;最后采用坐标直方图方法计算纱线平均直径和条干CV值。为验证方法的有效性和准确性,对多种不同线密度的纯棉纱线进行测试,并将测试结果与电容式条干仪的均匀度检测及基于模糊C均值分类和Otsu图像法的检测结果进行了对比。结果表明:基于亚像素边缘检测的纱线条干均匀度检测方法与电容式的测量结果有着较好的一致性,证明所提方法可得到准确的结果。 相似文献
9.
云计算应用层中的组合服务具有演化属性,因此,隐私数据在服务组合过程中,用户的隐私数据可能会因为服务或服务流程的演化而暴露。根据服务演化的特征,以描述逻辑为基础,提出了一种面向云计算应用层演化的隐私保护方法。对隐私协议进行形式化描述;根据服务的演化特征,对服务的演化进行监控,保证满足用户的隐私需求;利用实例研究证明该方法的正确性与可行性。 相似文献
10.
面对三维空间移动机器人从起始点到终止点的最短路径问题,提出一种新型的边缘点树启发式搜索(TreeEP)算法,该方法将地图空间进行密度可调的三维离散化处理,根据障碍安全距离筛选出障碍物的可靠边缘点信息,再利用树扩散架构选出最能引导搜索方向的潜力点进行扩散搜索,最终得出最短路径。提出局部调整策略,得到改进的Tree-EP算法。实验结果表明,在带障碍复杂地形最短路径搜索应用中,提出的Tree-EP算法与已有方法相比,能找到更短的移动路径。 相似文献