全文获取类型
收费全文 | 30681篇 |
免费 | 2352篇 |
国内免费 | 913篇 |
专业分类
电工技术 | 1853篇 |
技术理论 | 3篇 |
综合类 | 2308篇 |
化学工业 | 5004篇 |
金属工艺 | 1822篇 |
机械仪表 | 1882篇 |
建筑科学 | 2366篇 |
矿业工程 | 814篇 |
能源动力 | 858篇 |
轻工业 | 2061篇 |
水利工程 | 595篇 |
石油天然气 | 1431篇 |
武器工业 | 273篇 |
无线电 | 3371篇 |
一般工业技术 | 3628篇 |
冶金工业 | 1277篇 |
原子能技术 | 286篇 |
自动化技术 | 4114篇 |
出版年
2025年 | 84篇 |
2024年 | 573篇 |
2023年 | 515篇 |
2022年 | 689篇 |
2021年 | 1081篇 |
2020年 | 865篇 |
2019年 | 843篇 |
2018年 | 797篇 |
2017年 | 812篇 |
2016年 | 767篇 |
2015年 | 1096篇 |
2014年 | 1255篇 |
2013年 | 1489篇 |
2012年 | 1708篇 |
2011年 | 1828篇 |
2010年 | 1697篇 |
2009年 | 1761篇 |
2008年 | 1639篇 |
2007年 | 1599篇 |
2006年 | 1763篇 |
2005年 | 1439篇 |
2004年 | 1108篇 |
2003年 | 1195篇 |
2002年 | 1435篇 |
2001年 | 1223篇 |
2000年 | 791篇 |
1999年 | 807篇 |
1998年 | 573篇 |
1997年 | 461篇 |
1996年 | 453篇 |
1995年 | 396篇 |
1994年 | 283篇 |
1993年 | 241篇 |
1992年 | 181篇 |
1991年 | 113篇 |
1990年 | 94篇 |
1989年 | 80篇 |
1988年 | 66篇 |
1987年 | 39篇 |
1986年 | 14篇 |
1985年 | 20篇 |
1984年 | 15篇 |
1983年 | 13篇 |
1982年 | 13篇 |
1981年 | 7篇 |
1980年 | 13篇 |
1979年 | 3篇 |
1978年 | 1篇 |
1953年 | 3篇 |
1951年 | 5篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
91.
采用D类放大器可延长电池供电终端产品的工作时间,并产生更少的热量,因此高效率D类音频功率放大器正越来越多地被用在移动电话、智能电话、PDA及其他类似便携式应用中,以取代AB类放大器。简单陈述了D类功放的原理,并以TI公司的芯片TPA2012D2为例,着重介绍了该芯片在便携式媒体播放器(PMP)中的应用实例。该例在实际应用中得到较好的音频播放表现。 相似文献
92.
In many applications, wireless ad-hoc networks are formed by devices belonging to independent users. Therefore, a challenging
problem is how to provide incentives to stimulate cooperation. In this paper, we study ad-hoc games—the routing and packet forwarding games in wireless ad-hoc networks. Unlike previous work which focuses either on routing
or on forwarding, this paper investigates both routing and forwarding. We first uncover an impossibility result—there does
not exist a protocol such that following the protocol to always forward others' traffic is a dominant action. Then we define a novel solution concept called cooperation-optimal protocols. We present Corsac, a cooperation-optimal protocol which consists of a routing protocol and a forwarding protocol. The routing
protocol of Corsac integrates VCG with a novel cryptographic technique to address the challenge in wireless ad-hoc networks
that a link’s cost (i.e., its type) is determined by two nodes together. Corsac also applies efficient cryptographic techniques to design a forwarding protocol
to enforce the routing decision, such that fulfilling the routing decision is the optimal action of each node in the sense that it brings the maximum utility to the node. We evaluate our protocols using simulations.
Our evaluations demonstrate that our protocols provide incentives for nodes to forward packets. Additionally, we discuss the
challenging issues in designing incentive-compatible protocols in ad hoc networks.
Part of this paper appeared in a conference version [49]. Sheng Zhong was supported in part by NSF grants ANI-0207399 and
CNS-0524030. Yang Richard Yang was supported in part by NSF grants ANI-0207399, ANI-0238038, and CNS-0435201. This work was
partly done while Sheng Zhong was at Yale University; Yanbin Liu was at University of Texas at Austin.
Sheng Zhong is an assistant professor in the State University of New York at Buffalo. He received his PhD (2004) from Yale University
and his ME (1999), BS (1996) from Nanjing University, China, all in computer science. His research interests include economic
incentives and privacy protection, particularly incentive and privacy problems in mobile computing and data mining.
Li Erran Li received his B.E. in Automatic Control from Beijing Polytechnic University in 1993, his M.E. in Pattern Recognition from
the Institute of Automation, Chinese Academy of Sciences, in 1996, and his Ph.D. in Computer Science from Cornell University
in 2001 where Joseph Y. Halpern was his advisor. He is presently a member of the Networking Research Center in Bell Labs.
His research interests are in networking with a focus on wireless networking and mobile computing. He has served as a program
committee member for several conferences including ACM MobiCom, ACM MobiHoc, IEEE INFOCOM and IEEE ICNP. He is a guest editor
for JSAC special issue on Non-Cooperative Behavior in Networking. He has published over 30 papers.
Yanbin Liu received her B.E. degree in Computer Science and Technology from Tsinghua University (1993), Beijing, China, in 1993, and
her M.S. degree in Computer Science from the University of Texas at Austin (1998), where is a Ph.D. candidate. Since 2006,
he has been with IBM TJ Watson Research Center, Hawthorne, NY. Her research interests are in real-time systems, grid computing,
mobile computing, and computer networks.
Yang Richard Yang received his B.E. degree in Computer Science and Technology from Tsinghua University, Beijing, China, in 1993, and his M.S.
and Ph.D. degrees in Computer Science from the University of Texas at Austin in 1998 and 2001, respectively. Since 2001, he
has been with the Department of Computer Science, Yale University, New Haven, CT, where currently he is an Associate Professor.
His current research interests are in computer networks, mobile computing, and sensor networks. He leads the Laboratory of
Networked Systems (LANS) at Yale University. 相似文献
93.
Determining correspondence in 3-D MR brain images using attribute vectors as morphological signatures of voxels 总被引:3,自引:0,他引:3
Finding point correspondence in anatomical images is a key step in shape analysis and deformable registration. This paper proposes an automatic correspondence detection algorithm for intramodality MR brain images of different subjects using wavelet-based attribute vectors (WAVs) defined on every image voxel. The attribute vector (AV) is extracted from the wavelet subimages and reflects the image structure in a large neighborhood around the respective voxel in a multiscale fashion. It plays the role of a morphological signature for each voxel, and our goal is, therefore, to make it distinctive of the respective voxel. Correspondence is then determined from similarities of AVs. By incorporating the prior knowledge of the spatial relationship among voxels, the ability of the proposed algorithm to find anatomical correspondence is further improved. Experiments with MR images of human brains show that the algorithm performs similarly to experts, even for complex cortical structures. 相似文献
94.
We consider a new heuristic method for design of survivable wavelength-division multiplexing (WDM) networks with preconfigured protection cycles (p-cycles). Numerical studies show that the new heuristic works well for different traffic patterns, and the spare capacity obtained by the new heuristic is very close to that of the optimal solution but with much reduced computational time. 相似文献
95.
为增强数字水印的透明性和鲁棒性,提出了一种基于人类视觉系统和直流分量的DCT变换域数字水印算法。算法依据原始图像的纹理掩蔽特性确定水印信息的嵌入位置,依据照度掩蔽特性确定水印信息的嵌入强度,将二值水印图像嵌入到原始图像在DCT域的直流分量中。在仿真实验中与同等条件下的中频嵌入做比较,实验结果表明,该算法提取的水印具有良好的透明性和鲁棒性。 相似文献
96.
97.
98.
具有e指数关联噪声的单模激光的光强关联函数和含时矩 总被引:2,自引:2,他引:2
利用线性近似方法 ,推导了由e指数关联噪声驱动的单模激光增益模型的光强关联函数和含时矩 ,利用计算机技术分析了它们随时间的演化特征 ,发现了一些奇特的现象 ,即在一定条件下 ,光强关联函数及含时矩随时间的演化曲线均会出现双极值 相似文献
99.
100.
Recent progresses about optical pumped tunable terahertz (THz) sources are interviewed, including THz parametric oscillation (TPO) and difference frequency generation (DFG). We develop high efficiency and high power surface-emitted TPO, as well as DFG with nonlinear crystals. A novel scheme for the high efficiency DFG source based on the Cherenkov phase-matching technology is comprehensively investigated in both bulk crystals. The widely tunable optical THz radiation is also researched based on the organic nonlinear 4-N,N-dimethylamino-4'-N'- methylstilbazolium 2,4,6-trimethylbenzenesulfonate (DSTMS) crystal. 相似文献