全文获取类型
收费全文 | 6849篇 |
免费 | 237篇 |
国内免费 | 7篇 |
专业分类
电工技术 | 74篇 |
综合类 | 5篇 |
化学工业 | 1330篇 |
金属工艺 | 135篇 |
机械仪表 | 152篇 |
建筑科学 | 406篇 |
矿业工程 | 17篇 |
能源动力 | 216篇 |
轻工业 | 690篇 |
水利工程 | 111篇 |
石油天然气 | 32篇 |
无线电 | 463篇 |
一般工业技术 | 1230篇 |
冶金工业 | 1145篇 |
原子能技术 | 55篇 |
自动化技术 | 1032篇 |
出版年
2023年 | 35篇 |
2022年 | 78篇 |
2021年 | 103篇 |
2020年 | 92篇 |
2019年 | 99篇 |
2018年 | 118篇 |
2017年 | 128篇 |
2016年 | 128篇 |
2015年 | 144篇 |
2014年 | 193篇 |
2013年 | 428篇 |
2012年 | 346篇 |
2011年 | 426篇 |
2010年 | 293篇 |
2009年 | 341篇 |
2008年 | 443篇 |
2007年 | 373篇 |
2006年 | 309篇 |
2005年 | 321篇 |
2004年 | 256篇 |
2003年 | 232篇 |
2002年 | 226篇 |
2001年 | 124篇 |
2000年 | 98篇 |
1999年 | 118篇 |
1998年 | 149篇 |
1997年 | 115篇 |
1996年 | 122篇 |
1995年 | 91篇 |
1994年 | 92篇 |
1993年 | 88篇 |
1992年 | 67篇 |
1991年 | 53篇 |
1990年 | 63篇 |
1989年 | 84篇 |
1988年 | 47篇 |
1987年 | 55篇 |
1986年 | 48篇 |
1985年 | 65篇 |
1984年 | 66篇 |
1983年 | 57篇 |
1982年 | 46篇 |
1981年 | 55篇 |
1980年 | 32篇 |
1979年 | 39篇 |
1978年 | 36篇 |
1977年 | 25篇 |
1976年 | 29篇 |
1975年 | 32篇 |
1974年 | 20篇 |
排序方式: 共有7093条查询结果,搜索用时 15 毫秒
81.
This study tested arguments in the largely anecdotal debate over the existence of Asian values in Asian journalism. News stories uploaded to 10 Asian on-line newspapers were content analyzed for the prevalence of "harmony" and "supportiveness," which the literature suggests as key Asian values. The findings show that the journalistic emphasis on Asian values is concentrated in the Southeast Asia subregion and tracks restrictions on press freedom. 相似文献
82.
Cranstoun SD Ombao HC von Sachs R Guo W Litt B 《IEEE transactions on bio-medical engineering》2002,49(9):988-996
In this paper, we apply a new time-frequency spectral estimation method for multichannel data to epileptiform electroencephalography (EEG). The method is based on the smooth localized complex exponentials (SLEX) functions which are time-frequency localized versions of the Fourier functions and, hence, are ideal for analyzing nonstationary signals whose spectral properties evolve over time. The SLEX functions are simultaneously orthogonal and localized in time and frequency because they are obtained by applying a projection operator rather than a window or taper. In this paper, we present the Auto-SLEX method which is a statistical method that 1) computes the periodogram using the SLEX transform, 2) automatically segments the signal into approximately stationary segments using an objective criterion that is based on log energy, and 3) automatically selects the optimal bandwidth of the spectral smoothing window. The method is applied to the intracranial EEG from a patient with temporal lobe epilepsy. This analysis reveals a reduction in average duration of stationarity in preseizure epochs of data compared to baseline. These changes begin up to hours prior to electrical seizure onset in this patient. 相似文献
83.
84.
Brian Dipert 《电子设计技术》2004,11(1):68-70,72,74,75
看来您已认定,采取购买并组装现成的专用标准产品(ASSP),如嵌入式控制器、外设芯片等,然后再编写您自己的软件这种做法将不能使您设计的产品与您竞争对手的产品有足够大的差别.因此,您会决定选择芯片级设计.两大硅平台竞争对手及其各自的折衷方案已经在各种工业论坛上引起广泛的争论.不过如果您刚涉足这场争论,则很有必要了解下述有关争论的概要. 相似文献
85.
An indoor personal rowing machine (Concept 2 Inc., Morrisville, VT) has been modified for functional electrical stimulation assisted rowing exercise in paraplegia. To successfully perform the rowing maneuver, the voluntarily controlled upper body movements must be coordinated with the movements of the electrically stimulated paralyzed legs. To achieve such coordination, an automatic controller was developed that employs two levels of hierarchy. A high level finite state controller identifies the state or phase of the rowing motion and activates a low-level state-dedicated fuzzy logic controller (FLC) to deliver the electrical stimulation to the paralyzed leg muscles. A pilot study with participation of two paraplegic volunteers showed that FLC spent less muscle energy, and produced smoother rowing maneuvers than the existing On-Off constant-level stimulation controller. 相似文献
86.
Trust for Ubiquitous,Transparent Collaboration 总被引:1,自引:0,他引:1
In this paper, trust-based recommendations control the exchange of personal information between handheld computers. Combined with explicit risk analysis, this enables unobtrusive information exchange, while limiting access to confidential information. The same model can be applied to a wide range of mobile computing tasks, such as managing personal address books and electronic diaries, to automatically provide an appropriate level of security. Recommendations add structure to the information, by associating categories with data and with each other, with degrees of trust belief and disbelief. Since categories also in turn confer privileges and restrict actions, they are analogous to rôles in a Rôle-Based Access Control system, while principals represent their trust policies in recommendations. Participants first compute their trust in information, by combining their own trust assumptions with others' policies. Recommendations are thus linked together to compute a considered, local trust assessment. Actions are then moderated by a risk assessment, which weighs up costs and benefits, including the cost of the user's time, before deciding whether to allow or forbid the information exchange, or ask for help. By unifying trust assessments and access control, participants can take calculated risks to automatically yet safely share their personal information. 相似文献
87.
嵌入式设备在很多应用场合正在和因特网相连接,比如蜂窝电话、机顶盒、无线接入点、医疗设备和公共信息电话亭。当这些能够上网的设备与因特网连接,但是没有足够的安全考虑时,他们将很容易受到攻击,这些攻击包括无意的访问和恶意攻击。如果没有一些相应安全措施,这些攻击可能会使设备的功能、操作以及包含的信息遭受破坏。 相似文献
88.
Jin Tang Zhengyuan Xu Brian M. Sadler 《Wireless Communications, IEEE Transactions on》2007,6(2):494-505
An ultra-wideband (UWB) transmitted reference (TR) system transmits an un-modulated pulse and a delayed modulated pulse pair. Then, a correlation receiver uses the former to demodulate the latter. Because of the long spread of a typical UWB channel, time delay between the two pulses is preferable to be larger than the channel delay spread for reduced noise at the receiver. However, for bandwidth efficiency, that delay should be made small, resulting in inter-pulse interference at the receiver. In this paper, digital receivers are constructed for TR-UWB systems including inter-pulse interference. A typical mean matching technique, appropriate for both PPM and PAM schemes, is implemented digitally to obtain a good template for symbol detection. Joint estimation and detection performance of this family of digital receivers, using finite number of bits in analog-to-digital conversion and finite noisy observations, is analyzed. Closed form results are derived and verified by computer simulations. In addition, the effect of time offset between the reference pulse and information carrying pulse is studied. Overlap of the two pulses does not incur noticeable performance degradation. The proposed analytical framework can be applied to study detection performance of other related digital receivers not covered in this paper 相似文献
89.
Brian Markwalter 《中国电子商情》2007,(12):51-53
从过去来看,电视上出现字幕是再平常不过的事情的。当你换台时,字幕就会出现告诉你现在是哪一个频道。甚至当你调节音量时,很多电视机上也会出现字幕。 相似文献
90.
In a mobile ad hoc network (MANET), the nodes act both as traffic sources and as relays that forward packets from other nodes along multi-hop routes to the destination. Such networks are suited to situations in which a wireless infrastructure is unavailable, infeasible, or prohibitively expensive. However, the lack of a secure, trusted infrastructure in such networks make secure and reliable packet delivery very challenging. A given node acting as a relay may exhibit Byzantine behavior with respect to packet forwarding, i.e., arbitrary, deviant behavior, which disrupts packet transmission in the network. For example, a Byzantine node may arbitrarily choose to drop or misroute a certain percentage of the packets that are passed to it for forwarding to the next hop. In earlier work, we proposed a trust establishment framework, called Hermes, which enables a given node to determine the “trustworthiness” of other nodes with respect to reliable packet delivery by combining first-hand trust information obtained independently of other nodes and second-hand trust information obtained via recommendations from other nodes. A deficiency of the Hermes scheme is that a node can fail to detect certain types of Byzantine behavior, such as packet misforwarding directed at a particular source node. In this paper, we propose new mechanisms to make Hermes robust to Byzantine behavior and introduce a punishment policy that discourages selfish node behavior. We present simulation results that demonstrate the effectiveness of the proposed scheme in a variety of scenarios involving Byzantine nodes that are malicious both with respect to packet forwarding and trust propagation. 相似文献