全文获取类型
收费全文 | 12193篇 |
免费 | 782篇 |
国内免费 | 20篇 |
专业分类
电工技术 | 184篇 |
综合类 | 11篇 |
化学工业 | 3496篇 |
金属工艺 | 191篇 |
机械仪表 | 364篇 |
建筑科学 | 496篇 |
矿业工程 | 28篇 |
能源动力 | 448篇 |
轻工业 | 1515篇 |
水利工程 | 101篇 |
石油天然气 | 58篇 |
无线电 | 852篇 |
一般工业技术 | 1952篇 |
冶金工业 | 565篇 |
原子能技术 | 77篇 |
自动化技术 | 2657篇 |
出版年
2024年 | 28篇 |
2023年 | 180篇 |
2022年 | 518篇 |
2021年 | 630篇 |
2020年 | 380篇 |
2019年 | 425篇 |
2018年 | 479篇 |
2017年 | 495篇 |
2016年 | 526篇 |
2015年 | 438篇 |
2014年 | 580篇 |
2013年 | 1003篇 |
2012年 | 831篇 |
2011年 | 992篇 |
2010年 | 699篇 |
2009年 | 726篇 |
2008年 | 627篇 |
2007年 | 563篇 |
2006年 | 476篇 |
2005年 | 344篇 |
2004年 | 267篇 |
2003年 | 255篇 |
2002年 | 218篇 |
2001年 | 137篇 |
2000年 | 138篇 |
1999年 | 120篇 |
1998年 | 128篇 |
1997年 | 119篇 |
1996年 | 102篇 |
1995年 | 65篇 |
1994年 | 66篇 |
1993年 | 56篇 |
1992年 | 27篇 |
1991年 | 31篇 |
1990年 | 24篇 |
1989年 | 28篇 |
1988年 | 17篇 |
1987年 | 22篇 |
1986年 | 13篇 |
1985年 | 26篇 |
1984年 | 16篇 |
1983年 | 24篇 |
1982年 | 21篇 |
1981年 | 10篇 |
1980年 | 17篇 |
1979年 | 19篇 |
1978年 | 25篇 |
1977年 | 13篇 |
1976年 | 10篇 |
1973年 | 8篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
101.
Andrea Bettidi Antonio Cetronio Walter Ciccognani Marco De Dominicis Claudio Lanzieri Ernesto Limiti Antonio Manna Marco Peroni Claudio Proietti Paolo Romanini 《国际射频与微波计算机辅助工程杂志》2009,19(5):598-606
In this article, the design, fabrication, and on‐wafer test of X‐Band and 2–18 GHz wideband high‐power SPDT MMIC switches in AlGaN/GaN technology are presented. The switches have demonstrated state‐of‐the‐art performance and RF fabrication yield better than 65%. Linear and power measurements for different control voltages have been reported and an explanation of the dependence of the power performances on the control voltage is given. In particular, the X‐band switch exhibits a 0.4 dB compression level at 10 GHz when driven by a 38 dBm input signal. The wideband switch shows a compression level of 1 dB at an input drive higher than 38 dBm across the entire bandwidth. © 2009 Wiley Periodicals, Inc. Int J RF and Microwave CAE, 2009. 相似文献
102.
Marco A. Loza-Mejía Rafael Castillo Alfonso Lira-Rocha 《Journal of molecular graphics & modelling》2009,27(8):55
Although 9-anilinoacridines are among the best studied antitumoral intercalators, there are few studies about the effect of isosteric substitution of a benzene moiety for a heterocycle ring in the acridine framework. According to these studies, this approach may lead to effective cytotoxic agents, but good cytotoxic activity depends on structural requirements in the aniline ring which differ from those in 9-anilinoacridines. The present paper deals with molecular modeling studies of some 9-anilino substituted tricyclic compounds and their intercalation complexes (in various DNA sequences) resulting from docking the compounds into various DNA sequences. As expected, the isosteric substitution in 9-anilinoacridines influences the LUMO energy values and orbital distribution, the dipole moment, electrostatic charges and the conformation of the anilino ring. Other important differences are observed during the docking studies, for example, changes in the spatial arrangement of the tricyclic nucleus and the anilino ring at the intercalation site. Semiempirical calculations of the intercalation complexes show that the isosteric replacement of a benzene ring in the acridine nucleus affects not only DNA affinity but also base pair selectivity. These findings explain, at least partially, the different structural requirements observed in several 9-anilino substituted tricyclic compounds for cytotoxic activity. Thus, the data presented here may guide the rational design of new agents with different DNA binding properties and/or a cytotoxic profile by isosteric substitution of known intercalators. 相似文献
103.
104.
Efficient application identification and the temporal and spatial stability of classification schema
Motivated by the importance of accurate identification for a range of applications, this paper compares and contrasts the effective and efficient classification of network-based applications using behavioral observations of network-traffic and those using deep-packet inspection.Importantly, throughout our work we are able to make comparison with data possessing an accurate, independently determined ground-truth that describes the actual applications causing the network-traffic observed.In a unique study in both the spatial-domain: comparing across different network-locations and in the temporal-domain: comparing across a number of years of data, we illustrate the decay in classification accuracy across a range of application–classification mechanisms. Further, we document the accuracy of spatial classification without training data possessing spatial diversity.Finally, we illustrate the classification of UDP traffic. We use the same classification approach for both stateful flows (TCP) and stateless flows based upon UDP. Importantly, we demonstrate high levels of accuracy: greater than 92% for the worst circumstance regardless of the application. 相似文献
105.
Claudio Agostino Ardagna Marco Cremonini Gabriele Gianini 《Journal of Systems Architecture》2009,55(4):243-254
Mobile network providers have developed a variety of location-based services (LBSs), such as friend-finder, point of interest services, emergency rescue and many other safety and security services. The protection of location-privacy has consequently become a key aspect to the success of LBSs, since users consider their own physical location and movements highly privacy-sensitive, and demand for solutions able to protect such an information in a variety of environments. The idea behind location-privacy protection is that the individual should be able to set the level at which the location information is released to avoid undesired exploitation by a potential attacker: one of the approaches to this problem is given by the application of spatial obfuscation techniques, actuated by a trusted agent, and consisting in artificial perturbations of the location information collected by sensing technologies, before its disclosure to third parties. In many situations, however, landscape/map information can help a third party to perform Bayesian inference over spatially obfuscated data and to refine the user’s location estimate up to a violation of the original user’s location-privacy requirements. The goal of this paper is to provide a map-dependent obfuscation procedure that enables the release of the maximum possible user’s location information, that does not lead to a violation of the original user’s location-privacy requirements, even when refined through map-based inference. 相似文献
106.
Carlos T. Calafate P. Manzoni Juan-Carlos Cano M.P. Malumbres 《Computer Networks》2009,53(14):2586-2600
Mobile ad hoc networks (MANETs) show very significant difference with respect to other computer networks due to the presence of extremely large packet loss bursts. The development of protocols for mobile ad hoc networks, especially multimedia protocols, require extensive evaluation either through simulation or real-life tests. Such testing consumes a great amount of resources both in terms of time and trace file sizes. Therefore, finding efficient means of reducing the amount of data that is stored and processed is quite important to accelerate the evaluation of different audio/video streaming applications. If, moreover, we are able to model the loss pattern experienced, we can further accelerate the evaluation process.In this work we propose two models based on hidden Markov chains that are able to grasp both packet arrivals and packet loss patterns in MANETs. A simpler two-state model is proposed to model losses when proactive routing protocols are used, while a more complex three-state model is proposed for reactive routing protocols. We also introduce a new set for packet loss pattern measurements that can be of interest for the evaluation of audio/video streaming applications.Experimental results show that the proposed models can adequately reproduce extremely long packet loss patterns, typical of MANET environments, with a high degree of accuracy. Overall, we find that the proposed models are able to significantly reduce both the simulation time and the trace file sizes required. 相似文献
107.
In the last years, metaheuristics have emerged as powerful algorithmic approaches which have been applied with great success to difficult combinatorial optimization problems. However, this does not mean that metaheuristics can be applied blindly to any new problem.In this contribution we showed how the most basic ingredients of Soft Computing, namely fuzzy sets and fuzzy rules, are used in the context of a simple metaheuristic and a cooperative strategy based on it, to obtain successful results for the p-median problem. 相似文献
108.
Luis Gracia Carlos Perez-Vidal 《International Journal of Control, Automation and Systems》2009,7(5):764-776
This research presents a new control scheme for visual servoing that takes into account the delay introduced by image acquisition
and image processing. Firstly, previous control schemes for visual servoing are discussed and then a new control scheme is
proposed and fully described. Afterwards, the capabilities (steady-state errors, stability margins, step time response, etc.)
of the proposed control scheme and of previous ones are analytically analyzed and compared. Next, several simulations and
experimental results are provided to validate the analytical results and to illustrate the benefits of the proposed control
scheme. In particular, it is shown that this new control scheme clearly improves the performance of the previous ones. 相似文献
109.
Product features and task effects on experienced richness, control and engagement in voicemail browsing 总被引:1,自引:0,他引:1
Marco Rozendaal David V. Keyson Huib de Ridder 《Personal and Ubiquitous Computing》2009,13(5):343-354
A recent focus is on creating engaging user experiences with digital products and services such as voicemail. This study aims
to design towards increased levels of engagement in voicemail browsing by using the ‘Richness, Control and Engagement’ (RC
& E) framework. This framework explains the levels of engagement in terms of the levels of richness and control that are shaped
by the features of a product and the user’s expertise. A product was developed that utilized gestures and sound to access
digital voicemail contents. An experiment was conducted in which 28 participants interacted with the product while varying
(1) the number of features of the user interface, (2) the amount of voicemail content and (3) the type of task. Results showed
that the levels of engagement could be predicted according to the levels of richness and control experienced when a task-term
was added to the framework. Implications of the refined RC & E framework for interaction design practice are discussed. 相似文献
110.
Marco Bakera Tiziana Margaria Clemens D. Renner Bernhard Steffen 《Innovations in Systems and Software Engineering》2009,5(3):211-228
We show on a case study from an autonomous aerospace context how to apply a game-based model-checking approach as a powerful
technique for the verification, diagnosis, and adaptation of system behaviors based on temporal properties. This work is part
of our contribution within the SHADOWS project, where we provide a number of enabling technologies for model-driven self-healing.
We propose here to use GEAR, a game-based model checker, as a user-friendly tool that can offer automatic proofs of critical
properties of such systems. Although it is a model checker for the full modal μ-calculus, it also supports derived, more user-oriented logics. With GEAR, designers and engineers can interactively investigate
automatically generated winning strategies for the games, by this way exploring the connection between the property, the system,
and the proof.
This work has been partially supported by the European Union Specific Targeted Research Project SHADOWS (IST-2006-35157), exploring a Self-Healing Approach to Designing cOmplex softWare Systems. The project’s web page is at .
This article is an extended version of Renner et al. [18] presented at ISoLA 2007, Poitiers, December 2007. 相似文献