全文获取类型
收费全文 | 5612篇 |
免费 | 280篇 |
国内免费 | 53篇 |
专业分类
电工技术 | 79篇 |
综合类 | 14篇 |
化学工业 | 1162篇 |
金属工艺 | 125篇 |
机械仪表 | 166篇 |
建筑科学 | 122篇 |
矿业工程 | 29篇 |
能源动力 | 295篇 |
轻工业 | 481篇 |
水利工程 | 59篇 |
石油天然气 | 42篇 |
无线电 | 639篇 |
一般工业技术 | 1266篇 |
冶金工业 | 551篇 |
原子能技术 | 66篇 |
自动化技术 | 849篇 |
出版年
2024年 | 24篇 |
2023年 | 120篇 |
2022年 | 295篇 |
2021年 | 442篇 |
2020年 | 269篇 |
2019年 | 300篇 |
2018年 | 318篇 |
2017年 | 270篇 |
2016年 | 262篇 |
2015年 | 175篇 |
2014年 | 227篇 |
2013年 | 433篇 |
2012年 | 257篇 |
2011年 | 285篇 |
2010年 | 192篇 |
2009年 | 161篇 |
2008年 | 152篇 |
2007年 | 135篇 |
2006年 | 119篇 |
2005年 | 85篇 |
2004年 | 65篇 |
2003年 | 79篇 |
2002年 | 61篇 |
2001年 | 54篇 |
2000年 | 49篇 |
1999年 | 64篇 |
1998年 | 156篇 |
1997年 | 129篇 |
1996年 | 98篇 |
1995年 | 73篇 |
1994年 | 61篇 |
1993年 | 57篇 |
1992年 | 36篇 |
1991年 | 43篇 |
1990年 | 35篇 |
1989年 | 31篇 |
1988年 | 25篇 |
1987年 | 29篇 |
1986年 | 34篇 |
1985年 | 32篇 |
1984年 | 26篇 |
1983年 | 30篇 |
1982年 | 13篇 |
1981年 | 13篇 |
1980年 | 11篇 |
1978年 | 16篇 |
1977年 | 17篇 |
1976年 | 23篇 |
1973年 | 8篇 |
1972年 | 8篇 |
排序方式: 共有5945条查询结果,搜索用时 15 毫秒
101.
E. Jammeh I. Mkwawa A. Khan M. Goudarzi L. Sun E. Ifeachor 《Telecommunication Systems》2012,49(1):99-111
Network quality of service (NQoS) of IP networks is unpredictable and impacts the quality of networked multimedia services.
Adaptive voice and video schemes are therefore vital for the provision of voice over IP (VoIP) services for optimised quality
of experience (QoE). Traditional adaptation schemes based on NQoS do not take perceived quality into consideration even though
the user is the best judge of quality. Additionally, uncertainties inherent in NQoS parameter measurements make the design
of adaptation schemes difficult and their performance suboptimal. This paper presents a QoE-driven adaptation scheme for voice
and video over IP to solve the optimisation problem to provide optimal QoE for networked voice and video applications. The
adaptive VoIP architecture was implemented and tested both in NS2 and in an Open IMS Core network to allow extensive simulation
and test-bed evaluation. Results show that the scheme was optimally responsive to available network bandwidth and congestion
for both voice and video and optimised delivered QoE for different network conditions, and is friendly to TCP traffic. 相似文献
102.
Nan Wei Patrik Laiho Abu Taher Khan Aqeel Hussain Alina Lyuleeva Saeed Ahmed Qiang Zhang Yongping Liao Ying Tian Er‐Xiong Ding Yutaka Ohno Esko I. Kauppinen 《Advanced functional materials》2020,30(5)
In this work, a fast approach for the fabrication of hundreds of ultraclean field‐effect transistors (FETs) is introduced, using single‐walled carbon nanotubes (SWCNTs). The synthesis of the nanomaterial is performed by floating‐catalyst chemical vapor deposition, which is employed to fabricate high‐performance thin‐film transistors. Combined with palladium metal bottom contacts, the transport properties of individual SWCNTs are directly unveiled. The resulting SWCNT‐based FETs exhibit a mean field‐effect mobility, which is 3.3 times higher than that of high‐quality solution‐processed CNTs. This demonstrates that the hereby used SWCNTs are superior to comparable materials in terms of their transport properties. In particular, the on–off current ratios reach over 30 million. Thus, this method enables a fast, detailed, and reliable characterization of intrinsic properties of nanomaterials. The obtained ultraclean SWCNT‐based FETs shed light on further study of contamination‐free SWCNTs on various metal contacts and substrates. 相似文献
103.
Balch T. Dellaert F. Feldman A. Guillory A. Isbell C.L. Khan Z. Pratt S.C. Stein A.N. Wilde H. 《Proceedings of the IEEE. Institute of Electrical and Electronics Engineers》2006,94(7):1445-1463
Our understanding of social insect behavior has significantly influenced artificial intelligence (AI) and multirobot systems' research (e.g., ant algorithms and swarm robotics). In this work, however, we focus on the opposite question: "How can multirobot systems research contribute to the understanding of social animal behavior?" As we show, we are able to contribute at several levels. First, using algorithms that originated in the robotics community, we can track animals under observation to provide essential quantitative data for animal behavior research. Second, by developing and applying algorithms originating in speech recognition and computer vision, we can automatically label the behavior of animals under observation. In some cases the automatic labeling is more accurate and consistent than manual behavior identification. Our ultimate goal, however, is to automatically create, from observation, executable models of behavior. An executable model is a control program for an agent that can run in simulation (or on a robot). The representation for these executable models is drawn from research in multirobot systems programming. In this paper we present the algorithms we have developed for tracking, recognizing, and learning models of social animal behavior, details of their implementation, and quantitative experimental results using them to study social insects. 相似文献
104.
Mohd.Zahed M.Khan 《光电子快报》2009,5(3):198-201
A waveguide crossing utilizing a high index contrast material system is presented. The structure is based on coupling with an octagonal resonant cavity inserted at the waveguide junction. It also employs four identical square metal strips placed at the four comers of the waveguide crossing. The spectral response of the structure calculated using the method of line numerical technique, in general, shows a high power transmission in the forward arm with sufficiently low crosstalk and fraction of radiated power. 相似文献
105.
M. Ioannou G. Polymeris E. Hatzikraniotis A. U. Khan K. M. Paraskevopoulos Th. Kyratsi 《Journal of Electronic Materials》2013,42(7):1827-1834
Sb-doped magnesium silicide compounds have been prepared through ball milling and solid-state reaction. Materials produced were near-stoichiometric. The structural modifications have been studied with powder x-ray diffraction. Highly dense pellets of Mg2Si1?x Sb x (0 ≤ x ≤ 0.04) were fabricated via hot pressing and studied in terms of Seebeck coefficient, electrical and thermal conductivity, and free carrier concentration as a function of Sb concentration. Their thermoelectric performance in the high temperature range is presented, and the maximum value of the dimensionless figure of merit was found to be 0.46 at 810 K, for the Mg2Si0.915Sb0.015 member. 相似文献
106.
107.
Mohammed Khalid Khan Muhammad Sohail Muhammad Aamir B. S. Chowdhry Syed Irfan Hyder 《Wireless Personal Communications》2014,76(3):535-548
Last decade belongs to business intelligence (BI) because it is one of the few concepts that have actually lived to the expectations. Not only the businesses have adopted it but also have reaped the fruits out of it. But the cost of BI solutions is very high and has restricted small and medium enterprises to use BI solutions. The human resource is also limited and resultantly expensive in this field. This research proposes a web support system for business intelligence which provides automated data mapping and loading from user application to BI framework and also validates it. The system also assists users in getting the outputs in terms of reports and dashboards. The implementation of the proposed framework demonstrates convenience of use and effective cost saving as it does not require any technical expertise. The beauty of this web support system is that all the steps are menu driven and any non-technical user can get hold of it easily. 相似文献
108.
Sajid Bashir Muhammad Naeem Adnan Ahmed Khan Syed Ismail Shah 《International Journal of Communication Systems》2010,23(1):109-124
The paper discusses a sequence detector based on univariate marginal distribution algorithm (UMDA) that jointly estimates the symbols transmitted in a multiple input multiple output (MIMO) communication system. While an optimal maximum likelihood detection using an exhaustive search method is prohibitively complex, it has been shown that sphere decoder (SD) achieves the optimal bit error rate (BER) performance with polynomial time complexity for smaller array sizes. However, the worst‐case complexity of SD is exponential in the problem dimensions, this brings in question its practical implementation for larger number of spatial layers and for higher‐order signal constellation. The proposed detector shows promising results for this overly difficult and complicated operating environment, confirmed through simulation results. A performance comparison of the UMDA detector with SD is presented for higher‐order complex MIMO architectures with limited average transmit power. The proposed detector achieves substantial performance gain for higher‐order systems attaining a near optimal BER performance with reduced computational complexity as compared with SD. Copyright © 2009 John Wiley & Sons, Ltd. 相似文献
109.
Saru Kumari Muhammad Khurram Khan Xiong Li Fan Wu 《International Journal of Communication Systems》2016,29(3):441-458
Recently, Jiang et al. and He et al. independently found security problems in Chen et al.'s remote user authentication scheme for non‐tamper‐proof storage devices like Universal Serial Bus stick and proposed improvements. Nonetheless, we detect that the schemes proposed by Jiang et al. and He et al. overlook a user's privacy. We also observe that Jiang et al.'s scheme is vulnerable to insider attack and denial of service attacks and lacks forward secrecy. We point out that the password changing facility in He et al.'s scheme is equivalent to undergoing registration, whereas in Jiang et al.'s scheme, it is unsuitable. Moreover, the login phase of both the schemes is incapable to prevent the use of wrong password leading to the computation of an unworkable login request. Therefore, we design a new scheme with user anonymity to surmount the identified weaknesses. Without adding much in communication/computational cost, our scheme provides more security characteristics and keeps the merits of the original schemes. As compared with its predecessor schemes, the proposed scheme stands out as a more apt user authentication method for common storage devices. We have also presented a formal proof of security of the proposed scheme based on the logic proposed by Burrows, Abadi and Needham (BAN logic). Copyright © 2014 John Wiley & Sons, Ltd. 相似文献
110.
A non-intrusive design for monitoring everyday activities of an elderly person is presented. The proposed system is intended to be used in the bedroom, allowing the elders to stay at home in a safe environment. The required hardware design is simple in structure and cost effective. The sensor design is implemented by using capacitive sensors and an Arduino microcontroller unit. And a real time graphical user interface is implemented to monitor the elderly person. The performance analysis shows that the sensor design is able to differentiate between a human body and a house pet. 相似文献