全文获取类型
收费全文 | 3344篇 |
免费 | 198篇 |
国内免费 | 1篇 |
专业分类
电工技术 | 87篇 |
综合类 | 5篇 |
化学工业 | 834篇 |
金属工艺 | 71篇 |
机械仪表 | 104篇 |
建筑科学 | 118篇 |
矿业工程 | 8篇 |
能源动力 | 137篇 |
轻工业 | 547篇 |
水利工程 | 17篇 |
石油天然气 | 16篇 |
无线电 | 223篇 |
一般工业技术 | 799篇 |
冶金工业 | 72篇 |
原子能技术 | 13篇 |
自动化技术 | 492篇 |
出版年
2023年 | 26篇 |
2022年 | 39篇 |
2021年 | 81篇 |
2020年 | 74篇 |
2019年 | 83篇 |
2018年 | 130篇 |
2017年 | 122篇 |
2016年 | 155篇 |
2015年 | 106篇 |
2014年 | 167篇 |
2013年 | 363篇 |
2012年 | 232篇 |
2011年 | 253篇 |
2010年 | 209篇 |
2009年 | 143篇 |
2008年 | 154篇 |
2007年 | 132篇 |
2006年 | 104篇 |
2005年 | 61篇 |
2004年 | 42篇 |
2003年 | 56篇 |
2002年 | 42篇 |
2001年 | 32篇 |
2000年 | 38篇 |
1999年 | 32篇 |
1998年 | 32篇 |
1997年 | 27篇 |
1996年 | 31篇 |
1995年 | 23篇 |
1994年 | 30篇 |
1993年 | 27篇 |
1992年 | 24篇 |
1991年 | 21篇 |
1990年 | 20篇 |
1989年 | 17篇 |
1988年 | 13篇 |
1985年 | 32篇 |
1984年 | 34篇 |
1983年 | 28篇 |
1982年 | 24篇 |
1981年 | 37篇 |
1980年 | 33篇 |
1979年 | 25篇 |
1978年 | 25篇 |
1977年 | 20篇 |
1976年 | 22篇 |
1975年 | 14篇 |
1974年 | 11篇 |
1973年 | 14篇 |
1972年 | 14篇 |
排序方式: 共有3543条查询结果,搜索用时 15 毫秒
21.
M. Vuković 《Journal of Applied Electrochemistry》1990,20(6):969-973
Electrolytically grown hydrous oxide films on iridium wire electrodes have been thermally treated from 473 to 773 K. Anhydrous oxide films formed by this treatment have been subjected to cathodic polarization at the potential of the hydrogen evolution reaction, square-wave pulsing of potential from –0.25 to +1.25 V with respoect to SCE and to anodic galvanostatic polarization in 0.5 mol dm–3 H2SO4. Cathodic pretreatment caused an increase of the voltammetric charge in the oxide formation region while the square-wave pulsing formed a hydrous oxide film whose voltammetric charge was superimposed on the charge of the anhydrous oxide film. Both procedures restored the hydrophilic nature of the electrode/solution interface. Potential-time curves during anodic galvanostatic polarization served as a diagnostic criterion for the stability and the state of the oxide film. 相似文献
22.
23.
The impact of MAC parameters on the performance of 802.15.4 PAN 总被引:1,自引:0,他引:1
The operation of a personal area network, operating under the IEEE Standard 802.15.4 in the beacon enabled mode, is analyzed using the theory of discrete time Markov chains and M/G/1/K queues. The model includes the impact of different parameters such as packet arrival rate, number of stations, station’s buffer size, packet size, and inactive period between the beacons. We have derived several important performance parameters such as probability of access, probability that medium is idle, queue length distribution in the device, and probability distribution of the packet service time. Some important conclusions regarding the implementation of 802.15.4 networks and compatible network devices are outlined. 相似文献
24.
Francisco Javier Ovalle-Martínez Julio Solano González Ivan Stojmenović 《Mobile Networks and Applications》2004,9(4):257-264
The up-link bandwidth in satellite networks and in advanced traffic wireless information system is very limited. A server broadcasts data files provided by different independent providers and accessed by many clients in a round-robin manner. The clients who access these files may have different patterns of access. Some clients may wish to access several files in any order (AND), some wish to access one out of several files (OR), and some clients may access a second file only after accessing another file (IMPLY). The goal of the server is to order the files in a way that minimizes the access time of the clients given some a priori knowledge of their access patterns. An appropriate clients–servers model was recently proposed by Bay-Noy, Naor and Schieber. They formulated three separate problems and proposed an algorithm that evaluates certain number of random permutations and chooses the one whose access time is minimized. In this paper, we formulate a combined AOI (AND-OR-IMPLY) problem, and propose to apply a parallel hill climbing algorithm (to each of the four problems), which begins from certain number of random permutations, and then applies hill climbing technique on each of them until there is no more improvement. The evaluation time of neighboring permutations generated in hill climbing process is optimized, so that it requires O(n) time per permutation instead of O(n
2) time required for evaluating access time of a random permutation, where n is the number of files the server broadcasts. Experiments indicate that the parallel hill climbing algorithm is O(n) times faster that random permutations method, both in terms of time needed to evaluate the same number of permutations, and time needed to provide a high quality solution. Thus the improvement is significant for broadcasting large number of files. 相似文献
25.
26.
A statistical approach to cryptanalysis of a memoryless function of clock-controlled shift registers is introduced. In the case of zero-order correlation immunity, an algorithm for a shift register initial state reconstruction based on the sequence comparison concept is proposed. A constrained Levenshtein distance relevant for the cryptanalysis is defined and a novel recursive procedure for its efficient computation is derived. Preliminary experimental results are given and open theoretic problems are discussed.Following [11], a Boolean function f(x
1,..., x
n) is said to be mth-order correlation immune if m is the maximum integer such that the random variable f(X
1,..., X
n) is statistically independent of every set of m random variables chosen from the balanced and independent binary random variables X
1,..., X
n. 相似文献
27.
We propose an algorithm for adaptive efficient acquisition of fluorescence microscopy data sets using a multirate (MR) approach. We simulate acquisition as part of a larger system for protein classification based on their subcellular location patterns and, thus, strive to maintain the achieved level of classification accuracy as much as possible. This problem is similar to image compression but unique due to additional restrictions, namely causality; we have access only to the information scanned up to that point. While we do want to acquire fewer samples with as low distortion as possible to achieve compression, our goal is to do so while affecting the overall classification accuracy as little as possible. We achieve this by using an adaptive MR scanning scheme which samples the regions of the image area that hold the most pertinent information. Our results show that we can achieve significant compression which we can then use to aquire faster or to increase space resolution of our data set, all while minimally affecting the classification accuracy of the entire system. 相似文献
28.
Z. Marinković O. Pronić-Rančić V. Marković 《Journal of Communications Technology and Electronics》2014,59(11):1303-1309
A new method for accurate determination of noise parameters of microwave transistors for various bias conditions is proposed in this paper. The proposed model consists of a transistor empirical noise model (modification of Pospieszalski’s noise model) and two artificial neural networks. With the aim to avoid extraction of the empirical model parameters for each bias point, an artificial neural network is used to introduce bias-dependence of the equivalent circuit parameters. Accuracy of such bias-dependent model is further improved by using an additional neural network aimed to correct the noise parameters’ values. The proposed modeling approach is exemplified by modelling of a MESFET device in packaged form. The noise parameters obtained by the simulation agree well with the measured data. 相似文献
29.
A method for calculation the impulse response of a depletion layer of a semiconductor device based on Ramo's theorem is described. Using this method the impulse response of a reach-through avalanche photodiode is derived. 相似文献
30.
This paper presents a multimodal biometrie verification system based on the following hand features: palmprint, four digitprints and four fingerprints. The features are obtained using the Karhunen-Loève transform based approach, and information fusion at the matching-score level was applied. We experimented with different resolutions of the regions of interest, different numbers of features and several normalization and fusion techniques at the matching-score level. To increase the reliability of the system to spoof attacks we included an aliveness-detection module based on thermal images of the hand dor sa. The verification performance when using a system configuration with optimum parameters, i.e., resolution, number of features, normalization and fusion technique, showed an equal error rate (EER) of 0.0020%, which makes the system appropriate for the implementation of high-security biometric systems. 相似文献