首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9620篇
  免费   167篇
  国内免费   42篇
电工技术   180篇
综合类   67篇
化学工业   2295篇
金属工艺   252篇
机械仪表   299篇
建筑科学   273篇
矿业工程   37篇
能源动力   412篇
轻工业   1741篇
水利工程   99篇
石油天然气   74篇
无线电   626篇
一般工业技术   1430篇
冶金工业   861篇
原子能技术   76篇
自动化技术   1107篇
  2024年   149篇
  2023年   132篇
  2022年   261篇
  2021年   455篇
  2020年   341篇
  2019年   379篇
  2018年   383篇
  2017年   400篇
  2016年   391篇
  2015年   270篇
  2014年   385篇
  2013年   681篇
  2012年   537篇
  2011年   612篇
  2010年   425篇
  2009年   462篇
  2008年   396篇
  2007年   346篇
  2006年   288篇
  2005年   199篇
  2004年   204篇
  2003年   249篇
  2002年   256篇
  2001年   194篇
  2000年   141篇
  1999年   122篇
  1998年   256篇
  1997年   189篇
  1996年   146篇
  1995年   95篇
  1994年   68篇
  1993年   73篇
  1992年   38篇
  1991年   34篇
  1990年   37篇
  1989年   21篇
  1988年   35篇
  1987年   15篇
  1986年   21篇
  1985年   17篇
  1984年   9篇
  1982年   7篇
  1981年   9篇
  1980年   10篇
  1979年   8篇
  1978年   7篇
  1977年   10篇
  1976年   26篇
  1975年   9篇
  1974年   8篇
排序方式: 共有9829条查询结果,搜索用时 15 毫秒
41.
The MPLS platform enables the implementation of advanced multipath and multicast routing schemes. This work develops and analyses the performance of a new bi-criteria minimum spanning tree model intended for routing broadcast messages in MPLS networks or constructing tree-based overlay networks. The aim of the model is to obtain spanning trees which are compromise solutions with respect to two important traffic engineering metrics: load balancing cost and average delay bound. An exact solution to the formulated bi-criteria optimization problem is presented, which is based on an algorithm that enables the computation of the set of supported non-dominated spanning trees. An application model and a set of experiments on randomly generated Internet type topologies will also be presented. Finally a network performance analysis of the model considering three network performance metrics will be shown.  相似文献   
42.
Security is one of the major issues in MANETs. Their natural characteristics make them vulnerable to numerous severe attacks. It is widely acknowledged that cryptography provides a set of strong techniques against most vulnerabilities. Several cryptographic mechanisms for MANETs can be found in the literature. Among them, identity-based cryptographic mechanisms and key management schemes are proposed to simplify key management and to reduce the memory storage cost. This article presents the most important ID-based key management schemes, discussing their approaches, strengths, and weaknesses, and comparing their main features. It also presents the main IDbased key management application fields on MANETs. In this way it can be useful for users and researchers as a starting point on ID-based key management and its possible uses in MANETs.  相似文献   
43.
Microspectrometers based on the monolithic integration of a microelectromechanical system (MEMS) Fabry–Pérot filter and a Hg x Cd1–x Te-based infrared detector are discussed and measured results presented. The microspectrometers are designed to operate in the 1.5 μm to 2.6 μm wavelength range. Design equations are presented which account for the mechanical and optical characteristics of the device. Measurements indicate linewidths as narrow as 55 nm, switching times of 40 μs, and a tuning range of 380 nm, which is limited by snap-down. Optical characterization of the distributed Bragg mirrors and the Fabry–Pérot filter are presented, and these are shown to be in good agreement with simple first-order analytical models. Bowing of the movable Fabry–Pérot mirror due to stress gradients is identified as the dominant source of linewidth broadening.  相似文献   
44.
Managing computer networks using peer-to-peer technologies   总被引:7,自引:0,他引:7  
Peer-to-peer systems and network management are usually related to each other because the traffic loads of P2P systems have to be controlled to avoid regular network services becoming unavailable due to network congestion. In this context, from a network operation point of view, P2P systems often mean problems. In this article we take a different perspective and look at P2P technologies as an alternative to improve current network management solutions. We introduce an approach where P2P networks are used as flexible interdomain distributed management systems able to provide facilities often absent in traditional management systems. We present three examples of P2P-based network management: how managed network views can be shared in a P2P network, how P2P-based application layer routing can improve connectivity between management entities, and how groups of peers can be used to process management tasks in a balanced way. Our main goal is to show that P2P technologies are a feasible tool for network management, and thus motivate further investigations on the subject.  相似文献   
45.
A fast and efficient hybrid fractal-wavelet image coder.   总被引:1,自引:0,他引:1  
The excellent visual quality and compression rate of fractal image coding have limited applications due to exhaustive inherent encoding time. This paper presents a new fast and efficient image coder that applies the speed of the wavelet transform to the image quality of the fractal compression. Fast fractal encoding using Fisher's domain classification is applied to the lowpass subband of wavelet transformed image and a modified set partitioning in hierarchical trees (SPIHT) coding, on the remaining coefficients. Furthermore, image details and wavelet progressive transmission characteristics are maintained, no blocking effects from fractal techniques are introduced, and the encoding fidelity problem common in fractal-wavelet hybrid coders is solved. The proposed scheme promotes an average of 94% reduction in encoding-decoding time comparing to the pure accelerated Fractal coding results. The simulations also compare the results to the SPIHT wavelet coding. In both cases, the new scheme improves the subjective quality of pictures for high-medium-low bitrates.  相似文献   
46.
Tuning of 802.11e network parameters   总被引:1,自引:0,他引:1  
This paper introduces a mechanism which dynamically tunes the parameters of the 802.11e contention-based access method. The proposed mechanism aims at providing QoS as well as ameliorating the problem of delay asymmetry.  相似文献   
47.
48.
Journal of Materials Science: Materials in Electronics - In this paper, CaWO4 nanoparticles were prepared by the hydrothermal method using the temperature of 100 (CaWO4-100), 120 (CaWO4-120), 140...  相似文献   
49.
Heat exchanger network (HEN) synthesis has been a well-studied subject over the past decades. Many studies and methodologies were proposed to make possible the energy recovery, minimizing the utilities consumption and the number of heat transfer equipment.  相似文献   
50.
Vibratory finishing is a widely-used manufacturing process in which a vibrating container filled with granular media becomes fluidized. The resulting bulk flow entrains workpieces and exposes their surfaces to the impacts resulting from the small-scale media vibrations. The bulk flow is responsible for entrainment and mixing, while the media vibration does work on the surfaces. The selection of machine vibration parameters is commonly based on experience due to the difficulty in predicting the fluidized bed behavior. In this work, a discrete element method was used to investigate how the bulk flow in an actual tub finisher filled with steel balls depends on the tub motion parameters through a parametric study. The underlying mechanisms that create and drive the bulk flow were identified by examining the relationships between the bulk flow rates and the wall forces. Finally, the connection between the wall motion and the wall forces was investigated. The tub frequency was the most effective control parameter and there was an optimal phase difference between the horizontal and vertical vibrations to maximize bulk flow. The relationship between the media packing at the walls and the tangential forces between the walls and the media explained the formation and speed of the bulk flow. Lastly, it was shown that the tangential wall forces, unlike the normal forces, cannot be obtained from the known wall motion alone since they also depend on the media velocities relative to the walls.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号