全文获取类型
收费全文 | 135697篇 |
免费 | 10322篇 |
国内免费 | 5265篇 |
专业分类
电工技术 | 7351篇 |
技术理论 | 13篇 |
综合类 | 8136篇 |
化学工业 | 23190篇 |
金属工艺 | 7607篇 |
机械仪表 | 8554篇 |
建筑科学 | 9716篇 |
矿业工程 | 4395篇 |
能源动力 | 4214篇 |
轻工业 | 9265篇 |
水利工程 | 2081篇 |
石油天然气 | 9298篇 |
武器工业 | 962篇 |
无线电 | 14547篇 |
一般工业技术 | 16679篇 |
冶金工业 | 7428篇 |
原子能技术 | 1448篇 |
自动化技术 | 16400篇 |
出版年
2024年 | 570篇 |
2023年 | 2241篇 |
2022年 | 4000篇 |
2021年 | 5539篇 |
2020年 | 4162篇 |
2019年 | 3592篇 |
2018年 | 4176篇 |
2017年 | 4571篇 |
2016年 | 3991篇 |
2015年 | 5151篇 |
2014年 | 6593篇 |
2013年 | 7814篇 |
2012年 | 8251篇 |
2011年 | 9035篇 |
2010年 | 7909篇 |
2009年 | 7403篇 |
2008年 | 7177篇 |
2007年 | 6953篇 |
2006年 | 7118篇 |
2005年 | 6230篇 |
2004年 | 4185篇 |
2003年 | 3733篇 |
2002年 | 3540篇 |
2001年 | 2995篇 |
2000年 | 3223篇 |
1999年 | 3688篇 |
1998年 | 3053篇 |
1997年 | 2510篇 |
1996年 | 2490篇 |
1995年 | 2136篇 |
1994年 | 1728篇 |
1993年 | 1217篇 |
1992年 | 934篇 |
1991年 | 745篇 |
1990年 | 582篇 |
1989年 | 465篇 |
1988年 | 412篇 |
1987年 | 262篇 |
1986年 | 220篇 |
1985年 | 163篇 |
1984年 | 124篇 |
1983年 | 79篇 |
1982年 | 77篇 |
1981年 | 60篇 |
1980年 | 46篇 |
1979年 | 21篇 |
1978年 | 10篇 |
1977年 | 19篇 |
1976年 | 23篇 |
1975年 | 14篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
61.
Average consensus in networks of dynamic agents with switching topologies and multiple time-varying delays 总被引:5,自引:0,他引:5
In this paper, we discuss average consensus problem in undirected networks of dynamic agents with fixed and switching topologies as well as multiple time-varying communication delays. By employing a linear matrix inequality method, we prove that all the nodes in the network achieve average consensus asymptotically for appropriate communication delays if the network topology is connected. Particularly, several feasible linear matrix inequalities are established to determine the maximal allowable upper bound of time-varying communication delays. Numerical examples are given to demonstrate the effectiveness and the sharpness of the theoretical results. 相似文献
62.
Xin Sun Qiang Lu Moroz V. Takeuchi H. Gebara G. Wetzel J. Shuji Ikeda Changhwan Shin Tsu-Jae King Liu 《Electron Device Letters, IEEE》2008,29(5):491-493
A tri-gate bulk MOSFET design utilizing a low-aspect-ratio channel is proposed to provide an evolutionary pathway for CMOS scaling to the end of the roadmap. 3-D device simulations indicate that this design offers the advantages of a multi-gate FET (reduced variability in performance and improved scalability) together with the advantages of a conventional planar MOSFET (low substrate cost and capability for dynamic threshold-voltage control). 相似文献
63.
Shu‐Li Sun Jing Ma Nan Lv 《International Journal of Adaptive Control and Signal Processing》2008,22(10):932-948
Based on the optimal fusion estimation algorithm weighted by scalars in the linear minimum variance sense, a distributed optimal fusion Kalman filter weighted by scalars is presented for discrete‐time stochastic singular systems with multiple sensors and correlated noises. A cross‐covariance matrix of filtering errors between any two sensors is derived. When the noise statistical information is unknown, a distributed identification approach is presented based on correlation functions and the weighted average method. Further, a distributed self‐tuning fusion filter is given, which includes two stage fusions where the first‐stage fusion is used to identify the noise covariance and the second‐stage fusion is used to obtain the fusion state filter. A simulation verifies the effectiveness of the proposed algorithm. Copyright © 2008 John Wiley & Sons, Ltd. 相似文献
64.
标签粘贴机是一种可自动进行标签打印和粘贴的设备装置,在工业自动化生产中有着广泛的应用.介绍了一种采用单台微机进行控制的全自动标签粘贴机的工作原理及各部分组成,以及使用过程中对其进行设置和调整的方法.该标签粘贴机已实际应用于华飞彩色显示系统有限公司29英寸彩色显像管生产线的屏网组装工序,取得了良好的效果. 相似文献
65.
66.
67.
探讨了中国3G牌照何时发放、发放数量、牌照与标准是否捆绑、3G产业链如何搭建、频率如何分配、市场容量和终端等问题,并对此提出了建设性的意见。 相似文献
68.
裂缝性油气藏采收率:100个裂缝性油气田实例的经验总结 总被引:5,自引:2,他引:3
通过对世界上100个裂缝性油气藏的综合评价,研究储集层及流体本身的性质(包括孔隙度、渗透率、黏度、可动油比例、含水饱和度、润湿性及裂缝分布特征等)和驱动机制及油藏管理战略(优化日产量和采用不同类型的提高采收率技术)对其最终采收率的影响。将裂缝性油气藏分为4类:I类的基质几乎没有孔隙度和渗透率,裂缝是储存空间和流体流动的通道;Ⅱ类的基质有较低的孔隙度和渗透率,基质提供储存空间,裂缝提供流动通道;Ⅲ类(微孔隙)的基质具有高孔隙度和低渗透率,基质提供储存空间,裂缝提供流动通道;Ⅳ类(大孔隙)的基质具有高的孔隙度和渗透率,基质提供储存空间和流动通道,裂缝仅增加渗透率。对26个Ⅱ类油气藏和20个Ⅲ类油气藏的开采历史的研究表明:Ⅱ类油气藏的采收率受水驱强度和最优日产量控制,日产量过高会很容易破坏Ⅱ类油气藏,一些Ⅱ类油气藏如果管理得当,采收率可以很高,不需要二次或三次采油;Ⅲ类油气藏的采收率主要受岩石和流体本身性质的影响,特别是基质渗透率、流体重度、润湿性以及裂缝强度等,不进行二次或三次采油不可能完全开采,往往需要采用一些提高采收率的专门技术。以往将Ⅱ类和Ⅲ类裂缝性油气藏归为一类,认识它们的区别将有助于选择更好的开发策略。 相似文献
69.
Perturbation analysis and control of two-class stochastic fluid models for communication networks 总被引:2,自引:0,他引:2
Cassandras C.G. Gang Sun Panayiotou C.G. Wardi Y. 《Automatic Control, IEEE Transactions on》2003,48(5):770-782
This paper uses stochastic fluid models (SFMs) for the control and optimization (rather than performance analysis) of communication network nodes processing two classes of traffic: one is uncontrolled and the other is subject to threshold-based buffer control. We derive gradient estimators for packet loss and workload related performance metrics with respect to threshold parameters. These estimators are shown to be unbiased and directly observable from a sample path without any knowledge of underlying stochastic characteristics of the traffic processes. This renders them computable in online environments and easily implementable for network management and control. We further demonstrate their use in buffer control problems where our SFM-based estimators are evaluated based on data from an actual system. 相似文献
70.
Zhishou Zhang Qibin Sun Wai-Choong Wong John Apostolopoulos Susie Wee 《Multimedia, IEEE Transactions on》2007,9(2):320-331
This paper proposes an optimized content-aware authentication scheme for JPEG-2000 streams over lossy networks, where a received packet is consumed only when it is both decodable and authenticated. In a JPEG-2000 codestream, some packets are more important than others in terms of coding dependency and image quality. This naturally motivates allocating more redundant authentication information for the more important packets in order to maximize their probability of authentication and thereby minimize the distortion at the receiver. Towards this goal, with the awareness of its corresponding image content, we formulate an optimization framework to compute an authentication graph to maximize the expected media quality at the receiver, given specific authentication overhead and knowledge of network loss rate. System analysis and experimental results demonstrate that the proposed scheme achieves our design goal in that the rate-distortion (R-D) curve of the authenticated image is very close to the R-D curve when no authentication is required 相似文献