全文获取类型
收费全文 | 290966篇 |
免费 | 23515篇 |
国内免费 | 11871篇 |
专业分类
电工技术 | 16480篇 |
技术理论 | 26篇 |
综合类 | 18071篇 |
化学工业 | 49164篇 |
金属工艺 | 16876篇 |
机械仪表 | 18797篇 |
建筑科学 | 22278篇 |
矿业工程 | 9350篇 |
能源动力 | 8172篇 |
轻工业 | 17781篇 |
水利工程 | 4720篇 |
石油天然气 | 20035篇 |
武器工业 | 2197篇 |
无线电 | 32355篇 |
一般工业技术 | 34886篇 |
冶金工业 | 16054篇 |
原子能技术 | 2975篇 |
自动化技术 | 36135篇 |
出版年
2024年 | 1058篇 |
2023年 | 4626篇 |
2022年 | 8240篇 |
2021年 | 11741篇 |
2020年 | 8959篇 |
2019年 | 7671篇 |
2018年 | 8490篇 |
2017年 | 9474篇 |
2016年 | 8520篇 |
2015年 | 11341篇 |
2014年 | 14422篇 |
2013年 | 17021篇 |
2012年 | 18190篇 |
2011年 | 19926篇 |
2010年 | 17219篇 |
2009年 | 16334篇 |
2008年 | 15996篇 |
2007年 | 15185篇 |
2006年 | 15945篇 |
2005年 | 13865篇 |
2004年 | 9374篇 |
2003年 | 8163篇 |
2002年 | 7281篇 |
2001年 | 6440篇 |
2000年 | 6897篇 |
1999年 | 8000篇 |
1998年 | 6763篇 |
1997年 | 5534篇 |
1996年 | 5180篇 |
1995年 | 4312篇 |
1994年 | 3463篇 |
1993年 | 2410篇 |
1992年 | 1889篇 |
1991年 | 1510篇 |
1990年 | 1173篇 |
1989年 | 951篇 |
1988年 | 687篇 |
1987年 | 449篇 |
1986年 | 349篇 |
1985年 | 255篇 |
1984年 | 177篇 |
1983年 | 145篇 |
1982年 | 156篇 |
1981年 | 129篇 |
1980年 | 98篇 |
1979年 | 61篇 |
1978年 | 45篇 |
1977年 | 29篇 |
1976年 | 60篇 |
1973年 | 26篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
951.
Chongjin Xie Xiang Liu 《Photonics Technology Letters, IEEE》2003,15(8):1070-1072
We propose a novel polarization-mode dispersion (PMD) compensation scheme for wavelength-division-multiplexing (WDM) systems, in which many WDM channels share one or a few PMD compensators at receiver site. It is shown, both analytically and numerically, that this scheme can achieve virtually the same performance as that using per-channel-based PMD compensation. 相似文献
952.
一个基于优化的有限元模型修正方法 总被引:10,自引:5,他引:5
本文提供了一个基于一阶搜索优化的有限元模型修正方法。它只需利用结构模态试验的部分固有频率,就能获得较精确的有限元模型。文中附有某无人机上垂尾有限元模型修正的实例。根据上垂尾前二阶试验的固有频率,采用本文方法,对有限元模型进行了修正。修正后有限元模型的前二阶固有频率与试验值的相对误差在2.35%以内,而第三阶固有频率与试验值的相对误差仅为5.81%。它不仅大大地缩小了用修正前有限元模型算得的固有频率与试验值的相对误差,而且还能较精确地预测无试验结果的高阶固有频率值。 相似文献
953.
954.
955.
天桥水电站是黄河中游北干上的第一座高泥沙、低水头、大流量的径流式试验电站。它成功的施工与运营经验不仅对在黄河中游北干上开发梯级水电站,而且对中小型径流式水电站的施工都具有重要的借鉴作用。这篇文章总结了两期截流工程、基坑排水、固结灌浆、帷幕灌浆方面的施工经验。在诸如厂房位置的选择以及它的布置,泥沙、冰凌、洪水以及拦污方面的工程设计与运营的宝贵经验,使得水库长期保持高的有效库容和良好的运营状态。特剐是防止进水口淤积和水轮机的磨蚀方面的七条措施是非常有价值的。 相似文献
956.
Novel algorithms for shared segment protection 总被引:8,自引:0,他引:8
Dahai Xu Yizhi Xiong Chunming Qiao 《Selected Areas in Communications, IEEE Journal on》2003,21(8):1320-1331
The major challenges in designing survivable schemes are how to allocate a minimal amount of spare resources (e.g., bandwidth) using fast (e.g., polynomial-time) algorithms, and, in case a failure occurs, to be able to recover quickly from it. All existing approaches invariably make tradeoffs. We propose novel shared segment protection algorithms which make little or no compromise . We develop an elegant integer linear programming (ILP) model to determine an optimal set of segments to protect a given active path. Although the ILP approach is useful for a medium-size network, it is too time consuming for large networks. Accordingly, we also design a fast heuristic algorithm based on dynamic programming to obtain a near-optimal set of segments. Although the heuristic algorithm has a polynomial time complexity, it can achieve a bandwidth efficiency as high as some best-performing shared path protection schemes and, at the same time, much faster recovery than these shared path protection schemes. The proposed scheme is also applicable to a wide range of networking technologies, including Internet Protocol and wavelength-division multiplexing networks under the generalized multiprotocol label switched framework. 相似文献
957.
Wei-Hua Guo Yong-Zhen Huang Chun-Lin Han Li-Juan Yu 《Quantum Electronics, IEEE Journal of》2003,39(6):716-721
To improve the accuracy of measured gain spectra, which is usually limited by the resolution of the optical spectrum analyzer (OSA), a deconvolution process based on the measured spectrum of a narrow linewidth semiconductor laser is applied in the Fourier transform method. The numerical simulation shows that practical gain spectra can be resumed by the Fourier transform method with the deconvolution process. Taking the OSA resolution to be 0.06, 0.1, and 0.2 nm, the gain-reflectivity product spectra with the difference of about 2% are obtained for a 1550-nm semiconductor laser with the cavity length of 720 /spl mu/m. The spectra obtained by the Fourier transform method without the deconvolution process and the Hakki-Paoli method are presented and compared. The simulation also shows that the Fourier transform method has less sensitivity to noise than the Hakki-Paoli method. 相似文献
958.
基于质粒的DNA计算模型研究 总被引:5,自引:0,他引:5
论文给出了一种基于环状质粒DNA计算的新方法,这种计算质粒包含一个特殊的插入DNA序列片断,每个片断定位在匹配的限制性内切位点,通过剪切和粘贴实现计算过程。论文同时给出了生物计算模型和相关的数学描述,这种模式的计算有待进一步研究。 相似文献
959.
960.
Due to the salient characteristics such as the time-varying and error-prone wireless links, the dynamic and limited bandwidth, the time-varying traffic pattern and user locations, and the energy constraints, it is a challenging task to efficiently support heterogeneous traffic with different quality of service (CoS) requirements in multihop mobile ad hoc networks. In the last few years, many channel-dependent mechanisms are proposed to address this issue based on the cross-layer design philosophy. However, a lot of problems remain before more efficient solutions are found. One of the problems is how to alleviate the conflict between throughput and fairness for different prioritized traffic, especially how to avoid the bandwidth starvation problem for low-priority traffic when the high-priority traffic load is very high. In this paper, we propose a novel scheme named Courtesy Piggybacking to address this problem. With the recognition of interlayer coupling, our Courtesy Piggybacking scheme exploits the channel dynamics and stochastic traffic features to alleviate the conflict. The basic idea is to let the high-priority traffic help the low-priority traffic by sharing unused residual bandwidth with courtesy. Another noteworthy feature of the proposed scheme is its implementation simplicity: The scheme is easy to implement and is applicable in networks using either reservation-based or contention-based MAC protocols. 相似文献