全文获取类型
收费全文 | 4750篇 |
免费 | 499篇 |
国内免费 | 183篇 |
专业分类
电工技术 | 461篇 |
技术理论 | 1篇 |
综合类 | 267篇 |
化学工业 | 682篇 |
金属工艺 | 330篇 |
机械仪表 | 256篇 |
建筑科学 | 198篇 |
矿业工程 | 132篇 |
能源动力 | 197篇 |
轻工业 | 254篇 |
水利工程 | 60篇 |
石油天然气 | 115篇 |
武器工业 | 53篇 |
无线电 | 813篇 |
一般工业技术 | 561篇 |
冶金工业 | 280篇 |
原子能技术 | 42篇 |
自动化技术 | 730篇 |
出版年
2025年 | 45篇 |
2024年 | 142篇 |
2023年 | 147篇 |
2022年 | 227篇 |
2021年 | 296篇 |
2020年 | 192篇 |
2019年 | 161篇 |
2018年 | 150篇 |
2017年 | 160篇 |
2016年 | 143篇 |
2015年 | 179篇 |
2014年 | 215篇 |
2013年 | 309篇 |
2012年 | 332篇 |
2011年 | 307篇 |
2010年 | 218篇 |
2009年 | 269篇 |
2008年 | 280篇 |
2007年 | 246篇 |
2006年 | 184篇 |
2005年 | 143篇 |
2004年 | 124篇 |
2003年 | 112篇 |
2002年 | 124篇 |
2001年 | 95篇 |
2000年 | 72篇 |
1999年 | 54篇 |
1998年 | 93篇 |
1997年 | 65篇 |
1996年 | 45篇 |
1995年 | 40篇 |
1994年 | 31篇 |
1993年 | 25篇 |
1992年 | 22篇 |
1991年 | 30篇 |
1990年 | 16篇 |
1989年 | 11篇 |
1988年 | 12篇 |
1987年 | 16篇 |
1986年 | 12篇 |
1985年 | 13篇 |
1984年 | 8篇 |
1983年 | 12篇 |
1982年 | 7篇 |
1980年 | 6篇 |
1979年 | 4篇 |
1976年 | 3篇 |
1975年 | 7篇 |
1973年 | 5篇 |
1972年 | 3篇 |
排序方式: 共有5432条查询结果,搜索用时 15 毫秒
11.
Jin-Fu Li Hsin-Jung Huang Jeng-Bin Chen Chih-Pin Su Cheng-Wen Wu Chuang Cheng Shao-I Chen Chi-Yi Hwang Hsiao-Ping Lin 《Micro, IEEE》2002,22(5):69-81
We present a hierarchical test methodology for testing a SOC with heterogeneous cores, including the 1149.1-wrapped, P1500-wrapped, and BIST memory cores. We propose an 1149.1-based hierarchical test manager that also provides P1500 test control signals. This scheme includes a memory BIST interface, providing both serial and parallel access ports for BIST circuits. Our approach offers low area and pin overhead, and high flexibility 相似文献
12.
13.
M. W. Liang T. E. Hsieh S. Y. Chang T. H. Chuang 《Journal of Electronic Materials》2003,32(9):952-956
The multilayer thin-film systems of Cu/Ti/Si and Au/Cu/Al2O3 were diffusion-soldered at temperatures between 250°C and 400°C by inserting a Sn thin-film interlayer. Experimental results
showed that a double layer of intermetallic compounds (IMCs) η-(Cu0.99Au0.01)6Sn5/δ-(Au0.87Cu0.13)Sn was formed at the interface. Kinetics analyses revealed that the growth of intermetallics was diffusion-controlled. The
activation energies as calculated from Arrhenius plots of the growth rate constants for (Cu0.99Au0.01)6Sn5 and (Au0.87Cu0.13)Sn are 16.9 kJ/mol and 53.7 kJ/mol, respectively. Finally, a satisfactory tensile strength of 132 kg/cm2 could be attained under the bonding condition of 300°C for 20 min. 相似文献
14.
Fengyuan Ren Xunhe Yin Xiaomeng Huang Chuang Lin 《Communications Letters, IEEE》2006,10(12):858-860
Active queue management (AQM) is proposed to enhance end-to-end congestion control through purposefully dropping packets in the intermediate nodes. In this letter, a novel packet dropping mechanism is developed through designing a binary controller applying the robust control theory. The new mechanism can simplify the manipulation on the AQM router so as to be helpful for implementing the high performance router. The numerical simulation results show that the binary controller can satisfy with the technical requirements for AQM 相似文献
15.
The tensile strengths of bulk solders and joint couples of Sn-3.5Ag-0.5Cu, Sn-3.5Ag-0.07Ni, and Sn-3.5Ag-0.5Cu-0.07Ni-0.01Ge
solders and the shear strengths of ball grid array (BGA) specimens, solder-ball-attached Cu/Ni/Au metallized substrates were
investigated. The tensile strength of the bulk is degraded by thermal aging. The Ni-containing solder exhibits lower tensile
strength than Sn-3.5Ag-0.5Cu after thermal aging. However, the Ni-containing solder joints show greater tensile strength than
the Cu/Sn-3.5Ag-0.5Cu/Cu joint. Fracture of the solder joint occurs between the intermetallic compound (IMC) and the solder.
The shear strength and fracture mechanism of BGA specimens are the same regardless of solder composition. 相似文献
16.
Hiding data in multitone images for data communications 总被引:3,自引:0,他引:3
Chang C.-C. Chuang J.-C. Lai Y.-P. 《Vision, Image and Signal Processing, IEE Proceedings -》2004,151(2):137-145
Two novel data-hiding schemes for secure data communications are presented. These two schemes perform on the pixel differences between the original (host) image and the decompressed image, which is inspired from Wu's and Chao's methods. The first scheme, referred to as 'scheme-1', utilises the differences between two similar images and then embeds the secret data into the different parts. In the embedding process, two auxiliary techniques, zero-replacement and complement-bit, will also be incorporated. In addition, to enhance the hiding efficiency of scheme-1, the authors have followed the bit-plane hiding strategy and created scheme-2. The proposed schemes have two advantages. First, the error distortion can be measured before the hiding process begins. Second, there is no complex computation, which means the hiding process can be executed very efficiently. The experimental results show that the two proposed schemes can achieve better image quality than other data-hiding schemes. At the same time, the new schemes can also satisfy the three basic requirements a data hiding scheme should live up to: invisibility, capacity and data security. 相似文献
17.
Packetized access has some potential advantages over conventional circuit-switched-based access methods because several signal sources can share the same radio channel using statistical multiplexing. We consider radio resource assignment algorithms for packetized access based on the packet-reservation multiple-access (PRMA) protocol in the presence of cochannel interference. The statistical multiplexing gain of packet access is limited by frequency reuse, especially when the reuse factor is low or duality requirement is high. We propose a fuzzy logic-based adaptive medium-access control (MAC) algorithm to improve packet-access efficiency. Computer simulations based on the example of packetized voice have confirmed that the proposed packet-access protocol can support a higher number of active users per radio port than that supported by random slot assignment 相似文献
18.
Unsupervised Learning for Solving RSS Hardware Variance Problem in WiFi Localization 总被引:1,自引:0,他引:1
Hardware variance can significantly degrade the positional accuracy of RSS-based WiFi localization systems. Although manual
adjustment can reduce positional error, this solution is not scalable as the number of new WiFi devices increases. We propose
an unsupervised learning method to automatically solve the hardware variance problem in WiFi localization. This method was
designed and implemented in a working WiFi positioning system and evaluated using different WiFi devices with diverse RSS
signal patterns. Experimental results demonstrate that the proposed learning method improves positional accuracy within 100 s
of learning time. 相似文献
19.
Fast Duplicate Address Detection for Seamless Inter-Domain Handoff in All-IPv6 Mobile Networks 总被引:1,自引:0,他引:1
In All-IP networks, each computer or communication equipment needs an IP address. To supply enough IP addresses, the new Internet
protocol IPv6 will be used in next generation mobile communication. Although IPv6 improves the existing Internet protocol
(IPv4), Duplicate Address Detection (DAD) mechanism may consume resources and suffer from long delay. DAD is used to make
sure whether the IP address is unique or not. When a mobile node performs an inter-domain handoff, it will first generate
a new IP and perform a DAD procedure. The DAD procedure not only wastes time but also increases the signaling load on Internet.
In this paper, we propose a new DAD mechanism to speed up the DAD procedure. We create a DAD table in access or mobility routers
in All-IP networks and record all IP addresses of the area. When a new IP address needs to perform DAD, it can just search
in the DAD table to confirm the uniqueness of the address. Furthermore, we propose a new method, Fast Duplicate Address Detection
(Fast DAD), to reduce data search time. Simulation results show that our method outperforms the existing DAD methods. 相似文献
20.
This paper presents an equalization structure in which antennadiversity, adaptive decision feedback equalization (DFE), interleavingand trellis-coded modulation (TCM) can be effectively combined to combatboth ISI and cochannel interference in cellular mobile radioenvironments. The feedback filter of the DFE can use either tentative orfinal decision symbols of the TCM Viterbi decoding to cancel tail ISIwith the square root Kalman algorithm. A performance bound on theaverage pairwise error probability for TCM under perfect interleavingand equalization is obtained by analysis. Some simulation results whichillustrate the potential of the proposed system will also be given. Inparticular, a performance comparison between the proposed method anduncoded QPSK modulation will be undertaken. 相似文献