全文获取类型
收费全文 | 85286篇 |
免费 | 1059篇 |
国内免费 | 408篇 |
专业分类
电工技术 | 779篇 |
综合类 | 2317篇 |
化学工业 | 12095篇 |
金属工艺 | 4796篇 |
机械仪表 | 3050篇 |
建筑科学 | 2216篇 |
矿业工程 | 563篇 |
能源动力 | 1150篇 |
轻工业 | 3938篇 |
水利工程 | 1281篇 |
石油天然气 | 348篇 |
无线电 | 9302篇 |
一般工业技术 | 16450篇 |
冶金工业 | 2716篇 |
原子能技术 | 257篇 |
自动化技术 | 25495篇 |
出版年
2023年 | 30篇 |
2022年 | 190篇 |
2021年 | 184篇 |
2020年 | 84篇 |
2019年 | 71篇 |
2018年 | 14509篇 |
2017年 | 13422篇 |
2016年 | 10018篇 |
2015年 | 664篇 |
2014年 | 306篇 |
2013年 | 307篇 |
2012年 | 3240篇 |
2011年 | 9522篇 |
2010年 | 8342篇 |
2009年 | 5600篇 |
2008年 | 6820篇 |
2007年 | 7819篇 |
2006年 | 170篇 |
2005年 | 1247篇 |
2004年 | 1158篇 |
2003年 | 1208篇 |
2002年 | 566篇 |
2001年 | 105篇 |
2000年 | 197篇 |
1999年 | 71篇 |
1998年 | 75篇 |
1997年 | 42篇 |
1996年 | 55篇 |
1995年 | 15篇 |
1994年 | 18篇 |
1993年 | 17篇 |
1992年 | 16篇 |
1991年 | 25篇 |
1988年 | 12篇 |
1969年 | 24篇 |
1968年 | 43篇 |
1967年 | 33篇 |
1966年 | 42篇 |
1965年 | 44篇 |
1964年 | 11篇 |
1963年 | 28篇 |
1962年 | 22篇 |
1961年 | 18篇 |
1960年 | 30篇 |
1959年 | 35篇 |
1958年 | 37篇 |
1957年 | 36篇 |
1956年 | 34篇 |
1955年 | 63篇 |
1954年 | 68篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
Omar A. Elgendy Mahmoud H. Ismail Khaled M. F. Elsayed 《Telecommunication Systems》2018,68(4):643-655
One of the major issues in LTE-Advanced (LTE-A) systems is the poor capacity at the cell edge. This is mainly due to the interference experienced by the users as a result of the aggressive frequency reuse usually implemented. Relaying offers an attractive solution for this problem by offering better links than those with the eNodeB (eNB) for the terminals suffering from high path loss or high interference. However, adding relays complicates the resource allocation problem at the eNB and therefore the need for more efficient schemes arises. This is also aggravated by the reuse of resource blocks (RBs) by the relays to fully exploit the scarce spectrum, which, in turn, leads to intra-cell interference. In this paper, we study the joint power and resource allocation problem in LTE-A relay-enhanced cells that exploit spatial reuse. To guarantee fairness among users, a max–min fair optimization objective is used. This complex problem is solved using coordinate ascent and the difference of two convex functions (DC) programming techniques and the proposed scheme indeed converges to a local-optimum quickly. This is shown to be a satisfactory solution according to the simulation results that indicate an almost sevenfold increase in the 10th percentile capacity when compared to previously proposed solutions. 相似文献
992.
In this paper, we present a novel computationally efficient motion estimation (ME) algorithm for high-efficiency video coding (HEVC). The proposed algorithm searches in the hexagonal pattern with a fixed number of search points at each grid. It utilizes the correlation between contiguous pixels within the frame. In order to reduce the computational complexity, the proposed algorithm utilizes pixel truncation, adaptive search range, sub-sampling and avoids some of the asymmetrical prediction unit techniques. Simulation results are obtained by using the reference software HM (e n c o d e r_l o w d e l a y_P_m a i n and e n c o d e r_r a n d o m a c c e s s_m a i n profile) and shows 55.49% improvement on search points with approximately the same PSNR and around 1% increment in bit rate as compared to the Test Zonal Search (TZS) ME algorithm. By utilizing the proposed algorithm, the BD-PSNR loss for the video sequences like B a s k e t b a l l P a s s_416 × 240@50 and J o h n n y_1280 × 720@60 is 0.0804 dB and 0.0392 dB respectively as compared to the HM reference software with the e n c o d e r_l o w d e l a y_P_m a i n profile. 相似文献
993.
In this paper, we consider underlay cognitive radio (CR) networks where an amount of interference caused by secondary stations (STAs) has to be kept below a predefined level, which is called interference temperature. We propose opportunistic p-persistent carrier sense multiple access schemes for the CR networks, which opportunistically exploit wireless channel conditions in transmitting data to the secondary access point. We also devise an adaptive interference-level control technique to further improve quality-of-service of a primary network by limiting the excessive interference due to collisions among STAs. The performances of the proposed schemes are mathematically analyzed, and they are validated with extensive computer simulations. The simulation results show that the proposed schemes achieve near optimal throughput of the secondary network while they are backward-compatible to the conventional p-persistent CSMA scheme. 相似文献
994.
Secret key generation by extracting the shared randomness in the wireless fading channel from physical layer is an interesting topic of practical value. Previous works have focused on the study of physical layer key generation with two nodes from the view point of key generation rate (KGR). Information theoretic limits and the KGRs in implementation have been derived. However, in real-world applications, the physical layer key generation problem involving multiple nodes is the common case, which lacks sufficient study so far. Multi-node case differs from two-node case in that there are two more important considerations: (1) the trade-off between KGR and probing efficiency at individual node pair; (2) channel probing schedule among multiple node pairs. This paper aims at minimizing the Overall Waiting Time of physical layer key generation with multiple users (shorten as OWT) through the optimization of probing rates at individual node pair and channel probing schedule. The theoretical lower bound of OWT is derived first, then a practical method (MUKEM) is proposed to compute reasonable probing rates and channel probing schedule for multiple node pairs to obtain a short OWT. Simulations are conducted to evaluate the effectiveness of our method. The results show that 70 % of OWT can be reduced by using our method comparing with one-by-one key generations; while it is only about 8 % longer than the lower bound of OWT. 相似文献
995.
Tariq Umer Muhammad Khalil Afzal Ehsan Ullah Munir Muhammad Alam 《Wireless Personal Communications》2018,98(1):105-118
Vehicular ad-hoc network (VANET) is characterized as a highly dynamic wireless network due to the dynamic connectivity of the network nodes. To achieve better connectivity under such dynamic conditions, an optimal transmission strategy is required to direct the information flow between the nodes. Earlier studies on VANET’s overlook the characteristics of heterogeneity in vehicle types, traffic structure, flow for density estimation, and connectivity observation. In this paper, we have proposed a heterogeneous traffic flow based dual ring connectivity model to enhance both the message disseminations and network connectivity. In our proposed model the availability of different types of vehicles on the road, such as, cars, buses, etc., are introduced in an attempt to propose a new communication structure for moving vehicles in VANETl under cooperative transmission in heterogeneous traffic flow. The model is based on the dual-ring structure that forms the primary and secondary rings of vehicular communication. During message disseminations, Slow speed vehicles (buses) on the secondary ring provide a backup path of communication for high speed vehicles (cars) moving on the primary ring. The Slow speed vehicles act as the intermediate nodes in the aforementioned connectivity model that helps improve the network coverage and end-to-end data delivery. For the evaluation and the implementation of dual-ring model a clustering routing scheme warning energy aware cluster-head is adopted that also caters for the energy optimization. The implemented dual-ring message delivery scheme under the cluster-head based routing technique does show improved network coverage and connectivity dynamics even under the multi-hop communication system. 相似文献
996.
Nandkumar Kulkarni Neeli Rashmi Prasad Ramjee Prasad 《Wireless Personal Communications》2018,100(2):255-266
Quality of Service (QoS) assurance in Wireless Sensor Network (WSN) is a tough task, and it is more exciting due to the scarcity of resources. The requirement of different WSN applications running over has different constraints. In QoS, routing protocol the network has to balance the traffic. This paper presents a novel heuristic routing algorithm known as QoS assured Multi-objective Hybrid Routing Algorithm (Q-MOHRA) for Heterogeneous WSN. Q-MOHRA takes into account the link (energy, hop count, link quality indicator etc.) and path (jitter) metrics for optimal path selection. The performance of Q-MOHRA is evaluated through intensive simulation and equated with Simple Hybrid Routing Protocol (SHRP) and Dynamic Multi-objective Routing Algorithm (DyMORA). The metrics such as average energy consumption, residual energy, packet delivery ratio, jitter, and normalized routing load are used for comparison. The performance of Q-MOHRA has been observed to outclass SHRP and DyMORA. It improves the packet delivery ratio by 24.31% as compared to SHRP and 11.86% as compared to DyMORA. Q-MOHRA outperforms DyMORA in terms of average energy consumption by a factor of 8.27%. 相似文献
997.
Delay Tolerant Networks (DTNs) have attracted various interests these days. Since DTNs are subject to high loss rate, large delay, intermittent connection, and even no end-to-end connectivity, relay nodes, such as throwboxes, are deployed to enhance network performance. Internet-based systems have contemporaneous connectivity between location-distributed nodes, and this does not apply to DTNs. Thus, the traditional relay node deployment strategies are no longer suitable for DTNs. In this paper, we propose a novel strategy, named Connection-2 (\(CO_2\)), to deploy throwboxes to enhance the fault tolerance of DTNs. \(CO_2\) constructs a 2-connected DTN using an approximation algorithm. Every mobile node in the 2-connected DTN can reach another mobile node via two or more node-disjoint paths within its mobility range. While enhancing fault tolerance, the number of throwboxes that \(CO_2\) requires is small. We conduct various experiments based on the simulation of the real Tuscaloosa bus transit system and compare its performance with two popular strategies. Experimental results show that \(CO_2\) is effective. 相似文献
998.
Roy C. Park 《Wireless Personal Communications》2018,98(4):3035-3038
999.
Murat Dener 《Wireless Personal Communications》2018,101(1):269-286
Wireless sensor networks consist of low cost sensor nodes which have limited power supplies, memory capacity, processing capability and transmission rate. Sensor nodes gather information from the environment and send the collected information to base station with help of a routing cooperation. Because of limited resources in Wireless Sensor Networks, fulfilling these routing operations is a major problem. Routing protocols are used to perform these operations. The most important thing by considering while these protocols are designed is energy efficiency. Because wireless sensor networks are widely used in intelligent systems, the energy efficiency of these networks is very important in IoT. Researchers have proposed several hierarchical routing protocols such as LEACH, PEGASIS, TEEN and APTEEN. In this study, an energy efficient routing protocol is developed which is more efficient than currently avaliable routing protocols. The developed protocol involves mapping of the network, sleep–wake/load balancing, data merge processes. The proposed protocol gives better results than other protocols in number of surviving nodes and amount of energy consumed criterias. 相似文献
1000.
Underground mining production process is vulnerable and highly dynamic in nature. Among the various causes of accidents in underground mine, major one is presence of flammable and noxious gases. Though many existing safety gadgets are there but they could not work reliably because of the typical nature of mines structure and production variability. Wireless data and communication network is also not successful because wireless communication in underground mine is significantly more challenging than through air. This work introduces the application of mobile wireless sensor network in order to monitor a variety of parameters in underground mines which have life threatening effects towards them. Each node of the network placed over the safety gear (helmet wore statutorily by every miner) comprises of various sensors depending on the requirement with microcontroller unit and other low power accessories. The proposed work has a unique feature that it will make the personnel aware about the situation of the gases present and surrounding by automatically generating different alarms and different light indicators. Other function of this device will be to transmit the data sensed by the sensors in the device to the control room wirelessly so that the responsible person would be aware of the situation. This work is focused on the design of such a prototype model for the underground mines with the aforementioned specification. 相似文献