全文获取类型
收费全文 | 127551篇 |
免费 | 10574篇 |
国内免费 | 5836篇 |
专业分类
电工技术 | 7400篇 |
技术理论 | 8篇 |
综合类 | 8757篇 |
化学工业 | 20917篇 |
金属工艺 | 7353篇 |
机械仪表 | 8538篇 |
建筑科学 | 10177篇 |
矿业工程 | 4045篇 |
能源动力 | 3499篇 |
轻工业 | 9534篇 |
水利工程 | 2286篇 |
石油天然气 | 8544篇 |
武器工业 | 1037篇 |
无线电 | 13808篇 |
一般工业技术 | 14374篇 |
冶金工业 | 6039篇 |
原子能技术 | 1345篇 |
自动化技术 | 16300篇 |
出版年
2024年 | 573篇 |
2023年 | 2166篇 |
2022年 | 3901篇 |
2021年 | 5265篇 |
2020年 | 4120篇 |
2019年 | 3311篇 |
2018年 | 3655篇 |
2017年 | 4101篇 |
2016年 | 3803篇 |
2015年 | 5181篇 |
2014年 | 6388篇 |
2013年 | 7585篇 |
2012年 | 8347篇 |
2011年 | 8916篇 |
2010年 | 7860篇 |
2009年 | 7473篇 |
2008年 | 7403篇 |
2007年 | 7070篇 |
2006年 | 7130篇 |
2005年 | 6184篇 |
2004年 | 4062篇 |
2003年 | 3676篇 |
2002年 | 3530篇 |
2001年 | 3115篇 |
2000年 | 2930篇 |
1999年 | 3093篇 |
1998年 | 2446篇 |
1997年 | 1996篇 |
1996年 | 1917篇 |
1995年 | 1610篇 |
1994年 | 1310篇 |
1993年 | 870篇 |
1992年 | 740篇 |
1991年 | 524篇 |
1990年 | 420篇 |
1989年 | 360篇 |
1988年 | 259篇 |
1987年 | 175篇 |
1986年 | 137篇 |
1985年 | 82篇 |
1984年 | 57篇 |
1983年 | 46篇 |
1982年 | 44篇 |
1981年 | 33篇 |
1980年 | 31篇 |
1979年 | 19篇 |
1976年 | 7篇 |
1973年 | 5篇 |
1959年 | 5篇 |
1951年 | 6篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
随着电网的不断发展,技术的不断进步,变电站的防误闭锁装置也在不断的改进和完善,防止电气误操作已经成为电力自动化技术的一个重要分支,成为保障电力安全生产的一项重要措施,监控系统操作必须有防误闭锁系统的保证才能发挥其应有的作用。监控五防一体系统采用集成于监控系统的五防子模块形式,实现操作票及防误闭锁功能,并支持包括专业五防硬件厂商电脑钥匙的通讯接口,配合五防锁具,实现电气设备的防误闭锁。它是微机防误闭锁技术与监控系统的有机结合,真正的实现了资源共享。 相似文献
992.
本文针对传统入侵检测技术难以适应无线传感器网络的动态性和资源有限等特点的问题,将人工免疫原理和多代理技术相结合,提出了一种适用于分簇式无线传感器网络的入侵检测机制(IMAIDM);给出了免疫Multi-Agent模型描述、Multi-Agent的功能定义以及相关算法。 相似文献
993.
Health Outcomes and Socio-economic Status Among the Elderly in China: Evidence from the CHARLS Pilot
John Strauss Xiaoyan Lei Albert Park Yan Shen James P. Smith Zhe Yang Yaohui Zhao 《Journal of population ageing》2010,3(3-4):111-142
We are concerned in this paper with measuring health outcomes among the elderly in Zhejiang and Gansu provinces, China, and examining the relationships between different dimensions of health status and measures of socio-economic status (SES). We are CHARLS pilot data to document health conditions, using a very rich set of health indicators that include both self-reported measures and biomarkers. We also examine correlations between these health outcomes and two important indicators of socio-economic status (SES): education and log of per capita expenditure (log pce), our preferred measure of household resources. In general education tends to be positively correlated with better health outcomes, as it is in other countries. However, unmeasured community influences turn out to be highly important, much more so than one usually finds in other countries. While it is not yet clear which aspects of communities matter and why they matter, we set up an agenda for future research on this topic. We also find a large degree of under-diagnosis of hypertension, a major health problems that afflicts the aged. This implies that the current health system is not well prepared to address the rapid aging of the Chinese population, at least not in Gansu and Zhejiang. 相似文献
994.
In this paper, we consider Kalman filtering over a packet-delaying network. Given the probability distribution of the delay, we can characterize the filter performance via a probabilistic approach. We assume that the estimator maintains a buffer of length D so that at each time k, the estimator is able to retrieve all available data packets up to time k−D+1. Both the cases of sensor with and without necessary computation capability for filter updates are considered. When the sensor has no computation capability, for a given D, we give lower and upper bounds on the probability for which the estimation error covariance is within a prescribed bound. When the sensor has computation capability, we show that the previously derived lower and upper bounds are equal to each other. An approach for determining the minimum buffer length for a required performance in probability is given and an evaluation on the number of expected filter updates is provided. Examples are provided to demonstrate the theory developed in the paper. 相似文献
995.
Automatic human face detection from video sequences is an important component of intelligent human computer interaction systems for video surveillance, face recognition, emotion recognition and face database management. This paper proposes an automatic and robust method to detect human faces from video sequences that combines feature extraction and face detection based on local normalization, Gabor wavelets transform and Adaboost algorithm. The key step and the main contribution of this work is the incorporation of a normalization technique based on local histograms with optimal adaptive correlation (OAC) technique to alleviate a common problem in conventional face detection methods: inconsistent performance due to sensitivity to variation illuminations such as local shadowing, noise and occlusion. The approach uses a cascade of classifiers to adopt a coarse-to-fine strategy for achieving higher detection rates with lower false positives. The experimental results demonstrate a significant performance improvement gains and achieved by local normalization over methods without normalizations in real video sequences with a wide range of facial variations in color, position, scale, and varying lighting conditions. 相似文献
996.
Generalized honeycomb torus (GHT) is recognized as an attractive alternative to existing torus interconnection networks in parallel computing systems. Assume that m and d are integers with m ? 2 and d ? 8. This paper addresses the fault-tolerant hamiltonicity of GHT(m, 2d, d) with fault set F = {(w, y), (x, y)}, where w < x, w + y is even and x + y is odd. We show that such a faulty GHT is hamiltonian by presenting a systematic method for constructing a fault-free hamiltonian cycle. This result reveals another appealing feature of GHTs. 相似文献
997.
This paper presents an interpolating ternary butterfly subdivision scheme for triangular meshes based on a 1–9 splitting operator. The regular rules are derived from a C2 interpolating subdivision curve, and the irregular rules are established through the Fourier analysis of the regular case. By analyzing the eigenstructures and characteristic maps, we show that the subdivision surfaces generated by this scheme is C1 continuous up to valence 100. In addition, the curvature of regular region is bounded. Finally we demonstrate the visual quality of our subdivision scheme with several examples. 相似文献
998.
Qinghai Xiao Yunzhou Li Ming Zhao Shidong Zhou Jing Wang 《Computer Communications》2009,32(18):1914-1922
In this work, we consider a cognitive radio system with multiple primary channels and one secondary user, and then we introduce a channel-usage pattern model and some basic concepts in this system. Based on this system model and the basic concepts, we propose two opportunistic channel selection algorithms to optimize the throughput of the secondary user: minimum collision rate channel selection algorithm and minimum handoff rate channel selection algorithm. According to the two algorithms, we, respectively, present the channel selection scheme based on minimum collision rate algorithm (CSS-MCRA) and the channel selection scheme based on minimum handoff rate algorithm (CSS-MHRA) under the constraint that the collision probability is bounded below collision tolerable level. Theoretical analysis and simulation results both show that, on one hand, both CSS-MCRA scheme and CSS-MHRA can follow the constraint of collision tolerable level; on the other hand, the performance of CSS-MCRA scheme is better than that of CSS-MHRA scheme if handoff latency is zero or very low, while the performance of CSS-MHRA scheme is better than that of CSS-MCRA scheme if handoff latency is long enough. 相似文献
999.
1000.
Tongqing Qiu Edward Chan Mao Ye Guihai Chen Ben Y. Zhao 《The Journal of supercomputing》2009,48(1):15-42
A self-organizing peer-to-peer system is built upon an application level overlay, whose topology is independent of an underlying
physical network. A well-routed message path in such systems may result in a long delay and excessive traffic due to the mismatch
between logical and physical networks. In order to solve this problem, we present a family of Peer-exchange Routing Optimization
Protocols (PROP) to reconstruct the overlay. It includes two policies: PROP-G for generic condition and PROP-O for optimized
one. Both theoretical analysis and simulation experiments show that these two protocols greatly reduce the average latency
of the overlay and achieve a better logical topology with low overhead. Their overall performance can be further improved
if combined with other recent approaches. Specifically, PROP-G can be easily applied to both structured and unstructured systems
without the loss of their primary characteristics, such as efficient routing and anonymity. PROP-O, on the other hand, is
more efficient, especially in a heterogenous environment where nodes have different processing capabilities.
相似文献
Edward ChanEmail: |