全文获取类型
收费全文 | 88231篇 |
免费 | 7080篇 |
国内免费 | 2806篇 |
专业分类
电工技术 | 4501篇 |
技术理论 | 10篇 |
综合类 | 4675篇 |
化学工业 | 15741篇 |
金属工艺 | 4525篇 |
机械仪表 | 5436篇 |
建筑科学 | 7058篇 |
矿业工程 | 2001篇 |
能源动力 | 2602篇 |
轻工业 | 5098篇 |
水利工程 | 1459篇 |
石油天然气 | 4564篇 |
武器工业 | 489篇 |
无线电 | 10789篇 |
一般工业技术 | 11725篇 |
冶金工业 | 4841篇 |
原子能技术 | 945篇 |
自动化技术 | 11658篇 |
出版年
2024年 | 992篇 |
2023年 | 1606篇 |
2022年 | 2381篇 |
2021年 | 3294篇 |
2020年 | 2599篇 |
2019年 | 2077篇 |
2018年 | 2341篇 |
2017年 | 2597篇 |
2016年 | 2445篇 |
2015年 | 2998篇 |
2014年 | 4076篇 |
2013年 | 5112篇 |
2012年 | 5274篇 |
2011年 | 5550篇 |
2010年 | 4921篇 |
2009年 | 4735篇 |
2008年 | 4488篇 |
2007年 | 4426篇 |
2006年 | 4675篇 |
2005年 | 4156篇 |
2004年 | 2797篇 |
2003年 | 2512篇 |
2002年 | 2205篇 |
2001年 | 2026篇 |
2000年 | 2289篇 |
1999年 | 2570篇 |
1998年 | 2412篇 |
1997年 | 1906篇 |
1996年 | 1757篇 |
1995年 | 1460篇 |
1994年 | 1232篇 |
1993年 | 892篇 |
1992年 | 659篇 |
1991年 | 545篇 |
1990年 | 420篇 |
1989年 | 374篇 |
1988年 | 322篇 |
1987年 | 178篇 |
1986年 | 169篇 |
1985年 | 120篇 |
1984年 | 106篇 |
1983年 | 67篇 |
1982年 | 63篇 |
1981年 | 57篇 |
1980年 | 41篇 |
1979年 | 32篇 |
1978年 | 18篇 |
1977年 | 38篇 |
1976年 | 21篇 |
1975年 | 15篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
An efficient t‐out‐of‐n oblivious transfer for information security and privacy protection 下载免费PDF全文
In t‐out‐of‐n oblivious transfer (OT), the receiver can only receive t messages out of n messages sent by the sender, and the sender has no idea about which ones have been received. Majority of the existence of previous efficient OT schemes require t calls of 1‐out‐of‐n OT to construct the t‐out‐of‐n OT. Its computational requirements and bandwidth consumption are quite demanding. On the basis of the elliptic curves cryptography, we propose a new t‐out‐of‐n OT protocol for private information retrieval in this article. It is more suitable for the smart cards or mobile units. Copyright © 2013 John Wiley & Sons, Ltd. 相似文献
992.
This paper presents a non-parametric topic model that captures not only the latent topics in text collections, but also how the topics change over space. Unlike other recent work that relies on either Gaussian assumptions or diseretization of locations, here topics are associated with a distance dependent Chinese Restaurant Process (ddCRP), and for each document, the observed words are influenced by the document's GPS-tag. Our model allows both unbound number and flexible distribution of the geographical variations of the topics' content. We develop a Gibbs sampler for the proposal, and compare it with existing models on a real data set basis. 相似文献
993.
994.
为了使温度循环试验在有效提高电子组件的可靠性方面得以广泛应用,基于温度循环试验的机理,对电子组件温度循环试验的关键参数(温度范围、循环次数、保持时间、温变速率、风速)进行了探讨,给出了这些参数的工程经验选取值。在此基础上,借助热分析软件分析了温变速率、保持时间和风速三个参数对试验过程的影响并定性分析了三个参数间的关系。最后,提出了进行温度循环试验时应注意的问题,强调科学、正确地执行温度循环试验的重要性。 相似文献
995.
996.
Yao-Tang Chang Jen-Fa Huang Chih-Ta Yen Chuen-Ching Wang Hsu-Chih Cheng Kai-chun Hsu 《Optical Fiber Technology》2010,16(2):114-123
This paper exploits the inherent cyclic and periodic free-spectral-range (FSR) properties of arrayed-waveguide grating (AWG) routers to construct a two-dimensional (2D) time-spreading and wavelength-group-hopping embedded M-sequence code for optical multiple-access networks. In the proposed codecs (encoder/decoder), a fine arrayed-waveguide grating (AWG) is used to generate an M-sequence code pattern, which is then spread in the wavelength domain by multiple coarse AWGs. The signals produced at the output ports of the coarse AWGs are then spread in the time domain using optical delay lines. The 2D code is evaluated in terms of its correlation, bit-error-rate (BER) and cardinality characteristics. It is shown that the TS/GH embedded M-sequence code yields a significant improvement in both the BER and cardinality performance of the optical multiple-access networks compared to that obtained using conventional prime-hop code (PHC), modified prime-hop code (MPHC), Barker and Walsh-based bipolar–bipolar sequence. 相似文献
997.
Der‐Jiunn Deng Chih‐Heng Ke Han‐Chien Chao Yueh‐Min Huang 《Wireless Communications and Mobile Computing》2010,10(11):1509-1520
CBR (constant bit rate) traffic is expected to be an important traffic source in wireless networks. Such sources usually have stringent jitter or delay requirements and in many cases they should be delivered exactly as they were generated. In this paper, we propose a strictly guaranteed QoS (quality‐of‐service) provisioning CAC (call admission control) scheme with a polling‐based scheduling policy for CBR traffic in IEEE 802.11e wireless LANs. Under such a scheme, the proposed transmit‐permission policy for HCCA (HCF controlled channel access) method can forecast the maximum suffered delay for each packet and derive sufficient conditions so that all the CBR sources satisfy their time constraints to provide deterministic QoS guarantees. A simple analytical model is carried out to estimate the average queueing delay of the proposed scheme. In addition to theoretical analysis, simulations are conducted to validate its promising performance. Our simulation results show that the proposed scheme maintains a high throughput with respect to the whole range of system load. Copyright © 2009 John Wiley & Sons, Ltd. 相似文献
998.
为保障广播电视节目的安全播出,对值班人员的日常培训和考核十分重要。针对目前在播出设备上实际操作练习的弊端,本文设计并实现了一种基于计算机技术的广播电视仿真综合培训平台,该平台构建了一整套无线发射台站的仿真系统,通过在计算机上模拟真实设备的操作,达到培训和考核值班人员的目的。 相似文献
999.
The working state(WS) evaluation is a valuable task in the process of failure diagnosis in the analogue circuits. A fuzzy evaluating algorithm was proposed to quantify the working condition of analogue circuit regarded as fuzzy system. Several familiar WS evaluating functions based on fuzzy membership functions were also proposed to calculate the local working state indexes(WSI) of each node in an analogue circuit. The decision function combined with the WS evaluating functions is used to synthesize all the local WSI to the global WSI of the whole circuit. An example was presented to verify that the working status of the analogue circuits can be described by the new WS evaluating algorithm and the global WSI objectively and accurately. 相似文献
1000.
传统通信时代,公司大抵都是围绕语音/短信进行的业务发展,支撑手段也常来自对用户自身通话行为、套餐属性等进行的分析。而进入移动互联时代之后,运营商除了继续保有原有的传统业务,更是大力发展了自有的移动互联网业务。在自有移动互联网业务的发展过程中,我们越发感觉基于传统的用户通话行为、基本套餐等数据的分析对自有互联网业务支撑乏力。最大的局限莫过于对用户在移动互联网上的行为分析,如对业务的喜好,上网规律等,这些行为是传统数据无法支撑的,而这些数据恰恰对于发展公司自有业务具有极其重要作用。通过对信令测试数据中用户的互联网行为进行了分析、建模,支撑新形势下的自有业务互联营销。 相似文献