全文获取类型
收费全文 | 67354篇 |
免费 | 6442篇 |
国内免费 | 3405篇 |
专业分类
电工技术 | 4228篇 |
技术理论 | 2篇 |
综合类 | 4518篇 |
化学工业 | 10288篇 |
金属工艺 | 3808篇 |
机械仪表 | 4458篇 |
建筑科学 | 5441篇 |
矿业工程 | 1885篇 |
能源动力 | 1789篇 |
轻工业 | 4551篇 |
水利工程 | 1412篇 |
石油天然气 | 3138篇 |
武器工业 | 622篇 |
无线电 | 9071篇 |
一般工业技术 | 7776篇 |
冶金工业 | 3816篇 |
原子能技术 | 750篇 |
自动化技术 | 9648篇 |
出版年
2024年 | 298篇 |
2023年 | 1184篇 |
2022年 | 2284篇 |
2021年 | 3028篇 |
2020年 | 2293篇 |
2019年 | 1826篇 |
2018年 | 1936篇 |
2017年 | 2287篇 |
2016年 | 2077篇 |
2015年 | 2965篇 |
2014年 | 3629篇 |
2013年 | 4457篇 |
2012年 | 4696篇 |
2011年 | 5208篇 |
2010年 | 4513篇 |
2009年 | 4460篇 |
2008年 | 4396篇 |
2007年 | 3915篇 |
2006年 | 3608篇 |
2005年 | 2910篇 |
2004年 | 1911篇 |
2003年 | 1573篇 |
2002年 | 1434篇 |
2001年 | 1328篇 |
2000年 | 1145篇 |
1999年 | 1158篇 |
1998年 | 1266篇 |
1997年 | 929篇 |
1996年 | 829篇 |
1995年 | 734篇 |
1994年 | 553篇 |
1993年 | 483篇 |
1992年 | 316篇 |
1991年 | 278篇 |
1990年 | 199篇 |
1989年 | 166篇 |
1988年 | 144篇 |
1987年 | 99篇 |
1986年 | 92篇 |
1985年 | 93篇 |
1984年 | 52篇 |
1983年 | 52篇 |
1982年 | 62篇 |
1981年 | 51篇 |
1980年 | 50篇 |
1979年 | 36篇 |
1977年 | 26篇 |
1976年 | 48篇 |
1975年 | 19篇 |
1973年 | 20篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
61.
Multichannel security protocols transmit messages over multiple communication channels, taking into account each channel's security properties. Our first intentional use of these protocols goes back to a 1999 article that proposed physical contact for imprinting as opposed to the wireless channel used in subsequent operations. Only later did we understand three key points. First, explicit use of multiple channels in the same protocol can offer significant advantages for both security and usability. Second, explicitly stating the properties of the channel on which each protocol message is transmitted is useful for understanding one's own protocol in greater depth and therefore for addressing subtle vulnerabilities early on. Third, multichannel protocols existed long before we recognized them as such - think of the courier handcuffed to the briefcase carrying the code book that will later protect postal or telegraphic traffic. The paper presents a security protocol that exploit additional transmissions over lower-capacity channels, typically found in ubicomp environments, that offer a different combination of security properties. 相似文献
62.
63.
Analysis and synthesis of on-chip spiral inductors 总被引:3,自引:0,他引:3
This paper presents a physically based compact model for estimating high-frequency performance of spiral inductors. The model accurately accounts for skin and proximity effects in the metal conductors as well as eddy current losses in the substrate. The model shows excellent agreement with measured data mostly within 10% across a variety of inductor geometries and substrate dopings up to 20 GHz. A web-based spiral inductor synthesis and analysis tool COILS, which makes use of the compact models, is presented. An optimization algorithm using binary searches speeds up the synthesis of inductor designs. 相似文献
64.
梁昔明 《中南工业大学学报(英文版)》2005,12(1):93-96
An active set truncated-Newton algorithm (ASTNA) is proposed to solve the large-scale bound constrained sub-problems. The global convergence of the algorithm is obtained and two groups of numerical experiments are made for the various large-scale problems of varying size. The comparison results between ASTNA and the subspace limited memory quasi-Newton algorithm and between the modified augmented Lagrange multiplier methods combined with ASTNA and the modified barrier function method show the stability and effectiveness of ASTNA for simultaneous optimization of distillation column. 相似文献
65.
梁民基 《小型微型计算机系统》1994,15(12):41-46
本文给出了作者开发的一个单处理机实时多任务操作系统的响应性能(响应时间,同步时间)的实验结果和/或估算。与国外同期文献发表的数据相比,指标先进。 相似文献
66.
Performance model of interactive video-on-demand systems 总被引:5,自引:0,他引:5
Li V.O.K. Wanjiun Liao Xiaoxin Qiu Wong E.W.M. 《Selected Areas in Communications, IEEE Journal on》1996,14(6):1099-1109
An interactive video-on-demand (VoD) system allows users to access video services, such as movies, electronic encyclopedia, interactive games, and educational videos from video servers on a broadband network. This paper develops a performance evaluation tool for the system design. In particular, a user activity model is developed to describe the usage of system resources, i.e., network bandwidth and video server usage, by a user as it interacts with the service. In addition, we allow batching of user requests, and the effect of such batching is captured in a batching model. Our proposed queueing model integrates both the user activity and the batching model. This model can be used to determine the requirements of network bandwidth and video server and, hence, the trade-off in communication and storage costs for different system resource configurations 相似文献
67.
HS Wong 《Canadian Metallurgical Quarterly》1997,38(11):459-464
68.
69.
A genetic algorithm for multiple molecular sequence alignment 总被引:1,自引:0,他引:1
MOTIVATION: Multiple molecular sequence alignment is among the most important and most challenging tasks in computational biology. The currently used alignment techniques are characterized by great computational complexity, which prevents their wider use. This research is aimed at developing a new technique for efficient multiple sequence alignment. APPROACH: The new method is based on genetic algorithms. Genetic algorithms are stochastic approaches for efficient and robust searching. By converting biomolecular sequence alignment into a problem of searching for optimal or near-optimal points in an 'alignment space', a genetic algorithm can be used to find good alignments very efficiently. RESULTS: Experiments on real data sets have shown that the average computing time of this technique may be two or three orders lower than that of a technique based on pairwise dynamic programming, while the alignment qualities are very similar. AVAILABILITY: A C program on UNIX has been written to implement the technique. It is available on request from the authors. 相似文献
70.
本文介绍了广播发射台利用计算机技术、网络技术、遥控遥测技术、现代测试手段,对设备进行自动化控制与管理;实现设备技术指标自动测试,发射台无人值班、有人留守,建立机器的计算机档案制度,确保安全优质播出的方法和经验。 相似文献