全文获取类型
收费全文 | 2834篇 |
免费 | 184篇 |
国内免费 | 1篇 |
专业分类
电工技术 | 38篇 |
化学工业 | 790篇 |
金属工艺 | 50篇 |
机械仪表 | 128篇 |
建筑科学 | 131篇 |
矿业工程 | 8篇 |
能源动力 | 116篇 |
轻工业 | 453篇 |
水利工程 | 18篇 |
石油天然气 | 12篇 |
无线电 | 191篇 |
一般工业技术 | 375篇 |
冶金工业 | 95篇 |
原子能技术 | 12篇 |
自动化技术 | 602篇 |
出版年
2024年 | 27篇 |
2023年 | 48篇 |
2022年 | 75篇 |
2021年 | 158篇 |
2020年 | 125篇 |
2019年 | 132篇 |
2018年 | 110篇 |
2017年 | 115篇 |
2016年 | 125篇 |
2015年 | 98篇 |
2014年 | 142篇 |
2013年 | 244篇 |
2012年 | 179篇 |
2011年 | 216篇 |
2010年 | 174篇 |
2009年 | 160篇 |
2008年 | 120篇 |
2007年 | 124篇 |
2006年 | 109篇 |
2005年 | 79篇 |
2004年 | 63篇 |
2003年 | 53篇 |
2002年 | 54篇 |
2001年 | 32篇 |
2000年 | 33篇 |
1999年 | 23篇 |
1998年 | 19篇 |
1997年 | 22篇 |
1996年 | 20篇 |
1995年 | 16篇 |
1994年 | 14篇 |
1993年 | 16篇 |
1992年 | 5篇 |
1991年 | 6篇 |
1990年 | 5篇 |
1989年 | 5篇 |
1988年 | 6篇 |
1987年 | 4篇 |
1986年 | 8篇 |
1985年 | 7篇 |
1984年 | 9篇 |
1983年 | 13篇 |
1982年 | 5篇 |
1981年 | 3篇 |
1978年 | 5篇 |
1977年 | 3篇 |
1976年 | 2篇 |
1975年 | 3篇 |
1970年 | 2篇 |
1968年 | 1篇 |
排序方式: 共有3019条查询结果,搜索用时 15 毫秒
21.
Recently, preemption techniques have attracted considerable attention as a means to provide differentiated quality of service
in optical burst switching (OBS) networks. This paper is focused on the analysis of preemption probabilities for bursts within
the same priority class. As proposed by Vokkarane and Jue ((2003)* IEEE J Select Areas Commun 21(7): 1198–1209) an incoming
burst will preempt the burst in service, within the same priority class, if the residual length of the burst in service is
smaller than the incoming burst length. For a general case with wavelength conversion, the preemption probability of contending
bursts with a generic service distribution, not necessarily exponential, is analyzed. First, we show that the size distribution
for the preempting bursts is shifted to larger values, in comparison to the original burst size distribution. Second, we obtain
an upper and lower bound for the preemption probability. Finally, the asymptotic behavior of the OBS switch is analyzed showing
that preemption will always occur for a very large number of wavelengths. 相似文献
22.
The degradation of end-to-end quality of service (QoS) on mobile users is becoming a common issue for IEEE 802.11 infrastructure-based networks in crowded areas. This research tackles the issue by employing an SDN framework on an integrated wireless/wired environment. Thereby, we present the development and implementation of a system that performs user management by analyzing the network load from the OpenFlow statistics, as well as the wireless information collected from the associated users. In order to analyse the behaviour of the proposed user migration algorithm, we evaluate the system under scenarios with different traffic load and user session duration. From the experiments, we observed that in several cases wireless users get a considerable QoS improvement at the application layer (up to 30% improvement in throughput and up to 20% in delay in our simulations) once the system is activated. Based on the results, we present an analysis on how and when user migration in multi-access point IEEE 802.11 networks can be most effective. 相似文献
23.
This paper presents a test platform for the scale modeling of electromagnetic pulse effects. The different elements of the installation, i.e. a vertical conical antenna placed on a metallic reference plane, a fast rise time supply generator and a data acquisition and processing facility are described. The field of the antenna has also been studied using a Numerical Electromagnetic Code (Nec)based on the moments method and a comparison with the measurements has been performed. Conclusions resulting from this first stage in the construction of the scale modeling installation are presented. 相似文献
24.
Eduardo Pompeo da Silva Mineiro Débora Christina Muchaluat-Saade 《International Journal of Wireless Information Networks》2014,21(3):223-237
This work presents an admission control mechanism for multi-hop wireless mesh networks based on the IEEE 802.11 standard and the OLSR routing protocol. This mechanism, called CAC-OLSR, aims at ensuring that traffic flows with quality of service (QoS) requirements, especially voice and video, are only admitted in the mesh network if it has available resources in order to provide flow requirements. In addition, QoS requirements of previously admitted traffic flows cannot be violated. The proposal was evaluated with NS-2 and Evalvid simulations. 相似文献
25.
26.
Raimundo Barreto Paulo Maciel Eduardo Tavares Romulo Devezas Freitas Meuse Oliveira Ricardo Massa Lima 《Design Automation for Embedded Systems》2008,12(1-2):31-62
Over the last few years, embedded software synthesis has drawn much attention. However, few works deal with software synthesis for hard real-time systems considering arbitrary inter-tasks precedence and exclusion relations. Code generation for meeting all timing and resource constraints is not a trivial task. Thus, this research area has several open issues, mainly related to generation of predictable-guaranteed scheduled code. The method proposed in this paper starts from a high-level specification, and automatically translates such specification into a time Petri net model; this model is adopted for finding a feasible static schedule meeting all constraints. If found, the approach generates a scheduled code, based on the found feasible schedule. Therefore, the user just enter the specification and receives, as result, the scheduled code. Thus, all intermediary phases are hidden from the users. 相似文献
27.
Vitalio A. Reguera Evelio M. G. Fernandez Felix A. Paliza Walter Godoy Jr. Eduardo P. Ribeiro 《电信纪事》2009,64(3-4):225-237
This paper assesses the impact of active queue management schemes on the quality of service of voice over Internet protocol applications. A new analytical method based on a fixed point approach to estimate the end-user satisfaction is proposed. The results obtained were validated using discrete event simulation techniques. In all the studied cases, it was observed a great deal of agreement between the analytical results and the results obtained through simulation. The theoretical predictions, as well as the presented empirical evidences confirm, as demonstrated in previous works, that the use of active queue management offers better quality of service than the traditional queue control mechanisms used in Internet. From these results, we may reasonably conclude that the presented method can be used for network design in the presence of voice traffic. 相似文献
28.
An accurate mapping of Internet traffic to applications can be important for a broad range of network management and measurement tasks, including traffic engineering, service differentiation, performance/failure monitoring and security. Traditional mapping approaches have become increasingly inaccurate because many applications use non-default or ephemeral port numbers, use well-known port numbers associated with other applications, change application signatures or use traffic encryption. In this paper we will demonstrate that multiscale traffic analysis based on multi-order wavelet spectrum can be used as a discriminator of Internet applications traffic profiles. By performing clustering analysis over the multiscale wavelet spectrum coefficients that are inferred from the measured traffic, the proposed methodology is able to efficiently differentiate different IP applications without using any payload information. This characteristic will allow the differentiation of traffic flows in unencrypted and encrypted scenarios. In order to compare the differentiating potential of different traffic application data, upload, download and joint upload and download flow statistics are considered to evaluate the identification approach for each selected protocol. Moreover, we also evaluate which timescales and spectrum orders are more relevant for the traffic differentiation. From the analysis of the obtained results we can conclude that the proposed methodology is able to achieve good identification results using a small set of timescales of a single order wavelet spectrum of a general raw traffic statistic. 相似文献
29.
Eduardo Arias‐Egido María Angeles Laguna‐Marco Cristina Piquer Roberto Boada Sofía Díaz‐Moreno 《Advanced functional materials》2019,29(10)
Amorphous and polycrystalline Sn‐doped IrO2 thin films, Ir1‐xSnxO2, are grown for the first time. Their electrical response and strength of the spin–orbit coupling are studied in order to better understand and tailor its performance as spin current detector material. These experiments prove that the resistivity of IrO2 can be tuned over several orders of magnitude by controlling the doping content in both the amorphous and the polycrystalline state. In addition, growing amorphous samples increase the resistivity, thus improving the spin current to charge current conversion. As far as the spin–orbit coupling is concerned, the system not only remains in a strong spin–orbit coupling regime but it seems to undergo a slight enhancement in the amorphous state as well as in the Sn‐doped samples. 相似文献
30.
Ricardo Schumacher Eduardo G. Lima Gustavo H. C. Oliveira 《Circuits, Systems, and Signal Processing》2016,35(7):2298-2316
In this paper, a Takenaka–Malmquist–Volterra (TMV) model structure is employed to improve the approximations in the low-pass equivalent behavioral modeling of radio frequency (RF) power amplifiers (PAs). The Takenaka–Malmquist basis generalizes the orthonormal basis functions previously used in this context. In addition, it allows each nonlinearity order in the expanded Volterra model to be parameterized by multiple complex poles (dynamics). The state-space realizations for the TMV models are introduced. The pole sets for the TMV model and also for the previous Laguerre–Volterra (LV) and Kautz–Volterra (KV) models are obtained using a constrained nonlinear optimization approach. Based on experimental data measured on a GaN HEMT class AB RF PA excited by a WCDMA signal, it is observed that the TMV model reduces the normalized mean-square error and the adjacent channel error power ratio for the upper adjacent channel (upper ACEPR) by 1.6 dB when it is compared to the previous LV and KV models under the same computational complexity. 相似文献