全文获取类型
收费全文 | 8958篇 |
免费 | 679篇 |
国内免费 | 291篇 |
专业分类
电工技术 | 372篇 |
综合类 | 353篇 |
化学工业 | 1653篇 |
金属工艺 | 425篇 |
机械仪表 | 642篇 |
建筑科学 | 751篇 |
矿业工程 | 241篇 |
能源动力 | 242篇 |
轻工业 | 635篇 |
水利工程 | 105篇 |
石油天然气 | 543篇 |
武器工业 | 60篇 |
无线电 | 1067篇 |
一般工业技术 | 1317篇 |
冶金工业 | 446篇 |
原子能技术 | 101篇 |
自动化技术 | 975篇 |
出版年
2024年 | 33篇 |
2023年 | 171篇 |
2022年 | 270篇 |
2021年 | 366篇 |
2020年 | 287篇 |
2019年 | 256篇 |
2018年 | 277篇 |
2017年 | 336篇 |
2016年 | 310篇 |
2015年 | 320篇 |
2014年 | 479篇 |
2013年 | 549篇 |
2012年 | 558篇 |
2011年 | 687篇 |
2010年 | 536篇 |
2009年 | 526篇 |
2008年 | 503篇 |
2007年 | 431篇 |
2006年 | 422篇 |
2005年 | 362篇 |
2004年 | 259篇 |
2003年 | 230篇 |
2002年 | 188篇 |
2001年 | 180篇 |
2000年 | 163篇 |
1999年 | 257篇 |
1998年 | 183篇 |
1997年 | 176篇 |
1996年 | 126篇 |
1995年 | 100篇 |
1994年 | 85篇 |
1993年 | 59篇 |
1992年 | 41篇 |
1991年 | 43篇 |
1990年 | 28篇 |
1989年 | 26篇 |
1988年 | 19篇 |
1987年 | 21篇 |
1986年 | 12篇 |
1985年 | 8篇 |
1984年 | 8篇 |
1983年 | 3篇 |
1982年 | 5篇 |
1981年 | 5篇 |
1980年 | 5篇 |
1977年 | 2篇 |
1976年 | 5篇 |
1975年 | 2篇 |
1972年 | 2篇 |
1968年 | 2篇 |
排序方式: 共有9928条查询结果,搜索用时 15 毫秒
121.
122.
Xia Li Peng-Yong Kong Kee-Chaing Chua 《Mobile Computing, IEEE Transactions on》2007,6(12):1329-1342
We propose a packet-level model to investigate the impact of channel error on the transmission control protocol (TCP) performance over IEEE-802.11-based multihop wireless networks. A Markov renewal approach is used to analyze the behavior of TCP Reno and TCP Impatient NewReno. Compared to previous work, our main contributions are listed as follows: 1) modeling multiple lossy links, 2) investigating the interactions among TCP, Internet Protocol (IP), and media access control (MAC) protocol layers, specifically the impact of 802.11 MAC protocol and dynamic source routing (DSR) protocol on TCP throughput performance, 3) considering the spatial reuse property of the wireless channel, the model takes into account the different proportions between the interference range and transmission range, and 4) adopting more accurate and realistic analysis to the fast recovery process and showing the dependency of throughput and the risk of experiencing successive fast retransmits and timeouts on the packet error probability. The analytical results are validated against simulation results by using GloMoSim. The results show that the impact of the channel error is reduced significantly due to the packet retransmissions on a per-hop basis and a small bandwidth delay product of ad hoc networks. The TCP throughput always deteriorates less than ~ 10 percent, with a packet error rate ranging from 0 to 0.1. Our model also provides a theoretical basis for designing an optimum long retry limit for IEEE 802.11 in ad hoc networks. 相似文献
123.
采用解析的方法计算了在基区掺杂为高斯分布,Ge组分分布为三角形分布和矩形三角形分布时基区内建电场的变化情况.重新拟合了价带有效态密度公式,并在计算内建电场时考虑了导带有效态密度的影响.发现加入Ge组分后引起的导带有效态密度变化、价带有效态密度变化以及禁带宽度变窄量变化对基区内建电场的影响要大于掺杂对内建电场的影响.Ge组分为三角形分布时,在总的Ge组分一定的条件下,内建电场从发射结到集电结逐渐变大.在任一给定位置x处,内建电场随着Ge组分的增加而增大.当Ge组分分布为矩形三角形分布时,对于给定的Ge组分转折点x1,基区内建电场从发射结到集电结缓慢地增大.在Ge组分恒定的区域,内建电场变化甚微,在Ge组分为线性缓变区域的同一位置x处,内建电场随Ge组分转折点x1的增大而缓慢地增大.此外,在x1附近内建电场变化有一个很大的陡坡. 相似文献
124.
In this paper, we propose and analyze the integration of source and jammer for a decode-and-forward two-way scheme under physical layer security where the source nodes not only transmit data signals, but also transmit jamming signals to degrade the quality of eavesdropping links, and a selected relay forwards the combined data signals using an XOR operation. In this proposed protocol, the best relay is chosen by the maximum end-to-end achievable secrecy rate, and the secrecy system performance is evaluated by the exact and asymptotic secrecy outage probability over flat and block Rayleigh fading channels. The Monte-Carlo results are presented to verify the theoretical analysis. 相似文献
125.
Qi Wang Jian‐Fang Wu Ziheng Lu Francesco Ciucci Wei Kong Pang Xin Guo 《Advanced functional materials》2019,29(37)
Owing to the nonleakage and incombustibility, solid electrolytes are crucial for solving the safety issues of rechargeable lithium batteries. In this work, a new class of solid electrolyte, acceptor‐doped LiTaSiO5, is designed and synthesized based on the concerted migration mechanism. When Zr4+ is doped to the Ta5+ sites in LiTaSiO5, the high‐energy lattice sites are partly occupied by the introduced lithium ions, and the lithium ions at those sites interact with the lithium ions placed in the low‐energy sites, thereby favoring the concerted motion of lithium ions and lowering the energy barrier for ion transport. Therefore, the concerted migration of lithium ions occurs in Zr‐doped LiTaSiO5, and a 3D lithium‐ion diffusion network is established with quasi‐1D chains connected through interchain channels. The lithium‐ion occupation, as revealed by ab initio calculations, is validated by neutron powder diffraction. Zr‐doped LiTaSiO5 electrolytes are successfully synthesized; Li1.1Ta0.9Zr0.1SiO5 shows a conductivity of 2.97 × 10?5 S cm?1 at 25 °C, about two orders of magnitude higher than that of LiTaSiO5, and it increases to 3.11 × 10?4 S cm?1 at 100 °C. This work demonstrates the power of theory in designing new materials. 相似文献
126.
介绍了具有多层涂膜的塑料基片,它们对于潮气和氧具有足够的不可渗透性,可用于对潮气灵敏的显示器,譬如LCD,小分子有机半导体发光二极管显示器和聚合物半导体发光二极管显示器. 相似文献
127.
熔石英玻璃激光损伤的三维应力场研究 总被引:1,自引:0,他引:1
为了研究CO2激光损伤后熔石英玻璃内部的三维应力场分布,采用脉冲CO2激光与熔石英玻璃相互作用的有限元数值模型,计算了脉冲激光停止时熔石英玻璃内部的温度分布,并研究了材料冷却后的内部三维应力分布和表面初始损伤形貌,计算结果与实验结果吻合。以该模型为基础,详细分析了径向和环向应力的三维分布,结果表明,在损伤凹坑附近,径向应力表现为压应力,且在凹坑底部附近取得最大值后,径向应力沿深度方向逐渐转化为拉应力;损伤凹坑附近的环向应力与径向应力相似,均表现为压应力,但压应力沿径向逐渐转化为拉应力,不同深度处的环向应力沿轴向增至最大后逐渐减小。另外,脉冲激光能量的增大导致径向应力与环向应力及其影响范围均有明显增加。研究结果有助于分析激光损伤熔石英玻璃内部的三维应力场,为CO2激光修复工艺的改进提供了理论依据。 相似文献
128.
129.
130.
We consider large-scale wireless sensor networks with η nodes, out of which κ are in possession, (e.g., have sensed or collected in some other way) κ information packets. In the scenarios in which network nodes are vulnerable because of, for example, limited energy or a hostile environment, it is desirable to disseminate the acquired information throughout the network so that each of the η nodes stores one (possibly coded) packet so that the original κ source packets can be recovered, locally and in a computationally simple way from any κ(1 + ϵ) nodes for some small ϵ > 0. We develop decentralized Fountain codes based algorithms to solve this problem. Unlike all previously developed schemes, our algorithms are truly distributed, that is, nodes do not know η, κ or connectivity in the network, except in their own neighborhoods, and they do not maintain any routing tables. 相似文献