全文获取类型
收费全文 | 5696篇 |
免费 | 226篇 |
国内免费 | 28篇 |
专业分类
电工技术 | 79篇 |
综合类 | 12篇 |
化学工业 | 1114篇 |
金属工艺 | 176篇 |
机械仪表 | 120篇 |
建筑科学 | 60篇 |
矿业工程 | 16篇 |
能源动力 | 376篇 |
轻工业 | 294篇 |
水利工程 | 39篇 |
石油天然气 | 21篇 |
无线电 | 736篇 |
一般工业技术 | 1313篇 |
冶金工业 | 783篇 |
原子能技术 | 43篇 |
自动化技术 | 768篇 |
出版年
2023年 | 84篇 |
2022年 | 118篇 |
2021年 | 198篇 |
2020年 | 159篇 |
2019年 | 146篇 |
2018年 | 202篇 |
2017年 | 190篇 |
2016年 | 217篇 |
2015年 | 128篇 |
2014年 | 212篇 |
2013年 | 466篇 |
2012年 | 239篇 |
2011年 | 281篇 |
2010年 | 242篇 |
2009年 | 296篇 |
2008年 | 210篇 |
2007年 | 156篇 |
2006年 | 149篇 |
2005年 | 127篇 |
2004年 | 110篇 |
2003年 | 113篇 |
2002年 | 104篇 |
2001年 | 79篇 |
2000年 | 71篇 |
1999年 | 82篇 |
1998年 | 163篇 |
1997年 | 122篇 |
1996年 | 135篇 |
1995年 | 94篇 |
1994年 | 94篇 |
1993年 | 97篇 |
1992年 | 64篇 |
1991年 | 86篇 |
1990年 | 73篇 |
1989年 | 52篇 |
1988年 | 51篇 |
1987年 | 49篇 |
1986年 | 49篇 |
1985年 | 51篇 |
1984年 | 39篇 |
1983年 | 39篇 |
1982年 | 28篇 |
1981年 | 40篇 |
1980年 | 23篇 |
1979年 | 33篇 |
1978年 | 33篇 |
1977年 | 30篇 |
1976年 | 36篇 |
1975年 | 16篇 |
1973年 | 13篇 |
排序方式: 共有5950条查询结果,搜索用时 15 毫秒
121.
Optimizing Safe Yield Policy Implementation 总被引:1,自引:1,他引:0
The presented method enhances groundwater-mandated safe yield management. It is useful for settings that prevent sustained
yield or integrated management. To protect hydraulically connected surface water rights, the Utah government’s Cache Valley
groundwater management plan proposes that total pumping increase not exceed 84,431 m3/day. To determine how best to spatially distribute additional allowable pumping, stakeholders quantified limits defining
acceptable impacts on selected water resource indicators. A new simulation–optimization (S–O) algorithm used these limits
while computing optimal spatially distributed perennial yield or safe yield groundwater pumping extraction strategies. The
limits prevent unacceptable decreases in: head and net flow between aquifer and surface waters (rivers, surface/subsurface
drains, springs, lakes). The optimization objective function maximizes weighted pumping to provide water for 18 growing municipalities.
For 16 perennial yield scenarios, computed optimal pumping increases differ in protectiveness toward senior water rights,
and range from 16% to 103% of the state plan-proposed increase. Implementing a protective strategy would achieve 90% of the
storage changes needed to reach equilibrium within 23 years. Indicator potentiometric heads would reach equilibrium within
10–40 years. At equilibrium, an optimal Cache Valley perennial yield strategy acceptably minimizes net annual non-pumping
discharges. By comparison, multi-period 20-year transient groundwater mining optimizations allow more pumping in early years.
Pumping then must decline to satisfy seepage and head constraints through year 20. Adverse seepage impact would increase for
years thereafter. For situations governed by safe or perennial yield policy, equilibrium-based (steady-state) optimization
is very useful. It effectively develops optimal perennial yield strategies. 相似文献
122.
Probir Saha Debashis Tarafdar Surjya K. Pal Partha Saha Ashok K. Srivastava Karabi Das 《Applied Soft Computing》2013,13(4):2065-2074
This paper proposed a Neuro-Genetic technique to optimize the multi-response of wire electro-discharge machining (WEDM) process. The technique was developed through hybridization of a radial basis function network (RBFN) and non-dominated sorting genetic algorithm (NSGA-II). The machining was done on 5 vol% titanium carbide (TiC) reinforced austenitic manganese steel metal matrix composite (MMC). The proposed Neuro-Genetic technique was found to be potential in finding several optimal input machining conditions which can satisfy wide requirements of a process engineer and help in efficient utilization of WEDM in industry. 相似文献
123.
We propose an optical scheme for quantum key distribution in which bits are encoded in relative phases of four bipartite weak coherent states ${|\alpha, \alpha\rangle, |-\alpha, -\alpha\rangle, |-\alpha, \alpha\rangle}$ and ${|\alpha, -\alpha \rangle}$ , with respect to a strong reference pulse. We discuss security of the scheme against eavesdropping strategies like, photon number splitting, photon beam splitting and intercept-resend attacks. It is found that present scheme is more sensitive against these eavesdropping strategies than the two-dimensional non-orthogonal state based protocol and BB84 protocol. Our scheme is very simple, requires only passive optical elements like beam splitters, phase shifters and photon detectors, hence is at the reach of presently available technology. 相似文献
124.
125.
Emergency medical service (EMS) providers continually seek ways to improve system performance particularly the response time to incidents. The demand for ambulances fluctuate throughout the week, depending on the day of week, and even the time of day, therefore EMS operators can improve system performance by dynamic relocation/redeployment of ambulances in response to fluctuating demand patters. The objective of the model is to determine the minimum number of ambulances and their locations for each time cluster in which significant changes in demand pattern occur while meeting coverage requirement with a predetermined reliability. The model is further enhanced by calculating ambulance specific busy probabilities and validated by a comprehensive simulation model. Computational results on experimental data sets and data from an EMS agency are provided. 相似文献
126.
Critical Density for Coverage and Connectivity in Three-Dimensional Wireless Sensor Networks Using Continuum Percolation 总被引:3,自引:0,他引:3
Although most of the studies on coverage and connectivity in wireless sensor networks (WSNs) considered two-dimensional (2D) settings, such networks can in reality be accurately modeled in a three-dimensional (3D) space. The concepts of continuum percolation theory best fit the problem of connectivity in WSNs to find out whether the network provides long-distance multihop communication. In this paper, we focus on percolation in coverage and connectivity in 3D WSNs. We say that the network exhibits a coverage percolation (respectively, connectivity percolation) when a giant covered region (respectively, giant connected component) almost surely spans the entire network for the first time. Because of the dependency between coverage and connectivity, the problem is not only a continuum percolation problem but also an integrated continuum percolation problem. Thus, we propose an integrated-concentric-sphere model to address coverage and connectivity in 3D WSNs in an integrated way. First, we compute the critical density lambdaC con above which coverage percolation in 3D WSNs will almost surely occur. Second, we compute the critical density lambdac con above which connectivity percolation in 3D WSNs will almost surely occur. Third, we compute the critical density lambdac cov-con above which both coverage and connectivity percolation in 3D WSNs will almost surely occur. For each of these three problems, we also compute their corresponding critical network degree. Our results can be helpful in the design of energy-efficient topology control protocols for 3D WSNs in terms of coverage and connectivity. 相似文献
127.
Kundu Sumantra R. Pal Sourav Basu Kalyan Das Sajal K. 《Parallel and Distributed Systems, IEEE Transactions on》2009,20(1):111-123
In networks carrying large volume of traffic, accurate traffic characterization is necessary for understanding the dynamics and patterns of network resource usage. Previous approaches to flow characterization are based on random sampling of the packets (e.g., Cisco's NetFlow) or inferring characteristics solely based on long lived flows (LLFs) or on lossy data structures (e.g., bloom filters, hash tables). However, none of these approaches takes into account the heavy-tailed nature of the Internet traffic and separates the estimation algorithm from the flow measurement architecture.In this paper, we propose an alternate approach to traffic characterization by closely linking the flow measurement architecture with the estimation algorithm. Our measurement framework stores complete information related to short lived flows (SLFs) while collecting partial information related to LLFs. For real-time separation of LLFs and SLFs, we propose a novel algorithm based on typical sequences from Information theory. The distribution (pdf) and sample space of the underlying traffic is estimated using the non-parametric Parzen window technique and likelihood function defined over the Coupon collector problem. We validate the accuracy and performance of our estimation technique using traffic traces from the internal LAN in our laboratory and from National Library for Applied Network Research (NLANR). 相似文献
128.
Satish Chand Bijendra Kumar Hari Om 《Journal of Network and Computer Applications》2009,32(3):660-665
In the request-based scheme, a patching channel is initiated on arrival of a request in an interarrival time of two adjacent multicast channels. If two requests are received in a short duration in an interarrival time, two patching channels are needed to service them. Both these channels deliver almost the same data, thus, wasting the bandwidth. This problem may be addressed in two ways: using higher level patching technique, or forcing the first request to wait for the second one. Using higher level patching technique makes the system more complex and thus usually not preferred. In the second case, the bandwidth usage certainly reduces, but the length of the waiting time by the first request for the second request is the main issue. In this paper, this issue is addressed by dividing the video duration into uniform time slots such that there is at least one request in a time slot for initiating the patching channel. The proposed scheme is named as Video Data Delivery using Slotted Patching. In this scheme, the patching channels download much less video data than the request-based scheme and thus require less bandwidth. This scheme may not provide immediate services to all users unlike the request-based scheme, but the user's waiting can be made arbitrarily small without using much resources unlike the request-based scheme. 相似文献
129.
Regression models for six muscles, the left and right iliocostalis, the left and right erector spinae, and the left and right external oblique, were developed for asymmetry and height effects for floor and knuckle lifts. The models were based on participant anthropometric and other measures. Stepwise regression was performed for developing the prediction models. The models developed were discrete in terms of specific height and asymmetry. © 2009 Wiley Periodicals, Inc. 相似文献
130.
Sandip Ghosh Sarit K. Das Goshaidas Ray 《International Journal of Control, Automation and Systems》2009,7(2):311-317
Adaptive stabilization of a class of linear systems with matched and unmatched uncertainties is considered in this paper.
The proposed controller indeed stabilizes the uncertain system for any positive values of its non-adaptive gain that may be
tuned to enhance dynamic response of system. The performance of uncertain system along with the Algebraic Riccati Equation
that arises from the adaptive stabilizing controller is now formulated as a multi-objective Linear Matrix Inequality optimization
problem. The decay rate and a factor governing the ultimate bound of the system states are considered to characterize the
closed loop system performance. Finally, the effectiveness of the proposed controller is illustrated via stabilizing a mass-spring
system.
Recommended by Editorial Board member Gang Tao under the direction of Editor Young Il Lee. The authors would like to thank
the reviewers for their valuable comments and suggestions that have improved the quality of this paper.
Sandip Ghosh received the B.E. in Electrical Engineering from Bengal Engineering College (D.U.), Howrah, and Master in Control System
Engineering from Jadavpur University, Kolkata, India, in 1999 and 2003 respectively. Presently he is pursuing the Ph.D. degree
at Indian Institute of Technology, Kharagpur, India. His research interests include adaptive control, robust control and control
of time-delay systems.
Sarit K. Das is a Professor of Electrical Engineering Department, Indian Institute of Technology, Kharagpur, India. He received the Ph.D.
degree in 1985 from the same department. His research interests include design of periodic controller, decoupling of multivariable
systems, modeling and robust control of complex systems.
Goshaidas Ray is a Professor of Electrical Engineering Department, Indian Institute of Technology, Kharagpur, India. He received the Ph.D.
degree in 1982 from Indian Institute of Technology Delhi, India. His research interests include modeling, estimation, model-based
control, intelligent control, robotic systems and distributed control systems. 相似文献