全文获取类型
收费全文 | 14481篇 |
免费 | 697篇 |
国内免费 | 311篇 |
专业分类
电工技术 | 517篇 |
综合类 | 332篇 |
化学工业 | 1241篇 |
金属工艺 | 713篇 |
机械仪表 | 518篇 |
建筑科学 | 502篇 |
矿业工程 | 136篇 |
能源动力 | 219篇 |
轻工业 | 286篇 |
水利工程 | 126篇 |
石油天然气 | 317篇 |
武器工业 | 50篇 |
无线电 | 915篇 |
一般工业技术 | 674篇 |
冶金工业 | 239篇 |
原子能技术 | 143篇 |
自动化技术 | 8561篇 |
出版年
2024年 | 41篇 |
2023年 | 116篇 |
2022年 | 264篇 |
2021年 | 357篇 |
2020年 | 231篇 |
2019年 | 167篇 |
2018年 | 198篇 |
2017年 | 212篇 |
2016年 | 193篇 |
2015年 | 289篇 |
2014年 | 529篇 |
2013年 | 505篇 |
2012年 | 1162篇 |
2011年 | 2698篇 |
2010年 | 1436篇 |
2009年 | 1304篇 |
2008年 | 985篇 |
2007年 | 859篇 |
2006年 | 771篇 |
2005年 | 807篇 |
2004年 | 714篇 |
2003年 | 699篇 |
2002年 | 358篇 |
2001年 | 102篇 |
2000年 | 85篇 |
1999年 | 110篇 |
1998年 | 57篇 |
1997年 | 62篇 |
1996年 | 50篇 |
1995年 | 33篇 |
1994年 | 34篇 |
1993年 | 29篇 |
1992年 | 10篇 |
1991年 | 3篇 |
1990年 | 4篇 |
1988年 | 3篇 |
1986年 | 2篇 |
1983年 | 1篇 |
1982年 | 2篇 |
1980年 | 1篇 |
1959年 | 3篇 |
1951年 | 3篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
951.
Fotis T. FoukalasAuthor Vitae George T. KaretsosAuthor Vitae 《Computers & Electrical Engineering》2012,38(3):591-602
We study the problem of maximizing spectral efficiency of cognitive radio network deployments subject to an interference constraint and under specific quality of service (QoS) guarantees. The interference constraint corresponds to the upper limit of the received power that can be tolerated at the licensed users’ due to transmissions from unlicensed users. The QoS guarantees stem from the requirements imposed by the applications running at the users’ terminals. A cross-layer design is adopted that maps the user’s requirements into delay related QoS guarantees at the data link layer and error probability QoS guarantees at the physical layer. The obtained numerical results provide important insights regarding the impact of the considered constraint and guarantees on the achievable spectral efficiency of cognitive radio networks. 相似文献
952.
Xiongli GuAuthor VitaePeng LiuAuthor Vitae Mei YangAuthor VitaeJie YangAuthor Vitae Cheng LiAuthor VitaeQingdong YaoAuthor Vitae 《Computers & Electrical Engineering》2012,38(3):785-800
Recently there is a trend to broaden the usage of lower-power embedded media processor core to build the future high-end computing machine or the supercomputer. However the embedded solution also faces the operating system (OS) design challenge which the thread invoking overhead is higher for fine-grained scientific workload, the message passing among threads is not managed efficiently enough and the OS does not provide convenient enough service for parallel programming. This paper presents a scheduler of master-slave real-time operating system (RTOS) to manage the thread running for the distributed multi/many-core system without shared memories. The proposed scheduler exploits the data-driven feature of scientific workloads to reduce the thread invoking overhead. And it also defines two protocols: (1) one is between the RTOS and application program, which is used to reduce the burden of parallel programming for the programmer; (2) another one is between the RTOS and networks-on-chip, which is used to manage the message passing among threads efficiently. The experimental results show that the proposed scheduler can manage the thread running with lower overhead and less storage requirement, thereby, improving the multi/many-core system performance. 相似文献
953.
Mande XieAuthor Vitae Guiyi WeiAuthor VitaeYujia GeAuthor Vitae Yun LingAuthor Vitae 《Computers & Electrical Engineering》2012,38(1):116-127
This paper proposes two algorithms for multi-video-source in a new mobile P2P architecture for streaming media systems. One is serial, and the other is parallel. When the service peer set providing expected QoS is not empty, the former is called, otherwise the latter is called. The former triggers the video source change event, re-selects a video source, and synchronizes the multi-video-source by the time model of the streaming sequence when QoS is degraded. The latter allows the multiple video sources to concurrently send the data to the receiving peer according to the assigned transmission. Compared to the existing papers, the contribution of this paper is fourfold: (1) the serial and parallel scheduling algorithms, correctly switched according to the actual situation, are firstly proposed; (2) the mobile feature of peers are firstly considered and validated; (3) the client nodes have better and smoother video quality; (4) our algorithms have shorter run time, which is a crucial factor for an on-line system. 相似文献
954.
Xianfu MengAuthor Vitae Wenqing Cui Author Vitae 《Computers & Electrical Engineering》2012,38(2):194-205
To deal with the file pollution problem in structured P2P networks, this paper proposes an anti-pollution strategy based on the immune approach and the file propagation-chain tracing technique. With the characteristics of the structured P2P networks, we establish a biological immune model and a file propagation tracing mechanism, based on which the mechanisms for alarms collection, propagation-chain tracing, immune response and antibody memorizing are designed. The proposed immune strategy can not only eliminate the polluted clusters and indices effectively but also prevent the reviving of the old pollution. In addition, the node permission is employed to control the ability to request files. The experimental results show that our strategy can curb the propagations of the polluted files effectively and efficiently even in the severely polluted structured P2P networks. 相似文献
955.
George N. KorresAuthor Vitae Nikolaos M. ManousakisAuthor Vitae 《Computers & Electrical Engineering》2012,38(2):294-305
This paper presents an effective weighted least square formulation for the solution of the state estimation problem, considering conventional as well as synchronized phasor measurements. The proposed algorithm is based on a reference-free formulation, using both rectangular and polar coordinates for branch current phasor measurements, and alleviates any numerical problems encountered during initialization stage of the state estimation algorithm. Analytical equations are provided for the conventional and the phasor measurements and their corresponding partial derivatives with respect to state variables. The proposed algorithm is tested with a seven bus system and is compared with the traditional state estimator. Simulation results show that the proposed algorithm improves the precision greatly and gets better behavior as compared with the traditional state estimator. 相似文献
956.
957.
Hu XiongAuthor Vitae Zhong ChenAuthor VitaeFagen LiAuthor Vitae 《Computers & Electrical Engineering》2012,38(3):573-581
In this paper, we introduce an efficient and multi-level conditional privacy preservation authentication protocol in vehicular ad hoc networks (VANETs) based on ring signature. The proposed protocol has three appealing characteristics: First, it offers conditional privacy preservation authentication: while every receiver can verify that a message issuer is an authorized participant in the system only a trusted authority can reveal the true identity of a message sender. Second, it is equipped with multi-level countermeasure: each vehicle can select the degree of privacy according to its own requirements. Third, it is efficient: our system outperforms previous proposals in message authentication and verification, cost-effective identity tracking in case of a dispute, and low storage requirements. We demonstrate the merits gained by the proposed protocol through extensive analysis. 相似文献
958.
Yaobin ZouAuthor Vitae Hong LiuAuthor Vitae Enmin SongAuthor VitaeZhiyong HuangAuthor Vitae 《Computers & Electrical Engineering》2012,38(4):853-861
This paper introduces a novel global thresholding approach that exploits the multiscale gradient information. The multiscale gradient information, that is, the product of gradient magnitude (PGM), is obtained by multiplying the responses of the first derivative of Gaussian (FDoG) filter at three adjacent space scales. The output threshold is selected as the one that maximizes a new objective function of the gray level variable t. The objective function is defined as the ratio of the mean PGM values of the boundary and non-boundary regions in the binary image obtained by thresholding with variable t. Through analysis of 35 real images from different application areas, our results show that the proposed method can perform bilevel thresholding on the images with different histogram patterns, such as unimodal, bimodal, multimodal, or comb-like shape. Its segmentation quality is superior to five popular thresholding algorithms. 相似文献
959.
Zhaolong NingAuthor VitaeLei GuoAuthor Vitae Yuhuai PengAuthor VitaeXiaojie WangAuthor Vitae 《Computers & Electrical Engineering》2012,38(3):533-550
Wireless mesh network (WMN) is a promising solution for last mile broadband internet access. Mesh nodes or mesh routers are connected via wireless links to form a multi-hop backbone infrastructure and improving throughput is the primary goal. While previous works mainly focused on either link level protocol design or complex mathematical model, in this paper, we investigate the performance gains from jointly optimizing scheduling and routing in a multi-radio, multi-channel and multi-hop wireless mesh network. Then, two optimization objectives are addressed by considering wireless media contention and spatial multiplexing. The first objective is to maximize throughput by exploiting spatial reuse while the second one is to ensure fairness among different links. We design a cross-layer algorithm by considering both MAC layer and network layer. Simulation results show that our joint optimization algorithm can significantly increase throughput as well as fairness. 相似文献
960.
Mohamed Djendi Author Vitae 《Computers & Electrical Engineering》2012,38(4):938-952
This paper addresses the field of stereophonic acoustic echo cancellation (SAEC) by adaptive filtering algorithms. Recently, we have proposed a new version of the fast Newton transversal FNTF algorithm for SAEC applications. In this paper, we propose an efficient modification of this algorithm for the same applications. This new algorithm uses a new proposed and simplified numerical stabilization technique and takes into account the cross-correlation between the inputs of the channels. The basic idea is to introduce a small nonlinearity into each channel that has the effect of reducing the inter-channel coherence while not being noticeable for speech due to self masking. The complexity of the proposed algorithm does not alter the complexity of the original version and is kept less than half the complexity of the fastest two-channel FTF filter version. Simulation results and comparisons with the extended two-channel normalized least mean square NLMS and FTF algorithms are presented. 相似文献