全文获取类型
收费全文 | 111655篇 |
免费 | 3980篇 |
国内免费 | 2428篇 |
专业分类
电工技术 | 2992篇 |
综合类 | 4460篇 |
化学工业 | 15513篇 |
金属工艺 | 6637篇 |
机械仪表 | 4909篇 |
建筑科学 | 4390篇 |
矿业工程 | 1406篇 |
能源动力 | 1907篇 |
轻工业 | 6124篇 |
水利工程 | 1903篇 |
石油天然气 | 1717篇 |
武器工业 | 372篇 |
无线电 | 12779篇 |
一般工业技术 | 19141篇 |
冶金工业 | 3673篇 |
原子能技术 | 624篇 |
自动化技术 | 29516篇 |
出版年
2024年 | 170篇 |
2023年 | 569篇 |
2022年 | 1146篇 |
2021年 | 1513篇 |
2020年 | 1100篇 |
2019年 | 850篇 |
2018年 | 15297篇 |
2017年 | 14323篇 |
2016年 | 10818篇 |
2015年 | 1932篇 |
2014年 | 1832篇 |
2013年 | 1947篇 |
2012年 | 5345篇 |
2011年 | 11674篇 |
2010年 | 10355篇 |
2009年 | 7495篇 |
2008年 | 8606篇 |
2007年 | 9578篇 |
2006年 | 1771篇 |
2005年 | 2548篇 |
2004年 | 2049篇 |
2003年 | 1869篇 |
2002年 | 1207篇 |
2001年 | 641篇 |
2000年 | 722篇 |
1999年 | 504篇 |
1998年 | 308篇 |
1997年 | 301篇 |
1996年 | 244篇 |
1995年 | 164篇 |
1994年 | 146篇 |
1993年 | 92篇 |
1992年 | 81篇 |
1991年 | 64篇 |
1990年 | 48篇 |
1989年 | 49篇 |
1988年 | 37篇 |
1969年 | 24篇 |
1968年 | 43篇 |
1967年 | 33篇 |
1966年 | 42篇 |
1965年 | 44篇 |
1963年 | 28篇 |
1960年 | 30篇 |
1959年 | 43篇 |
1958年 | 37篇 |
1957年 | 36篇 |
1956年 | 34篇 |
1955年 | 63篇 |
1954年 | 68篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
Keisuke Ueda Yoh Matsuki Toshimichi Fujiwara Yoshinori Tatematsu Isamu Ogawa Toshitaka Idehara 《Journal of Infrared, Millimeter and Terahertz Waves》2016,37(9):825-836
A 394-GHz gyrotron, FU CW GII, has been designed at the University of Fukui, Japan, for dynamic nuclear polarization (DNP)-enhanced solid-state nuclear magnetic resonance (SSNMR) experiments at 600-MHz 1H resonant frequency. After installation at the Institute for Protein Research (IPR), Osaka University, Japan, a PID feedback control system was equipped to regulate the electron gun heater current for stabilization of the electron beam current, which ultimately achieved stabilization of output power when operating in continuous wave (CW) mode. During exploration to further optimize operating conditions, a continuous tuning bandwidth of approximately 1 GHz was observed by varying the operating voltage at a fixed magnetic field. In the frequency range required for positive DNP enhancement, the output power was improved by increasing the magnetic field and the operating voltage from their initial operational settings. In addition, fine tuning of output frequency by varying the cavity cooling water temperature was demonstrated. These operating conditions and ancillary enhancements are expected to contribute to further enhancement of SSNMR signal. 相似文献
992.
993.
As numerous faults exist in practical analog circuits, new challenges arise in the field of diagnosis with large-scale target faults as well as fault features. To address this issue, firstly, an ambiguity model is built to measure the distinguishability between two faults. Then, the optimal fault features are obtained by analyzing the response curves of the circuit under test (CUT) to minimize the ambiguities among the faults. Finally, comparisons are made among three classification methods, including the maximum likelihood classifier (MLC), artificial neural networks (ANNs) and support vector machine (SVM), to demonstrate their own diagnostic abilities for practical use. Two examples are illustrated, and taking advantage of an automated implementation framework, 92 faults in total are examined in the second example. The experimental results show that good diagnostic performances can be obtained with the proposed method. However, when a practical case is encountered, the ANNs method may fail due to its high time and space complexity, while the MLC and SVM methods are still applicable. 相似文献
994.
Traditional cryptanalysis assumes that an adversary only has access to input and output pairs, but has no knowledge about internal states of the device. However, the advent of side-channel analysis showed that a cryptographic device can leak critical information. In this circumstance, Machine learning is known as a powerful and promising method of analysing of side-channel information. In this paper, an experimental investigation on a FPGA implementation of elliptic curve cryptography (ECC) was conducted to explore the efficiency of side-channel information characterisation based on machine learning techniques. In this work, machine learning is used in terms of principal component analysis (PCA) for the preprocessing stage and a Cascade-Forward Back-Propagation Neural Network (CFBP) as a multi-class classifier. The experimental results show that CFBP can be a promising approach in characterisation of side-channel information. 相似文献
995.
Guillaume Renaud Manuel J. Barragan Asma Laraba Haralampos-G. Stratigopoulos Salvador Mir Hervé Le-Gall Hervé Naudet 《Journal of Electronic Testing》2016,32(4):407-421
This work presents an efficient on-chip ramp generator targeting to facilitate the deployment of Built-In Self-Test (BIST) techniques for ADC static linearity characterization. The proposed ramp generator is based on a fully-differential switched-capacitor integrator that is conveniently modified to produce a very small integration gain, such that the ramp step size is a small fraction of the LSB of the target ADC. The proposed ramp generator is employed in a servo-loop configuration to implement a BIST version of the reduced-code linearity test technique for pipeline ADCs, which drastically reduces the volume of test data and, thereby, the test time, as compared to the standard test based on a histogram. The demonstration of the pipeline ADC BIST is carried out based on a mixture of transistor-level and behavioral-level simulations that employ actual production test data. 相似文献
996.
Yan Li Steven Bielby Azhar Chowdhury Gordon W. Roberts 《Journal of Electronic Testing》2016,32(4):423-436
An instrument for on-chip measurement of transceiver transmission capability is described that is fully realizable in CMOS technology and embeddable within an SoC. The instrument can be used to inject and extract the timing and voltage information associated with signals in high-speed transceiver circuits that are commonly found in data communication applications. At the core of this work is the use of ΣΔ amplitude- and phase-encoding techniques to generate both the voltage and timing (phase) references, or strobes used for high-speed sampling. The same technique is also used for generating the test stimulant for the device-under-test. 相似文献
997.
Dong-Ki Kang Fawaz Al-Hazemi Seong-Hwan Kim Min Chen Limei Peng Chan-Hyun Youn 《Mobile Networks and Applications》2016,21(5):793-805
As cloud computing models have evolved from clusters to large-scale data centers, reducing the energy consumption, which is a large part of the overall operating expense of data centers, has received much attention lately. From a cluster-level viewpoint, the most popular method for an energy efficient cloud is Dynamic Right Sizing (DRS), which turns off idle servers that do not have any virtual resources running. To maximize the energy efficiency with DRS, one of the primary adaptive resource management strategies is a Virtual Machine (VM) migration which consolidates VM instances into as few servers as possible. In this paper, we propose a Two Phase based Adaptive Resource Management (TP-ARM) scheme that migrates VM instances from under-utilized servers that are supposed to be turned off to sustainable ones based on their monitored resource utilizations in real time. In addition, we designed a Self-Adjusting Workload Prediction (SAWP) method to improve the forecasting accuracy of resource utilization even under irregular demand patterns. From the experimental results using real cloud servers, we show that our proposed schemes provide the superior performance of energy consumption, resource utilization and job completion time over existing resource allocation schemes. 相似文献
998.
The next generation video surveillance systems are expected to face challenges in providing computation support for an unprecedented amount of video streams from multiple video cameras in a timely and scalable fashion. Cloud computing offers huge computation resources for large-scale storage and processing on demand, which are deemed suitable for video surveillance tasks. Cloud also provides quality of service guaranteed hardware and software solutions with the virtual machine (VM) technology using a utility-like service costing model. In cloud-based video surveillance context, the resource requests to handle video surveillance tasks are translated in the form of VM resource requests, which in turn are mapped to VM resource allocation referring to physical server resources hosting the VMs. Due to the nature of video surveillance tasks, these requests are highly time-constrained, heterogeneous and dynamic in nature. Hence, it is very challenging to actually manage the cloud resources from the perspective of VM resource allocation given the stringent requirements of video surveillance tasks. This paper proposes a computation model to efficiently manage cloud resources for surveillance tasks allocation. The proposed model works on optimizing the trade-off between average service waiting time and long-term service cost, and shows that long-term service cost is inversely proportional to high and balanced utilization of cloud resources. Experiments show that our approach provides a near-optimal solution for cloud resource management when handling the heterogeneous and unpredictable video surveillance tasks dynamically over next generation network. 相似文献
999.
Marinella Petrocchi Angelo Spognardi Paolo Santi 《Mobile Networks and Applications》2016,21(1):139-148
Fraglets represent an execution model for communication protocols that resembles the chemical reactions in living organisms. The strong connection between their way of transforming and reacting and formal rewriting systems makes a fraglet program amenable to automatic verification. Grounded on past work, this paper investigates feasibility of adopting fraglets as model for specifying security protocols and analysing their properties. In particular, we give concrete sample analyses over a secure RFID protocol, showing evolution of the protocol run as chemical dynamics and simulating an adversary trying to circumvent the intended steps. The results of our analysis confirm the effectiveness of the cryptofraglets framework for the model and analysis of security properties and eventually show its potential to identify and uncover protocol flaws. 相似文献
1000.
In this paper, we propose a novel resource allocation scheme for co-channel interference avoidance in LTE heterogeneous networks with universal spectrum reuse where both macro users (MUs) and cognitive femto base stations (FBSs) within the same macrocell coverage can dynamically reuse whole spectrum. Specifically, resource blocks (RBs) are shared between cognitive FBSs in underlay mode while the resource sharing among FBSs and MUs is in overlay mode. The macrocell is divided into inner and outer regions with the inner region further divided into three sectors. The proposed scheme addresses co-channel interference (CCI) by employing fractional frequency reuse (FFR) for RB allocation in the outer region of the macrocell and increase the distance of users that reuse the same RB within the macrocell. Part of RBs are allocated to the outer region of the macrocell with a FFR factor of 1/3, while the remaining RBs are dynamically allocated to each sector in the inner region of macrocell based on MUs demand to efficiently utilize the available spectrum. A basic macro base station (MBS) assistance is required by the FBS in selection of suitable RB to avoid interference with MU in each sector. With the proposed solution, both macro and femto users can dynamically access the whole spectrum while having minimum bandwidth guarantee even under fully congested scenarios. Moreover, the proposed scheme practically eliminates the cross-tier interference and the CCI problem in heterogeneous network reduces to inter-femtocell interference. The throughput and outage performances of the proposed scheme are validated through extensive simulations under LTE network parameters. Simulation results show that the proposed scheme achieves a performance gain of more than 1.5 dB in terms of SINRs of both macro user and femto user compared to traditional cognitive and non-cognitive schemes without bandwidth guarantee for femtocells. 相似文献