全文获取类型
收费全文 | 5695篇 |
免费 | 219篇 |
国内免费 | 9篇 |
专业分类
电工技术 | 75篇 |
综合类 | 4篇 |
化学工业 | 1349篇 |
金属工艺 | 91篇 |
机械仪表 | 137篇 |
建筑科学 | 246篇 |
矿业工程 | 8篇 |
能源动力 | 246篇 |
轻工业 | 414篇 |
水利工程 | 33篇 |
石油天然气 | 19篇 |
无线电 | 679篇 |
一般工业技术 | 981篇 |
冶金工业 | 609篇 |
原子能技术 | 67篇 |
自动化技术 | 965篇 |
出版年
2023年 | 23篇 |
2022年 | 58篇 |
2021年 | 118篇 |
2020年 | 74篇 |
2019年 | 100篇 |
2018年 | 117篇 |
2017年 | 143篇 |
2016年 | 159篇 |
2015年 | 108篇 |
2014年 | 155篇 |
2013年 | 318篇 |
2012年 | 248篇 |
2011年 | 303篇 |
2010年 | 250篇 |
2009年 | 247篇 |
2008年 | 229篇 |
2007年 | 239篇 |
2006年 | 242篇 |
2005年 | 177篇 |
2004年 | 185篇 |
2003年 | 153篇 |
2002年 | 153篇 |
2001年 | 113篇 |
2000年 | 109篇 |
1999年 | 89篇 |
1998年 | 180篇 |
1997年 | 148篇 |
1996年 | 123篇 |
1995年 | 121篇 |
1994年 | 106篇 |
1993年 | 94篇 |
1992年 | 63篇 |
1991年 | 47篇 |
1990年 | 56篇 |
1989年 | 51篇 |
1988年 | 50篇 |
1987年 | 47篇 |
1986年 | 29篇 |
1985年 | 82篇 |
1984年 | 58篇 |
1983年 | 56篇 |
1982年 | 51篇 |
1981年 | 83篇 |
1980年 | 48篇 |
1979年 | 52篇 |
1977年 | 39篇 |
1976年 | 46篇 |
1975年 | 41篇 |
1974年 | 31篇 |
1973年 | 26篇 |
排序方式: 共有5923条查询结果,搜索用时 31 毫秒
111.
Garrett BC Dixon DA Camaioni DM Chipman DM Johnson MA Jonah CD Kimmel GA Miller JH Rescigno TN Rossky PJ Xantheas SS Colson SD Laufer AH Ray D Barbara PF Bartels DM Becker KH Bowen KH Bradforth SE Carmichael I Coe JV Corrales LR Cowin JP Dupuis M Eisenthal KB Franz JA Gutowski MS Jordan KD Kay BD Laverne JA Lymar SV Madey TE McCurdy CW Meisel D Mukamel S Nilsson AR Orlando TM Petrik NG Pimblott SM Rustad JR Schenter GK Singer SJ Tokmakoff A Wang LS Wettig C Zwier TS 《Chemical reviews》2005,105(1):355-390
112.
Michel C Bol A Spinks T Townsend D Bailey D Grootoonk S Jones T 《IEEE transactions on medical imaging》1991,10(3):240-248
The authors have assessed the response function both experimentally and theoretically for two commercial tomographs: CTI 931/08-12 and CTI 953B with and without interplane septa. Monte Carlo simulations were undertaken using the GEANT package from CERN. Spatial resolution (tomographic and axial) was calculated for line sources at various positions in the field of view. Sensitivity and scatter fraction (SF) were calculated for various source geometries as a function of energy discrimination. A very realistic response function in positron emission tomography (PET) is obtained by Monte Carlo methods, using global parameters to account for unsimulated phenomena such as scintillation light transport inside a detector block and its sharing among the various phototubes. Minor discrepancies remain for sensitivity and SF at high energy thresholds and may probably be explained by introducing the observed dispersion in the energy response for the various crystals within a detector block. 相似文献
113.
Jadoon Habib Ullah Khan Huang Deqing Qin Na Gong Zifeng 《International Journal of Control, Automation and Systems》2021,19(8):2769-2783
International Journal of Control, Automation and Systems - The fault and disturbances estimation has an important role in the modern traction railway system. This paper proposes a unique method for... 相似文献
114.
Magat Julie Ozenne Valéry Cedilnik Nicolas Naulin Jérôme Haliot Kylian Sermesant Maxime Gilbert Stephen H. Trew Mark Haissaguerre Michel Quesson Bruno Bernus Olivier 《Magma (New York, N.Y.)》2021,34(5):741-755
Magnetic Resonance Materials in Physics, Biology and Medicine - The aim of the study is to compare structure tensor imaging (STI) with diffusion tensor imaging (DTI) of the sheep heart... 相似文献
115.
116.
Mickaël Duval Jean-Charles Passieux Michel Salaün Stéphane Guinard 《Archives of Computational Methods in Engineering》2016,23(1):17-38
This paper provides a detailed review of the global/local non-intrusive coupling algorithm. Such method allows to alter a global finite element model, without actually modifying its corresponding numerical operator. We also look into improvements of the initial algorithm (Quasi-Newton and dynamic relaxation), and provide comparisons based on several relevant test cases. Innovative examples and advanced applications of the non-intrusive coupling algorithm are provided, granting a handy framework for both researchers and engineers willing to make use of such process. Finally, a novel nonlinear domain decomposition method is derived from the global/local non-intrusive coupling strategy, without the need to use a parallel code or software. Such method being intended to large scale analysis, we show its scalability. Jointly, an efficient high level Message Passing Interface coupling framework is also proposed, granting an universal and flexible way for easy software coupling. A sample code is also given. 相似文献
117.
Emre Akyurek Alexandre Dilly Fabrice Jourdan Zhu Liu Souraneel Chattoraj Itziar Berruezo Juandeaburre Michel Heinrich Leonid Paramonov Peter Turner Stelarc Tatiana Kalganova 《计算机技术与应用:英文》2013,(11):569-574
In the development of robotic limbs, the side of members is of importance to define the shape of artificial limbs and the range of movements. It is mainly significant tbr biomedical applications concerning patients suffering arms or legs injuries, fn this paper, the concept of an ambidextrous design lbr robot hands is introduced. The fingers can curl in one xvay or another, to imitate either a right hand or a left hand. The advantages and inconveniences of different models have been investigated to optimise the range and the maximum force applied by fingers. Besides, a remote control interthce is integrated to the system, allowing both to send comrnands through internet and to display a video streaming of the ambidextrous hand as feedback. Therefore, a robotic prosthesis could be used for the first time in telerehabilitation. The main application areas targeted are physiotherapy alter strokes or management of phantom pains/br amputees by/earning to control the ambidextrous hand. A client application is also accessible on Facehook social network, making the robotic limb easily reachable for the patients. Additionally the ambidextrous hand can be used tbr robotics research as well as artistic performances. 相似文献
118.
Habib M. Ammari 《Computer Networks》2013,57(9):1913-1935
The design and development of multi-hop wireless sensor networks are guided by the specific requirements of their corresponding sensing applications. These requirements can be associated with certain well-defined qualitative and/or quantitative performance metrics, which are application-dependent. The main function of this type of network is to monitor a field of interest using the sensing capability of the sensors, collect the corresponding sensed data, and forward it to a data gathering point, also known as sink. Thus, the longevity of wireless sensor networks requires that the load of data forwarding be balanced among all the sensor nodes so they deplete their battery power (or energy) slowly and uniformly. However, some sensing applications are time-critical in nature. Hence, they should satisfy strict delay constraints so the sink can receive the sensed data originated from the sensors within a specified time bound. Thus, to account for all of these various sensing applications, appropriate data forwarding protocols should be designed to achieve some or all of the following three major goals, namely minimum energy consumption, uniform battery power depletion, and minimum delay. To this end, it is necessary to jointly consider these three goals by formulating a multi-objective optimization problem and solving it. In this paper, we propose a data forwarding protocol that trades off these three goals via slicing the communication range of the sensors into concentric circular bands. In particular, we discuss an approach, called weighted scale-uniform-unit sum, which is used by the source sensors to solve this multi-objective optimization problem. Our proposed data forwarding protocol, called Trade-off Energy with Delay (TED), makes use of our solution to this multi-objective optimization problem in order to find a “best” trade-off of minimum energy consumption, uniform battery power depletion, and minimum delay. Then, we present and discuss several numerical results to show the effectiveness of TED. Moreover, we show how to relax several widely used assumptions in order to enhance the practicality of our TED protocol, and extend it to real-world network scenarios. Finally, we evaluate the performance of TED through extensive simulations. We find that TED is near optimal with respect to the energy × delay metric. This simulation study is an essential step to gain more insight into TED before implementing it using a sensor test-bed. 相似文献
119.
Rachid El-Azouzi Francesco De Pellegrini Habib B.A. Sidi Vijay Kamble 《Computer Networks》2013,57(4):1003-1018
In this paper, we apply evolutionary games to non-cooperative forwarding control in Delay Tolerant Networks (DTNs). The main focus is on mechanisms to rule the participation of the relays to the delivery of messages in DTNs. Thus, we express the success probability as a function of the competition that takes place within a large population of mobiles, and we characterize the effect of reward-based mechanisms on the performance of such systems. Devices acting as active relays, in fact, sacrifice part of their batteries in order to support message replication and thus increase the probability to reach the destination. In our scheme, a relay can choose the strategy by which they participate to the message relaying. A mobile that participates receives a unit of reward based on the reward mechanism selected by the network. A utility function is introduced as the difference between the expected reward and the energy cost, i.e., the cost spent by the relay to sustain forwarding operations. We show how the evolution dynamics and the equilibrium behavior (called Evolutionary Stable Strategy – ESS) are influenced by the characteristics of inter contact time, energy expenditure and pricing characteristics.We extend our analysis to mechanisms that the system can introduce in order to have the message delivered to the destination with high probability within a given deadline and under energy constraints which bound the number of released copies per message. Finally, we apply our findings in order to devise decentralized forwarding algorithms that are rooted in the theory of stochastic approximations. Thus, we demonstrate that the ESS can be attained without complete knowledge of the system state and letting the source monitor number of released copies per message only. We provide extensive numerical results to validate the proposed scheme. 相似文献
120.
Adil Fahad Zahir Tari Ibrahim Khalil Ibrahim Habib Hussein Alnuweiri 《Computer Networks》2013,57(9):2040-2057
There is significant interest in the network management and industrial security community about the need to identify the “best” and most relevant features for network traffic in order to properly characterize user behaviour and predict future traffic. The ability to eliminate redundant features is an important Machine Learning (ML) task because it helps to identify the best features in order to improve the classification accuracy as well as to reduce the computational complexity related to the construction of the classifier. In practice, feature selection (FS) techniques can be used as a preprocessing step to eliminate irrelevant features and as a knowledge discovery tool to reveal the “best” features in many soft computing applications. In this paper, we investigate the advantages and disadvantages of such FS techniques with new proposed metrics (namely goodness, stability and similarity). We continue our efforts toward developing an integrated FS technique that is built on the key strengths of existing FS techniques. A novel way is proposed to identify efficiently and accurately the “best” features by first combining the results of some well-known FS techniques to find consistent features, and then use the proposed concept of support to select a smallest set of features and cover data optimality. The empirical study over ten high-dimensional network traffic data sets demonstrates significant gain in accuracy and improved run-time performance of a classifier compared to individual results produced by some well-known FS techniques. 相似文献