全文获取类型
收费全文 | 38321篇 |
免费 | 2655篇 |
国内免费 | 1537篇 |
专业分类
电工技术 | 1856篇 |
技术理论 | 1篇 |
综合类 | 2265篇 |
化学工业 | 5044篇 |
金属工艺 | 2158篇 |
机械仪表 | 1858篇 |
建筑科学 | 2362篇 |
矿业工程 | 782篇 |
能源动力 | 814篇 |
轻工业 | 1921篇 |
水利工程 | 597篇 |
石油天然气 | 1389篇 |
武器工业 | 272篇 |
无线电 | 3440篇 |
一般工业技术 | 3444篇 |
冶金工业 | 1261篇 |
原子能技术 | 344篇 |
自动化技术 | 12705篇 |
出版年
2024年 | 96篇 |
2023年 | 381篇 |
2022年 | 599篇 |
2021年 | 985篇 |
2020年 | 714篇 |
2019年 | 702篇 |
2018年 | 740篇 |
2017年 | 763篇 |
2016年 | 683篇 |
2015年 | 1057篇 |
2014年 | 1427篇 |
2013年 | 1639篇 |
2012年 | 2457篇 |
2011年 | 4869篇 |
2010年 | 2808篇 |
2009年 | 2750篇 |
2008年 | 2295篇 |
2007年 | 2166篇 |
2006年 | 2198篇 |
2005年 | 2001篇 |
2004年 | 1625篇 |
2003年 | 1762篇 |
2002年 | 1702篇 |
2001年 | 1226篇 |
2000年 | 795篇 |
1999年 | 822篇 |
1998年 | 647篇 |
1997年 | 478篇 |
1996年 | 462篇 |
1995年 | 394篇 |
1994年 | 281篇 |
1993年 | 242篇 |
1992年 | 185篇 |
1991年 | 116篇 |
1990年 | 101篇 |
1989年 | 83篇 |
1988年 | 72篇 |
1987年 | 42篇 |
1986年 | 22篇 |
1985年 | 24篇 |
1984年 | 35篇 |
1983年 | 19篇 |
1982年 | 16篇 |
1981年 | 13篇 |
1980年 | 12篇 |
1979年 | 3篇 |
1978年 | 1篇 |
1951年 | 3篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
941.
仲金霞 《网络安全技术与应用》2011,(2):69-71
本文介绍了当前互联网上最热门的技术,Widget。从Widget的技术原理、价值意义,体系架构、应用案例及未来展望等五个方面说明Widget在移动互联网中应用价值:给用户业务体验带来革命性变化的同时,也会给电信运营商在移动互联网领域带来巨大机遇。 相似文献
942.
This paper proposes a novel signal transformation and interpolation approach based on the modification of DCT (Discrete Cosine Transform). The proposed algorithm can be applied to any periodic or quasi periodic waveform for time scale and/or pitch modification purposes in addition to signal reconstruction, compression, coding and packet lost concealment. The proposed algorithm has two advantages:
(i)
Since DCT does not have the explicit phase information, one does not need the cubic spline interpolation of the phase component of the sinusoidal model. (ii)
The parameters to be interpolated can be reduced because of the energy packing efficiency of the DCT. This is particularly important if signal synthesis is carried out on a remote location from the transmitted parameters.
943.
T. Hoang Ngan Le Chia-Chen Lin Chin-Chen Chang Hoai Bac LeAuthor vitae 《Digital Signal Processing》2011,21(6):734-745
Many secret sharing schemes for digital images have been developed in recent decades. Traditional schemes typically must deal with the problem of computational complexity, and other visual secret sharing schemes come with a higher transmission cost and storage cost; that is, each shadow size is m times as big as the original secret image. The new (2,n) secret sharing scheme for grayscale images proposed in this paper is based a combination of acceptable image quality using block truncation coding (BTC), high compression ratio discrete wavelet transform (DWT) and good subjective performance of the vector quantization (VQ) technique. Experimental results confirm that our proposed scheme not only generates a high quality reconstructed original image but also generates small, random-like grayscale shadows. 相似文献
944.
This paper examines the role played by feedforward in model predictive control (MPC). We contrast feedforward with preview action. The latter is standard in model predictive control, whereas feedforward has been rarely, if ever, used in contemporary formulations of MPC. We argue that feedforward can significantly improve performance in the presence of measurement noise and certain types of model uncertainty. 相似文献
945.
Yacine Rebahi Mohamed Nassar Thomas Magedanz Olivier FestorAuthor vitae 《Information Security Technical Report》2011,16(1):12-19
The migration from circuit-switched networks to packet-switched networks necessitates the investigation of related issues such as service delivery, QoS, security, and service fraud and misuse. The latter can be seen as a combination of accounting and security aspects. In traditional telecommunication networks, fraud accounts for annual losses at an average of 3%–5% of the operators’ revenue and still increasing at a rate of more than 10% yearly. It is also expected that in VoIP networks, the situation will be worse due to the lack of strong built-in security mechanisms, and the use of open standards. This paper discusses the fraud problem in VoIP networks and evaluates the related available solutions. 相似文献
946.
Xue Li Jing Liu Quan Z. Sheng Sherali Zeadally Weicai Zhong 《Information Systems Frontiers》2011,13(4):481-500
In coming years, there will be billions of RFID tags living in the world tagging almost everything for tracking and identification
purposes. This phenomenon will impose a new challenge not only to the network capacity but also to the scalability of event
processing of RFID applications. Since most RFID applications are time sensitive, we propose a notion of Time To Live (TTL), representing the period of time that an RFID event can legally live in an RFID data management system, to manage various
temporal event patterns. TTL is critical in the “Internet of Things” for handling a tremendous amount of partial event-tracking
results. Also, TTL can be used to provide prompt responses to time-critical events so that the RFID data streams can be handled
timely. We divide TTL into four categories according to the general event-handling patterns. Moreover, to extract event sequence
from an unordered event stream correctly and handle TTL constrained event sequence effectively, we design a new data structure,
namely Double Level Sequence Instance List (DLSIList), to record intermediate stages of event sequences. On the basis of this,
an RFID data management system, namely Temporal Management System over RFID data streams (TMS-RFID), has been developed. This
system can be constructed as a stand-alone middleware component to manage temporal event patterns. We demonstrate the effectiveness
of TMS-RFID on extracting complex temporal event patterns through a detailed performance study using a range of high-speed
data streams and various queries. The results show that TMS-RFID has a very high throughput, namely 170,000–870,000 events
per second for different highly complex continuous queries. Moreover, the experiments also show that the main structure to
record the intermediate stages in TMS-RFID does not increase exponentially with the number of events. These results demonstrate
that TMS-RFID not only supports high processing speeds, but is also highly scalable. 相似文献
947.
Leszek Lilien Author Vitae Ajay Gupta Author Vitae Author Vitae Zijiang Yang Author Vitae 《Computers & Electrical Engineering》2010,36(2):328-340
We present opportunistic resource utilization networks or oppnets, a novel paradigm of specialized ad hoc networks. We believe that applications can benefit from using specialized ad hoc networks that provide a natural basis for them, the basis more efficient and effective than what general-purpose ad hoc networks can offer. Oppnets constitute the subcategory of ad hoc networks where diverse systems, not employed originally as nodes of an oppnet, join it dynamically in order to perform certain tasks they have been called to participate in. Oppnets have a significant potential to improve a variety of applications, and to create new application niches. We categorize opportunistic networks currently known in the literature as class 1opportunistic networks that use opportunistically only communication resources, and class 2opportunistic networks or oppnets that use opportunistically all kinds of resources, including not only communication but also computation, sensing, actuation, storage, etc. After describing the oppnets and the basics of their operation, we discuss the Oppnet Virtual Machine (OVM)—a proposed standard implementation framework for oppnet applications. It is followed by a discussion of an example application scenario using the OVM primitives. Next, we discuss the design and operations of a small-scale oppnet, named MicroOppnet, originally developed as a proof of concept. MicroOppnet is now being extended to serve as a testbed for experimentation and pilot implementations of oppnet architectures and their components. We conclude with a summary and a list of some open issues for oppnets. 相似文献
948.
Xiaofei Zhang Author VitaeAuthor Vitae Xin Gao Author VitaeAuthor Vitae 《Computers & Electrical Engineering》2010,36(1):160-168
We investigate the characteristics of the received signal as trilinear model for multi-carrier code division multiple access (MC-CDMA) system with antenna array, and propose a blind multiuser detection method for MC-CDMA system in this paper. The trilinear-based multiuser detection algorithm (Trilinear-MUDE) that we presented exploits the versatile diversity in MC-CDMA system while require neither channel information nor statistical characteristics. The algorithmic performance indicates that the proposed algorithm is very close to the nonblind MMSE method, and better than minimum output energy (MOE) receiver and matched filter. Numerical results also reveal its compatibility in condition of small sampling sizes. 相似文献
949.
Dragan Iveti? Author Vitae Author Vitae Branko Markoski Author Vitae 《Computers & Electrical Engineering》2010,36(1):169-179
This paper presents a novel video augmentation approach: a video recording of a real entity augmented by structured data. This augmented video is a self-contained entity integrating values of perceptible and non-perceptible attributes of the same real entity. It simplifies data search, storage and management. Streaming, sharing, collaboration and synchronization are also simplified by the fact that the structured data (so-called augmented data) are integrated in the video file and therefore only one file needs to be manipulated. Our approach was applied to address the issues which road engineers experience while using the ROad Measurement and Data Acquisition System (ROMDAS). The ROMDAS system collects and analyses the road-condition state through video recordings and the data corresponding acquired by specific measuring devices. Currently, however, road engineers have to search the videos manually in order to find details of interest provided by the analysis of the data measured due to the separation of the video from the data. The ROMDAS system manages a large collection of road-condition data. It does not offer history management of video recordings of the same road captured at different time. We present this hybrid video augmentation system: the Augmented Video stream Framework (AVF). It allows creation, search, history management and playback of such augmented video files for effective road surveying based on the discrete data recorded in parallel to the video recordings. The AVF provides road engineers with effective and more comfortable perceptible and non-perceptible data search, storage and history management to be used for (collaborative) road inspection and maintenance. 相似文献
950.
Wang Yafeng Author Vitae Yang Hao Author Vitae Author Vitae Wei Xiang Author Vitae 《Computers & Electrical Engineering》2010,36(4):789-801
One of the most challenging problems in high-data-rate wireless transmission is to reduce inter-symbol interference (ISI) resulted from the time dispersion caused by multi-path propagation. To solve this problem, equalization is introduced. Generally, efficient decision feedback equalizer (DFE) holds better performance than linear equalizer for the cancellation of ISI without noise enhancement. However, its inherent error propagation has some limitation for further improvement. In fact, as shown later in simulation results, conventional frequency domain DFE (FD-DFE) almost cannot be used in Discrete Fourier Transform-Spread Orthogonal Frequency Division Multiplex (DFT-S OFDM) system in Evolved-UMTS (Universal Mobile Telecommunications System) Terrestrial Radio Access (E-UTRA) uplink transmission [3GPP, TR 25.814 V1.2.3. Physical layer aspects for evolved UTRA. May 2006 [release 7]]. Unique word (UW) is proposed in the literatures, as a known symbol sequence, can make error propagation beyond one FFT-block impossible since the last symbols of every block are always decided correctly. But the UW-based scheme is not appropriate for DFT-S OFDM, so it must be modified. This paper proposes a simple DFE-based equalization algorithm for DFT-S OFDM. Through cyclic detection and iteration, the new algorithm obtains a noticeable gain than conventional DFE, and is almost as effective as the modified UW-based methods but with much higher bandwidth efficiency. Furthermore, it does not need to change the frame structure of existing protocol. 相似文献