全文获取类型
收费全文 | 83951篇 |
免费 | 961篇 |
国内免费 | 407篇 |
专业分类
电工技术 | 775篇 |
综合类 | 2316篇 |
化学工业 | 11513篇 |
金属工艺 | 4786篇 |
机械仪表 | 3018篇 |
建筑科学 | 2158篇 |
矿业工程 | 565篇 |
能源动力 | 1107篇 |
轻工业 | 3583篇 |
水利工程 | 1266篇 |
石油天然气 | 341篇 |
无线电 | 9247篇 |
一般工业技术 | 16322篇 |
冶金工业 | 2629篇 |
原子能技术 | 253篇 |
自动化技术 | 25440篇 |
出版年
2022年 | 16篇 |
2021年 | 19篇 |
2020年 | 8篇 |
2019年 | 12篇 |
2018年 | 14453篇 |
2017年 | 13379篇 |
2016年 | 9972篇 |
2015年 | 611篇 |
2014年 | 239篇 |
2013年 | 210篇 |
2012年 | 3149篇 |
2011年 | 9415篇 |
2010年 | 8289篇 |
2009年 | 5552篇 |
2008年 | 6770篇 |
2007年 | 7782篇 |
2006年 | 126篇 |
2005年 | 1221篇 |
2004年 | 1134篇 |
2003年 | 1183篇 |
2002年 | 554篇 |
2001年 | 99篇 |
2000年 | 179篇 |
1999年 | 61篇 |
1998年 | 53篇 |
1997年 | 32篇 |
1996年 | 54篇 |
1995年 | 14篇 |
1994年 | 13篇 |
1993年 | 14篇 |
1992年 | 16篇 |
1991年 | 23篇 |
1988年 | 12篇 |
1985年 | 9篇 |
1969年 | 24篇 |
1968年 | 43篇 |
1967年 | 33篇 |
1966年 | 42篇 |
1965年 | 44篇 |
1964年 | 11篇 |
1963年 | 29篇 |
1962年 | 23篇 |
1961年 | 18篇 |
1960年 | 30篇 |
1959年 | 35篇 |
1958年 | 37篇 |
1957年 | 36篇 |
1956年 | 34篇 |
1955年 | 63篇 |
1954年 | 68篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
The N-Queens Puzzle is a fascinating combinatorial problem. Up to now, the number of distinct valid placements of N non-attacking queens on a generalized N × N chessboard cannot be computed by a formula. The computation of these numbers is instead based on an exhaustive search whose complexity grows dramatically with the problem size N. Solutions counts are currently known for all N up to 26. The parallelization of the search for solutions is embarrassingly simple. It is achieved by pre-placing the queens within a certain board region. These pre-placements partition the search space. The chosen extent of the pre-placement allows for a wide range of the partitioning granularity. This ease of partitioning makes the N-Queens Puzzle a great show-off case for tremendously parallel computation approaches and a flexible benchmark for parallel compute resources. This article presents the Q27 Project, an open-source effort targeting the computation of the solution count of the 27-Queens Puzzle. It is the first undertaking pushing the frontier of the N-Queens Puzzle that exploits the complete symmetry group D 4 of the square. This reduces the overall computational complexity already to an eighth in comparison to a naive exploration of the whole search space. This article details the coronal pre-placement that enables the partitioning of the overall search under this approach. With respect to the physical implementation of the computation, it describes the hardware structure that explores the resulting subproblems efficiently by exploiting bit-level operations and their mapping to FPGA devices as well as the infrastructure that organizes the contributing devices in a distributed computation. The performance of several FPGA platforms is evaluated using the Q27 computation as a benchmark, and some intriguing observations obtained from the available partial solutions are presented. Finally, an estimate on the remaining run time and on the expected magnitude of the final result is dared. 相似文献
992.
Mohamad Yassin Mohamed A. AboulHassan Samer Lahoud Marc Ibrahim Dany Mezher Bernard Cousin Essam A. Sourour 《Wireless Networks》2017,23(2):403-418
LTE networks’ main challenge is to efficiently use the available spectrum, and to provide satisfying quality of service for mobile users. However, using the same bandwidth among adjacent cells leads to occurrence of Inter-cell Interference especially at the cell-edge. Basic interference mitigation approaches consider bandwidth partitioning techniques between adjacent cells, such as frequency reuse of factor m schemes, to minimize cell-edge interference. Although SINR values are improved, such techniques lead to significant reduction in the maximum achievable data rate. Several improvements have been proposed to enhance the performance of frequency reuse schemes, where restrictions are made on resource blocks usage, power allocation, or both. Nevertheless, bandwidth partitioning methods still affect the maximum achievable throughput. In this proposal, we intend to perform a comprehensive survey on Inter-Cell Interference Coordination (ICIC) techniques, and we study their performance while putting into consideration various design parameters. This study is implemented throughout intensive system level simulations under several parameters such as different network loads, radio conditions, and user distributions. Simulation results show the advantages and the limitations of each technique compared to frequency reuse-1 model. Thus, we are able to identify the most suitable ICIC technique for each network scenario. 相似文献
993.
Modern vehicles are proficient in establishing a spontaneous connection over a wireless radio channel, synchronizing actions and information. Security infrastructure is most important in such a sensitive scope of vehicle communication for coordinating actions and avoiding accidents on the road. One of the first security issues that need to be established is authentication via IEEE 1609.2 security infrastructure. According to our preliminary work, vehicle owners are bound to preprocess a certificate from the certificate authority. The certificate carries vehicle static attributes (e.g., licence number, brand and color) certified together with the vehicle public key in a monolithic manner. Nevertheless, a malicious vehicle might clone the static attributes to impersonate a specific vehicle. Therefore, in this paper we consider a resource expensive attack scenario involving multiple malicious vehicles with identical visual static attributes. Apparently, dynamic attributes (e.g., location and direction) can uniquely define a vehicle and can be utilized to resolve the true identity of the vehicle. However, unlike static attributes, dynamic attributes cannot be signed by a trusted authority beforehand. We propose an approach to verify the coupling between non-certified dynamic attributes and certified static attributes on an auxiliary communication channel, for example, a modulated laser beam. Furthermore, we illustrate that the proposed approach can be used to facilitate the usage of existing authentication protocols such as NAXOS, in the new scope of ad-hoc vehicle networks. We use BAN logic to verify the security claims of the protocol against the passive and active interception. 相似文献
994.
In this paper, we consider simultaneous wireless information and energy transfer in an orthogonal-frequency-division-multiple-access decode-and-forward relay network, in which an energy-constrained relay node harvests energy from a source node and uses the harvested energy to forward information to multiple destination nodes. Our objective is to maximize the end-to-end sum rate by resource allocation, subject to transmit power constraint at the source and energy-harvesting (EH) constraint at the relay. A non-convex and mixed-integer programming (MIP) problem is formulated to optimize time-switching (TS) ratios of EH and information decoding at the relay, TS ratio of information transmission from relay to destinations, subcarrier allocation as well as power allocation (PA) over all subcarriers at source and relay. We propose to decouple this problem into a convex problem and an MIP problem in fractional form. To solve the MIP problem, we transform it into an equivalent optimization problem in subtractive form which has a tractable solution. As a result, we propose a novel scheme to achieve jointly optimal TS ratios, subcarrier allocation and PA. Simulation results verify the optimality of our proposed resource allocation scheme. 相似文献
995.
The main objective of this research is to conduct a performance analysis of various multipath routing protocols in wireless multimedia sensor networks for the efficient transmission of the image, audio and video data. To provide efficient routing for the large sized multimedia content, various multipath routing protocols such as energy-aware routing, QoS based routing and geographical routing methods are analyzed. In this analysis, the efficient routing techniques including geographical routing techniques such as GPSR, DGR, PW-DGR presented for wireless multimedia sensor networks are studied and the performance of each technique is evaluated to determine the efficient multipath routing technique. Comparisons are made for evaluated protocols and it is proved that the PW-DGR provides better routing performance for the multimedia data. The findings of the research also show that the PW-DGR method efficiently overcomes the routing problems such as energy bottleneck problem, energy-hole, reduced network lifetime and high delay in packet transmission. 相似文献
996.
J. Mass-Sanchez E. Ruiz-Ibarra J. Cortez-González A. Espinoza-Ruiz Luis A. Castro 《Wireless Personal Communications》2017,96(4):5011-5033
The localization of nodes plays a fundamental role in Wireless Sensor and Actors Networks (WSAN) identifying geographically where an event occurred, which facilitates timely response to this action. This article presents a performance evaluation of multi-hop localization range-free algorithms used in WSAN, such as Distance Vector Hop (DV-Hop), Improved DV-Hop (IDV-Hop), and the Weighted DV-Hop (WDV-Hop). In addition, we propose a new localization algorithm, merging WDV-Hop, with the weighted hyperbolic localization algorithm (WH), which includes weights to the correlation matrix of the estimated distances between the node of interest (NOI) and the reference nodes (RN) in order to improve accuracy and precision. As performance metrics, the accuracy, precision, and computational complexity are evaluated. The algorithms are evaluated in three scenarios where all nodes are randomly distributed in a given area, varying the number of RNs, the density of nodes in the network, and radio coverage of the nodes. The results show that in networks with 100 nodes, WDV-Hop outperforms the DV-Hop and IDV-Hop even if the number of RNs is reduced to 10. Moreover, our proposal shows an improvement in terms of accuracy and precision at the cost of increased computational complexity, specifically in the algorithm execution time, but without affecting the hardware cost or power consumption. 相似文献
997.
Virtual network (VN) mapping which deals with the allocation of network resources from the shared physical substrate to individual VNs is one of the key challenges for the application of realizing network virtualization. While a variety of state-of-the-art algorithms have attempted to address this issue from different aspects, the challenge still remains for mapping virtual link with hop count constraint. This paper presents a fast approximation path mapping algorithm to address this issue by formulating such virtual link mapping problem as a path-flow mathematical programming model, which aims to minimize the maximum link load factor. Through the use of the primal–dual method, a fully polynomial time approximation algorithm is proposed to solve this model. The experimental results show that the proposed algorithm can effectively solve the problem of path mapping with hop limit. 相似文献
998.
Xunqian Tong Jun Lin Yanju Ji Guanyu Zhang Xuefeng Xing 《Wireless Personal Communications》2017,95(3):2203-2222
This study established the Kriging model to simplify the mathematical model for calculations and to improve the operational efficiency of global optimization in seismic exploration engineering. Accordingly, wireless seismic sensor network (WSSN) was used as an example in this research, and the generated seismic data flow rate and the flow rate of seismic data transmission are the simulation sample points. Thereafter, the Kriging model was constructed and the function was fitted. An improved particle swarm optimization (PSO) was also utilized for the global optimization of the Kriging model of WSSN to determine the optimized network lifetime. Results show that the Kriging model and the improved PSO algorithm significantly enhanced the lift performance and computer operational efficiency of WSSN. 相似文献
999.
Sang Hyun Park Younghwan Jin Kyunghan Ahn In Chung Chung-Yul Yoo 《Journal of Electronic Materials》2017,46(2):848-855
The structural and electrical characteristics of Ag/Ni bilayer metallization on polycrystalline thermoelectric SnSe were investigated. Two difficulties with thermoelectric SnSe metallization were identified for Ag and Ni single layers: Sn diffusion into the Ag metallization layer and unexpected cracks in the Ni metallization layer. The proposed Ag/Ni bilayer was prepared by hot-pressing, demonstrating successful metallization on the SnSe surface without interfacial cracks or elemental penetration into the metallization layer. Structural analysis revealed that the Ni layer reacts with SnSe, forming several crystalline phases during metallization that are beneficial for reducing contact resistance. Detailed investigation of the Ni/SnSe interface layer confirms columnar Ni-Sn intermetallic phases [(Ni3Sn and Ni3Sn2) and Ni5.63SnSe2] that suppress Sn diffusion into the Ag layer. Electrical specific-contact resistivity (5.32 × 10?4 Ω cm2) of the Ag/Ni bilayer requires further modification for development of high-efficiency polycrystalline SnSe thermoelectric modules. 相似文献
1000.
Adrian Lis Slavo Kicin Franziska Brem Christian Leinenbach 《Journal of Electronic Materials》2017,46(2):729-741
The potential of transient liquid-phase (TLP) bonding for chip packaging applications has been evaluated, focusing on three interlayer arrangements (Ag-Sn-Ag, Ni-Sn-Ni, and Ag-Sn-Ni). Shear tests on TLP-bonded components provided the interlayer-dependent mechanical strength as well as failure mode and position. Critical local stresses, i.e., failure criteria, within the intermetallic compound (IMC) layer were derived by replicating the shear test conditions with finite-element methods. The missing coefficient of thermal expansion for Ag3Sn IMC was obtained by producing small IMC bulk samples and subjecting them to dilatometric measurements. The experimental results were implemented into a finite-element model of a representative power module architecture to provide first predictions on thermally induced residual stresses that could be classified into fail/safe, as successfully validated by TLP chip bonding experiments. A numerical parameter study then assessed thermal stresses, including failure prediction and design optimization for TLP-bonded Si chips, considering the influence of process temperature, service conditions, TLP interlayer system, and metallization layers within the TLP joint. The presented procedure serves as a guideline to choose an appropriate TLP interlayer system for predefined boundary conditions, or vice versa. 相似文献