全文获取类型
收费全文 | 491663篇 |
免费 | 50344篇 |
国内免费 | 31538篇 |
专业分类
电工技术 | 75505篇 |
技术理论 | 63篇 |
综合类 | 60927篇 |
化学工业 | 41726篇 |
金属工艺 | 15702篇 |
机械仪表 | 28408篇 |
建筑科学 | 51981篇 |
矿业工程 | 21001篇 |
能源动力 | 21009篇 |
轻工业 | 19679篇 |
水利工程 | 23323篇 |
石油天然气 | 19069篇 |
武器工业 | 5467篇 |
无线电 | 46980篇 |
一般工业技术 | 33376篇 |
冶金工业 | 21278篇 |
原子能技术 | 5912篇 |
自动化技术 | 82139篇 |
出版年
2024年 | 1982篇 |
2023年 | 5750篇 |
2022年 | 11123篇 |
2021年 | 12991篇 |
2020年 | 14147篇 |
2019年 | 11861篇 |
2018年 | 11165篇 |
2017年 | 14365篇 |
2016年 | 16517篇 |
2015年 | 18219篇 |
2014年 | 29984篇 |
2013年 | 27560篇 |
2012年 | 35088篇 |
2011年 | 37718篇 |
2010年 | 29376篇 |
2009年 | 30105篇 |
2008年 | 29291篇 |
2007年 | 36062篇 |
2006年 | 32736篇 |
2005年 | 28184篇 |
2004年 | 23360篇 |
2003年 | 20442篇 |
2002年 | 16436篇 |
2001年 | 13973篇 |
2000年 | 11792篇 |
1999年 | 9360篇 |
1998年 | 7142篇 |
1997年 | 6099篇 |
1996年 | 5638篇 |
1995年 | 4776篇 |
1994年 | 4143篇 |
1993年 | 3028篇 |
1992年 | 2594篇 |
1991年 | 1936篇 |
1990年 | 1646篇 |
1989年 | 1435篇 |
1988年 | 1092篇 |
1987年 | 744篇 |
1986年 | 559篇 |
1985年 | 485篇 |
1984年 | 489篇 |
1983年 | 342篇 |
1982年 | 329篇 |
1981年 | 218篇 |
1980年 | 188篇 |
1979年 | 169篇 |
1978年 | 88篇 |
1977年 | 86篇 |
1976年 | 61篇 |
1959年 | 74篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
Haixia Xiang Cuiping Yu Jinchun Gao Shulan Li Yongle Wu Ming Su Yuanan Liu 《国际射频与微波计算机辅助工程杂志》2014,24(3):401-411
This article introduces the concurrent dual‐band digital predistortion (DPD) architecture with only one upconvertion unit, which is suitable for the linearization of wideband power amplifiers (PAs) excited by concurrent dual‐band signals. By extending the conventional dynamic deviation reduction (DDR) model to the concurrent dual‐band mode, we propose two DDR‐based concurrent dual‐band models, the dual‐band DDR (DB‐DDR) model and the simplified dual‐band DDR (SDB‐DDR) model. The performance of these two models is experimentally assessed with two types of wideband PAs (a GaN Class F PA and a GaN Doherty PA) driven by the concurrent dual‐band signal, and compared with the prior two‐dimensional digital predistortion (2D‐DPD) model and the two‐dimensional modified memory polynomial (2D‐MMP) model. The results prove the good DPD performance and low computational complexity of the proposed models. © 2013 Wiley Periodicals, Inc. Int J RF and Microwave CAE 24:401–411, 2014. 相似文献
992.
993.
In this paper we evaluate two alternative CCS technologies at a coal-fired power plant from an investor's point of view. The first technology uses CO2 for enhanced oil recovery (EOR) paired with storage in deep saline formations (DSF) and the second merely stores CO2 in DSF. The paper updates and improves on an earlier publication by Tzimas et al. (2005). For projects of this type there are many sources of risk, three of which stand out: the price of electricity, the price of oil and the price of carbon allowances. In this paper we develop a general stochastic model that can be adapted to other projects such as enhanced gas recovery (EGR) or industrial plants that use CO2 for either EOR or EGR with CCS. The model is calibrated with UK data and applied to help understand the conditions that generate the incentives needed for early investments in these technologies. Additionally, we analyse the risks of these investments. Investments with EOR and secondary DSF storage can only be profitable (NPV > 0) when there is a high long-term equilibrium price for oil of more than $56.38/barrel. When the investment decision can be made at any time, i.e. there is an option value, then the trigger value for optimal investment is significantly higher. 相似文献
994.
《Journal of Systems Architecture》2014,60(9):726-740
Cloud computing and virtualization technology have revolutionized general-purpose computing applications in the past decade. The cloud paradigm offers advantages through reduction of operation costs, server consolidation, flexible system configuration and elastic resource provisioning. However, despite the success of cloud computing for general-purpose computing, existing cloud computing and virtualization technology face tremendous challenges in supporting emerging soft real-time applications such as online video streaming, cloud-based gaming, and telecommunication management. These applications demand real-time performance in open, shared and virtualized computing environments. This paper identifies the technical challenges in supporting real-time applications in the cloud, surveys recent advancement in real-time virtualization and cloud computing technology, and offers research directions to enable cloud-based real-time applications in the future. 相似文献
995.
《Graphical Models》2014,76(4):224-238
We present algorithms for computing the differential geometry properties of lines of curvature of parametric surfaces. We derive a unit tangent vector, curvature vector, binormal vector, torsion, and algorithms to evaluate their higher-order derivatives of lines of curvature of parametric surfaces. Among these quantities, it is shown that the curvature and its first derivative of the lines of curvature lend a hand for the formation of curved plates in shipbuilding. We also visualize the twist of lines of curvature, which enables us to observe how much the osculating plane of the line of curvature turns about the tangent vector. 相似文献
996.
This paper deals with the problem of piecewise auto regressive systems with exogenous input(PWARX) model identification based on clustering solution. This problem involves both the estimation of the parameters of the affine sub-models and the hyper planes defining the partitions of the state-input regression. The existing identification methods present three main drawbacks which limit its effectiveness. First, most of them may converge to local minima in the case of poor initializations because they are based on the optimization using nonlinear criteria. Second, they use simple and ineffective techniques to remove outliers. Third, most of them assume that the number of sub-models is known a priori. To overcome these drawbacks, we suggest the use of the density-based spatial clustering of applications with noise(DBSCAN) algorithm. The results presented in this paper illustrate the performance of our methods in comparison with the existing approach. An application of the developed approach to an olive oil esterification reactor is also proposed in order to validate the simulation results. 相似文献
997.
998.
999.
Saadia Drissi Hicham Medromi 《通讯和计算机》2014,(1):52-58
The cloud computing introduces several changes in technology that have resulted a new ways for cloud providers to deliver their services to cloud consumers mainly in term of security risk assessment, thus, adapting a current risk assessment tools to cloud computing is a very difficult task due to its several characteristics that challenge the effectiveness of risk assessment approaches. Consequently, there is a need of risk assessment approach adapted to cloud computing. With such an approach, the cloud consumers can be guaranteed the effectiveness of data security and the cloud providers can win the trust of their cloud consumers. This paper requires the formalization of risk assessment method for conventional system as fundamental steps towards the development of flexible risk assessment approach regarding cloud consumers. 相似文献
1000.
Guofeng Zhao Minchang Yu Chuan Xu Hong Tang 《通讯和计算机》2014,(1):59-65
Generating web traffic is of great importance to analyze performance of new designed network, test new equipment, and verify new protocols, etc.. However, most existing traffic generation systems tend to simulate the overall characteristics of network traffic, while neglecting of the behavior of the individual users. Nevertheless, in principle, the emerged characteristics of overall traffic originate from the aggregation of individual users' access behavior. In this paper, we propose an innovative web traffic generating method based on user browsing behavior. Our method simulates the real users' accessing behavior, and visits the real web servers. Then, we design and develop a web traffic generating system. Because our system accesses the real websites, it can produce almost the real network traffic. The test results show that the traffic generated by our system has characteristics of burstiness and self-similarity, which are widely found and characterized in many real networks. In addition, our system can better reflect real user's web browsing behavior. 相似文献