首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9801篇
  免费   1287篇
  国内免费   1101篇
电工技术   220篇
综合类   853篇
化学工业   623篇
金属工艺   130篇
机械仪表   260篇
建筑科学   217篇
矿业工程   99篇
能源动力   124篇
轻工业   320篇
水利工程   180篇
石油天然气   156篇
武器工业   42篇
无线电   2595篇
一般工业技术   611篇
冶金工业   79篇
原子能技术   48篇
自动化技术   5632篇
  2024年   26篇
  2023年   119篇
  2022年   156篇
  2021年   202篇
  2020年   299篇
  2019年   203篇
  2018年   236篇
  2017年   306篇
  2016年   360篇
  2015年   509篇
  2014年   681篇
  2013年   746篇
  2012年   832篇
  2011年   879篇
  2010年   734篇
  2009年   790篇
  2008年   786篇
  2007年   807篇
  2006年   641篇
  2005年   589篇
  2004年   485篇
  2003年   407篇
  2002年   295篇
  2001年   252篇
  2000年   184篇
  1999年   130篇
  1998年   108篇
  1997年   78篇
  1996年   70篇
  1995年   64篇
  1994年   44篇
  1993年   37篇
  1992年   31篇
  1991年   20篇
  1990年   13篇
  1989年   9篇
  1988年   8篇
  1987年   9篇
  1986年   10篇
  1985年   4篇
  1984年   9篇
  1983年   10篇
  1982年   2篇
  1981年   3篇
  1980年   5篇
  1978年   1篇
排序方式: 共有10000条查询结果,搜索用时 328 毫秒
31.
Floods cause environmental hazards and influence on socio‐economic activities. In this study, we evaluated the historic flood frequency at a confluence in the middle Yellow River, China. A non‐parametric, multivariate, empirical, orthogonal function matrix model, which consists of time correlation coefficients of flood discharge at different gauge stations and flood events was used for the analysis of flood frequency. The model addresses the characteristics of confluent floods such as frequency and the probability in multiple tributary rivers. Flood frequency analysis is often coupled with studies of hydrological routing processes that reduce the flood capacity of the rivers. Flood routing to the confluence were simulated using kinematic wave theory. Results of this flood frequency analysis showed that flooding frequency has intensified in the past 500 years, especially during the 19th century. Flooding in streams above the confluence was more frequent than in streams below the confluence. Over the last 2000 years, concurrent flooding in multiple tributary rivers accounted for 67.5% of the total flooding in the middle Yellow River. Simulation of flood routing processes shows that the decreased flooding capacity and elevated river bed of the shrunken main channel leads to an increased flood wave propagation time (24–52.3 h) in the study area after 1995. The model indicates that human activities, such as constructions of the Sanmenxia Dam, have changed flood routing boundary conditions and have contributed to the increased flood frequency at the confluence. Copyright © 2007 John Wiley & Sons, Ltd.  相似文献   
32.
This is the last part of a four-part survey of optimization models and solution algorithms for winter road maintenance planning. The two first parts of the survey address system design problems for winter road maintenance. The third part concentrates mainly on vehicle routing problems for spreading operations. The aim of this paper is to provide a comprehensive survey of optimization models and solution methodologies for the routing of vehicles for plowing and snow disposal operations. We also review models for the fleet sizing and fleet replacement problems.  相似文献   
33.
林德秋 《电子质量》2002,(12):12-15,19
本文介绍HART协议物理层设备的测试要求、测试设备、测试方法及测试时的一些特别说明。  相似文献   
34.
胡褆  薛质 《电信快报》2002,(6):9-10,26
文章介绍无线移动自组网中动态源路由策略的路由发现和路由维护,并提出改进思路和今后研究的方向。  相似文献   
35.
Radio LANs are emerging in the computing world. They are supported by distinct configurations: on the one hand radio LANs with base stations and a wired backbone, on the other hand radio LANs implementing Intra-forwarding. Adding a new node in a radio LAN with Intra-forwarding, increases the reliability, while this reliability decreases with ad hoc or hub configurations. This advantage of Intra-forwarding is quantified. Intra-forwarding, as defined in the HIPERLAN standard, is based on a hop-by-hop policy and link check procedures. It is shown how point-to-point packets and broadcast packets are forwarded. The three basic components of Intra-forwarding needed to build and update the Intra-forwarding database are described. The originality of this approach is the use of multipoint relays which enable better scalability. The correctness of the Intra-forwarding protocol is proved and its cost is evaluated.  相似文献   
36.
In this paper we propose a new protocol called time-space label switching protocol (TSL-SP) in optical burst switching (OBS), and define the terms time-space label (TSL) and time-space routing (TSR). An important concept of response time is introduced in the time label mechanism. The TSL-SP is a new technology that can quickly and efficiently forward data with a label on the optical networks. A two-dimension label switched path (TD-LSP) can be set up, that is maintained and deleted by the TSL-SP. For clearly illuminating the operation principles of the TSL-SP, we propose a new approach of orthogonal time-space coordinates in which the vertical coordinate is the space label and the horizontal coordinate is the time label. The proposed TD-LSP can dramatically reduce the routing failure probability and greatly improve the link network efficiency compared with other signaling protocols. Moreover, we define the time-space label control plane that can achieve the higher efficiency. When the TSL-SP is applied to networks, switching performance can be improved by two orders compared to the switching performance with the conventional OBS signaling protocols. The fundamental goal of TSL-SP is to band the signaling and routing functions together closely. Also, the TSL-SP can reduce the complexity of the network, support automatic service offering, and provide traffic engineering.  相似文献   
37.
MANET(Mobile Ad Hoc Network)is a collection of wireless mobile nodes forming a temporary communica-tion network without the aid of any established infrastructure or centralized administration.The lifetime of a MANETdepends on the battery resources of the mobile nodes.So energy consumption may one of important design criterions forMANET.With changing the idle model to sleep model in the grid environment,this paper proposes a new energy-awarerouting protocol.Performance simulation results show that the proposed strategy can dynamic balance the traffic load in-side the whole network,extend the lifetime of a MANET,and without decreasing the throughput ratio.  相似文献   
38.
Nodes in a mobile ad hoc network are often vulnerable to failures. The failures could be either due to fading effects, battery drainage, or as a result of compromised nodes that do not participate in network operations. Intermittent node failures can disrupt routing functionalities. As such, it is important to provide redundancy in terms of providing multiple node-disjoint paths from a source to a destination. In line with this objective, we first propose a modified version of the widely studied ad hoc on-demand distance vector routing protocol to facilitate the discovery of multiple node-disjoint paths from a source to a destination. We find that very few of such paths can be found. Furthermore, as distances between sources and destinations increase, bottlenecks inevitably occur and thus, the possibility of finding multiple paths is considerably reduced. We conclude that it is necessary to place what we call reliable nodes (in terms of both being robust to failure and being secure) in the network to support efficient routing operations. We propose a deployment strategy that determines the positions and the trajectories of these reliable nodes such that we can achieve a framework for reliably routing information. We define a notion of a reliable path which is made up of multiple segments, each of which either entirely consists of reliable nodes, or contains a preset number of multiple paths between the end points of the segment. We show that the probability of establishing a reliable path between a random source and destination pair increases tremendously even with a small number of reliable nodes when we use our algorithm to appropriately position these reliable nodes.  相似文献   
39.
冯向辉 《世界电信》2003,16(12):57-59
北电网络提供的Contivity解决方案不仅可以使用户建立各种类型的VPN,而且还可以把这些VPN集成到未来的融合话音和数据的网络中。该方案已实现了安全路由选择;可通过多种技术支持鉴权功能,从而实现安全接入;允许用户使用其各自的安全性配置文件设置;其设计中没有“后门”,重点介绍了Contivity 2700网关的主要特征及其优势。  相似文献   
40.
S.M. Sadrameli  Wayne Seames  Mike Mann 《Fuel》2008,87(10-11):1776-1780
Higher heating values (HHVs) of fatty acids (C4–C18) were measured and correlated using linear least square regression analysis. Equations were developed for the estimation of the HHVs of saturated fatty acids from their molecular weight (Mw), density (DN) and carbon number (CN). These equations are HHV = 0.0518 Mw + 29.76, HHV = −93.4 DN + 122.67 and HHV = 0.7271 CN + 31.419 with R2 values of 0.9895, 0.9798, and 0.9895, respectively. The correlations may be used for HHV estimation of mixtures of fatty acids developed from vegetable oils.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号