全文获取类型
收费全文 | 14922篇 |
免费 | 1420篇 |
国内免费 | 1887篇 |
专业分类
电工技术 | 577篇 |
技术理论 | 2篇 |
综合类 | 848篇 |
化学工业 | 311篇 |
金属工艺 | 153篇 |
机械仪表 | 722篇 |
建筑科学 | 366篇 |
矿业工程 | 146篇 |
能源动力 | 134篇 |
轻工业 | 84篇 |
水利工程 | 105篇 |
石油天然气 | 92篇 |
武器工业 | 84篇 |
无线电 | 2909篇 |
一般工业技术 | 296篇 |
冶金工业 | 117篇 |
原子能技术 | 45篇 |
自动化技术 | 11238篇 |
出版年
2024年 | 18篇 |
2023年 | 126篇 |
2022年 | 359篇 |
2021年 | 540篇 |
2020年 | 448篇 |
2019年 | 274篇 |
2018年 | 308篇 |
2017年 | 274篇 |
2016年 | 297篇 |
2015年 | 440篇 |
2014年 | 868篇 |
2013年 | 819篇 |
2012年 | 1079篇 |
2011年 | 1493篇 |
2010年 | 954篇 |
2009年 | 840篇 |
2008年 | 1007篇 |
2007年 | 1181篇 |
2006年 | 1154篇 |
2005年 | 1080篇 |
2004年 | 860篇 |
2003年 | 847篇 |
2002年 | 709篇 |
2001年 | 493篇 |
2000年 | 427篇 |
1999年 | 359篇 |
1998年 | 248篇 |
1997年 | 186篇 |
1996年 | 132篇 |
1995年 | 90篇 |
1994年 | 74篇 |
1993年 | 58篇 |
1992年 | 38篇 |
1991年 | 19篇 |
1990年 | 24篇 |
1989年 | 22篇 |
1988年 | 20篇 |
1987年 | 7篇 |
1986年 | 15篇 |
1985年 | 5篇 |
1984年 | 14篇 |
1983年 | 8篇 |
1982年 | 6篇 |
1981年 | 3篇 |
1980年 | 2篇 |
1979年 | 1篇 |
1977年 | 2篇 |
1972年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
101.
电信管理及运营支撑是爱立信公司为公用电信网提供的有关管理及运营支撑功能的综合方案,本文介绍了其中的公网管理系统和蜂窝移动网络管理系统。 相似文献
102.
Aeromagnetic compensation using neural networks 总被引:1,自引:0,他引:1
Peter M. Williams 《Neural computing & applications》1993,1(3):207-214
Airborne magnetic surveys in geophysical exploration can be subject to interference effects from the aircraft. Principal sources are the permanent magnetism of various parts of the aircraft, induction effects created by the earth's magnetic field and eddy-current fields produced by the aircraft's manoeuvres. Neural networks can model these effects as functions of roll, pitch, heading and their time derivatives, together with vertical acceleration, charging currents to the generator, etc., without assuming an explicit physical model. Separation of interference effects from background regional and diurnal fields can also be achieved in a satisfactory way. 相似文献
103.
The reachability of a strongly connected network may be destroyed after link damage,Since many networds have directed links with the potential for reversal,the reachability may be restored by reversing the direction of links.In this paper,the reliability of a network that allows reversal of links in discussed. 相似文献
104.
105.
本文提出了在异质型互连网络环境下为实现统一的网络管理可能出现的管理信息共享问题。为此,作者深入探讨,分析了目前国外为实现这种管理信息共享所采用的几种迁移方法;协议迁移,接口迁移和MIB迁移。 相似文献
106.
通过新设备、新技术的引进和应用。重庆索特股份有限公司加强设备管理,不管是在规范性上,还是在可操作性上,都取得了明显的效果。去年全年设备维修费用大幅度降低,经济效益明显。 相似文献
107.
本文从地域通信网的特点出发,分析了以前所使用的路由选择方法的优缺点,提出了网控支持的基于业务量的动态中币管理方法,并描述了该路由管理方法的分层结构和在地域网网络管理系统中的具体实现。 相似文献
108.
This paper addresses the problem of bandwidth allocation under the weighted maximum rate constrained link sharing policy and proves a key theory in the condition of allocation termination. We propose several algorithms with various worst-case and average-case time complexities, and evaluate their computation elapse times. 相似文献
109.
Kevin Burns 《Information Sciences》2006,176(11):1570-1589
Bayesian inference provides a formal framework for assessing the odds of hypotheses in light of evidence. This makes Bayesian inference applicable to a wide range of diagnostic challenges in the field of chance discovery, including the problem of disputed authorship that arises in electronic commerce, counter-terrorism and other forensic applications. For example, when two documents are so similar that one is likely to be a hoax written from the other, the question is: Which document is most likely the source and which document is most likely the hoax? Here I review a Bayesian study of disputed authorship performed by a biblical scholar, and I show that the scholar makes critical errors with respect to several issues, namely: Causal Basis, Likelihood Judgment and Conditional Dependency. The scholar’s errors are important because they have a large effect on his conclusions and because similar errors often occur when people, both experts and novices, are faced with the challenges of Bayesian inference. As a practical solution, I introduce a graphical system designed to help prevent the observed errors. I discuss how this decision support system applies more generally to any problem of Bayesian inference, and how it differs from the graphical models of Bayesian Networks. 相似文献
110.
Chih-Hung Wang Author Vitae Chih-Heng Yin Author Vitae Author Vitae 《Computers & Electrical Engineering》2006,32(5):364-375
The most efficient approach to a fair exchange is to use an off-line trusted third party (TTP for short) who gets involved only when a dispute between two parties occurs. However, exchanged secrets that are not protected properly may be exposed to the TTP when one of these two parties asks the TTP to mediate the dispute. The first work to protect exchanged secrets from TTP’s misuse was proposed by Franklin and Reiter in 1997. They provided an on-line semi-trusted third party instead of an off-line third party for a fair exchange. Their schemes forced the TTP to take part in the protocol for all the cases, and thus, deemed to be impractical.The present paper, introduces several models, including single and multiple TTPs, to focus the attention not only on security properties, but also on reliability functions. In the single TTP mode, our new scheme can protect the exchanged data through an efficient exchange protocol, whereas in the multiple TTP mode, we proposed an approach to balance the security level with the reliability of the system. 相似文献