全文获取类型
收费全文 | 36109篇 |
免费 | 3228篇 |
国内免费 | 2073篇 |
专业分类
电工技术 | 4529篇 |
技术理论 | 3篇 |
综合类 | 3482篇 |
化学工业 | 558篇 |
金属工艺 | 342篇 |
机械仪表 | 1667篇 |
建筑科学 | 765篇 |
矿业工程 | 646篇 |
能源动力 | 157篇 |
轻工业 | 296篇 |
水利工程 | 281篇 |
石油天然气 | 262篇 |
武器工业 | 383篇 |
无线电 | 12740篇 |
一般工业技术 | 999篇 |
冶金工业 | 870篇 |
原子能技术 | 86篇 |
自动化技术 | 13344篇 |
出版年
2024年 | 128篇 |
2023年 | 392篇 |
2022年 | 613篇 |
2021年 | 804篇 |
2020年 | 850篇 |
2019年 | 571篇 |
2018年 | 669篇 |
2017年 | 923篇 |
2016年 | 1022篇 |
2015年 | 1440篇 |
2014年 | 2409篇 |
2013年 | 2103篇 |
2012年 | 3021篇 |
2011年 | 3083篇 |
2010年 | 2333篇 |
2009年 | 2138篇 |
2008年 | 2430篇 |
2007年 | 2601篇 |
2006年 | 2327篇 |
2005年 | 2091篇 |
2004年 | 1746篇 |
2003年 | 1775篇 |
2002年 | 1201篇 |
2001年 | 1007篇 |
2000年 | 746篇 |
1999年 | 640篇 |
1998年 | 415篇 |
1997年 | 380篇 |
1996年 | 341篇 |
1995年 | 284篇 |
1994年 | 220篇 |
1993年 | 134篇 |
1992年 | 88篇 |
1991年 | 54篇 |
1990年 | 37篇 |
1989年 | 55篇 |
1988年 | 33篇 |
1987年 | 13篇 |
1986年 | 14篇 |
1985年 | 21篇 |
1984年 | 27篇 |
1982年 | 24篇 |
1981年 | 13篇 |
1980年 | 12篇 |
1979年 | 14篇 |
1977年 | 15篇 |
1964年 | 13篇 |
1959年 | 11篇 |
1956年 | 12篇 |
1955年 | 13篇 |
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
41.
基于CC1100的无线抄表系统 总被引:1,自引:0,他引:1
介绍了一种利用单片机和CC1100无线通讯芯片构成的无线抄表系统,叙述了工作原理和实现过程,并重点介绍了CC1100的电磁波唤醒功能和原理,给出了详细的结论. 相似文献
42.
In today's Internet routing infrastructure, designers have addressed scaling concerns in routing constrained multiobjective optimization problems examining latency and mobility concerns as a secondary constrain. In tactical Mobile Ad-hoc Network (MANET), hubs can function based on the work plan in various social affairs and the internally connected hubs are almost having the related moving standards where the topology between one and the other are tightly coupled in steady support by considering the touchstone of hubs such as a self-sorted out, self-mending and self-administration. Clustering in the routing process is one of the key aspects to increase MANET performance by coordinating the pathways using multiple criteria and analytics. We present a Group Adaptive Hybrid Routing Algorithm (GAHRA) for gathering portability, which pursues table-driven directing methodology in stable accumulations and on-request steering strategy for versatile situations. Based on this aspect, the research demonstrates an adjustable framework for commuting between the table-driven approach and the on-request approach, with the objectives of enhancing the output of MANET routing computation in each hub. Simulation analysis and replication results reveal that the proposed method is promising than a single well-known existing routing approach and is well-suited for sensitive MANET applications. 相似文献
43.
This paper presents a quantitative approach to multimodal discourse analysis for analyzing online collaborative learning. The coding framework draws together the fields of systemic functional linguistics and Activity Theory to analyze interactions between collaborative-, content- and technology-related discourse. The approach is used to examine how the task subject matter, the activity design, and the choice of interface affected interaction and collaboration for a computing course conducted in a web-conferencing environment. The analysis revealed the critical impact of activity design on the amount and type of discourse that transpired. Student-centred designs resulted in over six times more student discourse as compared to teacher-centred designs and created a learning environment where students took greater ownership over the tasks and contributed more to the content-based discussion. The paper also incorporates a rationale for the approach to coding and a reflection on its efficacy for discourse analysis in technology-based learning environments. 相似文献
44.
45.
In sensor networks, a compromised node can either generate fabricated reports with false votes or inject false votes into real reports, which causes severe damage such as false alarms, energy drain and information loss. An interleaved hop-by-hop authentication (IHA) scheme addresses the former attack by detecting and filtering false reports in a deterministic and hop-by-hop fashion. Unfortunately, in IHA, all en-route nodes must join to verify reports while only a few are necessary to the authentication procedure. In this paper, we propose a fuzzy-based interleaved multi-hop authentication scheme based on IHA. In our scheme, the fuzzy logic system only selects some nodes for verification based on the network characteristics. Moreover, we apply a voting method and a hash-based key assignment mechanism to improve network security. Through performance evaluation, the proposed scheme is found to save up to 13% of the energy consumption and to provide more network protection compared to IHA. 相似文献
46.
一种实时可靠的移动无线传感器网络贪婪地理路由协议 总被引:2,自引:0,他引:2
随着定位装置和定位算法的成熟,基于地理位置信息的贪婪地理路由协议受到广泛的关注与研究.但是,在移动无线传感器网络贪婪地理路由协议中,周期性信标交换条件下采用贪婪转发策略会引起通信暂盲现象,造成数据的丢失.基于右手法则的面遍历算法,对路由空洞的形状不能进行感知,数据转发具有很大的盲目性,转发路径有时比最优路径长很多,造成数据传输时延的增加.针对上述问题提出一种实时可靠的QoS贪婪地理路由协议,该协议通过自适应信标交换算法、基于过渡带思想的贪婪转发策略和基于路标迭代提取和剔除的自适应空洞处理算法,使得数据分组能够实时可靠地传输.NS-2仿真结果表明该协议在不增加控制开销的情况下,能够有效减缓通信暂盲现象,高效地处理路由空洞问题,大大提高协议的实时性和可靠性,可应用于对实时性和可靠性有一定要求的大规模移动无线传感网络. 相似文献
47.
48.
49.
50.