全文获取类型
收费全文 | 8055篇 |
免费 | 1418篇 |
国内免费 | 1106篇 |
专业分类
电工技术 | 495篇 |
综合类 | 1362篇 |
化学工业 | 480篇 |
金属工艺 | 85篇 |
机械仪表 | 511篇 |
建筑科学 | 472篇 |
矿业工程 | 98篇 |
能源动力 | 101篇 |
轻工业 | 247篇 |
水利工程 | 250篇 |
石油天然气 | 232篇 |
武器工业 | 162篇 |
无线电 | 1470篇 |
一般工业技术 | 1268篇 |
冶金工业 | 108篇 |
原子能技术 | 77篇 |
自动化技术 | 3161篇 |
出版年
2024年 | 58篇 |
2023年 | 166篇 |
2022年 | 331篇 |
2021年 | 362篇 |
2020年 | 435篇 |
2019年 | 360篇 |
2018年 | 375篇 |
2017年 | 390篇 |
2016年 | 427篇 |
2015年 | 402篇 |
2014年 | 532篇 |
2013年 | 567篇 |
2012年 | 607篇 |
2011年 | 594篇 |
2010年 | 462篇 |
2009年 | 472篇 |
2008年 | 483篇 |
2007年 | 507篇 |
2006年 | 471篇 |
2005年 | 365篇 |
2004年 | 317篇 |
2003年 | 259篇 |
2002年 | 224篇 |
2001年 | 194篇 |
2000年 | 193篇 |
1999年 | 143篇 |
1998年 | 108篇 |
1997年 | 102篇 |
1996年 | 76篇 |
1995年 | 104篇 |
1994年 | 73篇 |
1993年 | 51篇 |
1992年 | 60篇 |
1991年 | 48篇 |
1990年 | 52篇 |
1989年 | 48篇 |
1988年 | 43篇 |
1987年 | 18篇 |
1986年 | 19篇 |
1985年 | 16篇 |
1984年 | 10篇 |
1983年 | 7篇 |
1982年 | 13篇 |
1981年 | 6篇 |
1980年 | 6篇 |
1978年 | 3篇 |
1977年 | 5篇 |
1976年 | 3篇 |
1964年 | 2篇 |
1959年 | 2篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
61.
一维随机粗糙表面散射特征的数值分析 总被引:3,自引:1,他引:3
本文在Kirchhoff近似基础上,利用数值积分方法分析了一维随机粗糙表面的散射特征。结果显示随着粗糙度的增大,单次散射峰值由连续地向后向移动,其强度不断降低。峰值宽度增加。在一个较窄的粗糙度范围内,散射场对称于表面法线呈近似余弦分布而接近于理想朗伯体。当粗糙度超过这一范围时,散射峰值将由线向后向移动,并在粗糙度很大时稳定在后向附近。 相似文献
62.
本文分析了离散随机变量熵与方差及有关微分熵的某种关系,给出了离散随机变量熵的一个上界,改进了T.M.Cover与J.A.Thomas关于离散熵的上界的已有结果[1],并以图和表的方式举出一些实例加以比较。 相似文献
63.
采用同位协同随机建模技术,以反映储层含油性的电阻率测井参数为主变量,以地震波阻抗为协变量,对储集层的合油砂岩厚度进行了预测。根据大庆葡南油田葡333区块有效储层下限的解释标准,对电阻率随机模拟得到的多个实现进行解释,得到各实现的含油砂岩厚度,并以10m含油砂岩厚度为风险门槛值分析了该区钻井风险性。新、老钻井的钻遇情况分析表明,应用序贯高斯同位协同地震属性数据的模拟方法进行储层预测的精度较高,利用多个随机模拟实现的差异性进行预测结果的风险性评价可以有效地降低钻井风险。 相似文献
64.
Modeling and performance analysis of VI‐CRA: A congestion control algorithm for vehicular networks 下载免费PDF全文
This study proposes a Vehicle ID‐based CAM Rate Adaptation (VI‐CRA) algorithm for beacon messages in the vehicular network. Foremost, an improved vehicle ID–based analytical model is proposed at the MAC layer of vehicular network. The model weighs the random back‐off number chosen by vehicles participating in the back‐off process, with the vehicle ID incorporated in their respective CAMs. This eventually leads to the selection of a vehicle ID–based random back‐off number, minimizing the probability of collision due to same back‐off number selection. It is worth noting that the improved analytical model outperforms the existing works in terms of average packet delay since only one fourth of the contention window size is used throughout the simulation. To enhance the performance of the analytical model, the paper incorporates a congestion control algorithm, by adapting the rate of CAM broadcast over the control channel. The algorithm is designed considering a wide range of scenarios, ranging from nonsaturated to extremely saturated network (in terms of collision probability) and sparsely distributed to teemed network (in terms of vehicular density). For better analyses of simulation results, the algorithm is applied over different vehicle ID–based back‐off numbers. Simulation results for all the back‐off numbers show that vehicle ID–based CAM rate adaptation algorithm performs better than the traditional fixed CAM rate IEEE 802.11p, even at high vehicular density. 相似文献
65.
Manlio Bacco Marco Colucci Alberto Gotta Charilaos Kourogiorgas Athanasios D. Panagopoulos 《International Journal of Satellite Communications and Networking》2019,37(4):331-342
The use of unmanned aerial vehicles (UAVs) is rising in several application fields. This work deals with the communication challenges in UAV swarms, or flying ad hoc network (FANET), when taking into account non–line‐of‐sight scenarios. The use of satellites is a necessity in such operating conditions; thus, this work provides architectural considerations and performance assessments when several (FANETs) share an uplink random access satellite channel, fed with M2M/IoT traffic generated from on‐board sensors, to be reliably delivered to a remote ground destination. 相似文献
66.
In this work we introduce two practical and interesting models of ad-hoc mobile networks: (a) hierarchical ad-hoc networks, comprised of dense subnetworks of mobile users interconnected by a very fast yet limited backbone infrastructure, (b) highly changing ad-hoc networks, where the deployment area changes in a highly dynamic way and is unknown to the protocol. In such networks, we study the problem of basic communication, i.e., sending messages from a sender node to a receiver node. For highly changing networks, we investigate an efficient communication protocol exploiting the coordinated motion of a small part of an ad-hoc mobile network (the runners support) to achieve fast communication. This protocol instead of using a fixed sized support for the whole duration of the protocol, employs a support of some initial (small) size which adapts (given some time which can be made fast enough) to the actual levels of traffic and the (unknown and possibly rapidly changing) network area, by changing its size in order to converge to an optimal size, thus satisfying certain Quality of Service criteria. Using random walks theory, we show that such an adaptive approach is, for this class of ad-hoc mobile networks, significantly more efficient than a simple non-adaptive implementation of the basic runners support idea, introduced in [9,10]. For hierarchical ad-hoc networks, we establish communication by using a runners support in each lower level of the hierarchy (i.e., in each dense subnetwork), while the fast backbone provides interconnections at the upper level (i.e., between the various subnetworks). We analyze the time efficiency of this hierarchical approach. This analysis indicates that the hierarchical implementation of the support approach significantly outperforms a simple implementation of it in hierarchical ad-hoc networks. Finally, we discuss a possible combination of the two approaches above (the hierarchical and the adaptive ones) that can be useful in ad-hoc networks that are both hierarchical and highly changing. Indeed, in such cases the hierarchical nature of these networks further supports the possibility of adaptation. 相似文献
67.
68.
69.
70.
Cruselles Ernesto J. Soriano Miguel Melús José Luis 《Wireless Personal Communications》1998,7(1):69-88
The prime characteristic of spread spectrum modulated signals is that their bandwidth is greater than the information rate. In this way a redundancy is introduced that allows the severe levels of inteference inherent in the transmission of digital information over radio and satellite links to be overcome. Current spread spectrum applications are primarily in military communications; nevertheless, there is growing interest in this technique for third generation mobile radio networks (UMTS, FPLTS, etc.) with open discussion regarding the practicality of using a multiple access system based on spread spectrum techniques (CDMA). However, in order to support as many users in the same bandwidth as other multiple access techniques such as TDMA or FDMA, it is important how to generate large families of sequences that present low cross-correlation. The aim of this paper is to describe a spreading codes generator that can produce a large number of PN sequences with good properties of auto- and cross-correlation. Moreover, the codes generated shows high unpredictability and good statistical behaviour. This also allows the implementation of some features that are common on military networks such as message privacy (increasingly important in commercial networks) without additional cost. The structure presented shows itself to be advantageous for high speed generation of codes at a low cost, low power consumption (allowing longer life for batteries), small size and simplicity of implementation, essential ingredients for commercial equipment. Another attractive feature is its structural parallelism, useful in VLSI implementations. All of these features render it potentially suitable for the implementation of channel bandwidth sharing systems in future wireless personal communications networks. 相似文献