全文获取类型
收费全文 | 28376篇 |
免费 | 2890篇 |
国内免费 | 2454篇 |
专业分类
电工技术 | 1514篇 |
技术理论 | 1篇 |
综合类 | 2332篇 |
化学工业 | 1537篇 |
金属工艺 | 341篇 |
机械仪表 | 869篇 |
建筑科学 | 643篇 |
矿业工程 | 216篇 |
能源动力 | 448篇 |
轻工业 | 219篇 |
水利工程 | 225篇 |
石油天然气 | 168篇 |
武器工业 | 111篇 |
无线电 | 6593篇 |
一般工业技术 | 1570篇 |
冶金工业 | 457篇 |
原子能技术 | 53篇 |
自动化技术 | 16423篇 |
出版年
2024年 | 143篇 |
2023年 | 496篇 |
2022年 | 592篇 |
2021年 | 666篇 |
2020年 | 830篇 |
2019年 | 722篇 |
2018年 | 680篇 |
2017年 | 873篇 |
2016年 | 1004篇 |
2015年 | 1166篇 |
2014年 | 1649篇 |
2013年 | 1858篇 |
2012年 | 1844篇 |
2011年 | 2145篇 |
2010年 | 1692篇 |
2009年 | 2016篇 |
2008年 | 2125篇 |
2007年 | 2068篇 |
2006年 | 1677篇 |
2005年 | 1447篇 |
2004年 | 1254篇 |
2003年 | 1090篇 |
2002年 | 967篇 |
2001年 | 828篇 |
2000年 | 746篇 |
1999年 | 595篇 |
1998年 | 513篇 |
1997年 | 453篇 |
1996年 | 362篇 |
1995年 | 275篇 |
1994年 | 214篇 |
1993年 | 176篇 |
1992年 | 126篇 |
1991年 | 73篇 |
1990年 | 53篇 |
1989年 | 40篇 |
1988年 | 31篇 |
1987年 | 24篇 |
1986年 | 19篇 |
1985年 | 46篇 |
1984年 | 41篇 |
1983年 | 37篇 |
1982年 | 41篇 |
1981年 | 4篇 |
1980年 | 3篇 |
1979年 | 8篇 |
1978年 | 4篇 |
1977年 | 1篇 |
1976年 | 2篇 |
1951年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
91.
92.
93.
This paper addresses the explicit synchronisation of heterogeneous dynamics networks via three-layer communication framework. The main contribution is to propose an explicit synchronisation algorithm, in which the synchronisation errors of all the agents are decoupled. By constructing a three-layer node model, the proposed algorithm removes the assumptions that the topology is fixed and the synchronisation process is coupled. By introducing appropriate assumptions, the algorithm leads to a class of explicit synchronisation protocols based on the states of agents in different layers. It is proved in the sense of Lyapunov that, if the dwell time is larger than a threshold, the explicit synchronisation can be achieved for closed-loop heterogeneous dynamics networks under switching topologies. The results are further extended to the cases in which the switching topologies are only frequently but not always connected. Simulation results are presented with four single-link manipulators to verify the theoretical analysis. 相似文献
94.
The objective of this study is to provide a framework for relocating or reconfiguring existing pollution monitoring station networks by using feature selection and data mining techniques. This methodology enables a partial redesign based on the maximization of the available information that is gathered by the pollution networks by the optimal data mining technique. It also considers requirements of the decision makers, like potential target places, etc.Since this methodology is based on the quality of forecasting, it can also be useful for auditing and forecasting. A case study is included in this paper. In light of the prediction results, a new way to relocate the existing monitoring station is proposed. 相似文献
95.
Opportunistic routing is a candidate for multihop wireless routing where the network topology and radio channels vary rapidly. However, there are not many opportunistic routing algorithms that can be implemented in a real multihop wireless network while exploiting the node mobility. It motivates us to implement an opportunistic routing, random basketball routing (BR), in a real multi-robot network to see if it can enhance the capacity of the multihop network as mobility increases. For implementation purposes, we added some features, such as destination RSSI measuring, a loop-free procedure and distributed relay probability updating, to the original BR. We carried out the experiments on a real multi-robot network and compared BR with AODV combined with CSMA/CA (routing + MAC protocol). We considered both static and dynamic scenarios. Our experiments are encouraging in that BR outperforms AODV + CSMA/CA, particularly in dynamic cases; the throughput of BR is 6.6 times higher than that of AODV + CSMA/CA. BR with dynamic networks shows 1.4 times higher throughput performance than BR with static networks. We investigate the performance of BR in the large-scale network using NS-2 simulation. We verify the effect of node density, speed, destination beacon signal and loop-free procedure. According to the large-scale simulation, the end-to-end throughput grows with the node speed. 相似文献
96.
Ralf Steinmetz Author VitaeAndré KönigAuthor Vitae 《Performance Evaluation》2011,68(9):750-767
Recent developments in the area of decentralized and infrastructureless systems opened avenues for novel applications. Along with these new technologies, new questions regarding their operational bounds in terms of e.g. scalability and security arose. Due to the sparse presence of real-world decentralized and infrastructureless systems, new protocols and applications have to be scrutinized by means of simulation, in (small-scale) testbeds, and by analytical models. In this paper, we discuss challenges of evaluating security mechanisms for mobile ad hoc networks and peer-to-peer systems. We focus on harmonizing predictions of analytical models and results obtained from simulation studies and testbed experiments. 相似文献
97.
This paper investigates packet scheduling in the context of Self-Optimizing Networks, and demonstrates how to improve coverage dynamically by adjusting the scheduling strategy. We focus on α-fair schedulers, and we provide methods for calculating the scheduling gain, including several closed form formulas. Scheduling gain is analyzed for different fading models, with a particular focus on the frequency-selective channel. We then propose a coverage-capacity self-optimization algorithm based on α-fair schedulers. A use case illustrates the implementation of the algorithm and simulation results show that important coverage gains are achieved at the expense of very little computing power. 相似文献
98.
Luis Garcés-Erice 《Parallel Computing》2011,37(8):379-391
The software in modern systems has become too complex to make accurate predictions about their performance under different configurations. Real-time or even responsiveness requirements cannot be met because it is not possible to perform admission control for new or changing tasks if we cannot tell how their execution affects the other tasks already running. Previously, we proposed a resource-allocation middleware that manages the execution of tasks in a complex distributed system with real-time requirements. The middleware behavior can be modeled depending on the configuration of the tasks running, so that the performance of any given configuration can be calculated. This makes it possible to have admission control in such a system, but the model requires knowledge of run-time parameters. We propose the utilization of machine-learning algorithms to obtain the model parameters, and be able to predict the system performance under any configuration, so that we can provide a full admission control mechanism for complex software systems. In this paper, we present such an admission control mechanism, we measure its accuracy in estimating the parameters of the model, and we evaluate its performance to determine its suitability for a real-time or responsive system. 相似文献
99.
100.