全文获取类型
收费全文 | 7510篇 |
免费 | 707篇 |
国内免费 | 505篇 |
专业分类
电工技术 | 648篇 |
综合类 | 889篇 |
化学工业 | 194篇 |
金属工艺 | 439篇 |
机械仪表 | 756篇 |
建筑科学 | 1067篇 |
矿业工程 | 185篇 |
能源动力 | 129篇 |
轻工业 | 100篇 |
水利工程 | 111篇 |
石油天然气 | 136篇 |
武器工业 | 59篇 |
无线电 | 1385篇 |
一般工业技术 | 394篇 |
冶金工业 | 255篇 |
原子能技术 | 46篇 |
自动化技术 | 1929篇 |
出版年
2024年 | 22篇 |
2023年 | 71篇 |
2022年 | 172篇 |
2021年 | 211篇 |
2020年 | 221篇 |
2019年 | 144篇 |
2018年 | 165篇 |
2017年 | 200篇 |
2016年 | 234篇 |
2015年 | 334篇 |
2014年 | 626篇 |
2013年 | 460篇 |
2012年 | 607篇 |
2011年 | 642篇 |
2010年 | 420篇 |
2009年 | 448篇 |
2008年 | 397篇 |
2007年 | 550篇 |
2006年 | 507篇 |
2005年 | 438篇 |
2004年 | 343篇 |
2003年 | 320篇 |
2002年 | 246篇 |
2001年 | 240篇 |
2000年 | 138篇 |
1999年 | 121篇 |
1998年 | 83篇 |
1997年 | 64篇 |
1996年 | 55篇 |
1995年 | 51篇 |
1994年 | 51篇 |
1993年 | 33篇 |
1992年 | 28篇 |
1991年 | 14篇 |
1990年 | 18篇 |
1989年 | 9篇 |
1988年 | 10篇 |
1987年 | 3篇 |
1986年 | 2篇 |
1985年 | 2篇 |
1984年 | 5篇 |
1982年 | 2篇 |
1980年 | 2篇 |
1978年 | 2篇 |
1975年 | 2篇 |
1966年 | 1篇 |
1965年 | 1篇 |
1964年 | 1篇 |
1959年 | 1篇 |
1954年 | 1篇 |
排序方式: 共有8722条查询结果,搜索用时 31 毫秒
51.
Makoto Kasu Rangaiya Rao Susumu Noda Akio Sasaki 《Journal of Electronic Materials》1991,20(9):691-693
Properties of theDX centers in Al0.5Ga0.5As bulk alloy (b-AL), (AlAs)2 (GaSa)2 ordered superlattice (o-SL) and (AlAs)
m
(GaAs)
n
disordered superlattice (d-SL) (m = 1, 2, 3,n = 1, 2, 3) with the same macroscopic composition were measured and compared. By deconvolution of deep level transient spectroscopy
(DLTS) spectrum due to theDX center, we have found a decrease in the number of separate peaks in DLTS spectrum in an intentionally atomic ordered arrangement.
Visiting Scholar of the Japan Society for the Promotion of Science. On leave from Department of Electrical Engineering, San
Jose State University, San Jose, California 95192-0084, USA. 相似文献
52.
Ioannis D. Moscholios Michael D. Logothetis 《International Journal of Communication Systems》2006,19(1):67-93
We consider a single link loss system of quasi‐random input, described by the Engset multirate loss model (EnMLM). Blocked calls may once reattempt to be connected to the system requiring less bandwidth; then the system is described by the single retry model for finite sources (f‐SRM). The EnMLM and the f‐SRM are extended with the single threshold finite source model (f‐STM), where calls may attempt to be connected to the system with less bandwidth requirements, according to the link occupancy, before blocking occurs. We focus on CBP equalization in the EnMLM, f‐SRM and f‐STM, under the bandwidth reservation (BR) policy. For this analysis, we apply two approximate methods, the Roberts' method and the method of reverse transition rates (RTR), which lead to a recursive CBP calculation. We evaluate the accuracy of the above models under the BR policy by comparing the analytical with simulation CBP results, based on the relative approximation errors (RAE). The results are highly satisfactory because they show that the proposed models (formulas) lead to small RAE. Copyright © 2005 John Wiley & Sons, Ltd. 相似文献
53.
Motonobu Yoshikawa Hiroshi Nakajima Takeshi Inada Yasushi Harada Masahiko Amano Yuji Nakata 《Electrical Engineering in Japan》1995,115(7):29-39
A new practical method is proposed which gives a quasi-optimal solution of the dynamic load-dispatching problem formulated by a multiconstraint multiobjective optimization problem. Here, the multiple constraints are rate reserve constraints and power flow ones, and the multiple objectives are fuel cost and CO2 emission. The proposed method is an integration of the following three techniques: (1) “Group Dispatch Scheme,” which is developed by the authors, is used to satisfy a violated constraint easily. This scheme consists of three steps. The first step is to classify all generators into two groups. One is the group which should be more loaded to satisfy the violated constraint, and the other is the should-be less loaded group. The second step is to add some load to the former group, and to subtract the same load from the latter. The third step is to dispatch each group load to each groups generators, respectively; (2) the dynamic load-dispatching algorithm is used which provides, in practical time, quasi-optimal generation trajectories; (3) the conventional weighting parametric method is used to obtain a Pareto optimal solution of multiobjective problems. The effectiveness of the method is clarified by a computer simulation on the actual power system of Kansai Electric Power Company. 相似文献
54.
Wayne S. Walker Josef M. Kellndorfer Michael Hoppus 《Remote sensing of environment》2007,109(4):482-499
Exploiting synergies afforded by a host of recently available national-scale data sets derived from interferometric synthetic aperture radar (InSAR) and passive optical remote sensing, this paper describes the development of a novel empirical approach for the provision of regional- to continental-scale estimates of vegetation canopy height. Supported by data from the 2000 Shuttle Radar Topography Mission (SRTM), the National Elevation Dataset (NED), the LANDFIRE project, and the National Land Cover Database (NLCD) 2001, this paper describes a data fusion and modeling strategy for developing the first-ever high-resolution map of canopy height for the conterminous U.S. The approach was tested as part of a prototype study spanning some 62,000 km2 in central Utah (NLCD mapping zone 16). A mapping strategy based on object-oriented image analysis and tree-based regression techniques is employed. Empirical model development is driven by a database of height metrics obtained from an extensive field plot network administered by the USDA Forest Service-Forest Inventory and Analysis (FIA) program. Based on data from 508 FIA field plots, an average absolute height error of 2.1 m (r = 0.88) was achieved for the prototype mapping zone. 相似文献
55.
省的基本原理及省转移的个案分析 总被引:1,自引:0,他引:1
分析了省的存在原理和转移原则,并对省转移的实际应用进行了实例对比分析,总结了省道转移中前胸省造型设计的规律,进一步探讨了省在实际设计中的应用规则。 相似文献
56.
Buffer overflow vulnerabilities are one of the most commonly and widely exploited security vulnerabilities in programs. Most existing solutions for avoiding buffer overflows are either inadequate, inefficient or incompatible with existing code. In this paper, we present a novel approach for transparent and efficient runtime protection against buffer overflows. The approach is implemented by two tools: Type Information Extractor and Depositor (TIED) and LibsafePlus. TIED is first used on a binary executable or shared library file to extract type information from the debugging information inserted in the file by the compiler and reinsert it in the file as a data structure available at runtime. LibsafePlus is a shared library that is preloaded when the program is run. LibsafePlus intercepts unsafe C library calls such as strcpy and uses the type information made available by TIED at runtime to determine whether it would be ‘safe’ to carry out the operation. With our simple design we are able to protect most applications with a performance overhead of less than 10%. Copyright © 2006 John Wiley & Sons, Ltd. 相似文献
57.
58.
The employment of the Zn(Se,Te) pseudo-graded contacting scheme to p-type ZnSe-based alloys contributes directly to the recent
demonstration of room temperature continuous-wave operation of II– VI green-blue laser diodes. Contact ohmicity is maintained
down to cryogenic temperatures which enabled the investigation of electrical transport properties associated with the p-type
nitrogen-doped ZnSe, Zn(S,Se), and (Zn,Mg)(S,Se). The observation of both persistent photoconductivity and a metastable population
of holes which are in thermodynamic equilibrium with hydrogenic acceptors having reduced activation energy suggests the presence
of a DX-like behavior for holes in p-type (Zn,Mg)(S,Se). 相似文献
59.
文章提出了一种利用无线传感器网络无线信号接收强度(RSSI)和移动锚节点轨迹来获得待定节点位置的算法。该算法在有多个可移动锚节点的情况下,定位将会更加高效。在定位阶段,通过RSSI测得锚节点到待定节点的距离,并利用三个以上移动锚节点的坐标(包括三个)来求解圆的方程,计算出待定节点的位置。 相似文献
60.
随着通信和信息技术的跨越式发展,传统呼叫中心已经难以满足企业快速增长的需求,同时以客户为中心和以服务为导向的经营理念对新一代联络中心提出了更高的要求。在联络中心技术快速革新的背景下,文中以软交换、NGN和分布式技术为基础,深入研究了基于融合技术的新一代联络中心的系统架构和软交换平台的逻辑关系,构建了支持全媒体业务和标准化SIP的统一通信平台。文章以联络中心中实时和非实时业务为例,分析设计了适合联络中心典型的话务和多媒体业务的信令流程,提出了适应新一代联络中心的业务部署方式,利用模糊综合评价方法对不同部署方式的特点进行对比评估,为新一代联络中心在大型企业中推广和应用提供重要的理论和实践依据。 相似文献