全文获取类型
收费全文 | 32915篇 |
免费 | 3359篇 |
国内免费 | 3084篇 |
专业分类
电工技术 | 2015篇 |
技术理论 | 3篇 |
综合类 | 3869篇 |
化学工业 | 1150篇 |
金属工艺 | 594篇 |
机械仪表 | 1922篇 |
建筑科学 | 2183篇 |
矿业工程 | 473篇 |
能源动力 | 304篇 |
轻工业 | 471篇 |
水利工程 | 491篇 |
石油天然气 | 1141篇 |
武器工业 | 291篇 |
无线电 | 8359篇 |
一般工业技术 | 2024篇 |
冶金工业 | 905篇 |
原子能技术 | 953篇 |
自动化技术 | 12210篇 |
出版年
2024年 | 146篇 |
2023年 | 338篇 |
2022年 | 652篇 |
2021年 | 812篇 |
2020年 | 983篇 |
2019年 | 701篇 |
2018年 | 824篇 |
2017年 | 906篇 |
2016年 | 1066篇 |
2015年 | 1278篇 |
2014年 | 2054篇 |
2013年 | 2153篇 |
2012年 | 2502篇 |
2011年 | 2633篇 |
2010年 | 2060篇 |
2009年 | 2204篇 |
2008年 | 2287篇 |
2007年 | 2574篇 |
2006年 | 2299篇 |
2005年 | 2068篇 |
2004年 | 1728篇 |
2003年 | 1491篇 |
2002年 | 1150篇 |
2001年 | 884篇 |
2000年 | 791篇 |
1999年 | 583篇 |
1998年 | 408篇 |
1997年 | 332篇 |
1996年 | 298篇 |
1995年 | 230篇 |
1994年 | 197篇 |
1993年 | 138篇 |
1992年 | 94篇 |
1991年 | 72篇 |
1990年 | 70篇 |
1989年 | 45篇 |
1988年 | 37篇 |
1987年 | 32篇 |
1986年 | 36篇 |
1985年 | 28篇 |
1984年 | 38篇 |
1983年 | 23篇 |
1982年 | 13篇 |
1981年 | 17篇 |
1980年 | 16篇 |
1979年 | 7篇 |
1977年 | 5篇 |
1973年 | 7篇 |
1959年 | 11篇 |
1955年 | 4篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
91.
In a mobile ad hoc network, difficulties exist in supporting address autoconfiguration and naming resolution due to the lack of centralized servers. This letter presents a novel approach, called name‐based autoconfiguration (NBA), which uses host names to determine IP addresses and provides address autoconfiguration and name resolution as a single protocol. 相似文献
92.
一种PN码自适应捕获门限的改进算法 总被引:1,自引:0,他引:1
文献[1]提出了一种用于直扩系统的PN码自适应门限算法。但该文献也指出,此算法对门限总数十分敏感。当门限总数设置不当时,系统的平均捕获时间将显著增加。这限制了该算法在实际中的应用。本文就此提出了改进,给出了算法及电路框图。仿真结果表明,与原方案相比,改进算法改善了对门限总数的敏感性,降低了PN码平均捕获时间。 相似文献
93.
Java语言及其虚拟机技术探讨 总被引:1,自引:0,他引:1
随着Internet的迅猛发展,Internet编程语言Java愈来愈成为计算机行业的焦点。本文在简述了Java的主要特点后,重点对Java最关键的技术──虚拟机进行了深入的探讨。 相似文献
94.
The broadband integrated services digital networks (B-ISDN) based on asynchronous transfer mode (ATM) technology can support
a wide range of applications such as voice, video, still images, and data. Compression techniques increase the effective bandwidth
utilization, but the bursty and asynchronous nature of the traffic can still lead to congestion in the network, and degradation
of image quality and quality of service (QOS). Some of the features to provide better coding schemes for ATM networks are
layered coding, resynchronization, buffering, interleaved schemes, constrained bit rate due to buffers, encapsulation with
the RTP or AAL1 for clock recovery, lapped transforms, motion compensation, and optimal bit allocation for coders based on
wavelet transforms. We review various techniques forimage and video coding such as transforms, motion compensation, vector
quantization, and subband coding. We outline the impact of the cell loss ratio (CLR), delay and cell delay variation (CDV)
on video coding: blocking effects, loss of frame synchronization, motion vectors, and vector quantization codewords. The open
problems include tuning coding parameters to the available QOS provided by the network. 相似文献
95.
A technique for designing efficient checkers for conventional Berger code is proposed in this paper. The check bits are derived by partitioning the information bits into two blocks, and then using an addition array to sum the number of 1's in each block. The check bit generator circuit uses a specially designed 4-input 1's counter. Two other types of 1's counters having 2 and 3 inputs are also used to realize checkers for variable length information bits. Several variations of 2-bit adder circuits are used to add the number of 1's. The check bit generator circuit uses gates with fan-in of less than or equal to 4 to simplify implementation in CMOS. The technique achieves significant improvement in gate count as well as speed over existing approaches. 相似文献
96.
97.
98.
99.
The purpose of this study was to analyze the symbolization of colors as cultural codes, based on costume colors. In order to study the significance of colors in cultural changes, we carried out a quantitative analysis and interpreted it from the perspective of cultural semiotics. The range of this study was focused on Korean costume colors, over diverse diachronic stages of Korean culture. For this study 1535 color samples were collected, measured with a spectrophotometer, and analyzed quantitatively according their diachronic stages of origin. As a result, red, blue, and yellow were found to be the most frequently used colors during the Chosun Dynasty, a period based on Confucianism. These colors acted as cultural codes with cultural significance. During the Modern times pink, light blue, and black increased in frequency and represented the reception of western culture, the changing sex role of women in society, and utilitarianism. In these days, neutral colors and grayish tones of all colors are the most significant colors of high frequency. The use of such colors is closely related to industrialization, mechanization, functionalism, and the changes of women's sex roles in the societies. They are used as cultural codes, especially to emphasize a rational and masculine image rather than a feminine image. © 2006 Wiley Periodicals, Inc. Col Res Appl, 32, 71–79, 2007; Published online in Wiley InterScience (www.interscience.wiley.com). DOI 10.1002/col.20290 相似文献
100.
Joseph Dunn Michael Neufeld Anmol Sheth Dirk Grunwald John Bennett 《Mobile Networks and Applications》2006,11(1):37-45
Many companies, organizations and communities are providing wireless hotspots that provide networking access using 802.11b wireless networks. Since wireless networks are more sensitive to variations
in bandwidth and environmental interference than wired networks, most networks support a number of transmission rates that
have different error and bandwidth properties. Access points can communicate with multiple clients running at different rates,
but this leads to unfair bandwidth allocation. If an access point communicates with a mix of clients using both 1 Mb/s and
11 Mb/s transmission rates, the faster clients are effectively throttled to 1 Mb/s as well. This happens because the 802.11
MAC protocol approximate “station fairness”, with each station given an equal chance to access the media. We provide a solution
to provide “rate proportional fairness”, where the 11 Mb/s stations receive more bandwidth than the 1 Mb/s stations. Unlike
previous solutions to this problem, our mechanism is easy to implement, works with common operating systems and requires no
change to the MAC protocol or the stations.
Joseph Dunn received an M.S. in computer science from the University of Colorado at Boulder in 2003, and B. S. in coputer science and
mathematics from the University of Arizona in 2001. His research interests are in the general area of computer systems, primarily
focusing on security and scalability in distributed systems. He is currently working on his Ph.D. in computer science from
the University of Colorado at Boulder.
Michael Neufeld received a Ph.D. in Computer Science from the University of Colorado at Boulder in December of 2004, having previously received
an M.S. in Computer Science from the University of Colorado at Boulder in 2000 and an A.B. in Computer Science from Princeton
University in 1993. His research interests are in the general area of computer system, specifically concentrating on wireless
networking, software defind/cognitive radio, and streerable antennas. He is currently a postdoc in the Computer Science department
at the University of Calorado at Boulder pursuing research related to software defined radio and new MAC protocols for steerable
phase array antennas.
Anmol Sheth is a Ph.D. student in Computer Science at the University of Colorado at Boulder. He received his B.S. in Computer Science
from the University of Pune, India in 2001. He has been co-leading the development of the MANTIS operating system. He has
co-authored three papers include MAC layer protocol design, energy-efficient wireless communication, and adapting communications
to mobility.
Dirk Grunwald received his Ph.D. from the University of Illinois in 1989 and joined the University of Colorado the same year. His work
addresses research and teaching in the broad area of “computer systems”, which includes computer architecture, operating systems,
networks, and storage systems. His interests also include issues in pervasive computing, novel computing models, and enjoying
the mountains. He is currently an Associate Professor in the Department of Computer Science and in Electrical and Computer
Engineering and is also the Director of the Colorado Center for Information Storage.
John Bennett is a Professor of Computer Science with a joint appointment in Electrical and Computer Engineering at the University of Colorado
at Boulder. He also serves as Associate Dean for Education in the College of Engineering and Applied Science. He joined the
CU-Boulder faculty in 2000, after serving on the faculty of Rice University for 11 years. While at Rice, Bennett pioneered
a course in engineering design for both engineering and non-engineering students that has been emulated at several universities
and high schools. In addition to other teaching awards, Bennett received the Keck Foundation National Award for Engineering
Teaching Excellence for his work on this course. Bennett received his Ph.D. in 1988 from the University of Washington. Prior
to completing his doctoral studies, he was a U.S. Naval Officer for several years and founded and served as President of Pacific
Mountain Research, Inc., where he supervised the design and development of a number of commercial computing systems. Bennett's
primary research interests are broadly focused in the area of distributed systems, and more narrowly in distributed information
management and distributed robotic macrosensors. 相似文献