首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   32915篇
  免费   3359篇
  国内免费   3084篇
电工技术   2015篇
技术理论   3篇
综合类   3869篇
化学工业   1150篇
金属工艺   594篇
机械仪表   1922篇
建筑科学   2183篇
矿业工程   473篇
能源动力   304篇
轻工业   471篇
水利工程   491篇
石油天然气   1141篇
武器工业   291篇
无线电   8359篇
一般工业技术   2024篇
冶金工业   905篇
原子能技术   953篇
自动化技术   12210篇
  2024年   146篇
  2023年   338篇
  2022年   652篇
  2021年   812篇
  2020年   983篇
  2019年   701篇
  2018年   824篇
  2017年   906篇
  2016年   1066篇
  2015年   1278篇
  2014年   2054篇
  2013年   2153篇
  2012年   2502篇
  2011年   2633篇
  2010年   2060篇
  2009年   2204篇
  2008年   2287篇
  2007年   2574篇
  2006年   2299篇
  2005年   2068篇
  2004年   1728篇
  2003年   1491篇
  2002年   1150篇
  2001年   884篇
  2000年   791篇
  1999年   583篇
  1998年   408篇
  1997年   332篇
  1996年   298篇
  1995年   230篇
  1994年   197篇
  1993年   138篇
  1992年   94篇
  1991年   72篇
  1990年   70篇
  1989年   45篇
  1988年   37篇
  1987年   32篇
  1986年   36篇
  1985年   28篇
  1984年   38篇
  1983年   23篇
  1982年   13篇
  1981年   17篇
  1980年   16篇
  1979年   7篇
  1977年   5篇
  1973年   7篇
  1959年   11篇
  1955年   4篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
91.
In a mobile ad hoc network, difficulties exist in supporting address autoconfiguration and naming resolution due to the lack of centralized servers. This letter presents a novel approach, called name‐based autoconfiguration (NBA), which uses host names to determine IP addresses and provides address autoconfiguration and name resolution as a single protocol.  相似文献   
92.
一种PN码自适应捕获门限的改进算法   总被引:1,自引:0,他引:1  
刘震昆  黄顺吉 《信号处理》2006,22(4):458-461
文献[1]提出了一种用于直扩系统的PN码自适应门限算法。但该文献也指出,此算法对门限总数十分敏感。当门限总数设置不当时,系统的平均捕获时间将显著增加。这限制了该算法在实际中的应用。本文就此提出了改进,给出了算法及电路框图。仿真结果表明,与原方案相比,改进算法改善了对门限总数的敏感性,降低了PN码平均捕获时间。  相似文献   
93.
Java语言及其虚拟机技术探讨   总被引:1,自引:0,他引:1  
随着Internet的迅猛发展,Internet编程语言Java愈来愈成为计算机行业的焦点。本文在简述了Java的主要特点后,重点对Java最关键的技术──虚拟机进行了深入的探讨。  相似文献   
94.
The broadband integrated services digital networks (B-ISDN) based on asynchronous transfer mode (ATM) technology can support a wide range of applications such as voice, video, still images, and data. Compression techniques increase the effective bandwidth utilization, but the bursty and asynchronous nature of the traffic can still lead to congestion in the network, and degradation of image quality and quality of service (QOS). Some of the features to provide better coding schemes for ATM networks are layered coding, resynchronization, buffering, interleaved schemes, constrained bit rate due to buffers, encapsulation with the RTP or AAL1 for clock recovery, lapped transforms, motion compensation, and optimal bit allocation for coders based on wavelet transforms. We review various techniques forimage and video coding such as transforms, motion compensation, vector quantization, and subband coding. We outline the impact of the cell loss ratio (CLR), delay and cell delay variation (CDV) on video coding: blocking effects, loss of frame synchronization, motion vectors, and vector quantization codewords. The open problems include tuning coding parameters to the available QOS provided by the network.  相似文献   
95.
A technique for designing efficient checkers for conventional Berger code is proposed in this paper. The check bits are derived by partitioning the information bits into two blocks, and then using an addition array to sum the number of 1's in each block. The check bit generator circuit uses a specially designed 4-input 1's counter. Two other types of 1's counters having 2 and 3 inputs are also used to realize checkers for variable length information bits. Several variations of 2-bit adder circuits are used to add the number of 1's. The check bit generator circuit uses gates with fan-in of less than or equal to 4 to simplify implementation in CMOS. The technique achieves significant improvement in gate count as well as speed over existing approaches.  相似文献   
96.
近年来,随着ATM主干网络的建设和发展,研究ATM对现有通信业务的支持方式和适配技术是目前ATM技术研究的热点之一。话音ATM交换在降低话音通信成本和简化网络操作环境等方面提供了大量的技术手段,并且支持在单一网络环境中的多种综合业务传输。ATM论坛制定了电路仿真系列建议,话音ATM交换的技术已经基本成熟。文章通过对话音ATM交换在实现和优化方面的技术进行分析,并提出一种基于NativeModeATM的话音通信方式。  相似文献   
97.
就民用建筑设计部门设计图纸质量抽查中出现的问题,进行了剖析并提出了注意事项。  相似文献   
98.
99.
The purpose of this study was to analyze the symbolization of colors as cultural codes, based on costume colors. In order to study the significance of colors in cultural changes, we carried out a quantitative analysis and interpreted it from the perspective of cultural semiotics. The range of this study was focused on Korean costume colors, over diverse diachronic stages of Korean culture. For this study 1535 color samples were collected, measured with a spectrophotometer, and analyzed quantitatively according their diachronic stages of origin. As a result, red, blue, and yellow were found to be the most frequently used colors during the Chosun Dynasty, a period based on Confucianism. These colors acted as cultural codes with cultural significance. During the Modern times pink, light blue, and black increased in frequency and represented the reception of western culture, the changing sex role of women in society, and utilitarianism. In these days, neutral colors and grayish tones of all colors are the most significant colors of high frequency. The use of such colors is closely related to industrialization, mechanization, functionalism, and the changes of women's sex roles in the societies. They are used as cultural codes, especially to emphasize a rational and masculine image rather than a feminine image. © 2006 Wiley Periodicals, Inc. Col Res Appl, 32, 71–79, 2007; Published online in Wiley InterScience (www.interscience.wiley.com). DOI 10.1002/col.20290  相似文献   
100.
A Practical Cross-Layer Mechanism For Fairness in 802.11 Networks   总被引:2,自引:0,他引:2  
Many companies, organizations and communities are providing wireless hotspots that provide networking access using 802.11b wireless networks. Since wireless networks are more sensitive to variations in bandwidth and environmental interference than wired networks, most networks support a number of transmission rates that have different error and bandwidth properties. Access points can communicate with multiple clients running at different rates, but this leads to unfair bandwidth allocation. If an access point communicates with a mix of clients using both 1 Mb/s and 11 Mb/s transmission rates, the faster clients are effectively throttled to 1 Mb/s as well. This happens because the 802.11 MAC protocol approximate “station fairness”, with each station given an equal chance to access the media. We provide a solution to provide “rate proportional fairness”, where the 11 Mb/s stations receive more bandwidth than the 1 Mb/s stations. Unlike previous solutions to this problem, our mechanism is easy to implement, works with common operating systems and requires no change to the MAC protocol or the stations. Joseph Dunn received an M.S. in computer science from the University of Colorado at Boulder in 2003, and B. S. in coputer science and mathematics from the University of Arizona in 2001. His research interests are in the general area of computer systems, primarily focusing on security and scalability in distributed systems. He is currently working on his Ph.D. in computer science from the University of Colorado at Boulder. Michael Neufeld received a Ph.D. in Computer Science from the University of Colorado at Boulder in December of 2004, having previously received an M.S. in Computer Science from the University of Colorado at Boulder in 2000 and an A.B. in Computer Science from Princeton University in 1993. His research interests are in the general area of computer system, specifically concentrating on wireless networking, software defind/cognitive radio, and streerable antennas. He is currently a postdoc in the Computer Science department at the University of Calorado at Boulder pursuing research related to software defined radio and new MAC protocols for steerable phase array antennas. Anmol Sheth is a Ph.D. student in Computer Science at the University of Colorado at Boulder. He received his B.S. in Computer Science from the University of Pune, India in 2001. He has been co-leading the development of the MANTIS operating system. He has co-authored three papers include MAC layer protocol design, energy-efficient wireless communication, and adapting communications to mobility. Dirk Grunwald received his Ph.D. from the University of Illinois in 1989 and joined the University of Colorado the same year. His work addresses research and teaching in the broad area of “computer systems”, which includes computer architecture, operating systems, networks, and storage systems. His interests also include issues in pervasive computing, novel computing models, and enjoying the mountains. He is currently an Associate Professor in the Department of Computer Science and in Electrical and Computer Engineering and is also the Director of the Colorado Center for Information Storage. John Bennett is a Professor of Computer Science with a joint appointment in Electrical and Computer Engineering at the University of Colorado at Boulder. He also serves as Associate Dean for Education in the College of Engineering and Applied Science. He joined the CU-Boulder faculty in 2000, after serving on the faculty of Rice University for 11 years. While at Rice, Bennett pioneered a course in engineering design for both engineering and non-engineering students that has been emulated at several universities and high schools. In addition to other teaching awards, Bennett received the Keck Foundation National Award for Engineering Teaching Excellence for his work on this course. Bennett received his Ph.D. in 1988 from the University of Washington. Prior to completing his doctoral studies, he was a U.S. Naval Officer for several years and founded and served as President of Pacific Mountain Research, Inc., where he supervised the design and development of a number of commercial computing systems. Bennett's primary research interests are broadly focused in the area of distributed systems, and more narrowly in distributed information management and distributed robotic macrosensors.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号