全文获取类型
收费全文 | 7141篇 |
免费 | 1001篇 |
国内免费 | 838篇 |
专业分类
电工技术 | 670篇 |
综合类 | 797篇 |
化学工业 | 371篇 |
金属工艺 | 123篇 |
机械仪表 | 305篇 |
建筑科学 | 517篇 |
矿业工程 | 133篇 |
能源动力 | 154篇 |
轻工业 | 133篇 |
水利工程 | 287篇 |
石油天然气 | 191篇 |
武器工业 | 85篇 |
无线电 | 805篇 |
一般工业技术 | 505篇 |
冶金工业 | 124篇 |
原子能技术 | 66篇 |
自动化技术 | 3714篇 |
出版年
2024年 | 15篇 |
2023年 | 102篇 |
2022年 | 116篇 |
2021年 | 147篇 |
2020年 | 150篇 |
2019年 | 210篇 |
2018年 | 153篇 |
2017年 | 215篇 |
2016年 | 243篇 |
2015年 | 273篇 |
2014年 | 385篇 |
2013年 | 449篇 |
2012年 | 503篇 |
2011年 | 528篇 |
2010年 | 424篇 |
2009年 | 493篇 |
2008年 | 544篇 |
2007年 | 641篇 |
2006年 | 490篇 |
2005年 | 459篇 |
2004年 | 366篇 |
2003年 | 309篇 |
2002年 | 274篇 |
2001年 | 210篇 |
2000年 | 184篇 |
1999年 | 171篇 |
1998年 | 138篇 |
1997年 | 133篇 |
1996年 | 116篇 |
1995年 | 91篇 |
1994年 | 100篇 |
1993年 | 70篇 |
1992年 | 54篇 |
1991年 | 53篇 |
1990年 | 22篇 |
1989年 | 31篇 |
1988年 | 22篇 |
1987年 | 15篇 |
1986年 | 6篇 |
1985年 | 15篇 |
1984年 | 8篇 |
1983年 | 9篇 |
1982年 | 7篇 |
1981年 | 6篇 |
1980年 | 6篇 |
1979年 | 3篇 |
1976年 | 4篇 |
1975年 | 3篇 |
1974年 | 3篇 |
1962年 | 2篇 |
排序方式: 共有8980条查询结果,搜索用时 15 毫秒
51.
P2P系统在构建覆盖网络时未考虑到与物理网络的结合,导致逻辑拓扑结构与物理拓扑结构严重不匹配问题,增加P2P相邻节点间的延迟。本文提出一种基于区域划分的超级节点选取机制,将P2P网络中的节点按照物理位置划分成若干区域,保证区域内节点在物理位置上是相近的。利用MATLAB进行仿真实验,仿真实验表明使用这种机制能降低半分布式P2P网络的信息检索延迟,有效地提高检索的效率,并且具有较好的可扩展性。 相似文献
52.
针对空间信息网络(space information network,SIN)中卫星节点缓存容量有限,且卫星高速移动使得星间链路时变,导致地面用户内容访问延迟增大的问题,提出一种基于人工蜂群算法的空间信息网络缓存决策策略(satellite improved artificial bee colony,SIABC)。首先根据低轨卫星节点链路切换的周期性和可预知性,建立网络分区模型,对空间信息网络的卫星节点进行分区,在此基础上,建立区域节点协作缓存模型,使得整个网络区域内的卫星节点有选择性地缓存不同流行度的内容,同时兼顾区域内节点的协作缓存,从而流行度高的内容缓存在网络边缘。仿真结果表明,与现有缓存机制相比,该缓存策略能够明显提高内容的平均缓存命中率,并显著降低用户的内容访问时延。 相似文献
53.
M. MoessnerAuthor VitaeGul N. KhanAuthor Vitae 《Computer Networks》2012,56(1):273-286
Privacy and security concerns inhibit the fast adaption of RFID technology for many applications. A number of authentication protocols that address these concerns have been proposed but real-world solutions that are secure, maintain low communication cost and can be integrated into the ubiquitous EPCglobal Class 1 Generation 2 tag protocol (C1G2) are still needed and being investigated. We present a novel authentication protocol, which offers a high level of security through the combination of a random key scheme with a strong cryptography. The protocol is applicable to resource, power and computationally constraint platforms such as RFID tags. Our investigation shows that it can provide mutual authentication, untraceability, forward and backward security as well as resistance to replay, denial-ofth-service and man-in-the-middle attacks, while retaining a competitive communication cost. The protocol has been integrated into the EPCglobal C1G2 tag protocol, which assures low implementation cost. We also present a successful implementation of our protocol on real-world components such as the INTEL WISP UHF RFID tag and a C1G2 compliant reader. 相似文献
54.
Design of optimal plans for environmental planning and management applications should ideally consider the multiple quantitative and qualitative criteria relevant to the problem. For example, in ground water monitoring design problems, qualitative criteria such as acceptable spatial extent and shape of the contaminant plume predicted from the monitored locations can be equally important as the typical quantitative criteria such as economic costs and contaminant prediction accuracy. Incorporation of qualitative criteria in the problem-solving process is typically done in one of two ways: (a) quantifying approximate representations of the qualitative criteria, which are then used as additional criteria during the optimization process, or (b) post-optimization analysis of designs by experts to evaluate the overall performance of the optimized designs with respect to the qualitative criteria. These approaches, however, may not adequately represent all of the relevant qualitative information that affect a human expert involved in design (e.g. engineers, stakeholders, regulators, etc.), and do not necessarily incorporate the effect of the expert's own learning process on the suitability of the final design. The Interactive Genetic Algorithm with Mixed Initiative Interaction (IGAMII) is a novel approach that addresses these limitations by using a collaborative human-computer search strategy to assist users in designing optimized solutions to their applications, while also learning about their problem. The algorithm adaptively learns from the expert's feedback, and explores multiple designs that meet her/his criteria using both the human expert and a simulated model of the expert's responses in a collaborative fashion. The algorithm provides an introspection-based learning framework for the human expert and uses the human's subjective confidence measures to adjust the optimization search process to the transient learning process of the user. This paper presents the design and testing of this computational framework, and the benefits of using this approach for solving groundwater monitoring design problems. 相似文献
55.
Analog circuits are one of the most important parts of modern electronic systems and the failure of electronic hardware presents a critical threat to the completion of modern aircraft, spacecraft, and robot missions. Compared to digital circuits, designing fault-tolerant analog circuits is a difficult and knowledge-intensive task. A simple but powerful method for robustness is a redundancy approach to use multiple circuits instead of single one. For example, if component failures occur, other redundant components can replace the functions of broken parts and the system can still work. However, there are several research issues to make the redundant system automatically. In this paper, we used evolutionary computation to generate multiple analog circuits automatically and then we combined the solutions to generate robust outputs. Evolutionary computation is a natural way to produce multiple redundant solutions because it is a population-based search. Experimental results on the evolution of the low-pass, high-pass and band-stop filters show that the combination of multiple evolved analog circuits produces results that are more robust than those of the best single circuit. 相似文献
56.
A method capable of estimating the hydrograph from a prescribed storm for a practical mild slope upstream catchment is proposed. This method makes use of two new characteristic parameters, andS, in conjunction with the kinematic wave equation to compute lateral inflows of the main stream of the catchment. The depth profile of overland flow at any instant within the catchment and hydrograph at any location can be easily found. Lag times for individual lateral inflows are then considered and are linearly combined to obtain the hydrograph at the outlet of the catchment or depth profile of the main stream at any instant. The validity of the excess rainfall-surface runoff linear relationship in this study has also been verified with Tatsunokuchiyama catchment, and it shows good results for this computed runoff. 相似文献
57.
Paul Feautrier 《International journal of parallel programming》1992,21(6):389-420
This paper extends the algorithms which were developed in Part I to cases in which there is no affine schedule, i.e. to problems whose parallel complexity is polynomial but not linear. The natural generalization is to multidimensional schedules with lexicographic ordering as temporal succession. Multidimensional affine schedules, are, in a sense, equivalent to polynomial schedules, and are much easier to handle automatically. Furthermore, there is a strong connection between multidimensional schedules and loop nests, which allows one to prove that a static control program always has a multidimensional schedule. Roughly, a larger dimension indicates less parallelism. In the algorithm which is presented here, this dimension is computed dynamically, and is just sufficient for scheduling the source program. The algorithm lends itself to a divide and conquer strategy. The paper gives some experimental evidence for the applicability, performances and limitations of the algorithm. 相似文献
58.
The two basic performance parameters that capture the complexity of any VLSI chip are the area of the chip,A, and the computation time,T. A systematic approach for establishing lower bounds onA is presented. This approach relatesA to the bisection flow, . A theory of problem transformation based on , which captures bothAT
2 andA complexity, is developed. A fundamental problem, namely, element uniqueness, is chosen as a computational prototype. It is shown under general input/output protocol assumptions that any chip that decides ifn elements (each with (1+)lognbits) are unique must have =(nlogn), and thus, AT2=(n
2log2
n), andA= (nlogn). A theory of VLSI transformability reveals the inherentAT
2 andA complexity of a large class of related problems.This work was supported in part by the Semiconductor Research Corporation under contract RSCH 84-06-049-6. 相似文献
59.
Engineering the surfaces of components to improve the life and performance of parts used in automotive and aerospace engineering is the active area of research. Suitable Thermal/Mechanical/Thermo mechanical surface engineering treatments will produce extensive rearrangement of atoms in metals and alloys and corresponding marked variations in Physical, Chemical and Mechanical properties. Among the more important of these treatments are heat treatment processes such as hardening by Quenching, Induction hardening and Case Carburizing which rely on phase transformations to produce desired changes in mechanical properties. Other processes where phase transformation occur are casting, welding and machining etc. [1] Phase transformation may be homogeneous or heterogeneous. Homogeneous involves rearrangements in the structure of the material taking place simultaneously in all parts of the solid, while the heterogeneous transformation involves structural changes which are more localized. Alternatively they could be called as Isothermal and Nonisothermal transformation. But irrespective of the classification, these transformations alter the structure of the material giving rise to changes in the mechanical and physical properties of the processed material. It is of interest to review some consequences of surface modification in isothermal (Normalizing) and nonisothermal transformations (Machining) of low carbon steels. 相似文献
60.