全文获取类型
收费全文 | 9861篇 |
免费 | 873篇 |
国内免费 | 451篇 |
专业分类
电工技术 | 1134篇 |
综合类 | 960篇 |
化学工业 | 437篇 |
金属工艺 | 147篇 |
机械仪表 | 452篇 |
建筑科学 | 1885篇 |
矿业工程 | 414篇 |
能源动力 | 309篇 |
轻工业 | 121篇 |
水利工程 | 877篇 |
石油天然气 | 315篇 |
武器工业 | 117篇 |
无线电 | 984篇 |
一般工业技术 | 560篇 |
冶金工业 | 201篇 |
原子能技术 | 78篇 |
自动化技术 | 2194篇 |
出版年
2024年 | 29篇 |
2023年 | 77篇 |
2022年 | 158篇 |
2021年 | 197篇 |
2020年 | 253篇 |
2019年 | 196篇 |
2018年 | 216篇 |
2017年 | 259篇 |
2016年 | 287篇 |
2015年 | 341篇 |
2014年 | 754篇 |
2013年 | 536篇 |
2012年 | 887篇 |
2011年 | 866篇 |
2010年 | 639篇 |
2009年 | 678篇 |
2008年 | 631篇 |
2007年 | 756篇 |
2006年 | 597篇 |
2005年 | 526篇 |
2004年 | 436篇 |
2003年 | 411篇 |
2002年 | 325篇 |
2001年 | 252篇 |
2000年 | 196篇 |
1999年 | 144篇 |
1998年 | 105篇 |
1997年 | 89篇 |
1996年 | 69篇 |
1995年 | 63篇 |
1994年 | 41篇 |
1993年 | 38篇 |
1992年 | 30篇 |
1991年 | 15篇 |
1990年 | 18篇 |
1989年 | 16篇 |
1988年 | 10篇 |
1987年 | 5篇 |
1986年 | 5篇 |
1985年 | 7篇 |
1984年 | 5篇 |
1982年 | 3篇 |
1981年 | 5篇 |
1980年 | 4篇 |
1979年 | 3篇 |
1978年 | 2篇 |
1974年 | 1篇 |
1965年 | 1篇 |
1964年 | 1篇 |
1959年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 9 毫秒
11.
在经济的推动下,商业区数量日益增多,空间布局更加紧凑,用电量也随之大幅增加,管理更为困难。因此,要重视商业区建筑的供电配电。介绍了商业区建筑的特点,然后结合实际案例对其供配电进行了设计。 相似文献
12.
The recent evolution of wireless sensor networks have yielded a demand to improve energy-efficient scheduling algorithms and energy-efficient medium access protocols. This paper proposes an energy-efficient real-time scheduling scheme that reduces power consumption and network errors on dual channel networks. The proposed scheme is based on a dynamic modulation scaling scheme which can scale the number of bits per symbol and a switching scheme which can swap the polling schedule between channels. Built on top of EDF scheduling policy, the proposed scheme enhances the power performance without violating the constraints of real-time streams. The simulation results show that the proposed scheme enhances fault-tolerance and reduces power consumption. 相似文献
13.
介绍了组网方案自动生成在通信装备组网仿真训练系统中的作用;总结了专家系统在自动配置系统中运用的研究现状;提出了通信装备组网方案自动生成系统的总体框架和主要构成模块,并对其涉及的关键技术进行了分析和研究,结合系统特点指出了下一步研究方向,从理论上论述了系统实现的可行性。 相似文献
14.
In today's Internet routing infrastructure, designers have addressed scaling concerns in routing constrained multiobjective optimization problems examining latency and mobility concerns as a secondary constrain. In tactical Mobile Ad-hoc Network (MANET), hubs can function based on the work plan in various social affairs and the internally connected hubs are almost having the related moving standards where the topology between one and the other are tightly coupled in steady support by considering the touchstone of hubs such as a self-sorted out, self-mending and self-administration. Clustering in the routing process is one of the key aspects to increase MANET performance by coordinating the pathways using multiple criteria and analytics. We present a Group Adaptive Hybrid Routing Algorithm (GAHRA) for gathering portability, which pursues table-driven directing methodology in stable accumulations and on-request steering strategy for versatile situations. Based on this aspect, the research demonstrates an adjustable framework for commuting between the table-driven approach and the on-request approach, with the objectives of enhancing the output of MANET routing computation in each hub. Simulation analysis and replication results reveal that the proposed method is promising than a single well-known existing routing approach and is well-suited for sensitive MANET applications. 相似文献
15.
In sensor networks, a compromised node can either generate fabricated reports with false votes or inject false votes into real reports, which causes severe damage such as false alarms, energy drain and information loss. An interleaved hop-by-hop authentication (IHA) scheme addresses the former attack by detecting and filtering false reports in a deterministic and hop-by-hop fashion. Unfortunately, in IHA, all en-route nodes must join to verify reports while only a few are necessary to the authentication procedure. In this paper, we propose a fuzzy-based interleaved multi-hop authentication scheme based on IHA. In our scheme, the fuzzy logic system only selects some nodes for verification based on the network characteristics. Moreover, we apply a voting method and a hash-based key assignment mechanism to improve network security. Through performance evaluation, the proposed scheme is found to save up to 13% of the energy consumption and to provide more network protection compared to IHA. 相似文献
16.
Pricing schemes for digital content with DRM mechanisms 总被引:1,自引:0,他引:1
In this paper, utilizing game-theoretic model, we examine the impact of collaborative structure, content quality, and network environment on the development of pricing scheme and DRM protection policy of digital content. DRM protection level decreases and pirating activities becomes relatively tolerable as the content provider and platform provider operate collaboratively. Depending on the market structure, higher content quality may strengthen or weaken the adoption of DRM. However, it would seem that, as the network environment becomes more decentralized and uncontrolled, weaker DRM protection should be a better strategy. 相似文献
17.
Chung‐Shi Tseng 《Asian journal of control》2008,10(4):420-429
In this study, a robust nonlinear L∞‐gain tracking control design for uncertain robotic systems is proposed under persistent bounded disturbances. The design objective is that the peak of the tracking error in time domain must be as small as possible under persistent bounded disturbances. Since the nonlinear L∞ ‐gain optimal tracking control cannot be solved directly, the nonlinear L∞ ‐gain optimal tracking problem is transformed into a nonlinear L∞ ‐gain tracking problem by given a prescribed disturbance attenuation level for the L∞ ‐gain tracking performance. To guarantee that the L∞ ‐gain tracking performance can be achieved for the uncertain robotic systems, a sliding‐mode scheme is introduced to eliminate the effect of the parameter uncertainties. By virtue of the skew‐symmetric property of the robotic systems, sufficient conditions are developed for solving the robust L∞ ‐gain tracking control problems in terms of an algebraic equation instead of a differential equation. The proposed method is simple and the algebraic equation can be solved analytically. Therefore, the proposed robust L∞ ‐gain tracking control scheme is suitable for practical control design of uncertain robotic systems. Copyright © 2008 John Wiley and Sons Asia Pte Ltd and Chinese Automatic Control Society 相似文献
18.
A multimodel scheme is designed for a triggering tunnel-diode circuit. The scheme improves the transient behavior during the transition time period after switching from a stable system equilibrium point to another one which is known as a triggering process. Each model is obtained by a linearization of the circuit near an equilibrium point. Moreover, each of these models can be described as a combination of two other transfer functions describing the linearized plant behavior near two different equilibrium points. The scheme chooses online the model with the best tracking performance in order to generate the control law. Different reference transfer functions are proposed with the aim of generating the desired transient in the triggering process. Some simulations show the usefulness of this scheme. 相似文献
19.
In this paper, we extend a previous work on a compact scheme for the steady Navier–Stokes equations [Li, Tang, and Fornberg (1995), Int. J. Numer. Methods Fluids, 20, 1137–1151] to the unsteady case. By exploiting the coupling relation between the streamfunction and vorticity equations, the Navier–Stokes equations are discretized in space within a 3×3 stencil such that a fourth order accuracy is achieved. The time derivatives are discretized in such a way as to maintain the compactness of the stencil. We explore several known time-stepping approaches including second-order BDF method, fourth-order BDF method and the Crank–Nicolson method. Numerical solutions are obtained for the driven cavity problem and are compared with solutions available in the literature. For large values of the Reynolds number, it is found that high-order time discretizations outperform the low-order ones. 相似文献
20.
以保德县汾家沟骨干淤地坝除险加固工程为实例,介绍了在特定的施工环境下的一些除险加固工程的施工布置,方案及方法,质量控制方面的一些技术措施。 相似文献