全文获取类型
收费全文 | 15197篇 |
免费 | 1183篇 |
国内免费 | 573篇 |
专业分类
电工技术 | 794篇 |
综合类 | 826篇 |
化学工业 | 2678篇 |
金属工艺 | 789篇 |
机械仪表 | 911篇 |
建筑科学 | 1094篇 |
矿业工程 | 396篇 |
能源动力 | 457篇 |
轻工业 | 962篇 |
水利工程 | 223篇 |
石油天然气 | 966篇 |
武器工业 | 84篇 |
无线电 | 2045篇 |
一般工业技术 | 1902篇 |
冶金工业 | 751篇 |
原子能技术 | 108篇 |
自动化技术 | 1967篇 |
出版年
2024年 | 56篇 |
2023年 | 264篇 |
2022年 | 452篇 |
2021年 | 625篇 |
2020年 | 420篇 |
2019年 | 370篇 |
2018年 | 407篇 |
2017年 | 459篇 |
2016年 | 410篇 |
2015年 | 580篇 |
2014年 | 766篇 |
2013年 | 931篇 |
2012年 | 946篇 |
2011年 | 1102篇 |
2010年 | 899篇 |
2009年 | 823篇 |
2008年 | 862篇 |
2007年 | 785篇 |
2006年 | 864篇 |
2005年 | 757篇 |
2004年 | 469篇 |
2003年 | 399篇 |
2002年 | 335篇 |
2001年 | 305篇 |
2000年 | 309篇 |
1999年 | 435篇 |
1998年 | 390篇 |
1997年 | 300篇 |
1996年 | 280篇 |
1995年 | 204篇 |
1994年 | 187篇 |
1993年 | 137篇 |
1992年 | 107篇 |
1991年 | 72篇 |
1990年 | 60篇 |
1989年 | 39篇 |
1988年 | 29篇 |
1987年 | 11篇 |
1986年 | 24篇 |
1985年 | 6篇 |
1984年 | 14篇 |
1983年 | 8篇 |
1982年 | 16篇 |
1981年 | 9篇 |
1980年 | 8篇 |
1979年 | 5篇 |
1977年 | 4篇 |
1976年 | 5篇 |
1975年 | 3篇 |
1974年 | 2篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
1.
为研究织物组织结构与复合纱线线密度对织物凉爽性能的影响,将线密度为7.4和9.8 tex涤纶分别与线密度为7.8 tex锦纶反向加捻、并线后作为纬纱,以8.3 tex涤纶/竹浆纤维50/50混纺纱作经纱,设计平纹、二上一下斜纹和透孔组织织物.测试织物的瞬间接触凉感、热湿舒适性能及织物干、湿态升温曲线,并采用凉爽温度指数对织物的综合凉爽性能进行评价.研究结果表明:6种设计织物的瞬间接触凉感均高于标准,且平纹织物最好,纬纱粗细对瞬间接触凉感影响不显著;透孔织物透气性最好,且在人体出汗的状态下具有较好的导湿散热性能.平纹织物凉爽温度指数最高,最大凉爽温度为2.8℃,综合凉爽性能最好. 相似文献
2.
Private information retrieval(PIR) is an important privacy protection issue of secure multi-party computation, but the PIR protocols based on classical cryptography are vulnerable because of new technologies,such as quantum computing and cloud computing. The quantum private queries(QPQ) protocols available, however, has a high complexity and is inefficient in the face of large database. This paper, based on the QKD technology which is mature now, proposes a novel QPQ protocol utilizing the key dilution and auxiliary parameter. Only N quits are required to be sent in the quantum channel to generate the raw key, then the straight k bits in the raw key are added bitwise to dilute the raw key, and a final key is consequently obtained to encrypt the database. By flexible adjusting of auxiliary parameters θ and k, privacy is secured and the query success ratio is improved. Feasibility and performance analyses indicate that the protocol has a high success ratio in first-trial query and is easy to implement, and that the communication complexity of O(N) is achieved. 相似文献
3.
Multifunctional 3D Patternable Drug‐Embedded Nanocarrier‐Based Interfaces to Enhance Signal Recording and Reduce Neuron Degeneration in Neural Implantation 下载免费PDF全文
4.
5.
6.
7.
Jui-Ting Weng Jiunn Ru Lai Wanjiun Liao 《Wireless Communications, IEEE Transactions on》2006,5(7):1676-1684
In this paper, we analyze node mobility for reliable packet delivery in mobile IP networks. In mobile IP, packets destined to roaming nodes are intercepted by their home agents and delivered via tunneling to their care of addresses (CoA). A mobile node may roam across multiple subnets. At each boundary crossing, a handoff is initiated such that the CoA is updated and a new tunnel is established. We consider both basic mobile IP handoff and smooth handoff. We find that reliable packet delivery in mobile IP networks can be modeled as a renewal process, because the retransmission over a new tunnel after each boundary crossing is independent of the previous history. We then derive the probability distribution of boundary crossings for each successful packet, based on which the packet reliable delivery time can be obtained. Our analytical model is derived based on a general distribution of residence time in a subnet and a general distribution of successful retransmission attempts in each subnet. The results can be readily applied to any distributions for both items. We also provide numerical examples to calculate the probability distribution of boundary crossings, and conduct simulations to validate our analytical results 相似文献
8.
Ray-Guang Cheng Cun-Yi Wang Li-Hung Liao Jen-Shun Yang 《Communications Letters, IEEE》2006,10(2):123-125
This work presents a wireless token-passing protocol, named Ripple, for wireless mesh networks (WMNs). In contrast to existing random-access approaches, Ripple uses a decentralized controlled-access approach to protect nodes from unintentional packet collisions and maximize the spatial reuse. The performance of Ripple under an error-free wireless channel was investigated and the accuracy of the analysis was verified by simulation. Simulation results also indicated that Ripple achieved throughput, stability, and QoS enhancement than that of 802.11 DCF under a highly loaded situation. 相似文献
9.
10.
1960-1970年那段时间被称为立体声的黄金岁月 ,那时要调试并建立一套立体声系统是非常简单的,整个系统只包括一对音箱,一个功放(纯A/V功放或附带收音功能)或纯粹的无线电接收器以及诸如唱片机这类型的音源即可,而设置过程更是简单,只需要连接很少的几根线,再将扬声器放到一个合适的位置就可以了。[编者按] 相似文献