全文获取类型
收费全文 | 25679篇 |
免费 | 2267篇 |
国内免费 | 2161篇 |
专业分类
电工技术 | 1878篇 |
技术理论 | 6篇 |
综合类 | 2876篇 |
化学工业 | 481篇 |
金属工艺 | 453篇 |
机械仪表 | 1215篇 |
建筑科学 | 1444篇 |
矿业工程 | 420篇 |
能源动力 | 215篇 |
轻工业 | 285篇 |
水利工程 | 400篇 |
石油天然气 | 353篇 |
武器工业 | 110篇 |
无线电 | 5856篇 |
一般工业技术 | 1416篇 |
冶金工业 | 864篇 |
原子能技术 | 24篇 |
自动化技术 | 11811篇 |
出版年
2024年 | 86篇 |
2023年 | 326篇 |
2022年 | 612篇 |
2021年 | 793篇 |
2020年 | 961篇 |
2019年 | 566篇 |
2018年 | 616篇 |
2017年 | 709篇 |
2016年 | 768篇 |
2015年 | 928篇 |
2014年 | 1709篇 |
2013年 | 1707篇 |
2012年 | 1993篇 |
2011年 | 2000篇 |
2010年 | 1503篇 |
2009年 | 1489篇 |
2008年 | 1656篇 |
2007年 | 1851篇 |
2006年 | 1640篇 |
2005年 | 1574篇 |
2004年 | 1353篇 |
2003年 | 1202篇 |
2002年 | 1025篇 |
2001年 | 880篇 |
2000年 | 788篇 |
1999年 | 498篇 |
1998年 | 282篇 |
1997年 | 168篇 |
1996年 | 118篇 |
1995年 | 78篇 |
1994年 | 67篇 |
1993年 | 36篇 |
1992年 | 18篇 |
1991年 | 13篇 |
1990年 | 13篇 |
1989年 | 11篇 |
1988年 | 7篇 |
1987年 | 6篇 |
1986年 | 8篇 |
1985年 | 4篇 |
1984年 | 4篇 |
1982年 | 4篇 |
1981年 | 7篇 |
1980年 | 5篇 |
1979年 | 2篇 |
1973年 | 3篇 |
1958年 | 3篇 |
1957年 | 2篇 |
1956年 | 2篇 |
1955年 | 3篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
One of the most challenging issues in radio received signal strength (RSS)-based localization systems is the generation and distribution of a radio map with a coordinate system linked with spatial information in a large indoor space. This study proposes a novel spatial-tagged radio-mapping system (SRS) that effectively combines the heterogeneous properties of LiDAR and mobile phones to simultaneously perform both spatial and radio mappings. The SRS consists of synchronization, localization, and map building processes, and enables real-time spatial and radio mapping. In the synchronization process, the distance range, motion data, and radio signals obtained through the LiDAR and mobile phone are collected in nodal units according to the sensing time. In the localization process, a feature variance filter is used to control the number of features generated from LiDAR and estimate the positions at which the nodes are generated in real time according to the motion data and radio signals. In map building, the estimated positions of the nodes are used to extract spatial and radio maps by using a unified location coordinate system. To ensure mobility, the SRS is manufactured in the form of a backpack supporting LiDAR and a mobile phone; the usefulness of the system is experimentally verified. The experiments are performed in a large indoor shopping mall with a complex structure. The experimental results demonstrated that a common coordinate system could be used to build spatial and radio maps with high accuracy and efficiency in real time. In addition, the field applicability of the SRS to location-based services is experimentally verified by applying the constructed radio map to well-known fingerprinting algorithms using the heterogeneous mobile phones. 相似文献
2.
摘 要:核心网业务模型的建立是5G网络容量规划和网络建设的基础,通过现有方法得到的理论业务模型是静态不可变的且与实际网络存在偏离。为了克服现有5G核心网业务模型与现网模型适配性较差以及规划设备无法满足用户实际业务需求的问题,提出了一种长短期记忆(long short-term memory,LSTM)网络与卷积LSTM (convolution LSTM,ConvLSTM)网络双通道融合的 5G 核心网业务模型预测方法。该方法基于人工智能(artificial intelligence,AI)技术以实现高质量的核心网业务模型的智能预测,形成数据反馈闭环,实现网络自优化调整,助力网络智能化建设。 相似文献
3.
In the Internet of Things (IoT), a huge amount of valuable data is generated by various IoT applications. As the IoT technologies become more complex, the attack methods are more diversified and can cause serious damages. Thus, establishing a secure IoT network based on user trust evaluation to defend against security threats and ensure the reliability of data source of collected data have become urgent issues, in this paper, a Data Fusion and transfer learning empowered granular Trust Evaluation mechanism (DFTE) is proposed to address the above challenges. Specifically, to meet the granularity demands of trust evaluation, time–space empowered fine/coarse grained trust evaluation models are built utilizing deep transfer learning algorithms based on data fusion. Moreover, to prevent privacy leakage and task sabotage, a dynamic reward and punishment mechanism is developed to encourage honest users by dynamically adjusting the scale of reward or punishment and accurately evaluating users’ trusts. The extensive experiments show that: (i) the proposed DFTE achieves high accuracy of trust evaluation under different granular demands through efficient data fusion; (ii) DFTE performs excellently in participation rate and data reliability. 相似文献
4.
目的 针对面向老龄化社会的产品及产品服务系统设计,将赋能的设计理念和价值引入其中,探索设计结果提升老年人能动性和参与性的赋能品质,为设计师开展设计赋能实践提供参考.方法 以设计教学中的学生设计方案作为研究材料,邀请设计研究者参与工作坊,对设计结果的赋能属性进行分析,并通过聚类获得类别化的设计属性,产生了能描述赋能品质的属性词汇表.结果 总结了包含5组形容词组的设计赋能品质集,这一集合包含"顺应性"和"激励性"两个面向.结论 研究结果为设计师进行老龄化设计提供了知识参考,有助于提升设计师的赋能意识.揭示了设计赋能充满矛盾性的品质,提出面向老龄化的设计赋能需要在"顺应"和"激励"之间找到平衡. 相似文献
5.
Veronica Cocetta Vincenzo Quagliariello Francesco Fiorica Massimiliano Berretta Monica Montopoli 《International journal of molecular sciences》2021,22(4)
Resistance to chemotherapy still remains a major challenge in the clinic, impairing the quality of life and survival rate of patients. The identification of unconventional chemosensitizing agents is therefore an interesting aspect of cancer research. Resveratrol has emerged in the last decades as a fascinating molecule, able to modulate several cancer-related molecular mechanisms, suggesting a possible application as an adjuvant in cancer management. This review goes deep into the existing literature concerning the possible chemosensitizing effect of resveratrol associated with the most conventional chemotherapeutic drugs. Despite the promising effects observed in different cancer types in in vitro studies, the clinical translation still presents strong limitations due to the low bioavailability of resveratrol. Recently, efforts have been moved in the field of drug delivery to identifying possible strategies/formulations useful for a more effective administration. Despite the necessity of a huge implementation in this research area, resveratrol appears as a promising molecule able to sensitize resistant tumors to drugs, suggesting its potential use in therapy-refractory cancer patients. 相似文献
6.
7.
Most real-world vehicle nodes can be structured into an interconnected network of vehicles. Through structuring these services and vehicle device interactions into multiple types, such internet of vehicles becomes multidimensional heterogeneous overlay networks. The heterogeneousness of the overlays makes it difficult for the overlay networks to coordinate with each other to improve their performance. Therefore, it poses an interesting but critical challenge to the effective analysis of heterogeneous virtual vehicular networks. A variety of virtual vehicular networks can be easily deployed onto the native network by applying the concept of SDN (Software Defined Networking). These virtual networks reflect their heterogeneousness due to their different performance goals, and they compete for the same physical resources of the underlying network, so that a sub-optimal performance of the virtual networks may be achieved. Therefore, we propose a Deep Reinforcement Learning (DRL) approach to make the virtual networks cooperate with each other through the SDN controller. A cooperative solution based on the asymmetric Nash bargaining is proposed for co-existing virtual networks to improve their performance. Moreover, the Markov Chain model and DRL resolution are introduced to leverage the heterogeneous performance goals of virtual networks. The implementation of the approach is introduced, and simulation results confirm the performance improvement of the latency sensitive, loss-rate sensitive and throughput sensitive heterogeneous vehicular networks using our cooperative solution. 相似文献
8.
Fog computing has emerged to support the requirements of IoT applications that could not be met by today’s solutions. Different initiatives have been presented to drive the development of fog, and much work has been done to improve certain aspects. However, an in-depth analysis of the different solutions, detailing how they can be integrated and applied to meet specific requirements, is still required. In this work, we present a unified architectural model and a new taxonomy, by comparing a large number of solutions. Finally, we draw some conclusions and guidelines for the development of IoT applications based on fog. 相似文献
9.
The recent trend of integration among new network services such as the long-term evolution (LTE) based on internet protocol (IP) needs reputable analyses and prediction information on the internet traffic. The IP along with increased internet traffics due to expanding new service platforms such as smartphones will reflect policies such as network QoS according to new services. The establishment of monitoring methods and analysis plans is thus required for the development of internet traffics that will analyze their status and predict their future. The paper with the speed of Internet traffic model is developed for monitoring the state of the experiment and verified. The problem is that the proposed service Internet service provider (ISP) to resolve the conflict between the occurrences can be considerably Internet traffic and that the state of data may be helpful in understanding. The paper advancement policy to reflect the network traffic volume of Internet services and users irradiation with increased traffic due to the development and management of the analysis was carried out experimental measurements. 相似文献
10.
This study explored adolescents’ opinions about how Internet use supports the achievement of their developmental tasks. Qualitative data were collected in focus groups interviews with 127 Italian Internet users (11–20) attending middle and high schools. Discussions were recorded, transcribed and analyzed using content analysis. Results showed that the Internet plays important functions in identity formation, personal autonomy, and relationships outside the family. It allows teens to develop their own interests, to identify with others and, at the same time, differentiate from others. The Internet is also an arena in which adolescents develop and practice autonomy. The Internet can be a source of conflict with parents, because of parents’ concerns about Internet use. However, the Internet can also be a meeting ground with parents. Finally, participants indicated the Internet is used to form close relationships with peers. Gender and age differences are discussed. Although the study is cross-sectional and relies only on adolescent report, findings illustrate how the conceptual framework of developmental goals may be helpful for understanding how the Internet can affect adolescents’ lives. 相似文献