全文获取类型
收费全文 | 1408篇 |
免费 | 103篇 |
国内免费 | 5篇 |
专业分类
电工技术 | 17篇 |
综合类 | 4篇 |
化学工业 | 302篇 |
金属工艺 | 31篇 |
机械仪表 | 42篇 |
建筑科学 | 49篇 |
矿业工程 | 1篇 |
能源动力 | 38篇 |
轻工业 | 139篇 |
水利工程 | 7篇 |
石油天然气 | 5篇 |
无线电 | 239篇 |
一般工业技术 | 277篇 |
冶金工业 | 73篇 |
原子能技术 | 16篇 |
自动化技术 | 276篇 |
出版年
2023年 | 33篇 |
2022年 | 50篇 |
2021年 | 122篇 |
2020年 | 89篇 |
2019年 | 90篇 |
2018年 | 83篇 |
2017年 | 63篇 |
2016年 | 112篇 |
2015年 | 51篇 |
2014年 | 67篇 |
2013年 | 119篇 |
2012年 | 95篇 |
2011年 | 83篇 |
2010年 | 64篇 |
2009年 | 63篇 |
2008年 | 49篇 |
2007年 | 28篇 |
2006年 | 32篇 |
2005年 | 36篇 |
2004年 | 9篇 |
2003年 | 20篇 |
2002年 | 15篇 |
2001年 | 9篇 |
2000年 | 5篇 |
1999年 | 9篇 |
1998年 | 27篇 |
1997年 | 10篇 |
1996年 | 9篇 |
1995年 | 7篇 |
1994年 | 6篇 |
1993年 | 10篇 |
1992年 | 5篇 |
1991年 | 4篇 |
1990年 | 2篇 |
1989年 | 2篇 |
1988年 | 3篇 |
1987年 | 2篇 |
1986年 | 2篇 |
1985年 | 5篇 |
1984年 | 3篇 |
1983年 | 4篇 |
1982年 | 2篇 |
1981年 | 3篇 |
1980年 | 3篇 |
1979年 | 2篇 |
1978年 | 1篇 |
1977年 | 4篇 |
1976年 | 1篇 |
1974年 | 1篇 |
1972年 | 1篇 |
排序方式: 共有1516条查询结果,搜索用时 31 毫秒
51.
Raphael C.-W. Phan 《Computer Standards & Interfaces》2009,31(1):63-65
The APSSNMP network management protocol was proposed as a secure alternative to the Simple Network Management Protocol (SNMP) used in the TCP/IP suite. The designers claimed that it resists meet-in-the-middle (MITM) attacks. In this paper, we present an advanced MITM attack on the APSSNMP and hence show that it fails to achieve its design objective of providing better security against MITM attacks. Since the APSSNMP has been presented in several journals, and IEEE and IASTED conferences, our result is important to highlight to network implementers and users of distributed systems that the APSSNMP is not secure for practical deployment. 相似文献
52.
Van Thanh Dau Thien Xuan Dinh Tanaka Katsuhiko Sugiyama Susumu 《Microsystem Technologies》2009,15(7):1039-1044
A gas-jet micro pump with novel cross-junction channel has been designed and fabricated using a Si micromachining process.
The valveless micro pump is composed of a piezoelectric lead zirconate titanate (PZT) diaphragm actuator and fluidic network.
The design of the valveless pump focuses on a cross-junction formed by the neck of the pump chamber and one outlet and two
opposite inlet channels. The structure of cross-junction allows differences in fluidic resistance and fluidic momentum inside
the channels during each PZT diaphragm vibration cycle, which leads to the gas flow being rectified without valves. The flow
channels were easily fabricated by using silicon etching process. To investigate the effects of the structure of the cross-junction
on the gas flow rate, two types of pump with different cross-junction were studied. The design and simulation were done using
ANSYS-Fluent software. The simulations and experimental data revealed that the step-nozzle structure is much more advantageous
than the planar structure. A flow rate of 5.2 ml/min was obtained for the pump with step structure when the pump was driven
at its resonant frequency of 7.9 kHz by a sinusoidal voltage of 50 Vp–p. 相似文献
53.
Tich Phuoc Tran Thi Thanh Sang Nguyen Poshiang Tsai Xiaoying Kong 《Artificial Intelligence Review》2011,35(4):369-382
In the modern age of Internet connectivity, advanced information systems have accumulated huge volumes of data. Such fast
growing, tremendous amount of data, collected and stored in large databases has far exceeded our human ability to comprehend
without proper tools. There has been a great deal of research conducted to explore the potential applications of Machine Learning
technologies in Security Informatics. This article studies the Network Security Detection problems in which predictive models
are constructed to detect network security breaches such as spamming. Due to overwhelming volume of data, complexity and dynamics
of computer networks and evolving cyber threats, current security systems suffer limited performance with low detection accuracy
and high number of false alarms. To address such performance issues, a novel Machine Learning algorithm, namely Boosted Subspace
Probabilistic Neural Network (BSPNN), has been proposed which combines a Radial Basis Function Neural Network with an innovative
diversity-based ensemble learning framework. Extensive empirical analyses suggested that BSPNN achieved high detection accuracy
with relatively small computational complexity compared with other conventional detection methods. 相似文献
54.
WLAN (Wireless Local Area Network) has been seen to be one of the promising access technologies that adapts to 4G cellular network systems in providing very high speed connection with QoS guarantee through the polling function. However, when the handover happens, the contention-based medium access mechanism which is mainly used in WLAN is invoked and introduces unbounded transmission delay due to idle time periods and retransmission because of collision during the handover. If this technique is expanded to use in a microcellular network such as connected WLAN micro-cells, contention-based mechanism, therefore, should not be used to handle the MT’s handover, especially for vehicular users who change access point every few seconds. To overcome these difficulties in handover, we introduce parallel polling scheme in dynamic LMC (Logical Macro Cell) which can reduce delays much and remove packet loss rate. LMC is a virtual single macro cell which is built on a multicast group of adjacent micro-cells. In the same LMC, polling signals are sent from every BS (base station) to give MT (mobile terminal) permission to access one of these BSs. Instead of wasting much time to contend for resources of a new BS during handover, the MT answers the polling as an acknowledgment to connect to that new BS. The polling response is controlled to multicast to all BSs of the same LMC via the core network to synchronize for the next polling cycle. LMC is controlled to dynamically change when the MT comes in a new BS to make polling signals be continuous in a new LMC. Through analytical and simulation results, we show that the parallel polling scheme can achieve no handover latency, no packet loss and maintain mobile users’ throughput stably in the high traffic load condition though it causes overhead on the neighboring cells in both of wired and wireless sections. At speeds of up to70 m/s, the MT can still maintain its stable connection. OMNeT++ simulator with INET project is used to evaluate our proposal. 相似文献
55.
M. Claeys-Bruno O. Vandenabeele-Trambouze M. Sergent M. Geffard D. Bodet M. Dobrijevic A. Commeyras R. Phan Tan Luu 《Chemometrics and Intelligent Laboratory Systems》2006,80(2):186-197
In a previous paper (part I), new strategy was used for raising antibodies against hapten (< 300 Da) and the quantification of these hapten by ELISA using derivatization by chloroethyl nitrosourea (CENU). After raising antibodies against histamine, they were characterized and used for ELISA measurements. Optimal detection conditions were determined for the histamine quantification by ELISA method. The present study investigates the derivatization step of the histamine by chloroethylnitrosourea (CENU). Five factors (2 qualitative: nature of the solvent and nature of the antibodies and 3 quantitative: pH, % of solvent and time of derivatization) have been considered. Optimal reaction conditions were established by calculation of a validated model. 相似文献
56.
Paul F. Mlakar Donald O. Dusenberry James R. Harris Gerald Haynes Long T. Phan Mete A. Sozen 《Canadian Metallurgical Quarterly》2005,19(3):197-205
On September 11, 2001, an airliner was intentionally crashed into the Pentagon. It struck at the first elevated slab on the west wall, and slid approximately 310?ft (94.5?m) diagonally into the building. The force of the collision demolished numerous columns and the fa?ade of the exterior wall, and induced damage to first-floor columns and the first elevated slab over an area approximately 90?ft (27.4?m) wide and 310?ft (94.5?m) long. None of the building collapsed immediately. The portion that remained standing, even after an intense fire, sustained substantial damage at the first-floor level. 相似文献
57.
Paul F. Mlakar Donald O. Dusenberry James R. Harris Gerald Haynes Long T. Phan Mete A. Sozen 《Canadian Metallurgical Quarterly》2005,19(3):206-211
On September 11, 2001, the reinforced concrete structure of the Pentagon Building was able to resist, without collapse, the impact of a large commercial airliner despite the total loss of 26 columns and severe damage to 15 columns at the ground level. The ensuing fire and related fire-fighting activities led to the collapse of a portion of the building approximately one-half hour after the impact. In this paper, the reasons for the demonstrated toughness of the reinforced concrete structure are examined and attributed to use of spiral columns, effective splicing of reinforcing bars, strong girders, and short span lengths. 相似文献
58.
C. Bui Thanh H. Klaudel F. Pommereau 《Electronic Notes in Theoretical Computer Science》2003,68(5):85-100
We present a new approach to the modelling of time constrained systems. It is based on untimed high-level Petri nets using the concept of causal time. With this concept, the progression of time is modelled in the system by the occurrence of a distinguished event, tick, which serves as a reference to the rest of the system. In order to validate this approach as suitable for automated verification, a case study is provided and the results obtained using a model-checker on high-level Petri nets are compared with those obtained for timed automata using prominent tools. The comparison is encouraging and shows that the causal time approach is intuitive and modular. It also potentially allows for efficient verification. 相似文献
59.
Raphael C.-W. Phan 《Information Processing Letters》2004,91(1):33-38
In 2000, Biham and Keller [Cryptanalysis of reduced variants of Rijndael, 3rd AES Conference, in press] presented an impossible differential cryptanalysis of the Advanced Encryption Standard (AES) up to 5 rounds. This was later improved in 2001 by Cheon et al. [Improved impossible differential cryptanalysis of Rijndael and Crypton, in: Lecture Notes in Comput. Sci., vol. 2288, Springer-Verlag, Berlin, 2001, pp. 39-49] to apply to 6 rounds of the AES. In this paper, we extend on previous results to present an attack on the AES up to 7 rounds. This is the best-known impossible differential attack on the AES, and works by exploiting weaknesses in the AES key schedule. 相似文献
60.