全文获取类型
收费全文 | 7203篇 |
免费 | 1031篇 |
国内免费 | 605篇 |
专业分类
电工技术 | 165篇 |
技术理论 | 3篇 |
综合类 | 2006篇 |
化学工业 | 73篇 |
金属工艺 | 31篇 |
机械仪表 | 182篇 |
建筑科学 | 6篇 |
矿业工程 | 15篇 |
能源动力 | 60篇 |
轻工业 | 7篇 |
石油天然气 | 8篇 |
武器工业 | 5篇 |
无线电 | 3679篇 |
一般工业技术 | 303篇 |
冶金工业 | 9篇 |
原子能技术 | 1篇 |
自动化技术 | 2286篇 |
出版年
2025年 | 37篇 |
2024年 | 80篇 |
2023年 | 109篇 |
2022年 | 219篇 |
2021年 | 227篇 |
2020年 | 204篇 |
2019年 | 175篇 |
2018年 | 180篇 |
2017年 | 177篇 |
2016年 | 154篇 |
2015年 | 197篇 |
2014年 | 496篇 |
2013年 | 560篇 |
2012年 | 764篇 |
2011年 | 677篇 |
2010年 | 624篇 |
2009年 | 692篇 |
2008年 | 634篇 |
2007年 | 706篇 |
2006年 | 696篇 |
2005年 | 397篇 |
2004年 | 177篇 |
2003年 | 151篇 |
2002年 | 116篇 |
2001年 | 136篇 |
2000年 | 132篇 |
1999年 | 48篇 |
1998年 | 20篇 |
1996年 | 4篇 |
1995年 | 3篇 |
1993年 | 2篇 |
1992年 | 1篇 |
1991年 | 1篇 |
1990年 | 1篇 |
1989年 | 1篇 |
1988年 | 3篇 |
1987年 | 9篇 |
1986年 | 8篇 |
1985年 | 3篇 |
1984年 | 1篇 |
1983年 | 1篇 |
1979年 | 1篇 |
1973年 | 2篇 |
1970年 | 2篇 |
1967年 | 1篇 |
1966年 | 2篇 |
1963年 | 3篇 |
1962年 | 1篇 |
1961年 | 1篇 |
1954年 | 1篇 |
排序方式: 共有8839条查询结果,搜索用时 15 毫秒
1.
2.
《Computer Standards & Interfaces》2014,36(3):513-523
One of the critical security issues of Vehicular Ad Hoc Networks (VANETs) is the revocation of misbehaving vehicles. While essential, revocation checking can leak potentially sensitive information. Road Side Units (RSUs) receiving the certificate status queries could infer the identity of the vehicles posing the query. An important loss of privacy results from the RSUs ability to tie the checking vehicle with the query's target. We propose a Privacy Preserving Revocation mechanism (PPREM) based on a universal one-way accumulator. PPREM provides explicit, concise, authenticated and unforgeable information about the revocation status of each certificate while preserving the users' privacy. 相似文献
3.
Response time (RT) of Networked Automation Systems (NAS) is affected by timing imperfections induced due to the network, computing and hardware components. Guaranteeing RT in the presence of such timing imperfections is essential for building dependable NAS, and to avoid costly upgrades after deployment in industries.This investigation proposes a methodology and work-flow that combines modelling, simulation, verification, experiments, and software tools to verify the RT of the NAS during the design, rather than after deployment. The RT evaluation work-flow has three phases: model building, modelling and verification. During the model building phase component reaction times are specified and their timing performance is measured by combining experiments with simulation. During the modelling phase, component based mathematical models that capture the network architecture and inter-connection are proposed. Composition of the component models gives the NAS model required for studying the RT performance on system level. Finally, in the verification step, the NAS formal models are abstracted as UPPAAL timed automata with their timing interfaces. To model timing interfaces, the action patterns, and their timing wrapper are proposed. The formal model of high level of abstraction is used to verify the total response time of the NAS where the reactions to be verified are specified using a subset of timed computation tree logic (TCTL) in UPPAAL model checker. The proposed approach is illustrated on an industrial steam boiler deployment. 相似文献
4.
Xiao-chuan SUN Hong-yan CUI Ren-ping LIU Jian-ya CHEN Yun-jie LIU 《浙江大学学报(英文版)(C辑:计算机与电子)》2012,13(9)
Echo state network (ESN),which efficiently models nonlinear dynamic systems,has been proposed as a special form of recurrent neural network.However,most of the proposed ESNs consist of complex reservoi... 相似文献
5.
Peng Peng Pan Yu-yan Wang Jun-feng Lin Jin-tong 《Frontiers of Electrical and Electronic Engineering in China》2006,1(4):416-420
We propose the hybrid optical burst switching (HOBS), and investigate the HOBS-based ring topology with numerical simulation.
Results indicate that the packet loss ratio in HOBS is much less than that in optical burst switching(OBS) and its performance
depends on some parameters such as the packet proportion, the electronic buffer size and the processing speed in the node.
__________
Translated from Journal on Communications, 2005, 26(11): 7–11 (in Chinese) 相似文献
6.
7.
Dingde Jiang Zhengzheng Xu Hongwei Xu Yang Han Zhenhua Chen Zhen YuanAuthor vitae 《Computers & Electrical Engineering》2011,37(6):1106-1121
Traffic matrix (TM) is a key input of traffic engineering and network management. However, it is significantly difficult to attain TM directly, and so TM estimation is so far an interesting topic. Though many methods of TM estimation are proposed, TM is generally unavailable in the large-scale IP backbone networks and is difficult to be estimated accurately. This paper proposes a novel method of TM estimation in large-scale IP backbone networks, which is based on the generalized regression neural network (GRNN), called GRNN TM estimation (GRNNTME) method. Firstly, building on top of GRNN, we present a multi-input and multi-output model of large-scale TM estimation. Because of the powerful capability of learning and generalizing of GRNN, the output of our model can sufficiently capture the spatio-temporal correlations of TM. This ensures that the estimation of TM can accurately be attained. And then GRNNTME uses the procedure of data posttreating further to make the output of our model closer to real value. Finally, we use the real data from the Abilene Network to validate GRNNTME. Simulation results show that GRNNTME can perform well the accurate and fast estimation of TM, track its dynamics, and holds the stronger robustness and lower estimation errors. 相似文献
8.
9.
在室内/热点区域场景下,由于终端与基站之间信道质量良好,因此可以考虑引入高阶星座调制以提高频谱效率。基于一种MCS/TBS/CQI配置,对多种Small Cell场景进行引入256QAM的系统级仿真,并通过仿真结果来对比在不同场景中,引入256QAM和采用原有调制方式对用户吞吐量、频谱效率等多项指标的影响。仿真结果初步表明,在Small Cell scenario 3稀疏场景下,引入256QAM后将对系统产生较大增益。 相似文献
10.
with the increasing popularity of cloud services,attacks on the cloud infrastructure also increase dramatically.Especially,how to monitor the integrity of cloud execution environments is still a difficult task.In this paper,a real-time dynamic integrity validation(DIV) framework is proposed to monitor the integrity of virtual machine based execution environments in the cloud.DIV can detect the integrity of the whole architecture stack from the cloud servers up to the VM OS by extending the current trusted chain into virtual machine's architecture stack.DIV introduces a trusted third party(TTP) to collect the integrity information and detect remotely the integrity violations on VMs periodically to avoid the heavy involvement of cloud tenants and unnecessary information leakage of the cloud providers.To evaluate the effectiveness and efficiency of DIV framework,a prototype on KVM/QEMU is implemented,and extensive analysis and experimental evaluation are performed.Experimental results show that the DIV can efficiently validate the integrity of files and loaded programs in real-time,with minor performance overhead. 相似文献