全文获取类型
收费全文 | 17483篇 |
免费 | 2426篇 |
国内免费 | 1529篇 |
专业分类
电工技术 | 1612篇 |
技术理论 | 1篇 |
综合类 | 2181篇 |
化学工业 | 1074篇 |
金属工艺 | 249篇 |
机械仪表 | 1016篇 |
建筑科学 | 562篇 |
矿业工程 | 345篇 |
能源动力 | 420篇 |
轻工业 | 334篇 |
水利工程 | 260篇 |
石油天然气 | 315篇 |
武器工业 | 144篇 |
无线电 | 3954篇 |
一般工业技术 | 840篇 |
冶金工业 | 260篇 |
原子能技术 | 114篇 |
自动化技术 | 7757篇 |
出版年
2024年 | 43篇 |
2023年 | 102篇 |
2022年 | 212篇 |
2021年 | 286篇 |
2020年 | 318篇 |
2019年 | 315篇 |
2018年 | 361篇 |
2017年 | 514篇 |
2016年 | 583篇 |
2015年 | 717篇 |
2014年 | 1152篇 |
2013年 | 1097篇 |
2012年 | 1459篇 |
2011年 | 1438篇 |
2010年 | 1192篇 |
2009年 | 1181篇 |
2008年 | 1299篇 |
2007年 | 1566篇 |
2006年 | 1279篇 |
2005年 | 1198篇 |
2004年 | 969篇 |
2003年 | 947篇 |
2002年 | 717篇 |
2001年 | 587篇 |
2000年 | 462篇 |
1999年 | 388篇 |
1998年 | 235篇 |
1997年 | 190篇 |
1996年 | 144篇 |
1995年 | 124篇 |
1994年 | 97篇 |
1993年 | 71篇 |
1992年 | 55篇 |
1991年 | 31篇 |
1990年 | 28篇 |
1989年 | 24篇 |
1988年 | 12篇 |
1987年 | 10篇 |
1986年 | 4篇 |
1985年 | 6篇 |
1984年 | 4篇 |
1983年 | 4篇 |
1982年 | 5篇 |
1980年 | 2篇 |
1974年 | 1篇 |
1965年 | 1篇 |
1963年 | 1篇 |
1962年 | 1篇 |
1956年 | 1篇 |
1951年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
1.
This article presents a new method for pairing devices securely. The commitment-based authentication uses a fuzzy secret that the devices only know approximately. Its novel feature is time-based opening of commitments in a single round. We also introduce a new source for the fuzzy secret: synchronized drawing with two fingers of the same hand on two touch screens or surfaces. The drawings are encoded as strings and compared with an edit-distance metric. A prototype implementation of this surprisingly simple and natural pairing mechanism shows that it accurately differentiates between true positives and man-in-the-middle attackers. 相似文献
2.
3.
Barbara M. Johnston Peter R. Johnston 《International journal for numerical methods in engineering》2003,56(4):589-607
Accurate numerical evaluation of integrals arising in the boundary element method is fundamental to achieving useful results via this solution technique. In this paper, a number of techniques are considered to evaluate the weakly singular integrals which arise in the solution of Laplace's equation in three dimensions and Poisson's equation in two dimensions. Both are two‐dimensional weakly singular integrals and are evaluated using (in a product fashion) methods which have recently been used for evaluating one‐dimensional weakly singular integrals arising in the boundary element method. The methods used are based on various polynomial transformations of conventional Gaussian quadrature points where the transformation polynomial has zero Jacobian at the singular point. Methods which split the region of integration into sub‐regions are considered as well as non‐splitting methods. In particular, the newly introduced and highly accurate generalized composite subtraction of singularity and non‐linear transformation approach (GSSNT) is applied to various two‐dimensional weakly singular integrals. A study of the different methods reveals complex relationships between transformation orders, position of the singular point, integration kernel and basis function. It is concluded that the GSSNT method gives the best overall results for the two‐dimensional weakly singular integrals studied. Copyright © 2002 John Wiley & Sons, Ltd. 相似文献
4.
首先介绍了HART通信协议及他的优点,然后介绍了HART通信协议在汽油机测速方面的软件实现。该软件主要采用目前流行的VB编程语言。可设计出界面友好、功能强大的测量和监控软件。 相似文献
5.
对三网互联的几个关键技术进行分析与研究,介绍利用IP技术解决有线电视网地址选择问题,探讨怎样将ATM技术与IP技术相互融合,使真正的信息高速公路成为现实,阐述利用H.323标准全面解决视频网络方案。 相似文献
6.
7.
Panagiotis N. Zarros Myung J. Lee Tarek N. Saadawi 《Journal of Network and Systems Management》1994,2(4):361-382
In this paper, an algorithm to determine the set of packets generated continuously and periodically from different participants that are arriving at a node either for mixing at the master of a conference, or for simply playing back at a regular participant of a conference, is proposed. The essence of the algorithm is to estimate the expected packet arrival time (or reference time) for each participant. With the reference time at hand, the maximum jitter and the optimum waiting time for a mixer to wait packets from all participants can be determined. An enhancement to improve synchronization which deals with the estimation of the time offsets between the individual periods of the sources and the period of the receiver is also presented. The error of the proposed algorithm is enumerated by the Chernoff bound and demonstrated by simulation and is shown to be acceptable in practical application. The algorithm can also be employed when traffic sources operate with different periods. 相似文献
8.
张鉴 《中国有色金属学会会刊》2002,12(1):120-126
Based on the principle of annexation and phase diagrams, the structural units of In-Pb-Sb and In-Bi-Pb melts were determined, and their calculating models of mass action concentrations were formulated. Calculated results agree well with practical values, which in turn show that the models deduced can reflect the structural realities of corresponding melts and the principle of annexation is applicable not only to some binary metallic melts, but also to ternary metallic melts. 相似文献
9.
宽带建设低潮期实际上是一次优胜劣汰的过程,宽带运营竞争的手段将由低价竞争转向服务质量和特色的竞争。应在重视宽带接入建设的同时,也要重视业务运营管理平台的建设。应从长远考虑,不应仅为了节省投资而降低对设备的要求。由于降低成本的主要方向是在线缆部分,因此EVDSL技术应用的速度将大大超过人们的预期。在网络建设上,IPDSLAM虽有优势但也有不足,还需要进一步的成熟、稳定和实践的检验。 相似文献
10.
阐述了城域光网络(MON)技术的出现背景、定义、技术方案和特点,以及与现有城域基础设施的比较,突出说明了其应用上的竞争优势。最后介绍了MON的现状和前景展望。 相似文献