全文获取类型
收费全文 | 5808篇 |
免费 | 319篇 |
国内免费 | 46篇 |
专业分类
电工技术 | 74篇 |
综合类 | 20篇 |
化学工业 | 1632篇 |
金属工艺 | 125篇 |
机械仪表 | 220篇 |
建筑科学 | 154篇 |
矿业工程 | 4篇 |
能源动力 | 377篇 |
轻工业 | 558篇 |
水利工程 | 84篇 |
石油天然气 | 36篇 |
无线电 | 556篇 |
一般工业技术 | 1064篇 |
冶金工业 | 276篇 |
原子能技术 | 83篇 |
自动化技术 | 910篇 |
出版年
2024年 | 23篇 |
2023年 | 113篇 |
2022年 | 325篇 |
2021年 | 399篇 |
2020年 | 300篇 |
2019年 | 327篇 |
2018年 | 359篇 |
2017年 | 296篇 |
2016年 | 325篇 |
2015年 | 194篇 |
2014年 | 324篇 |
2013年 | 534篇 |
2012年 | 306篇 |
2011年 | 312篇 |
2010年 | 277篇 |
2009年 | 245篇 |
2008年 | 167篇 |
2007年 | 145篇 |
2006年 | 132篇 |
2005年 | 95篇 |
2004年 | 75篇 |
2003年 | 71篇 |
2002年 | 55篇 |
2001年 | 42篇 |
2000年 | 36篇 |
1999年 | 37篇 |
1998年 | 69篇 |
1997年 | 59篇 |
1996年 | 42篇 |
1995年 | 53篇 |
1994年 | 24篇 |
1993年 | 34篇 |
1992年 | 30篇 |
1991年 | 25篇 |
1990年 | 24篇 |
1989年 | 22篇 |
1988年 | 15篇 |
1987年 | 30篇 |
1986年 | 30篇 |
1985年 | 22篇 |
1984年 | 30篇 |
1983年 | 26篇 |
1982年 | 16篇 |
1981年 | 8篇 |
1980年 | 14篇 |
1979年 | 13篇 |
1978年 | 12篇 |
1977年 | 11篇 |
1976年 | 14篇 |
1975年 | 8篇 |
排序方式: 共有6173条查询结果,搜索用时 46 毫秒
101.
Hasnain Ahmed Muhammad Junaid Arshad Shah Muhammad Sarfraz Ahmad Amjad Hussain Zahid 《International Journal of Communication Systems》2020,33(14)
Traffic load balancing in data centers is an important requirement. Traffic dynamics and possibilities of changes in the topology (e.g., failures and asymmetries) make load balancing a challenging task. Existing end‐host–based schemes either employ the predominantly used ECN or combine it with RTT to get congestion information of paths. Both congestion signals, ECN and RTT, have limitations; ECN only tells whether the queue length is above or below a threshold value but does not inform about the extent of congestion; similarly, RTT in data center networks is on the scale of up to few hundreds of microseconds, and current data center operating systems lack fine‐grained microsecond‐level timers. Therefore, there is a need of a new congestion signal which should give accurate information of congestion along the path. Furthermore, in end‐host–based schemes, detecting asymmetries in the topology is challenging due to the inability to accurately measure RTT on the scale of microseconds. This paper presents QLLB, an end‐host–based, queue length–based load balancing scheme. QLLB employs a new queue length–based congestion signal that gives an exact measure of congestion along the paths. Furthermore, QLLB uses relative‐RTT to detect asymmetries in the topology. QLLB is implemented in ns‐3 and compared with ECMP, CONGA, and Hermes. The results show that QLLB significantly improves performance of short flows over the other schemes and performs within acceptable level, of CONGA and Hermes, for long flows. In addition, QLLB effectively detects asymmetric paths and performs better than Hermes under high loads. 相似文献
102.
Salabat Khan Zijian Zhang Liehuang Zhu Mussadiq Abdul Rahim Sadique Ahmad Ruoyu Chen 《International Journal of Communication Systems》2020,33(15)
In classical public‐key infrastructure (PKI), the certificate authorities (CAs) are fully trusted, and the security of the PKI relies on the trustworthiness of the CAs. However, recent failures and compromises of CAs showed that if a CA is corrupted, fake certificates may be issued, and the security of clients will be at risk. As emerging solutions, blockchain‐ and log‐based PKI proposals potentially solved the shortcomings of the PKI, in particular, eliminating the weakest link security and providing a rapid remedy to CAs' problems. Nevertheless, log‐based PKIs are still exposed to split‐world attacks if the attacker is capable of presenting two distinct signed versions of the log to the targeted victim(s), while the blockchain‐based PKIs have scaling and high‐cost issues to be overcome. To address these problems, this paper presents a secure and accountable transport layer security (TLS) certificate management (SCM), which is a next‐generation PKI framework. It combines the two emerging architectures, introducing novel mechanisms, and makes CAs and log servers accountable to domain owners. In SCM, CA‐signed domain certificates are stored in log servers, while the management of CAs and log servers is handed over to a group of domain owners, which is conducted on the blockchain platform. Different from existing blockchain‐based PKI proposals, SCM decreases the storage cost of blockchain from several hundreds of GB to only hundreds of megabytes. Finally, we analyze the security and performance of SCM and compare SCM with previous blockchain‐ and log‐based PKI schemes. 相似文献
103.
104.
Bouguezel S. Swamy M.N.S. Ahmad M.O. 《IEEE transactions on circuits and systems. I, Regular papers》2006,53(4):905-917
In this paper, efficient multidimensional (M-D) vector radix (VR) decimation-in-frequency and decimation-in-time fast Hartley transform (FHT) algorithms are derived for computing the discrete Hartley transform (DHT) of any dimension using an appropriate index mapping and the Kronecker product. The proposed algorithms are more effective and highly suitable for hardware and software implementations compared to all existing M-D FHT algorithms that are derived for the computation of the DHT of any dimension. The butterflies of the proposed algorithms are based on simple closed-form expressions that allow easy implementations of these algorithms for any dimension. In addition, the proposed algorithms possess properties such as high regularity, simplicity and in-place computation that are highly desirable for software and hardware implementations, especially for the M-D applications. A close relationship between the M-D VR complex-valued fast Fourier transform algorithms and the proposed M-D VR FHT algorithms is established. This type of relationship is of great significance for software and hardware implementations of the algorithms, since it is shown that because of this relationship and the fact that the DHT is an alternative to the discrete Fourier transform (DFT) for real data, a single module with a little or no modification can be used to carry out the forward and inverse M-D DFTs for real- or complex-valued data and M-D DHTs. Thus, the same module (with a little or no modification) can be used to cover all domains of applications that involve the DFTs or DHTs. 相似文献
105.
Chinipardaz Maryam Noorhosseini Seyed Majid Sarlak Ahmad 《Telecommunication Systems》2022,81(1):67-81
Telecommunication Systems - Interference is the main source of capacity limitation in wireless networks. In some medium access technologies in cellular networks, such as OFDMA, the allocation of... 相似文献
106.
Modeling and Simulation for Transient Thermal Analyses Using a Voltage-in-Current Latency Insertion Method 下载免费PDF全文
This article presents a modeling and simulation method for transient thermal analyses of integrated circuits(ICs) using the original and voltage-in-current(VinC) latency insertion method(LIM). LIM-based algorithms are a set of fast transient simulation methods that solve electrical circuits in a leapfrog updating manner without relying on large matrix operations used in conventional Simulation Program with Integrated Circuit Emphasis(SPICE)-based methods which can significantly slow down the sol... 相似文献
107.
Ahmad Patooghy Author Vitae Author Vitae Mahdi Fazeli Author Vitae 《Integration, the VLSI Journal》2010,43(3):268-278
This paper proposes and evaluates Low-overhead, Reliable Switch (LRS) architecture to enhance the reliability of Network-on-Chips (NoCs). The proposed switch architecture exploits information and hardware redundancies to eliminate retransmission of faulty flits. The LRS architecture creates a redundant copy of each newly received flit and stores the redundant flit in a duplicated flit buffer that is associated with the incoming channel of the flit. Flit buffers in the LRS are equipped with information redundancy to detect probable bit flip errors. When an error is detected in a flit buffer, its duplicated buffer is used to recover the correct value of the flit. In this way, the propagation of the erroneous flits in NoC is prevented without any need to credit signals and, retransmission buffers. Using an HDL-based NoC simulator, the LRS is compared to two other widely used reliability enhancement methods: the Switch-to-Switch (S2S) and the End-to-End (E2E) methods. The simulation results show that the LRS consumes less power and provides higher performance compared to those of the E2E and S2S methods. More importantly, unlike the E2E and the S2S methods, the LRS has constant overheads, which makes it applicable in all working conditions. To validate the comparison, an analytical performance and reliability model is developed for the LRS, S2S and E2E methods. The results of the model match those obtained from the simulations while the proposed model is significantly faster. 相似文献
108.
Fakhra Aziz M.H.Sayyad Khassan S.Karimov M.Saleem Zubair Ahmad S.Mahmood Khan 《半导体学报》2010,31(11):114002-114002-6
This study presents the fabrication and characterization of novel surface-type capacitive humidity sensors using vanadyl phthalocyanine (VOPc) as the active material. The devices, which comprise three different thicknesses,have been fabricated using the thermal evaporation technique. A thin film of VOPc is deposited on thoroughly cleaned glass substrates with pre-pattemed Ag electrodes. The capacitive effect of the samples under humidity has been in-vestigated. Comparison of the samples with different thicknesses shows that the thinnest device seems more sensitive towards humidity. The humidity dependent capacitance properties of the sensor make it beneficial for use in commercial hygrometers. 相似文献
109.
Engineering Iron Oxide Hollow Nanospheres to Enhance Antimicrobial Property: Understanding the Cytotoxic Origin in Organic Rich Environment 下载免费PDF全文
Yusilawati Ahmad Nor Liang Zhou Anand Kumar Meka Chun Xu Yuting Niu Hongwei Zhang Neena Mitter Donna Mahony Chengzhong Yu 《Advanced functional materials》2016,26(30):5408-5418
Engineered magnetic iron oxide nanoparticles with surprisingly high antimicrobial activity and excellent safety profiles to mammalian cell lines have been developed. Hematite hollow nanospheres (HNSs) are prepared by a facile hard templating method; reduction of hematite HNSs by H2 leads to magnetite HNSs. The antimicrobial activity of magnetite HNSs towards Gram negative (Escherichia coli) and Gram positive (Staphylococcus epidermidis) bacteria is evaluated against hematite HNSs and conventional magnetite (C‐magnetite; diameter <50 nm). Superior antibacterial performance is observed for magnetite HNSs towards both E. coli and S. epidermidis over hematite HNSs and C‐magnetite. The origin of the antimicrobial activity of magnetite HNSs is the high leaching of iron ions in the presence of microorganisms, which leads to high generation of reactive oxygen species. Magnetite HNSs allow multiple‐fold increase in the generation of soluble iron ions over hematite HNSs and C‐magnetite, showing that control over both the composition and nanostructure is crucial to tune the antimicrobial activity of iron oxides. Based on the current findings, magnetic HNSs show promising potential antimicrobial applications. 相似文献
110.
In a region characterized by low water resources, Lebanon stands as an exceptional country in the Middle East. Several waterways present ample opportunity for utilization of hydropower. Before the civil war, several projects were undertaken to generate electricity through hydropower. A total installed capacity of 283 MW has aided Lebanon in supplementing its need of electricity from local renewable sources, thus reducing the overall bill of imported energy. The available hydropower generation constitutes currently 4–7% of the electricity generation depending on rainfall, with future plans expected to install another 205 MW of capacity. This use is in competition with water diversion for irrigation. Four different scenarios were analyzed to indicate the share of hydropower in the total production of electricity, with and without future irrigation and power projects, indicating that, by 2020, hydropower's share of electricity generation will vary between a maximum of 6.9% and a minimum of 1.2% depending on government plans regarding water use. Current value of potential energy available when water from the Litani river is used for hydropower is estimated to be around 20 cents per m3. Water uses planned should take this value into account. 相似文献