首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   13782篇
  免费   856篇
  国内免费   111篇
电工技术   217篇
综合类   61篇
化学工业   3544篇
金属工艺   358篇
机械仪表   495篇
建筑科学   516篇
矿业工程   21篇
能源动力   966篇
轻工业   1279篇
水利工程   189篇
石油天然气   227篇
武器工业   4篇
无线电   1395篇
一般工业技术   2544篇
冶金工业   506篇
原子能技术   95篇
自动化技术   2332篇
  2024年   71篇
  2023年   269篇
  2022年   591篇
  2021年   898篇
  2020年   755篇
  2019年   813篇
  2018年   919篇
  2017年   835篇
  2016年   818篇
  2015年   478篇
  2014年   756篇
  2013年   1376篇
  2012年   906篇
  2011年   953篇
  2010年   674篇
  2009年   599篇
  2008年   423篇
  2007年   359篇
  2006年   306篇
  2005年   194篇
  2004年   176篇
  2003年   152篇
  2002年   120篇
  2001年   93篇
  2000年   92篇
  1999年   81篇
  1998年   142篇
  1997年   116篇
  1996年   96篇
  1995年   71篇
  1994年   53篇
  1993年   60篇
  1992年   46篇
  1991年   38篇
  1990年   40篇
  1989年   34篇
  1988年   26篇
  1987年   24篇
  1986年   34篇
  1985年   27篇
  1984年   27篇
  1983年   25篇
  1982年   21篇
  1981年   19篇
  1980年   19篇
  1979年   16篇
  1978年   18篇
  1977年   18篇
  1976年   27篇
  1975年   13篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
81.
Group key management is one of the key security issues in multicast networks. The main challenge is to provide a secure group key management method which avoids high key update cost in terms of the number of transmitted keys. In order to achieve low key update cost for group key management, most of the existing methods increase their encryption/decryption cycles which requires a strong cryptographic function. In this paper, a cost-effective key management method is proposed to address the problem of high key update cost without increasing the encryption/decryption cycles. We evaluated our proposed method with existing tree-based methods by using Markov chain and Poisson Arrival Process. Results indicate the efficiency of our proposed method in reducing the key update cost significantly compared to the existing tree-based key management methods.  相似文献   
82.
As a network-based localized mobility management protocol, Proxy Mobile IPv6 (PMIPv6) enables a Mobile Host (MH) to roam within a localized domain without MH intervention in the mobility-related signalling. However, the PMIPv6 maintains MH mobility support in a restriction domain. Therefore, whenever the MH roams away from the PMIPv6 domain, its reachability status will be broken-down causing high handover latency and inevitable traffic loss for its communication session. This article proposes a proactive mechanism to mange the MH handover and maintain its data session continually across inter-PMIPv6-domains. The proposed mechanism introduces an intermediate global mobility anchor entity, called, which is responsible to coordinate MH handover as well as redirect its traffic across inter-PMIPv6-domains. Through various simulation evaluations, via ns-2, several experiments were conducted, revealing numerous results that verify the proposed mechanism superior performance over the conventional inter-PMIPv6-domain handover schemes in terms of handover latency, achieved throughput, protocol signalling cost and end-to-end traffic delivery latency.  相似文献   
83.
The current controlled current-mode amplifier proposed by Fabre et al. (1996, IEEE Transactions on Circuits and Systems—I, 43, 82) is reanalysed to show that it can work not only under small signal conditions, as suggested by Fabre et al., but also under large signal conditions. Simulation results which confirm the theory presented are included.  相似文献   
84.
Provisioning buffer management mechanism is especially crucial in resource-constrained delay tolerant networks (DTNs) as maximum data delivery ratio with minimum overhead is expected in highly congested environments. However, most DTN protocols do not consider resource limitations (e.g., buffer, bandwidth) and hence, results in performance degradation. To strangle and mitigate the impact of frequent buffer overflows, this paper presents an adaptive and efficient buffer management scheme called size-aware drop (SAD) that strives to improve buffer utilization and avoid unnecessary message drops. To improve data delivery ratio, SAD exactly determines the requirement based on differential of newly arrived message(s) and available space. To vacate inevitable space from a congested buffer, SAD strives to avoid redundant message drops and deliberate to pick and discard most appropriate message(s) to minimize overhead. The performance of SAD is validated through extensive simulations in realistic environments (i.e., resource-constrained and congested) with different mobility models (i.e., Random Waypoint and disaster). Simulation results demonstrate the performance supremacy of SAD in terms of delivery probability and overhead ratio besides other metrics when compared to contemporary schemes based on Epidemic (DOA and DLA) and PRoPHET (SHLI and MOFO).  相似文献   
85.
A respiratory image-sequence-segmentation technique is introduced based on a novel image-sequence analysis. The proposed technique is capable of segmenting the lung's air and its soft tissues followed by estimating the lung's air volume and its variations throughout the image sequence. Accurate estimation of these two parameters is very important in many applications related to lung disease diagnosis and treatment systems (e.g., brachytherapy), where the parameters are either the variables of interest themselves or are dependent/independent variables. The concept of the proposed technique involves using the image sequence's combined histogram to obtain a reasonable initial guess for the lung's air segmentation thresholds. This is followed by an optimization process to find the optimum threshold values that best satisfy the lung's air mass conservation and tissue incompressibility principles. These threshold values are consequently applied to estimate the lung's air volume and its variations throughout respiratory Computed Tomography (CT) image sequences. Ex vivo experiments were conducted on porcine left lungs in order to demonstrate the performance of the proposed technique. The proposed method was initially validated using a breath-hold CT image sequence with known air volumes inside the lung, where results show that the proposed technique outperforms single-histogram-based methods. This was followed by demonstrating the proposed technique's application in a 4-D-CT respiratory sequence, where the air volume inside the lung was unknown. Consistency of the obtained results in the latter experiment with tissue near incompressibility principle was validated. The results indicate a very good ability of the proposed method for estimating the lung's air volume and its variations in a respiratory image sequence.  相似文献   
86.
Ultrasmall Co9S8 nanoparticles are introduced on the basal plane of MoS2 to fabricate a covalent 0D–2D heterostructure that enhances the hydrogen evolution reaction (HER) activity of electrochemical water splitting. In the heterostructure, separate phases of Co9S8 and MoS2 are formed, but they are connected by Co–S–Mo type covalent bonds. The charge redistribution from Co to Mo occurring at the interface enhances the electron‐doped characteristics of MoS2 to generate electron‐rich Mo atoms. Besides, reductive annealing during the synthesis forms S defects that activates adjacent Mo atoms for further enhanced HER activity as elucidated by the density functional theory (DFT) calculation. Eventually, the covalent Co9S8–MoS2 heterostructure shows amplified HER activity as well as stability in all pH electrolytes. The synergistic effect is pronounced when the heterostructure is coupled with a porous Ni foam (NF) support to form Co9S8–MoS2/NF that displays superior performance to those of the state‐of‐the‐art non‐noble metal electrocatalysts, and even outperforms a commercial Pt/C catalyst in a practically meaningful, high current density region in alkaline (>170 mA cm?2) and neutral (>60 mA cm?2) media. The high HER performance and stability of Co9S8–MoS2 heterostructure make it a promising pH universal alternative to expensive Pt‐based electrocatalysts for practical water electrolyzers.  相似文献   
87.
Telecommunication Systems - Certificateless authenticated key agreement (CLAKA) is important to prevent the escrow problem. It also mitigates the certificate management burden in storage and during...  相似文献   
88.
Wireless Personal Communications - A prediction-based method is presented to track mobile object and its location in a sensor network area. In recent years, energy consumption and high accuracy...  相似文献   
89.
Assi  Chadi  Shami  Abdallah  Ali  M. A.  Ye  Yinghua  Dixit  Sudhir 《Photonic Network Communications》2002,4(3-4):377-390
This work focuses on developing and implementing comprehensive unified constraint-based routing algorithms within the generalized multi-protocol label switching framework (GMPLS) to provision sub-wavelength circuits (low-rate traffic streams). Constraint-based routing is further augmented in this work by dynamically routing both an active and another alternate link/node-disjoint backup path at the same time in order to provision a given connection request. This new integrated approach combines both IP routing and optical resource allocation to setup end-to-end connections.  相似文献   
90.
International Journal of Wireless Information Networks - With exponential growth in the number of wireless devices and limited available spectrum, the problem of spectrum sharing remains in...  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号