全文获取类型
收费全文 | 168310篇 |
免费 | 7049篇 |
国内免费 | 3330篇 |
专业分类
电工技术 | 5128篇 |
技术理论 | 9篇 |
综合类 | 6800篇 |
化学工业 | 26629篇 |
金属工艺 | 9115篇 |
机械仪表 | 8165篇 |
建筑科学 | 9161篇 |
矿业工程 | 2550篇 |
能源动力 | 3554篇 |
轻工业 | 8418篇 |
水利工程 | 2694篇 |
石油天然气 | 4866篇 |
武器工业 | 493篇 |
无线电 | 19425篇 |
一般工业技术 | 27160篇 |
冶金工业 | 7259篇 |
原子能技术 | 1073篇 |
自动化技术 | 36190篇 |
出版年
2024年 | 326篇 |
2023年 | 1320篇 |
2022年 | 2293篇 |
2021年 | 3134篇 |
2020年 | 2346篇 |
2019年 | 2040篇 |
2018年 | 16326篇 |
2017年 | 15532篇 |
2016年 | 12056篇 |
2015年 | 3529篇 |
2014年 | 4240篇 |
2013年 | 5261篇 |
2012年 | 8301篇 |
2011年 | 14722篇 |
2010年 | 12977篇 |
2009年 | 10109篇 |
2008年 | 11072篇 |
2007年 | 12023篇 |
2006年 | 4756篇 |
2005年 | 5325篇 |
2004年 | 3875篇 |
2003年 | 3644篇 |
2002年 | 2716篇 |
2001年 | 2111篇 |
2000年 | 2458篇 |
1999年 | 2616篇 |
1998年 | 2436篇 |
1997年 | 1913篇 |
1996年 | 1787篇 |
1995年 | 1456篇 |
1994年 | 1227篇 |
1993年 | 892篇 |
1992年 | 667篇 |
1991年 | 567篇 |
1990年 | 410篇 |
1989年 | 367篇 |
1988年 | 327篇 |
1987年 | 175篇 |
1986年 | 165篇 |
1985年 | 112篇 |
1984年 | 98篇 |
1983年 | 63篇 |
1982年 | 60篇 |
1981年 | 54篇 |
1980年 | 38篇 |
1968年 | 45篇 |
1966年 | 43篇 |
1965年 | 45篇 |
1955年 | 63篇 |
1954年 | 68篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
991.
992.
Modern network systems have much trouble in security vulnerabilities such as buffer overflow, bugs in Microsoft Internet, sensor network routing protocol too simple, security flaws of applications, and operating systems. Moreover, wireless devices such as smart phones, personal digital assistants (PDAs), and sensors have become economically feasible because of technological advances in wireless communication and manufacturing of small and low-cost sensors. There are typologies of vulnerabilities to be exploited in these devices. In order to improve securities, many mechanisms are adopted, including authentication, cryptography, access control, and intrusion detection systems (IDS). In general, intrusion detection techniques can be categorized into two groups: misuse detection and anomaly detection. The misuse detection systems use patterns of weB-known attacks or weak spots of the systems to identify intrusions. The weakness of misuse detection systems is unable to detect any future (unknown) intrusion until corresponding attack signatures are intruded into the signature database. Anomaly detection methods try to determine whether the deviation is from the established normal usage patterns or not. The critical success of anomaly detection relies on the model of normal behaviors. 相似文献
993.
从技术特点和研究热点的角度,综述了X射线光栅干涉成像技术与系统的国内外最新进展。介绍了具有代表性的基于Talbot-Lau干涉法的X射线光栅成像原理与系统结构,以及物质对X射线的衰减、折射与小角散射的多信息获取技术。综述了国内外对X射线光栅成像技术与系统的优化改进研究,主要包括光栅步进对高位置分辨率的松弛与大视场高分辨率光栅成像技术的实现。介绍了二维光栅与基于光栅的具有时间分辨率的四维成像技术的国内外最新发展动态。展望了X射线光栅成像技术的发展趋势。 相似文献
994.
针对基于中继的OFDM蜂窝网络,该文考虑具有不同QoS要求的混合业务场景,引入合作传输机制,提出了一种基于合作中继的QoS感知资源调度算法,解决了合作中继节点选取,子载波分配以及功率控制等问题。以最大化系统效用为目标,在考虑QoS业务的速率要求与基站功率约束的同时,针对中继结构引入了中继节点的功率约束。为降低计算复杂度,将原非线性组合优化问题分解为子载波分配与功率控制两个子问题。仿真结果表明,该文所提算法在能量节约、系统效用,吞吐量等性能方面都有显著优势。 相似文献
995.
996.
This paper presents a low quiescent current,highly stable low-drop out(LDO) regulator.In order to reduce capacitor value and control frequency response peak,capacitor multipliers are adopted in the compensation circuit with mathematic calculations.The phase margin is adequate when the load current is 0.1 or 150 mA.Fabricated in an XFAB 0.6μm CMOS process,the LDO produces 12.2 mV(0.7%) overshoot voltage while the current changes at 770 mA/100μs with a capacitor load of 10μF. 相似文献
997.
In this paper, we present a CAD technique to design low-power and low phase noise integrated frequency synthesizers. This
technique introduces a key parameter, Phase Noise per Unit Power, which correlates phase noise and power among all the sub-circuits
in the frequency synthesizer. By correlating the performance of all the independent circuits together, sophisticated synthesizer
design and optimization can be significantly simplified. We demonstrate a 1.8 GHz frequency synthesizer design in a 0.18 μm
CMOS process achieving −132 dBc/Hz phase noise at 100 kHz offset with less than 4.3 mW power consumption. 相似文献
998.
The increased usage of directional methods of communications has prompted research into leveraging directionality in every layer of the network stack. In this paper, we explore the use of directionality in layer 3 to facilitate routing in highly mobile environments. We introduce Mobile Orthogonal Rendezvous Routing Protocol (MORRP) for mobile ad-hoc networks (MANETs). MORRP is a lightweight, but scalable routing protocol utilizing directional communications (such as directional antennas or free-space-optical transceivers) to relax information requirements such as coordinate space embedding, node localization, and mobility. This relaxation is done by introducing a novel concept called the directional routing table (DRT) which maps a set-of-IDs to each interface direction to provide probabilistic routing information based on interface direction. We show that MORRP achieves connectivity with high probability even in highly mobile environments while maintaining only probabilistic information about destinations. Additionally, we compare MORRP with various proactive, reactive, and position-based routing protocols using single omni-directional interfaces and multiple directional interfaces and show that MORRP gains over 10–14 × additional goodput vs. traditional protocols and 15–20% additional goodput vs. traditional protocols using multiple interfaces. MORRP scales well without imposing DHT-like graph structures (eg: trees, rings, torus etc). We also show that high connectivity can be achieved without the need to frequently disseminate node position resulting increased scalability even in highly mobile environments. 相似文献
999.
Cooperative energy spectrum sensing has been proved effective to detect the spectrum holes in Cognitive Radio (CR). However, its performance may suffer from the noise uncertainty, which is portrayed by the SNR wall in some literatures. In this paper we analyze the spectrum sensing performance under noise uncertainty and find an alternative approach to obtain the SNR wall. Then the average SNR wall is proposed to illustrate the statistically average impact of noise uncertainty. In addition, the cooperative sensing performance under noise uncertainty with AND rule is discussed. Analyses and numerical results show that cooperative sensing can significantly improve the sensing performance under the condition of noise uncertainty. 相似文献
1000.
Osnat Keren 《Journal of Electronic Testing》2010,26(3):337-353
The paper deals with context-oriented codes for concurrent error detection. We consider a fault model for which, in the presence of a fault, the values on the circuit’s output are arbitrary. This model allows one to design an error detection code without analyzing sensitive parts or error cones in the synthesized circuit. Conventional coding schemes are based on a one-to-one mapping between an original output vector (information word) and a codeword. In this paper, we introduce a different approach, which we call one-to-many coding. In one-to-many code, each codeword comprises a predefined set of words. The functional unit is referred to as an encoder enabling each activation to map an information word to a different word. This flexible mapping system results in a lower implementation cost of the functional unit and its checker. 相似文献