全文获取类型
收费全文 | 38858篇 |
免费 | 4193篇 |
国内免费 | 2077篇 |
专业分类
电工技术 | 2835篇 |
技术理论 | 2篇 |
综合类 | 2828篇 |
化学工业 | 6120篇 |
金属工艺 | 2126篇 |
机械仪表 | 2674篇 |
建筑科学 | 3088篇 |
矿业工程 | 1305篇 |
能源动力 | 1358篇 |
轻工业 | 2738篇 |
水利工程 | 836篇 |
石油天然气 | 1891篇 |
武器工业 | 330篇 |
无线电 | 4939篇 |
一般工业技术 | 4564篇 |
冶金工业 | 1545篇 |
原子能技术 | 352篇 |
自动化技术 | 5597篇 |
出版年
2024年 | 169篇 |
2023年 | 710篇 |
2022年 | 1381篇 |
2021年 | 1861篇 |
2020年 | 1346篇 |
2019年 | 1145篇 |
2018年 | 1246篇 |
2017年 | 1358篇 |
2016年 | 1205篇 |
2015年 | 1739篇 |
2014年 | 2118篇 |
2013年 | 2538篇 |
2012年 | 2772篇 |
2011年 | 2855篇 |
2010年 | 2536篇 |
2009年 | 2320篇 |
2008年 | 2372篇 |
2007年 | 2163篇 |
2006年 | 2076篇 |
2005年 | 1738篇 |
2004年 | 1287篇 |
2003年 | 1249篇 |
2002年 | 1336篇 |
2001年 | 1238篇 |
2000年 | 827篇 |
1999年 | 781篇 |
1998年 | 541篇 |
1997年 | 430篇 |
1996年 | 411篇 |
1995年 | 283篇 |
1994年 | 253篇 |
1993年 | 201篇 |
1992年 | 155篇 |
1991年 | 107篇 |
1990年 | 87篇 |
1989年 | 57篇 |
1988年 | 49篇 |
1987年 | 20篇 |
1986年 | 38篇 |
1985年 | 14篇 |
1984年 | 21篇 |
1983年 | 13篇 |
1982年 | 19篇 |
1981年 | 16篇 |
1980年 | 13篇 |
1979年 | 11篇 |
1977年 | 4篇 |
1976年 | 5篇 |
1975年 | 3篇 |
1959年 | 4篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
31.
文章针对使用USB存储设备造成的内部泄密问题,提出了一种USB存储设备访问控制方案,该方案对用户的身份认证基于安全强度很高的椭圆曲线数字签名算法,同时使用过滤器驱动程序实现了USB存储设备的读写控制,因而此方案具有较好的安全性、实用性和通用性。 相似文献
32.
S.J. Choi K. Djordjev Zhen Peng Qi Yang Sang Jun Choi P.D. Dapkus 《Photonics Technology Letters, IEEE》2004,16(10):2266-2268
All-buried InP-InGaAsP ring resonators laterally coupled to bus waveguides are demonstrated. The buried configurations offer a lower built-in refractive index step along the resonator periphery, which affords enhanced optical coupling coefficients between the waveguides and reduced scattering losses caused by the resonator sidewall imperfections. Very low optical intensity attenuations of 0.4 cm/sup -1/ and coupling-limited quality factors of greater than 10/sup 5/ are observed from 200-/spl mu/m-radii ring resonators. The measured spectral linewidth is as narrow as 0.0145 nm. 相似文献
33.
34.
35.
Given Hong Kong's special circumstances of small physical size, advanced infrastructure, and low shopping cost, a survey is designed under which supply-side problems in Internet business-to-consumer (B2C) e-commerce are indirectly revealed by responses on the demand side. Difficulties arising from the reluctance to answer questionnaires on the part of e-firms wary about trade and innovation secrets and their small number at the outset are thereby overcome. Survey data on demand-side obstacle factors in the form of perceived low e-shopping comparability, e-shopping inconvenience, e-transaction insecurity, and poor Internet privacy, together with orientation toward social interaction and low awareness on the part of consumers, translate into information on notionally matching supply-side hurdles. Regression analysis and hypothesis testing indicate statistical significance for the above hurdle factors in terms of impact on individual unwillingness to shop online. These results add to the inductive basis for future research into a general demand-supply theory of Internet B2C e-commerce and offer an empirically-grounded position against which the effects of later supply-side changes can be evaluated. Useful information also follows for engineer-managers seeking to compare marginal improvements in supply-side problems, particularly in the form of estimated substitution ratios. 相似文献
36.
Jui-Ting Weng Jiunn Ru Lai Wanjiun Liao 《Wireless Communications, IEEE Transactions on》2006,5(7):1676-1684
In this paper, we analyze node mobility for reliable packet delivery in mobile IP networks. In mobile IP, packets destined to roaming nodes are intercepted by their home agents and delivered via tunneling to their care of addresses (CoA). A mobile node may roam across multiple subnets. At each boundary crossing, a handoff is initiated such that the CoA is updated and a new tunnel is established. We consider both basic mobile IP handoff and smooth handoff. We find that reliable packet delivery in mobile IP networks can be modeled as a renewal process, because the retransmission over a new tunnel after each boundary crossing is independent of the previous history. We then derive the probability distribution of boundary crossings for each successful packet, based on which the packet reliable delivery time can be obtained. Our analytical model is derived based on a general distribution of residence time in a subnet and a general distribution of successful retransmission attempts in each subnet. The results can be readily applied to any distributions for both items. We also provide numerical examples to calculate the probability distribution of boundary crossings, and conduct simulations to validate our analytical results 相似文献
37.
38.
39.
Ray-Guang Cheng Cun-Yi Wang Li-Hung Liao Jen-Shun Yang 《Communications Letters, IEEE》2006,10(2):123-125
This work presents a wireless token-passing protocol, named Ripple, for wireless mesh networks (WMNs). In contrast to existing random-access approaches, Ripple uses a decentralized controlled-access approach to protect nodes from unintentional packet collisions and maximize the spatial reuse. The performance of Ripple under an error-free wireless channel was investigated and the accuracy of the analysis was verified by simulation. Simulation results also indicated that Ripple achieved throughput, stability, and QoS enhancement than that of 802.11 DCF under a highly loaded situation. 相似文献
40.