全文获取类型
收费全文 | 53200篇 |
免费 | 4219篇 |
国内免费 | 1981篇 |
专业分类
电工技术 | 2771篇 |
技术理论 | 5篇 |
综合类 | 2985篇 |
化学工业 | 9223篇 |
金属工艺 | 3203篇 |
机械仪表 | 3231篇 |
建筑科学 | 3759篇 |
矿业工程 | 1731篇 |
能源动力 | 1689篇 |
轻工业 | 3770篇 |
水利工程 | 860篇 |
石油天然气 | 3704篇 |
武器工业 | 396篇 |
无线电 | 5767篇 |
一般工业技术 | 6387篇 |
冶金工业 | 2953篇 |
原子能技术 | 657篇 |
自动化技术 | 6309篇 |
出版年
2024年 | 192篇 |
2023年 | 849篇 |
2022年 | 1467篇 |
2021年 | 2268篇 |
2020年 | 1645篇 |
2019年 | 1424篇 |
2018年 | 1622篇 |
2017年 | 1759篇 |
2016年 | 1572篇 |
2015年 | 2078篇 |
2014年 | 2680篇 |
2013年 | 3099篇 |
2012年 | 3308篇 |
2011年 | 3612篇 |
2010年 | 3202篇 |
2009年 | 2873篇 |
2008年 | 2818篇 |
2007年 | 2737篇 |
2006年 | 2894篇 |
2005年 | 2473篇 |
2004年 | 1550篇 |
2003年 | 1353篇 |
2002年 | 1277篇 |
2001年 | 1003篇 |
2000年 | 1201篇 |
1999年 | 1479篇 |
1998年 | 1177篇 |
1997年 | 1007篇 |
1996年 | 1009篇 |
1995年 | 877篇 |
1994年 | 698篇 |
1993年 | 455篇 |
1992年 | 370篇 |
1991年 | 291篇 |
1990年 | 237篇 |
1989年 | 196篇 |
1988年 | 172篇 |
1987年 | 105篇 |
1986年 | 89篇 |
1985年 | 60篇 |
1984年 | 52篇 |
1983年 | 36篇 |
1982年 | 32篇 |
1981年 | 29篇 |
1980年 | 17篇 |
1979年 | 7篇 |
1978年 | 7篇 |
1977年 | 10篇 |
1976年 | 14篇 |
1975年 | 4篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
Design and Verification of Enhanced Secure Localization Scheme in Wireless Sensor Networks 总被引:2,自引:0,他引:2
He Daojing Cui Lin Huang Hejiao Ma Maode 《Parallel and Distributed Systems, IEEE Transactions on》2009,20(7):1050-1058
In this paper, we focus on the need for secure and efficient localization for wireless sensor networks in adversarial settings. An attack-resistant and efficient localization scheme is developed, which extends the scheme proposed in [1]. The method offers strong defense against not only distance reduction attacks but also distance enlargement attacks. Furthermore, our method does not employ any device-dependent variables, hence yields more accurate localization. An attack-driven model is also specified using Petri net. It provides a formal method for the verification of our scheme when considering distance enlargement attacks. The state analysis shows that the potential insecure states are unreachable, implying that the model can offer strong defense against these attacks. To the best of our knowledge, it is the first time that the Petri net has been introduced to validate security scheme for wireless sensor networks in the literature. 相似文献
992.
The robust stochastic stability, stabilization and H∞ control for mode‐dependent time‐delay discrete Markovian jump singular systems with parameter uncertainties are discussed. Based on the restricted system equivalent (r.s.e.) transformation and by introducing new state vectors, the singular system is transformed into a standard linear system, and delay‐dependent linear matrix inequalities (LMIs) conditions for the mode‐dependent time‐delay discrete Markovian jump singular systems to be regular, causal and stochastically stable, and stochastically stable with γ‐disturbance attenuation are obtained, respectively. With these conditions, robust stabilization problem and robust H∞ control problem are solved, and the LMIs sufficient conditions are obtained. A numerical example illustrates the effectiveness of the method given in the paper. Copyright © 2008 John Wiley & Sons, Ltd. 相似文献
993.
Yan Zhang Laurence T. Yang Jianhua Ma Jun Zheng 《Journal of Network and Computer Applications》2009,32(2):483-489
As a fundamental component in wireless networks, location management consists of two operations: location update and paging. These two supplementary operations enable the mobile user ubiquitous mobility. However, in case of failed location update, a significant consequence is the obsolete location identity in the network databases and thereafter the incapability in establishing the valid route for the potential call connection, which will seriously degrade the network quality-of-service (QoS). This issue is not theoretically studied in the literature. In this paper, we perform a quantitative analysis of the location management effect on QoS in the wireless networks. The metrics call blocking probability and the average number of blocked calls are introduced to reflect the QoS. For the sake of general applicability, the performance metrics are formulated with the relaxed tele-traffic parameters. Namely, the call inter-arrival time, cell residence time, location area residence time and location update inter-arrival time follow a general probability density function. The formulae are additionally specified in the static and several dynamic location management mechanisms. Numerical examples are presented to show the interaction between the performance metrics and location management schemes. The discussions on the sensitivity of tele-parameters are also given. 相似文献
994.
A cable-driven parallel manipulator is a manipulator whose end-effector is driven by a number of parallel cables instead of
rigid links. Since cables always have more flexibility than rigid links, a cable manipulator bears a concern of possible vibration.
Thus, investigation of vibration of cable manipulators caused by cable flexibility is important for applications requiring
high system stiffness or bandwidth. This paper provides a vibration analysis of general 6-DOF cable-driven parallel manipulators.
Based on the analysis of the natural frequencies of the multibody system, the study demonstrates that a cable manipulator
can be designed stiff enough for special applications like the cable-manipulator based hardware-in-the-loop simulation of
contact dynamics. Moreover, under an excitation, a cable may vibrate not only in its axial direction, but also in its transversal
direction. The paper also analyzes the vibration of cable manipulators caused by cable flexibilities in both axial and transversal
directions. It is shown that the vibration of a cable manipulator due to the transversal vibration of cables can be ignored
comparing to that due to the axial flexibility of cables. 相似文献
995.
Flexible-body modeling with geometric nonlinearities remains a hot topic of research by applications in multibody system dynamics
undergoing large overall motions. However, the geometric nonlinear effects on the impact dynamics of flexible multibody systems
have attracted significantly less attention. In this paper, a point-surface impact problem between a rigid ball and a pivoted
flexible beam is investigated. The Hertzian contact law is used to describe the impact process, and the dynamic equations
are formulated in the floating frame of reference using the assumed mode method. The two important geometric nonlinear effects
of the flexible beam are taken into account, i.e., the longitudinal foreshortening effect due to the transverse deformation,
and the stress stiffness effect due to the axial force. The simulation results show that good consistency can be obtained
with the nonlinear finite element program ABAQUS/Explicit if proper geometric nonlinearities are included in the floating
frame formulation. Specifically, only the foreshortening effect should be considered in a pure transverse impact for efficiency,
while the stress stiffness effect should be further considered in an oblique case with much more computational effort. It
also implies that the geometric nonlinear effects should be considered properly in the impact dynamic analysis of more general
flexible multibody systems. 相似文献
996.
The robust stability and robust stabilization for time‐delay discrete singular systems with parameter uncertainties is discussed. A delay‐dependent linear matrix inequality (LMI) condition for the time‐delay discrete systems to be nonsingular and stable is given. Based on this condition and the restricted system equivalent transformation, the delay‐dependent LMI condition is proposed for the time‐delay discrete singular systems to be admissible. With this condition, the problems of robust stability and robust stabilization are solved, and the delay‐dependent LMI conditions are obtained. Numerical examples illustrate the effectiveness of the method given in the paper. Copyright © 2009 John Wiley and Sons Asia Pte Ltd and Chinese Automatic Control Society 相似文献
997.
一种基于多Agent的分布式入侵检测系统设计 总被引:1,自引:0,他引:1
在分析现有基于Agent的入侵检测系统的基础上,提出了一种基于多Agent分布式入侵检测系统模型。该模型采用了分布检测、分布响应的模式,各Agent之间具有良好的相对独立性。通过多Agent技术的思想建立系统总体结构,给出了模型的各个组成部分,并对结构中各种Agent与中心控制台的功能设计进行了分析。同时对涉及到特征匹配算法、动态选举算法、协同算法进行了初步的设计与分析。系统可充分利用各Agent的协同完成入侵检测任务,实时响应,可有效地改进传统IDS。 相似文献
998.
基于Windows系统的木马程序隐蔽行径分析 总被引:1,自引:1,他引:0
文章介绍了特洛伊木马的基本概念、分类及特点。针对基于Windows系统的木马分别从木马运行形式、木马通信形式、木马启动方式、以及木马程序在宿主机磁盘上的隐蔽技术进行了分析,为已知和未知木马的防范和检测提供参考。 相似文献
999.
In this paper, we provide an overview of challenges in mobile search and ranking, and envision the fundamental features that
should be satisfied. We argue that two principles will help improve the relevance and quality of mobile search and ranking:
the first one is to examine both intrinsic content features and context of items (usage statistics and social features, etc.);
and the second one lies in that no algorithms can replace the objectivity of a human being—let users define the sites that
they feel are relevant, leverage their social networks, and over time see their results become highly personalized. Specifically,
wireless-virtualcommunity-based mobile search and ranking architecture is proposed in this paper, in which communities act
as a first class abstraction for information sharing. Then, we introduce briefly the potential procedures of achieving high
relevance and quality in mobile search and ranking based on wireless virtual community. 相似文献
1000.
在Excel环境下,采用逐级计算法,模拟了逆流和错流两种工艺下水多级萃取甲苯 乙醚的理论级数、各级萃取相与萃余相浓度和萃取率,最终获得了两种工艺的优化溶剂比.优化的工艺结果是相对于错流操作,当逆流操作的实际溶剂比可取1.38倍最小溶剂比时,可提高萃取相浓度8.5百分点,降低萃取相流率约1/2,减少萃取剂用量2/3. 相似文献