全文获取类型
收费全文 | 1303篇 |
免费 | 92篇 |
国内免费 | 13篇 |
专业分类
电工技术 | 38篇 |
综合类 | 6篇 |
化学工业 | 301篇 |
金属工艺 | 26篇 |
机械仪表 | 65篇 |
建筑科学 | 64篇 |
矿业工程 | 3篇 |
能源动力 | 85篇 |
轻工业 | 120篇 |
水利工程 | 28篇 |
石油天然气 | 24篇 |
无线电 | 122篇 |
一般工业技术 | 194篇 |
冶金工业 | 42篇 |
原子能技术 | 8篇 |
自动化技术 | 282篇 |
出版年
2024年 | 7篇 |
2023年 | 40篇 |
2022年 | 48篇 |
2021年 | 93篇 |
2020年 | 85篇 |
2019年 | 95篇 |
2018年 | 123篇 |
2017年 | 120篇 |
2016年 | 95篇 |
2015年 | 58篇 |
2014年 | 95篇 |
2013年 | 153篇 |
2012年 | 82篇 |
2011年 | 87篇 |
2010年 | 53篇 |
2009年 | 41篇 |
2008年 | 27篇 |
2007年 | 19篇 |
2006年 | 20篇 |
2005年 | 7篇 |
2004年 | 10篇 |
2003年 | 8篇 |
2002年 | 2篇 |
2001年 | 3篇 |
2000年 | 3篇 |
1999年 | 5篇 |
1998年 | 6篇 |
1997年 | 7篇 |
1996年 | 3篇 |
1995年 | 1篇 |
1994年 | 3篇 |
1992年 | 1篇 |
1991年 | 3篇 |
1988年 | 1篇 |
1987年 | 1篇 |
1985年 | 1篇 |
1977年 | 2篇 |
排序方式: 共有1408条查询结果,搜索用时 15 毫秒
21.
22.
Nowadays low-cost RFID systems have moved from obscurity into mainstream applications which cause growing security and privacy concerns. The lightweight cryptographic primitives and authentication protocols are indispensable requirements for these devices to grow pervasive. In recent years, there has been an increasing interest in intuitive analysis of RFID protocols. This concept has recently been challenged by formal privacy models. This paper investigates how to analyse and solve privacy problems in formal model. First, we highlight some vague drawbacks especially in forward and backward traceability analysis and extend it in the simulation-based privacy model family. Then, the privacy weaknesses of three new-found RFID authentication protocols are analysed in formal privacy models and three improved protocols are proposed to prevent the aforementioned attacks. 相似文献
23.
Wireless Networks - Single carrier-frequency division multiple access (SC-FDMA) is a multiple access technique in broadband wireless networks which has been adapted by 3GPP for uplink transmission... 相似文献
24.
F.R.M. Adikan A.S.M. Noor M.A. Mahdi 《Photonics Technology Letters, IEEE》2004,16(6):1465-1467
L-band gain improvement through usage of secondary pumping sources in the form of amplified spontaneous emission (ASE) was conducted. A simulation of the three-level rate equation that precedes the experimental approach provides a limited overview of the behavior of various inputs into the active medium-the erbium-doped fiber. Gain improvement as high as 6 dB was attained while incurring minimal noise figure penalty; in this case as low as 1 dB. For an L-band amplifier system employing ASE to improve gain, pumping the system counterdirectionally with ASE while the 980- or 1480-nm pumps are being used in a copropagating configuration would yield the best overall performance in terms of gain. 相似文献
25.
Heba Nashaat Rawya Rizk Hani Mahdi 《International Journal of Wireless Information Networks》2011,18(4):210-223
Mobile IP has been developed to provide the continuous information network access to mobile users. The performance of Mobile
IP mobility management scheme is dependent on traffic characteristics and user mobility. Consequently, it is important to
assess this performance in-depth through these factors. This paper introduces a novel analytical model of handoff management
in mobile IP networks. The proposed model focuses on the effect the traffic types and their frame error rates on the handoff
latency. It is derived based on general distribution of both successful transmission attempts and the residence time to be
applicable in all cases of traffic characteristics and user mobility. The impact of the behavior of wireless connection, cell
residence time, probability distribution of transmission time and the handoff time is investigated. Numerical results are
obtained and presented for both TCP and UDP traffics. As expected, the reliability of TCP leads to higher handoff latency
than UDP traffic. It is shown that, higher values of FER increase the probability of erroneous packet transfer across the
link layer. A short retransmission time leads to end the connection most likely in the existing FA; however a long retransmission
time leads to a large delivery time. The proposed model is robust in the sense that it covers the impact of all the effective
parameters and can be easily extended to any distribution. 相似文献
26.
The effects of carbon monoxide (CO) and ammonia (NH3) molecules adsorption on the various composites of boron nitride and graphene BN-C hybrid nanoribbons are investigated using the non-equilibrium Green’s function (NEGF) technique based on density functional theory (DFT). The effects of adsorption with possible random configurations on the average of the density of states (DOS), transmission coefficient, and the current–voltage (I–V) characteristics are calculated. The results indicate that, by embedding armchair graphene nanoribbon (AGNR) with boron nitride nanoribbon (BNNR), the various electronic properties can be observed after gas molecule adsorption. The electronic structure and gap of hybrids system is modified due to gas adsorption, and the systems act like the n-type semiconductor by NH3 molecule adsorption. The hybrid structures due to their tunable band gap are better candidates for gas detecting compared to the pristine BNNRs and AGNRs. 相似文献
27.
28.
Seyed M. Hosseini Mahdi Teimouri Saralees Nadarajah 《Wireless Personal Communications》2012,65(2):319-334
Cognitive radios (CRs) have been recently proposed for the problem of spectrum scarcity. The principle of CRs?? operation is based on the opportunistic access to the frequency spectrum mainly dedicated to primary users (PUs). The statistical time pattern of PUs?? channel usage and arrival can affect the usability of specific frequency bands for CRs. In this note, the effect of the arrival rate and channel holding time of PUs on the available times for CRs is analyzed. To this end, first, based on Poissonian arrivals, the available time for CRs is calculated. Then, assuming a gamma distribution for the inter-arrival times and a uniform distribution of channel holding time of PU in these intervals, the probability density function and moments of the available time for CRs are derived. Next, the effect of PUs statistical parameters on the average number of packets and the average symbol rate that a CR can transmit is analyzed. Also, taking that CR needs at least T seconds, the average waiting time is calculated. 相似文献
29.
Ahmad Patooghy Author Vitae Author Vitae Mahdi Fazeli Author Vitae 《Integration, the VLSI Journal》2010,43(3):268-278
This paper proposes and evaluates Low-overhead, Reliable Switch (LRS) architecture to enhance the reliability of Network-on-Chips (NoCs). The proposed switch architecture exploits information and hardware redundancies to eliminate retransmission of faulty flits. The LRS architecture creates a redundant copy of each newly received flit and stores the redundant flit in a duplicated flit buffer that is associated with the incoming channel of the flit. Flit buffers in the LRS are equipped with information redundancy to detect probable bit flip errors. When an error is detected in a flit buffer, its duplicated buffer is used to recover the correct value of the flit. In this way, the propagation of the erroneous flits in NoC is prevented without any need to credit signals and, retransmission buffers. Using an HDL-based NoC simulator, the LRS is compared to two other widely used reliability enhancement methods: the Switch-to-Switch (S2S) and the End-to-End (E2E) methods. The simulation results show that the LRS consumes less power and provides higher performance compared to those of the E2E and S2S methods. More importantly, unlike the E2E and the S2S methods, the LRS has constant overheads, which makes it applicable in all working conditions. To validate the comparison, an analytical performance and reliability model is developed for the LRS, S2S and E2E methods. The results of the model match those obtained from the simulations while the proposed model is significantly faster. 相似文献
30.
The purpose of this research is to study the stress corrosion behavior of basalt/epoxy composites under bending loading and submerged in 5% sulfuric acid corrosive medium. There are limited numbers of research in durability of fiber reinforced polymer composites. Moreover, studies on basalt fibers and its composites are very limited. In this research, mechanical property degradation of basalt/epoxy composites under bending loading and submerged in acidic corrosive medium is investigated. Three states of stress, equal to 30%, 50% and 70% of the ultimate strength of composites, are applied on samples. High stress states are applied to the samples to accelerate the testing procedure. Mechanical properties degradation consists of bending strength, bending modulus of elasticity and fracture energy of samples are examined. Also, a normalized strength degradation model for stress corrosion condition is presented. Finally, microscopic images of broken cross sections of samples are examined. 相似文献