全文获取类型
收费全文 | 3669篇 |
免费 | 218篇 |
国内免费 | 9篇 |
专业分类
电工技术 | 31篇 |
综合类 | 8篇 |
化学工业 | 861篇 |
金属工艺 | 87篇 |
机械仪表 | 70篇 |
建筑科学 | 88篇 |
矿业工程 | 6篇 |
能源动力 | 196篇 |
轻工业 | 630篇 |
水利工程 | 36篇 |
石油天然气 | 26篇 |
无线电 | 313篇 |
一般工业技术 | 638篇 |
冶金工业 | 383篇 |
原子能技术 | 22篇 |
自动化技术 | 501篇 |
出版年
2023年 | 44篇 |
2022年 | 82篇 |
2021年 | 147篇 |
2020年 | 94篇 |
2019年 | 96篇 |
2018年 | 163篇 |
2017年 | 170篇 |
2016年 | 148篇 |
2015年 | 105篇 |
2014年 | 153篇 |
2013年 | 282篇 |
2012年 | 212篇 |
2011年 | 277篇 |
2010年 | 173篇 |
2009年 | 192篇 |
2008年 | 148篇 |
2007年 | 140篇 |
2006年 | 118篇 |
2005年 | 89篇 |
2004年 | 90篇 |
2003年 | 81篇 |
2002年 | 51篇 |
2001年 | 36篇 |
2000年 | 42篇 |
1999年 | 52篇 |
1998年 | 106篇 |
1997年 | 80篇 |
1996年 | 60篇 |
1995年 | 57篇 |
1994年 | 48篇 |
1993年 | 33篇 |
1992年 | 35篇 |
1991年 | 28篇 |
1990年 | 29篇 |
1989年 | 14篇 |
1988年 | 18篇 |
1987年 | 21篇 |
1986年 | 9篇 |
1985年 | 18篇 |
1984年 | 14篇 |
1983年 | 20篇 |
1982年 | 14篇 |
1981年 | 17篇 |
1980年 | 12篇 |
1978年 | 10篇 |
1977年 | 12篇 |
1976年 | 10篇 |
1974年 | 7篇 |
1973年 | 8篇 |
1970年 | 7篇 |
排序方式: 共有3896条查询结果,搜索用时 0 毫秒
21.
A set of second-order absorbing boundary conditions is derived for the three-dimensional finite-difference TLM analysis of open region scattering problems. These boundary conditions are implemented into a computer code using a two-level discretization scheme. A simulation experiment using a 4-term Blackman-Harris pulse excitation with very low sidelobes is used to examine the efficiency of the boundary conditions. It is observed that the absorbing boundaries are perfectly transparent to waves impinging upon them at angles between 0 and 45 degrees, and the normal incidence reflection coefficient is less than -35 dB. 相似文献
22.
Rosario G. Garroppo Stefano Giordano Davide Iacono Luca Tavanti 《Wireless Networks》2011,17(6):1441-1459
In WiMAX systems the Base Station scheduler plays a key role as it controls the sharing of the radio resources among the users. The goal of the scheduler is multiple: achieve fair usage of the resources, satisfy the QoS requirements of the users, maximize goodput, and minimize power consumption, and at the same time ensuring feasible algorithm complexity and system scalability. Since most of these goals are contrasting, scheduler designers usually focus their attention on optimizing one aspect only. In this scenario, we propose a scheduling algorithm (called GTSNmathrm{GTS_N}) whose goal is to contemporaneously achieve efficiency and fairness, while also taking into account the QoS requirements and the channel state. GTSNmathrm{GTS_N} exploits the properties of Time Utility Functions (TUFs) and Game Theory. Simulations prove that the performance of GTSN,mathrm{GTS_N}, when compared to that of several well-known schedulers, is remarkable. GTSNmathrm{GTS_N} provides the best compromise between the two contrasting objectives of fairness and efficiency, while QoS requirements are in most cases guaranteed. However, the exponential complexity introduced by the game theory technique makes it rather impractical and not computationally scalable for a large number of users. Thus we developed a suboptimal version, named sub-GTSN.mathrm{GTS_N}. We show that this version retains most of the features and performance figures of its brother, but its complexity is linear with the number of users. 相似文献
23.
A Distributed Key Generation (DKG) protocol is an essential component of threshold cryptosystems required to initialize the
cryptosystem securely and generate its private and public keys. In the case of discrete-log-based (dlog-based) threshold signature
schemes (ElGamal and its derivatives), the DKG protocol is further used in the distributed signature generation phase to generate
one-time signature randomizers (r = gk). In this paper we show that a widely used dlog-based DKG protocol suggested by Pedersen does not guarantee a uniformly random
distribution of generated keys: we describe an efficient active attacker controlling a small number of parties which successfully
biases the values of the generated keys away from uniform. We then present a new DKG protocol for the setting of dlog-based
cryptosystems which we prove to satisfy the security requirements from DKG protocols and, in particular, it ensures a uniform
distribution of the generated keys. The new protocol can be used as a secure replacement for the many applications of Pedersen's
protocol. Motivated by the fact that the new DKG protocol incurs additional communication cost relative to Pedersen's original
protocol, we investigate whether the latter can be used in specific applications which require relaxed security properties
from the DKG protocol. We answer this question affirmatively by showing that Pedersen's protocol suffices for the secure implementation
of certain threshold cryptosystems whose security can be reduced to the hardness of the discrete logarithm problem. In particular,
we show Pedersen's DKG to be sufficient for the construction of a threshold Schnorr signature scheme. Finally, we observe
an interesting trade-off between security (reductions), computation, and communication that arises when comparing Pedersen's
DKG protocol with ours. 相似文献
24.
Characteristics of Mobile Ad hoc Networks such as shared broadcast channel, bandwidth and battery power limitations, highly dynamic topology, and location dependent errors, make provisioning of quality of service (QoS) in such networks very difficult. The Medium Access Control (MAC) layer plays a very important role as far as QoS is concerned. The MAC layer is responsible for selecting the next packet to be transmitted and the timing of its transmission. We have proposed a new MAC layer protocol that includes a laxity-based priority scheduling scheme and an associated back-off scheme, for supporting time-sensitive traffic. In the proposed scheduling scheme, we select the next packet to be transmitted, based on its priority value which takes into consideration the uniform laxity budget of the packet, the current packet delivery ratio of the flow to which the packet belongs, and the packet delivery ratio desired by the user. The back-off mechanism devised by us grants a node access to the channel, based on the rank of its highest priority packet in comparison to other such packets queued at nodes in the neighborhood of the current node. We have studied the performance of our protocol that combines a packet scheduling scheme and a channel access scheme through simulation experiments, and the simulation results show that our protocol exhibits a significant improvement in packet delivery ratio under bounded end-to-end delay requirements, compared to the existing 802.11 DCF and the Distributed Priority Scheduling scheme proposed recently in [ACM Wireless Networks Journal 8 (5) (2002) 455–466; Proceedings of ACM MOBICOM '01, July 2001, pp. 200–209]. 相似文献
25.
26.
Ram Kumar K. Gopalakrishnan Irshad Ahmad C. N. R. Rao 《Advanced functional materials》2015,25(37):5910-5917
Composites of boron nitride (BN) and carboxylated graphene are prepared for the first time using covalent cross‐linking employing the carbodiimide reaction. The BN1–xGx (x ≈ 0.25, 0.5, and 0.75) obtained are characterized using a variety of spectroscopic techniques and thermogravimetric analysis. The composites show composition‐dependent electrical resistivity, the resistivity decreasing with increase in graphene content. The composites exhibit microporosity and the x ≈ 0.75 composite especially exhibits satisfactory performance with high stability as an electrode in supercapacitors. The x ≈ 0.75 composite is also found to be a good electrocatalyst for the oxygen reduction reaction in fuel cells. 相似文献
27.
Helen M. Kerch Rosario A. Gerhardt John L. Grazul 《Journal of the American Ceramic Society》1990,73(8):2228-2237
Transmission electron microscopy (TEM), scanning electron microscopy (SEM), mercury intrusion porosimetry (MIP), and nitrogen sorption technique (BET) were utilized to characterize the microstructure of a 10:90 wt% colloidal silica/potassium silicate gel as first described by Shoup. Gels in the unsintered state (15% theoretical density) were prepared for microscopy by the techniques of ultramicrotomy, Pt/C replication, and pore casting. Electron microscopic images of the ultramicrotomed thin sections (70 nm) show that the unfired gel possesses three distinct species of pores which are referred to as the micropores, mesopores, and macropores. The average micropore diameter was found to be 4 nm as determined by nitrogen desorption. Quantitative stereological analysis of the ultramicrotomed sections indicated that the average circular and lengthwise dimensions of the cylindrical mesopores were 0.15 and 0.39 μm, respectively. Similarly, this same analysis determined the average spherical macropore diameter to be 0.83 μm. In contrast, MIP results suggested that these gels possessed a unimodal pore size distribution centered around the 0.2-μm pore size. The discrepancy between MIP and microscopy can be explained by viewing the void space as a pore-throat network. Experimental evidence for this type of pore geometry was obtained from stereo pairs of Pt/C replicas and thick microtomed sections (0.5 μm) which gave information about particle connectivity and pore casts which depicted the pore connectivity in three dimensions. 相似文献
28.
尽管有源滤波器的理论家和设计者都对GIC(通用阻抗变换器)非常熟悉,但一般模拟人员对它并不了解。一个单端口有源电路一般包括低成本运放、电阻和电容,GIC将容抗转换为感抗,因而可以替代滤波器中以RLC传输函数描述的电感。另外,GIC输入阻抗方程的灵活性允许进行虚拟阻抗的设计,这在实际元器件中是不存在的,例如依赖频率的电阻。GIC是30年前推出的,已广泛应用于交流电路和有源滤波电路。 相似文献
29.
Francisco J. Fernandez-Luque David Pérez Félix Martínez Ginés Domènech Isabel Navarrete Juan Zapata Ramón Ruiz 《Ad hoc Networks》2013,11(3):907-925
DIA (Dispositivo Inteligente de Alarma, in Spanish) is an AAL (Ambient Assisted Living) system that allows to infer a potential dangerous action of an elderly person living alone at home. This inference is obtained by a specific sensorisation with sensor nodes (portables and fixes) and a reasoning layer embedded in a PC that learns of the users behaviour patterns and advices when actual one differs significantly of the normal patterns. In AAL systems, energy is a limited resource therefore sensor devices need to be properly managed to conserve energy. In this paper, we introduce the design and implementation of innovative and specific mechanisms at the sensory layer middleware which is capable of, first to discriminate spurious motion detections assuming that these signals do not resemble the patterns of real motion detections and, second to reduce the dynamics of messages by a sensor signal processing in order to compress the whole information in one single event. The middleware achieves power saving by modifying the raw information from sensors and adapting it to the predefined semantic of the reasoning layer. It manages the important task of data processing from sensors (raw information), and transfers the pre-processed information into the top layer of reasoning in a more energy efficient way. We also address the trade-off between reducing power consumption and reducing delay for incoming data. We present results from experiments using our implementation of these mechanisms at the middleware that comprises from node firmware to the PC driver. The number of messages of the proposed method with respect to the raw data is reduced by approximately 98.5%. The resources used in the PIR signal processing is reduced by approximately 85%. The resulting delay introduced is small (10–19 s) but system dynamics is slow enough to avoid contextualisation errors or reduction of system performance. We consider these results as very satisfactory. 相似文献
30.
In this paper, we address the traffic grooming problem in WDM mesh networks when the offered traffic is characterized by a set of traffic matrices—a variant of dynamically changing traffic. We justify the need to address this problem in mesh networks and also argue for the validity of our approach to solve this problem. Our primary objective is to design the network in terms of the number of wavelengths and transceivers required to support any offered traffic matrix. We provide a simple and generic framework to minimize the number of transceivers needed in the network. Simulation results have been presented in contrast with a possible approach, to enable comparison with our solution strategy. An ILP formulation of our approach is also presented. 相似文献