全文获取类型
收费全文 | 1821篇 |
免费 | 71篇 |
国内免费 | 5篇 |
专业分类
电工技术 | 31篇 |
综合类 | 8篇 |
化学工业 | 388篇 |
金属工艺 | 29篇 |
机械仪表 | 41篇 |
建筑科学 | 78篇 |
能源动力 | 134篇 |
轻工业 | 195篇 |
水利工程 | 25篇 |
石油天然气 | 26篇 |
无线电 | 237篇 |
一般工业技术 | 335篇 |
冶金工业 | 110篇 |
原子能技术 | 7篇 |
自动化技术 | 253篇 |
出版年
2024年 | 9篇 |
2023年 | 38篇 |
2022年 | 77篇 |
2021年 | 120篇 |
2020年 | 84篇 |
2019年 | 68篇 |
2018年 | 83篇 |
2017年 | 74篇 |
2016年 | 84篇 |
2015年 | 61篇 |
2014年 | 93篇 |
2013年 | 139篇 |
2012年 | 91篇 |
2011年 | 122篇 |
2010年 | 89篇 |
2009年 | 83篇 |
2008年 | 75篇 |
2007年 | 60篇 |
2006年 | 61篇 |
2005年 | 56篇 |
2004年 | 41篇 |
2003年 | 28篇 |
2002年 | 16篇 |
2001年 | 21篇 |
2000年 | 18篇 |
1999年 | 20篇 |
1998年 | 33篇 |
1997年 | 20篇 |
1996年 | 21篇 |
1995年 | 14篇 |
1994年 | 10篇 |
1993年 | 8篇 |
1992年 | 11篇 |
1991年 | 4篇 |
1989年 | 6篇 |
1988年 | 6篇 |
1987年 | 4篇 |
1986年 | 3篇 |
1985年 | 5篇 |
1984年 | 3篇 |
1982年 | 3篇 |
1981年 | 5篇 |
1980年 | 7篇 |
1979年 | 5篇 |
1978年 | 2篇 |
1976年 | 3篇 |
1973年 | 2篇 |
1971年 | 2篇 |
1970年 | 3篇 |
1969年 | 2篇 |
排序方式: 共有1897条查询结果,搜索用时 15 毫秒
11.
Batch experiments were conducted to investigate the desorption kinetics of a contaminated soil collected from a field site at Hill Air Force Base (AFB), Utah. The site has been contaminated with many dense nonaqueous phase liquids (DNAPLs), primarily trichloroethylene (TCE) and perchloroethylene (PCE), for more than 60 years. Similar desorptive behaviour of both TCE and PCE was observed: a stage of fast release of the contaminant at the start followed by a very slow stage. Moreover, it is suggested that not all the contaminant in the solid phase may be released to the aqueous phase, apparently due to the age factor. Local variations were observed in the effective diffusivity and other sorption-related parameters across the site due to aquifer heterogeneity. Experimental results were then simulated using a numerical code based on the intraparticle diffusion model. Good agreement was found between both results. 相似文献
12.
Ashraf Mahmoud Ahmad Abo Naser Marwan Abu‐Amara Tarek Sheltami Nidal Nasser 《International Journal of Communication Systems》2018,31(1)
The evolved packet core (EPC) network is the mobile network standardized by the 3rd Generation Partnership Project and represents the recent evolution of mobile networks providing high‐speed data rates and on‐demand connectivity services. Software‐defined networking (SDN) is recently gaining momentum in network research as a new generation networking technique. An SDN‐based EPC is expected to introduce gains to the EPC control plane architecture in terms of simplified, and perhaps even software‐based, vendor independent infrastructure nodes. In this paper, we propose a novel SDN‐based EPC architecture along with the protocol‐level detailed implementation and provide a mechanism for identifying information fields exchanged between SDN‐EPC entities that maintains correct functionality with minimal impact on the conventional design. Furthermore, we present the first comprehensive network performance evaluation for the SDN‐based EPC versus the conventional EPC and provide a comparative analysis of 2 networks performances identifying potential bottlenecks and performance issues. The evaluation focuses on 2 network control operations, namely, the S1‐handover and registration operations, taking into account several factors, and assessing performance metrics such as end‐to‐end delay (E2ED) for completion of the respective control operation, and EPC nodes utilization figures. 相似文献
13.
Azeem Irshad Shehzad Ashraf Chaudhry Muhammad Shafiq Muhammad Usman Muhammad Asif Anwar Ghani 《International Journal of Communication Systems》2019,32(14)
The mobile cloud computing (MCC) has enriched the quality of services that the clients access from remote cloud‐based servers. The growth in the number of wireless users for MCC has further augmented the requirement for a robust and efficient authenticated key agreement mechanism. Formerly, the users would access cloud services from various cloud‐based service providers and authenticate one another only after communicating with the trusted third party (TTP). This requirement for the clients to access the TTP during each mutual authentication session, in earlier schemes, contributes to the redundant latency overheads for the protocol. Recently, Tsai et al have presented a bilinear pairing based multi‐server authentication (MSA) protocol, to bypass the TTP, at least during mutual authentication. The scheme construction works fine, as far as the elimination of TTP involvement for authentication has been concerned. However, Tsai et al scheme has been found vulnerable to server spoofing attack and desynchronization attack, and lacks smart card‐based user verification, which renders the protocol inapt for practical implementation in different access networks. Hence, we have proposed an improved model designed with bilinear pairing operations, countering the identified threats as posed to Tsai scheme. Additionally, the proposed scheme is backed up by performance evaluation and formal security analysis. 相似文献
14.
Traditional cryptanalysis assumes that an adversary only has access to input and output pairs, but has no knowledge about internal states of the device. However, the advent of side-channel analysis showed that a cryptographic device can leak critical information. In this circumstance, Machine learning is known as a powerful and promising method of analysing of side-channel information. In this paper, an experimental investigation on a FPGA implementation of elliptic curve cryptography (ECC) was conducted to explore the efficiency of side-channel information characterisation based on machine learning techniques. In this work, machine learning is used in terms of principal component analysis (PCA) for the preprocessing stage and a Cascade-Forward Back-Propagation Neural Network (CFBP) as a multi-class classifier. The experimental results show that CFBP can be a promising approach in characterisation of side-channel information. 相似文献
15.
The next generation video surveillance systems are expected to face challenges in providing computation support for an unprecedented amount of video streams from multiple video cameras in a timely and scalable fashion. Cloud computing offers huge computation resources for large-scale storage and processing on demand, which are deemed suitable for video surveillance tasks. Cloud also provides quality of service guaranteed hardware and software solutions with the virtual machine (VM) technology using a utility-like service costing model. In cloud-based video surveillance context, the resource requests to handle video surveillance tasks are translated in the form of VM resource requests, which in turn are mapped to VM resource allocation referring to physical server resources hosting the VMs. Due to the nature of video surveillance tasks, these requests are highly time-constrained, heterogeneous and dynamic in nature. Hence, it is very challenging to actually manage the cloud resources from the perspective of VM resource allocation given the stringent requirements of video surveillance tasks. This paper proposes a computation model to efficiently manage cloud resources for surveillance tasks allocation. The proposed model works on optimizing the trade-off between average service waiting time and long-term service cost, and shows that long-term service cost is inversely proportional to high and balanced utilization of cloud resources. Experiments show that our approach provides a near-optimal solution for cloud resource management when handling the heterogeneous and unpredictable video surveillance tasks dynamically over next generation network. 相似文献
16.
A Novel Analytical Framework for Integrated Cross-Layer Study of Call-Level and Packet-Level QoS in Wireless Mobile Multimedia Networks 总被引:1,自引:0,他引:1
Dusit Niyato Ekram Hossain 《Mobile Computing, IEEE Transactions on》2007,6(3):322-335
We present a novel integrated analytical framework for analyzing the quality-of-service (QoS) performance measures in a wireless mobile multimedia network. The framework integrates physical, radio link, and network layer parameters and protocols to analyze the call-level and packet-level performances. In the network layer, call admission control (CAC) is responsible for deciding whether an incoming call can be accepted or not so that the performances of the ongoing calls do not deteriorate below the acceptable level. Also, an adaptive channel allocation (ACA) scheme is used to maximize the utilization of the radio resources. In the data link layer, queue management and error control are used for non-real-time loss-sensitive traffic. In the physical layer, a finite state Markov channel (FSMC) is used to model channel fading, and adaptive modulation is used for rate adaptation according to channel quality. Various call-level and packet-level QoS measures for real-time, non-real-time, and best-effort traffic are obtained. The analytical results are validated by extensive simulations. Examples of the applications of the presented analytical framework are also provided 相似文献
17.
Ashraf Bastawros Abhijit Chandra Yongjin Guo Bo Yan 《Journal of Electronic Materials》2002,31(10):1022-1031
The role of a porous pad in controlling material-removal rate (MRR) during the chemical-mechanical planarization (CMP) process
has been studied numerically. The numerical results are used to develop a phenomenological model that correlates the forces
on each individual abrasive particle to the applied nominal pressure. The model provides a physical explanation for the experimentally
observed domains of pressure-dependent MRR, where the pad deformation controls the load sharing between active-abrasive particles
and direct pad-wafer contact. The predicted correlations between MRR and slurry characteristics, i.e., particle size and concentration,
are in agreement with experimentally measured trends reported by Ouma1 and Izumitani.2 相似文献
18.
Hasan M.K. Hossain N.M. Naylor P.A. 《Vision, Image and Signal Processing, IEE Proceedings -》2005,152(5):520-526
A novel method for parameter estimation of minimum-phase autoregressive moving average (ARMA) systems in noise is presented. The ARMA parameters are estimated using a damped sinusoidal model representation of the autocorrelation function of the noise-free ARMA signal. The AR parameters are obtained directly from the estimates of the damped sinusoidal model parameters with guaranteed stability. The MA parameters are estimated using a correlation matching technique. Simulation results show that the proposed method can estimate the ARMA parameters with better accuracy as compared to other reported methods, in particular for low SNRs. 相似文献
19.
A stochastic model (G-O) for the software failure phenomenon based on a nonhomogeneous Poisson process (NHPP) was suggested by Goel and Okumoto (1979). This model has been widely used but some important work remains undone on estimating the parameters. The authors present a necessary and sufficient condition for the likelihood estimates to be finite, positive, and unique. A modification of the G-O model is suggested. The performance measures and parametric inferences of the new model are discussed. The results of the new model are applied to real software failure data and compared with G-O and Jelinski-Moranda models 相似文献
20.
Dynamic rate adaptation based on multidimensional multicode DS-CDMA in cellular wireless networks 总被引:1,自引:0,他引:1
Dynamic rate adaptation for uplink data transmission in a cellular multidimensional multicode (MDMC) direct-sequence code-division multiple-access packet data network is modeled and analyzed. An analytical framework is developed to evaluate the performances of radio link level dynamic rate adaptation schemes under multipath fading and log-normal shadowing. The radio link level throughput under optimal dynamic rate adaptation (having exponential computational complexity) and different heuristic-based suboptimal rate adaptation schemes can be assessed under the presented analytical framework. The performance of MDMC signaling is compared with that of the single-code variable spreading factor (VSF) signaling. To this end, based on an equilibrium point analysis of the system in steady-state, a base station-assisted and mobile-controlled dynamic rate adaptation scheme is presented. 相似文献