全文获取类型
收费全文 | 107379篇 |
免费 | 2417篇 |
国内免费 | 447篇 |
专业分类
电工技术 | 948篇 |
综合类 | 2433篇 |
化学工业 | 17873篇 |
金属工艺 | 5250篇 |
机械仪表 | 3439篇 |
建筑科学 | 3002篇 |
矿业工程 | 634篇 |
能源动力 | 1896篇 |
轻工业 | 8958篇 |
水利工程 | 1454篇 |
石油天然气 | 525篇 |
武器工业 | 1篇 |
无线电 | 10254篇 |
一般工业技术 | 19848篇 |
冶金工业 | 4775篇 |
原子能技术 | 383篇 |
自动化技术 | 28570篇 |
出版年
2024年 | 55篇 |
2023年 | 248篇 |
2022年 | 841篇 |
2021年 | 1057篇 |
2020年 | 664篇 |
2019年 | 756篇 |
2018年 | 15182篇 |
2017年 | 14120篇 |
2016年 | 10797篇 |
2015年 | 1361篇 |
2014年 | 1333篇 |
2013年 | 2214篇 |
2012年 | 4761篇 |
2011年 | 11080篇 |
2010年 | 9573篇 |
2009年 | 6770篇 |
2008年 | 7879篇 |
2007年 | 8733篇 |
2006年 | 971篇 |
2005年 | 1866篇 |
2004年 | 1700篇 |
2003年 | 1754篇 |
2002年 | 1031篇 |
2001年 | 479篇 |
2000年 | 492篇 |
1999年 | 369篇 |
1998年 | 865篇 |
1997年 | 563篇 |
1996年 | 427篇 |
1995年 | 290篇 |
1994年 | 231篇 |
1993年 | 172篇 |
1992年 | 101篇 |
1991年 | 95篇 |
1990年 | 61篇 |
1989年 | 65篇 |
1988年 | 80篇 |
1987年 | 56篇 |
1985年 | 61篇 |
1984年 | 55篇 |
1983年 | 51篇 |
1982年 | 40篇 |
1980年 | 45篇 |
1976年 | 58篇 |
1968年 | 49篇 |
1966年 | 43篇 |
1965年 | 46篇 |
1958年 | 39篇 |
1955年 | 63篇 |
1954年 | 68篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
981.
Xiaofeng Lu Fletcher D. Wicker Don Towsley Zhang Xiong Pietro Lio’ 《Wireless Personal Communications》2010,55(1):51-63
This paper studies the problem of detection of directional antennas and omni-directional antennas by hostile detection systems.
We present a model for calculating the probability of detecting a transmitter at arbitrary location around the transmitter.
Our study shows that, if a directional antenna employs the same transmit power as an omni-directional antenna, the directional
antenna can not decrease the probability of being detected. In some scenarios, a directional antenna is more likely to be
detected than an omni-directional antenna. However, if a directional antenna provides the same Effective Isotropic Radiated
Power in the direction of the receiver as an omni-directional antenna, the transmit power needed by a directional antenna
to send data is much less than that of an omni-directional antenna. In this scenario, the probability of detecting a directional
antenna is reduced by over 90%. This reveals that directional antennas can be used to build a secure path to send data at
low probability of being detected by adversaries. 相似文献
982.
Sven Verdoolaege Martin Palkovič Maurice Bruynooghe Gerda Janssens Francky Catthoor 《Journal of Electronic Testing》2010,26(2):279-292
The application of loop and data transformations to array and loop intensive programs is crucial to obtain a good performance.
Designers often apply these transformations manually or semi-automatically. For the class of static affine programs, automatic
methods exist for proving the correctness of these transformations. Realistic multimedia systems, however, often contain constructs
that fall outside of this class. We present an extension of a widening based approach to handle the most relevant of these
constructs, viz. accesses to array slices, data dependent accesses and data dependent assignments, and report on some experiments
with non-trivial applications. 相似文献
983.
Secure service convergence based on scalable media coding 总被引:1,自引:0,他引:1
Shiguo Lian 《Telecommunication Systems》2010,45(1):21-35
In multimedia services, security and privacy issues are urgent to be solved, such as the content security and service protection.
To solve these issues, some means have been proposed, such as conditional access and digital rights management. However, for
the latest application scenarios in convergent networks, there is still no solution. This paper focuses on the convergent
multimedia broadcasting applications: the multimedia content, e.g., TV program, is encoded and packaged by the content provider,
and is then transmitted to users through different communication networks, e.g., 3G network, DVB-H, ADSL, etc. Thus, the same
multimedia content will be used for various services, i.e., mobile TV, Internet TV and home TV. Since different network channel
support different bandwidths, the multimedia content should be transcoded before being transmitted through the networks. To
protect the content and service in this application, we propose the content and service protection methods. In content protection,
the content provider encrypts the scalable multimedia content with the manner denoted by Encryption Flag. The content distributor
has no decryption keys, but can transcode the scalable content with the manner denoted by Layer Flag, and transmit the transcoded
content to users. In service protection, the content provider combines the encryption key, Encryption Flag and the user right
information, and transmits them, independent from the encrypted content, to certified users. At user side, the content is
decrypted with the received key according to the Encryption Flag and Layer Flag. Thus, the content provider needs only to
encrypt the content once, which can be transcoded by the content distributor in a secure manner and used for various networks.
Additionally, the user rights need not to be changed when the service network is changed. Totally, the proposed scheme is
secure and efficient for service convergence. 相似文献
984.
We report large-area synthesis of few-layer graphene films by chemical vapor deposition (CVD) in a cold-wall reactor. The
key feature of this method is that the catalytic metal layers on the SiO2/Si substrates are self-heated to high growth temperature (900°C to 1000°C) by high-current Joule heating. Synthesis of high-quality
graphene films, whose structural and electrical characteristics are comparable to those grown by hot-wall CVD systems, was
confirmed by transmission electron microscopy images, Raman spectra, and current–voltage analysis. Optical transmittance spectra
of the graphene films allowed us to estimate the number of graphene layers, which revealed that high-temperature exposure
of Ni thin layers to a carbon precursor (CH4) was critical in determining the number of graphene layers. In particular, exposure to CH4 for 20 s produces very thin graphene films with an optical transmittance of 93%, corresponding to an average layer number
of three and a sheet resistance of ~600 Ω/square. 相似文献
985.
Today’s analog/RF design and verification face significant challenges due to circuit complexity, process variations and short
market windows. In particular, the influence of technology parameters on circuits, and the issues related to noise modeling
and verification still remain a priority for many applications. Noise could be due to unwanted interaction between the circuit
elements or it could be inherited from the circuit elements. In addition, manufacturing disparity influence the characteristic
behavior of the manufactured circuits. In this paper, we propose a methodology for modeling and verification of analog/RF
designs in the presence of noise and process variations. Our approach is based on modeling the designs using stochastic differential
equations (SDE) that will allow us to incorporate the statistical nature of noise. We also integrate the device variation
due to 0.18μ
m fabrication process in an SDE based simulation framework for monitoring properties of interest in order to quickly detect
errors. Our approach is illustrated on nonlinear Tunnel-Diode and a Colpitts oscillator circuits. 相似文献
986.
Wireless mesh networks (WMNs) are considered as cost effective, easily deployable and capable of extending Internet connectivity.
However, one of the major challenges in deploying reliable WMNs is preventing their nodes from malicious attacks, which is
of particular concern as attacks can severely degrade network performance. When a DoS attack is targeted over an entire communication
path, it is called a path-based DoS attack. We study the performance impact of path-based DoS attacks by considering attack
intensity, medium errors, physical diversity, collusion and hop count. We setup a wireless mesh testbed and configure a set
of experiments to gather realistic measurements, and assess the effects of different factors. We find that medium errors have
significant impact on the performance of WMNs when a path-based DoS attack is carried out, and the impact is exacerbated by
the MAC layer retransmissions. We show that due to physical diversity, a far attacker can lead to an increased performance
degradation than a close-by attacker. Additionally, we demonstrate that the joint impact of two colluding attackers is not
as severe as the joint result of individual attacks. We also discuss a strategy to counter path-based DoS attacks which can
potentially alleviate the impact of the attack significantly. 相似文献
987.
Technological evolution is leading telecommunications toward all-IP scenarios, where multiple services are transported as
IP packets. Among these services is the broadcast of video. A possible mechanism for broadcasting multiple video channels
over IP is to use IP multicast, and let each client decide about the reception of a channel. The secure IP multicast specified
by the IETF MSEC working group is a candidate solution for securing these broadcast services. In this paper we propose a new
solution for supporting the broadcast of multiple video channels which can be accessed only by authorized users; besides,
when a video channel is not visualized in the last mile its transmission is temporarily suspended, so that the cable can be
used for other services such as standard Internet access. 相似文献
988.
Huffman coding is a popular and important lossless compression scheme for various multimedia applications. This paper presents
a low-latency parallel Huffman decoding technique with efficient memory usage for multimedia standards. First, the multi-layer
prefix grouping technique is proposed for sub-group partition. It exploits the prefix characteristic in Huffman codewords
to solve the problem of table size explosion. Second, a two-level table lookup approach is introduced which can promptly branch
to the correct sub-group by level-1 table lookup and decode the symbols by level-2 table lookup. Third, two optimization approaches
are developed; one is to reduce the branch cycles and the other is parallel processing between two-level table lookup and
direct table lookup approaches to fully utilize the advantage of VLIW parallel processing. An AAC Huffman decoding example
is realized on the Parallel Architecture Core DSP (PAC DSP) processor. The simulation results show that the proposed method
can further improve about 89% of decoding cycles and 33% of table size comparing to the linear search method.
相似文献
Chun-Nan LiuEmail: |
989.
Manuel Vzquez Ignacio Rey‐Stolle 《Progress in Photovoltaics: Research and Applications》2008,16(5):419-433
Crystalline silicon photovoltaic (PV) modules are often stated as being the most reliable element in PV systems. This presumable high reliability is reflected by their long power warranty periods. In agreement with these long warranty times, PV modules have a very low total number of returns, the exceptions usually being the result of catastrophic failures. Up to now, failures resulting from degradation are not typically taken into consideration because of the difficulties in measuring the power of an individual module in a system. However, lasting recent years PV systems are changing from small isolated systems to large grid‐connected power stations. In this new scenario, customers will become more sensitive to power losses and the need for a reliability model based on degradation may become of utmost importance. In this paper, a PV module reliability model based on degradation studies is presented. The main analytical functions of reliability engineering are evaluated using this model and applied to a practical case, based on state‐of‐the‐art parameters of crystalline silicon PV technology. Relevant and defensible power warranties and other reliability data are obtained with this model based on measured degradation rates and time‐dependent power variability. In the derivation of the model some assumptions are made about the future behaviour of the products—i.e. linear degradation rates—although the approach can be used for other assumed functional profiles as well. The method documented in this paper explicitly shows manufacturers how to make reasonable and sensible warranty projections. Copyright © 2008 John Wiley & Sons, Ltd. 相似文献
990.
Efficient anti-jamming rateless coding based on cognitive Orthogonal Frequency Division Multiplexing (OFDM) modulation in Cognitive Radio Network (CRN) is mainly discussed. Rateless coding with small redundancy and low complexity is presented, and the optimal design methods of building rateless codes are also proposed. In CRN, anti-jamming rateless coding could recover the lost packets in parallel channels of cognitive OFDM, thus it protects Secondary Users (SUs) from the interference by Primary Users (PUs) efficiently. Frame Error Rate (FER) and throughput performance of SU employing anti-jamming rateless coding are analyzed in detail. Performance comparison between rateless coding and piecewise coding are also presented. It is shown that, anti-jamming rateless coding provides low FER and Word Error Rate (WER) performance with uniform sub-channel selection. Meanwhile, it is also verified that, in higher jamming rate and longer code redundancy scenario, rateless coding method could achieve better FER and throughput performance than another anti-jamming coding schemes. 相似文献