全文获取类型
收费全文 | 1351篇 |
免费 | 81篇 |
国内免费 | 2篇 |
专业分类
电工技术 | 19篇 |
综合类 | 7篇 |
化学工业 | 249篇 |
金属工艺 | 30篇 |
机械仪表 | 19篇 |
建筑科学 | 38篇 |
矿业工程 | 2篇 |
能源动力 | 30篇 |
轻工业 | 162篇 |
水利工程 | 4篇 |
石油天然气 | 7篇 |
无线电 | 170篇 |
一般工业技术 | 240篇 |
冶金工业 | 229篇 |
原子能技术 | 7篇 |
自动化技术 | 221篇 |
出版年
2023年 | 16篇 |
2022年 | 25篇 |
2021年 | 57篇 |
2020年 | 46篇 |
2019年 | 57篇 |
2018年 | 50篇 |
2017年 | 40篇 |
2016年 | 70篇 |
2015年 | 39篇 |
2014年 | 57篇 |
2013年 | 97篇 |
2012年 | 73篇 |
2011年 | 68篇 |
2010年 | 38篇 |
2009年 | 45篇 |
2008年 | 55篇 |
2007年 | 35篇 |
2006年 | 35篇 |
2005年 | 40篇 |
2004年 | 26篇 |
2003年 | 27篇 |
2002年 | 25篇 |
2001年 | 19篇 |
2000年 | 11篇 |
1999年 | 22篇 |
1998年 | 81篇 |
1997年 | 46篇 |
1996年 | 29篇 |
1995年 | 22篇 |
1994年 | 20篇 |
1993年 | 16篇 |
1992年 | 7篇 |
1991年 | 8篇 |
1990年 | 4篇 |
1989年 | 9篇 |
1988年 | 6篇 |
1987年 | 6篇 |
1986年 | 4篇 |
1985年 | 11篇 |
1984年 | 8篇 |
1983年 | 7篇 |
1981年 | 4篇 |
1980年 | 5篇 |
1979年 | 4篇 |
1977年 | 11篇 |
1976年 | 9篇 |
1975年 | 3篇 |
1974年 | 5篇 |
1973年 | 6篇 |
1968年 | 4篇 |
排序方式: 共有1434条查询结果,搜索用时 15 毫秒
41.
WLAN (Wireless Local Area Network) has been seen to be one of the promising access technologies that adapts to 4G cellular network systems in providing very high speed connection with QoS guarantee through the polling function. However, when the handover happens, the contention-based medium access mechanism which is mainly used in WLAN is invoked and introduces unbounded transmission delay due to idle time periods and retransmission because of collision during the handover. If this technique is expanded to use in a microcellular network such as connected WLAN micro-cells, contention-based mechanism, therefore, should not be used to handle the MT’s handover, especially for vehicular users who change access point every few seconds. To overcome these difficulties in handover, we introduce parallel polling scheme in dynamic LMC (Logical Macro Cell) which can reduce delays much and remove packet loss rate. LMC is a virtual single macro cell which is built on a multicast group of adjacent micro-cells. In the same LMC, polling signals are sent from every BS (base station) to give MT (mobile terminal) permission to access one of these BSs. Instead of wasting much time to contend for resources of a new BS during handover, the MT answers the polling as an acknowledgment to connect to that new BS. The polling response is controlled to multicast to all BSs of the same LMC via the core network to synchronize for the next polling cycle. LMC is controlled to dynamically change when the MT comes in a new BS to make polling signals be continuous in a new LMC. Through analytical and simulation results, we show that the parallel polling scheme can achieve no handover latency, no packet loss and maintain mobile users’ throughput stably in the high traffic load condition though it causes overhead on the neighboring cells in both of wired and wireless sections. At speeds of up to70 m/s, the MT can still maintain its stable connection. OMNeT++ simulator with INET project is used to evaluate our proposal. 相似文献
42.
M. Claeys-Bruno O. Vandenabeele-Trambouze M. Sergent M. Geffard D. Bodet M. Dobrijevic A. Commeyras R. Phan Tan Luu 《Chemometrics and Intelligent Laboratory Systems》2006,80(2):186-197
In a previous paper (part I), new strategy was used for raising antibodies against hapten (< 300 Da) and the quantification of these hapten by ELISA using derivatization by chloroethyl nitrosourea (CENU). After raising antibodies against histamine, they were characterized and used for ELISA measurements. Optimal detection conditions were determined for the histamine quantification by ELISA method. The present study investigates the derivatization step of the histamine by chloroethylnitrosourea (CENU). Five factors (2 qualitative: nature of the solvent and nature of the antibodies and 3 quantitative: pH, % of solvent and time of derivatization) have been considered. Optimal reaction conditions were established by calculation of a validated model. 相似文献
43.
Paul F. Mlakar Donald O. Dusenberry James R. Harris Gerald Haynes Long T. Phan Mete A. Sozen 《Canadian Metallurgical Quarterly》2005,19(3):197-205
On September 11, 2001, an airliner was intentionally crashed into the Pentagon. It struck at the first elevated slab on the west wall, and slid approximately 310?ft (94.5?m) diagonally into the building. The force of the collision demolished numerous columns and the fa?ade of the exterior wall, and induced damage to first-floor columns and the first elevated slab over an area approximately 90?ft (27.4?m) wide and 310?ft (94.5?m) long. None of the building collapsed immediately. The portion that remained standing, even after an intense fire, sustained substantial damage at the first-floor level. 相似文献
44.
Paul F. Mlakar Donald O. Dusenberry James R. Harris Gerald Haynes Long T. Phan Mete A. Sozen 《Canadian Metallurgical Quarterly》2005,19(3):206-211
On September 11, 2001, the reinforced concrete structure of the Pentagon Building was able to resist, without collapse, the impact of a large commercial airliner despite the total loss of 26 columns and severe damage to 15 columns at the ground level. The ensuing fire and related fire-fighting activities led to the collapse of a portion of the building approximately one-half hour after the impact. In this paper, the reasons for the demonstrated toughness of the reinforced concrete structure are examined and attributed to use of spiral columns, effective splicing of reinforcing bars, strong girders, and short span lengths. 相似文献
45.
The dispersion of spray drops within a two-phase-flow is signified by an deformable phase interface where material properties suddenly change. The process of atomisation could previously only be modelled for standard applications simultaneously coupled with substantial simulations. In this case the process of atomisation is not coupled to the direct numerical simulation (DNS) of the interaction between two liquids. The approach of disintegration is modelled by statistics, describing the probability of generating liquid droplets. Therefore consideration of potential time and length for an intact liquid core are supposed from standard applications [1, 2]. Using this way of describing atomisation is utilised in a CFD-Code and then compared with PDA-measurements to control the process capability of this implementation.
Zusammenfassung Zweiphasenströmungen zeichnen sich durch eine bewegliche und deformierbare Phasengrenze aus. An dieser Phasengrenze ändern sich die Stoffeigenschaften sprunghaft. Die Erfassung und Beschreibung dieser Grenzflächeneigenschaften ist sehr aufwendig, so dass die numerische Modellierung von Zerstäubungsprozessen bisher nur für exemplarische Einzelfälle eingesetzt wird. Bei dieser Simulation von Zerstäubungsprozessen ist ein hoher Rechenaufwand gegeben. Der Vorgang des Strahlzerfalls lässt sich, wie im Folgenden dargestellt, mittels Zerfallswahrscheinlichkeiten abbilden. Aerodynamische Grenzflächenbetrachtungen fließen bei dieser Betrachtungsweise nicht in das Modell ein. Bei der Verwendung von Zerfallswahrscheinlichkeiten werden Annahmen zu Länge und Zeit der intakten Strahllänge der flüssigen Phase getroffen, die sich aus ähnlichen technischen Fragestellungen in direkten numerischen Simulationen (DNS) ableiten lassen [1,2]. Durch Anwendung von statistisch erzeugten Tropfenspektren in einem Strömungscode und durch Messung mittels Phasen-Doppler-Anemometrie erfolgt die Überprüfung der Aussagefähigkeit des statistischen Modells.相似文献
46.
Raphael C.-W. Phan 《Information Processing Letters》2004,91(1):33-38
In 2000, Biham and Keller [Cryptanalysis of reduced variants of Rijndael, 3rd AES Conference, in press] presented an impossible differential cryptanalysis of the Advanced Encryption Standard (AES) up to 5 rounds. This was later improved in 2001 by Cheon et al. [Improved impossible differential cryptanalysis of Rijndael and Crypton, in: Lecture Notes in Comput. Sci., vol. 2288, Springer-Verlag, Berlin, 2001, pp. 39-49] to apply to 6 rounds of the AES. In this paper, we extend on previous results to present an attack on the AES up to 7 rounds. This is the best-known impossible differential attack on the AES, and works by exploiting weaknesses in the AES key schedule. 相似文献
47.
48.
Minh Son Phan Étienne Baudrier Loïc Mazo Mohamed Tajine 《Journal of Mathematical Imaging and Vision》2017,57(2):164-182
This paper introduces a new method for estimating the angular difference between two tomographic projections belonging to a set of projections taken at unknown directions in 2D and 3D. Our method relies on the projection neighbor selection in projection moment space, the calculation of the angular differences between these neighboring projections using moment properties and a projection moment neighborhood graph. The accuracy and the robustness of our method are shown on a test database including fifty 2D and 3D gray-level images at different resolutions and with different levels of noise. 相似文献
49.
Phan Dương Hiệu 《Cryptologia》2017,41(6):491-511
After Vietnam’s Declaration of Independence on 2 September 1945, the country had to suffer through two long, brutal wars, first against the French and then against the Americans, before finally becoming a unified country free of colonial domination in 1975. The authors’ purpose is to examine the role of cryptography in those two wars. Despite the far greater technological resources of their opponents, the communications intelligence specialists of the Vi?t Minh, the National Liberation Front, and the Democratic Republic of Vietnam had considerable success in both protecting Vietnamese communications and acquiring tactical and strategic secrets from the enemy. Perhaps surprisingly, in both wars there was a balance between the sides. Generally speaking, cryptographic knowledge and protocol design were at a high level at the central commands, but deployment for tactical communications in the field was difficult, and there were many failures on all sides. 相似文献
50.