全文获取类型
收费全文 | 159974篇 |
免费 | 8457篇 |
国内免费 | 5191篇 |
专业分类
电工技术 | 6603篇 |
技术理论 | 5篇 |
综合类 | 8594篇 |
化学工业 | 22503篇 |
金属工艺 | 9526篇 |
机械仪表 | 7865篇 |
建筑科学 | 8041篇 |
矿业工程 | 2812篇 |
能源动力 | 3202篇 |
轻工业 | 11717篇 |
水利工程 | 3094篇 |
石油天然气 | 3934篇 |
武器工业 | 868篇 |
无线电 | 17914篇 |
一般工业技术 | 23841篇 |
冶金工业 | 5853篇 |
原子能技术 | 1136篇 |
自动化技术 | 36114篇 |
出版年
2024年 | 404篇 |
2023年 | 1246篇 |
2022年 | 2528篇 |
2021年 | 3296篇 |
2020年 | 2529篇 |
2019年 | 1988篇 |
2018年 | 16588篇 |
2017年 | 15786篇 |
2016年 | 12202篇 |
2015年 | 4042篇 |
2014年 | 4434篇 |
2013年 | 5128篇 |
2012年 | 8961篇 |
2011年 | 15573篇 |
2010年 | 13857篇 |
2009年 | 10888篇 |
2008年 | 12216篇 |
2007年 | 12812篇 |
2006年 | 4680篇 |
2005年 | 4899篇 |
2004年 | 3757篇 |
2003年 | 3469篇 |
2002年 | 2743篇 |
2001年 | 1980篇 |
2000年 | 1589篇 |
1999年 | 1166篇 |
1998年 | 859篇 |
1997年 | 731篇 |
1996年 | 642篇 |
1995年 | 477篇 |
1994年 | 363篇 |
1993年 | 273篇 |
1992年 | 194篇 |
1991年 | 204篇 |
1990年 | 140篇 |
1989年 | 84篇 |
1988年 | 66篇 |
1987年 | 46篇 |
1986年 | 42篇 |
1968年 | 43篇 |
1967年 | 33篇 |
1966年 | 42篇 |
1965年 | 44篇 |
1960年 | 30篇 |
1959年 | 44篇 |
1958年 | 37篇 |
1957年 | 36篇 |
1956年 | 34篇 |
1955年 | 63篇 |
1954年 | 68篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
Hai Li Meng Zhou Qinghua Guo Renbiao Wu Jiangtao Xi 《Multidimensional Systems and Signal Processing》2018,29(2):719-732
An important issue in low-altitude wind-shear detection is to estimate the wind speed of wind field. In this paper, a novel method for wind speed estimation with airborne phased array radar is proposed by combining space time adaptive processing and compressive sensing. The proposed method is able to achieve accurate wind speed estimate in the condition of limited number of sampling pulses, as demonstrated by numerical examples. 相似文献
992.
The mobility and openness of wireless communication technologies make Mobile Healthcare Systems (mHealth) potentially exposed to a number of potential attacks, which significantly undermines their utility and impedes their widespread deployment. Attackers and criminals, even without knowing the context of the transmitted data, with simple eavesdropping on the wireless links, may benefit a lot from linking activities to the identities of patient’s sensors and medical staff members. These vulnerabilities apply to all tiers of the mHealth system. A new anonymous mutual authentication scheme for three-tier mobile healthcare systems with wearable sensors is proposed in this paper. Our scheme consists of three protocols: Protocol-1 allows the anonymous authentication nodes (mobile users and controller nodes) and the HSP medical server in the third tier, while Protocol-2 realizes the anonymous authentication between mobile users and controller nodes in the second tier, and Protocol-3 achieves the anonymous authentication between controller nodes and the wearable body sensors in the first tier. In the design of our protocols, the variation in the resource constraints of the different nodes in the mHealth system are taken into consideration so that our protocols make a better trade-off among security, efficiency and practicality. The security of our protocols are analyzed through rigorous formal proofs using BAN logic tool and informal discussions of security features, possible attacks and countermeasures. Besides, the efficiency of our protocols are concretely evaluated and compared with related schemes. The comparisons show that our scheme outperforms the previous schemes and provides more complete and integrated anonymous authentication services. Finally, the security of our protocols are evaluated by using the Automated Validation of Internet Security Protocols and Applications and the SPAN animator software. The simulation results show that our scheme is secure and satisfy all the specified privacy and authentication goals. 相似文献
993.
Mojtaba Eslamnezhad Namin Mehdi Hosseinzadeh Nasour Bagheri Ahmad Khademzadeh 《Telecommunication Systems》2018,67(4):539-552
In radio frequency identification (RFID) systems, search protocols are used to find a specific item in a large number of tagged products. These protocols should be secure against RFID attacks such as traceability, impersonation, DoS and eavesdropping. Sundaresan et al. (IEEE Trans Dependable Secure Comput, 2015) presented a server-less search protocol based on 128-bits PRNG function and claimed that their method can address all vulnerabilities of previous protocols. In this paper, we prove that Sundaresan et al.’s protocol is vulnerable to traceability attack with the high probability. In addition, we present an improved protocol to solve the proposed problem and analyze its security level informally and formally based on AVISPA tool and BAN logic. 相似文献
994.
Effective techniques for extending lifetime in multi-hop wireless sensor networks include duty cycling and, more recently introduced, cooperative transmission (CT) range extension. However, a scalable MAC protocol has not been presented that combines both. An On-demand Scheduling Cooperative MAC protocol (OSC-MAC) is proposed to address the energy hole problem in multi-hop wireless sensor networks (WSNs). By combining an on-demand strategy and sensor cooperation intended to extend range, OSC-MAC tackles the spatio-temporal challenges for performing CT in multi-hop WSNs: cooperating nodes are neither on the same duty cycle nor are they necessarily in the same collision domain. We use orthogonal and pipelined duty-cycle scheduling, in part to reduce traffic contention, and devise a reservation-based wake-up scheme to bring cooperating nodes into temporary synchrony to support CT range extension. The efficacy of OSC-MAC is demonstrated using extensive NS-2 simulations for different network scenarios without and with mobility. Compared with existing MAC protocols, simulation results show that while we explicitly account for the overhead of CT and practical failures of control packets in dense traffic, OSC-MAC still gives 80–200 % lifetime improvement. 相似文献
995.
996.
Songjun Ma Ge Chen Luoyi Fu Weijie Wu Xiaohua Tian Jun Zhao Xinbing Wang 《Wireless Networks》2018,24(8):2973-2991
The rapid growth of online social networks (OSNs) has ultimately facilitated information spreading and changed the economics of mobile networks. It is important to understand how to spread information as widely as possible. In this paper, we aim to seek powerful information initial spreaders with an efficient manner. We use the mean-field theory to characterize the process of information spreading based on the Susceptible Infected (SI) model and validate that the prevalence of information depends on the network density. Inspired by this result, we seek the initial spreaders from closely integrated groups of nodes, i.e., dense groups (DGs). In OSNs, DGs distribute dispersedly over the network, so our approach can be fulfilled in a distributed way by seeking the spreaders in each DG. We first design a DG Generating Algorithm to detect DGs, where nodes within the DG have more internal connections than external ones. Second, based on the detected DGs, we design a criterion to seek powerful initial spreaders from each DG. We conduct experiments as well as statistical analysis on real OSNs. The results show that our approach provides a satisfactory performance as well as computational efficiency. 相似文献
997.
The problem of binary hypothesis testing is considered in a bandwidth-constrained low-power wireless sensor network operating over insecure links. To prevent passive eavesdropping from enemy fusion center (EFC), the sensor observations are randomly flipped according to pre-deployed flipping rates before transmission. Accordingly, a constrained optimization problem is formulated to minimize the fusion error of ally fusion center (AFC) while maintain EFC’s error at high level. We demonstrated that the fusion error is a non-convex function of the flipping rates, thus an immune based differential evolution algorithm is designed to search the optimal flipping rates, such that the EFC always gets high error probability at the cost of a small degeneration of the AFC’s fusion performance. Furthermore, the optimal thresholds of the fusion rules are calculated based on the statistics of the sensor data, which further degenerates the detection performance of the EFC, since it is not aware of the statistics of the sensor observations after data flipping, resulting in its threshold does not match the observations. Simulation results demonstrated that the AFC can appropriately acquire the original nature state, while the EFC is prevent to detect the target regardless of the signal-to-noise and sensor numbers. 相似文献
998.
一种新型平面阿基米德螺旋天线的分析与设计 总被引:1,自引:0,他引:1
对一种新型的平面阿基米德螺旋天线--锯齿状平面阿基米德螺旋天线进行了研究。首先给出了该天线的几何结构,介绍了其主要特点和应用领域,设计并制作了一个2.9~6.2GHz的锯齿状平面阿基米德螺旋天线。测试表明,与普通平面阿基米德螺旋天线相比,该天线能够缩小尺寸,展宽频带,很好地改善天线的低频特性。 相似文献
999.
1000.