全文获取类型
收费全文 | 5746篇 |
免费 | 449篇 |
国内免费 | 58篇 |
专业分类
电工技术 | 64篇 |
综合类 | 23篇 |
化学工业 | 1311篇 |
金属工艺 | 84篇 |
机械仪表 | 273篇 |
建筑科学 | 122篇 |
矿业工程 | 9篇 |
能源动力 | 352篇 |
轻工业 | 736篇 |
水利工程 | 67篇 |
石油天然气 | 31篇 |
武器工业 | 1篇 |
无线电 | 725篇 |
一般工业技术 | 1303篇 |
冶金工业 | 96篇 |
原子能技术 | 57篇 |
自动化技术 | 999篇 |
出版年
2024年 | 38篇 |
2023年 | 209篇 |
2022年 | 499篇 |
2021年 | 783篇 |
2020年 | 475篇 |
2019年 | 530篇 |
2018年 | 481篇 |
2017年 | 402篇 |
2016年 | 405篇 |
2015年 | 249篇 |
2014年 | 299篇 |
2013年 | 432篇 |
2012年 | 250篇 |
2011年 | 306篇 |
2010年 | 178篇 |
2009年 | 149篇 |
2008年 | 108篇 |
2007年 | 95篇 |
2006年 | 38篇 |
2005年 | 29篇 |
2004年 | 39篇 |
2003年 | 31篇 |
2002年 | 25篇 |
2001年 | 22篇 |
2000年 | 10篇 |
1999年 | 14篇 |
1998年 | 19篇 |
1997年 | 15篇 |
1996年 | 13篇 |
1995年 | 19篇 |
1994年 | 9篇 |
1993年 | 12篇 |
1992年 | 9篇 |
1991年 | 7篇 |
1990年 | 3篇 |
1989年 | 5篇 |
1988年 | 4篇 |
1987年 | 6篇 |
1986年 | 3篇 |
1985年 | 6篇 |
1984年 | 4篇 |
1983年 | 4篇 |
1982年 | 5篇 |
1981年 | 3篇 |
1980年 | 1篇 |
1979年 | 3篇 |
1978年 | 2篇 |
1977年 | 3篇 |
1974年 | 1篇 |
1961年 | 1篇 |
排序方式: 共有6253条查询结果,搜索用时 15 毫秒
131.
Mohammed Khalid Khan Muhammad Sohail Muhammad Aamir B. S. Chowdhry Syed Irfan Hyder 《Wireless Personal Communications》2014,76(3):535-548
Last decade belongs to business intelligence (BI) because it is one of the few concepts that have actually lived to the expectations. Not only the businesses have adopted it but also have reaped the fruits out of it. But the cost of BI solutions is very high and has restricted small and medium enterprises to use BI solutions. The human resource is also limited and resultantly expensive in this field. This research proposes a web support system for business intelligence which provides automated data mapping and loading from user application to BI framework and also validates it. The system also assists users in getting the outputs in terms of reports and dashboards. The implementation of the proposed framework demonstrates convenience of use and effective cost saving as it does not require any technical expertise. The beauty of this web support system is that all the steps are menu driven and any non-technical user can get hold of it easily. 相似文献
132.
The aim of this paper is to introduce a novel frequency reuse concept especially for macro cellular networks to substantially increase the mobile network capacity, and simultaneously to avoid the implementation of low efficient small cells. Single path multiple access (SPMA) utilizes the characteristics of independent propagation paths for particular geographical location in the coverage area of mobile network. The proposed concept is based on the assumption that new approach will be adopted by the antenna manufacturers for producing advanced antennas by utilizing materials like metamaterials including carbon based nanotechnology, and graphene. In SPMA concept, communication between base station and mobile station happens through only single independent propagation path, and frequency resources can be reused in 5 m \(\times \) 5 m areas or even more often in 1 m \(\times \) 1 m areas, but limited by a base station/mobile station antenna requirement. Thus, the capacity of the network will be increased dramatically, and it can be managed in centralized manner at certain macro site locations. In already deployed cellular networks, these macro sites are mostly easily available, and that would help to implement SPMA to enhance the network capacity. Simulation results provided in this paper show the applicability of SPMA technique, by limiting the radiation of signal as single path propagation between base station and mobile station. 相似文献
133.
Aditya Narayan Singh Mobinul Islam Abhishek Meena Muhammad Faizan Daseul Han Chinna Bathula Amir Hajibabaei Rohit Anand Kyung-Wan Nam 《Advanced functional materials》2023,33(46):2304617
Rechargeable sodium-ion batteries (SIBs) are emerging as a viable alternative to lithium-ion battery (LIB) technology, as their raw materials are economical, geographically abundant (unlike lithium), and less toxic. The matured LIB technology contributes significantly to digital civilization, from mobile electronic devices to zero electric-vehicle emissions. However, with the increasing reliance on renewable energy sources and the anticipated integration of high-energy-density batteries into the grid, concerns have arisen regarding the sustainability of lithium due to its limited availability and consequent price escalations. In this context, SIBs have gained attention as a potential energy storage alternative, benefiting from the abundance of sodium and sharing electrochemical characteristics similar to LIBs. Furthermore, high-entropy chemistry has emerged as a new paradigm, promising to enhance energy density and accelerate advancements in battery technology to meet the growing energy demands. This review uncovers the fundamentals, current progress, and the views on the future of SIB technologies, with a discussion focused on the design of novel materials. The crucial factors, such as morphology, crystal defects, and doping, that can tune electrochemistry, which should inspire young researchers in battery technology to identify and work on challenging research problems, are also reviewed. 相似文献
134.
Jongsun Park Muhammad K. Roy K. 《Very Large Scale Integration (VLSI) Systems, IEEE Transactions on》2003,11(2):244-253
Finite impulse response (FIR) filtering can be expressed as multiplications of vectors by scalars. We present high-speed designs for FIR filters based on a computation sharing multiplier which specifically targets computation re-use in vector-scalar products. The performance of the proposed implementation is compared with implementations based on carry-save and Wallace tree multipliers in 0.35-/spl mu/m technology. We show that sharing multiplier scheme improves speed by approximately 52 and 33% with respect to the FIR filter implementations based on the carry-save multiplier and Wallace tree multiplier, respectively. In addition, sharing multiplier scheme has a relatively small power delay product than other multiplier schemes. Using voltage scaling, power consumption of the FIR filter based on computation sharing multiplier can be reduced to 41% of the FIR filter based on the Wallace tree multiplier for the same frequency of operation. 相似文献
135.
Sajid Bashir Muhammad Naeem Adnan Ahmed Khan Syed Ismail Shah 《International Journal of Communication Systems》2010,23(1):109-124
The paper discusses a sequence detector based on univariate marginal distribution algorithm (UMDA) that jointly estimates the symbols transmitted in a multiple input multiple output (MIMO) communication system. While an optimal maximum likelihood detection using an exhaustive search method is prohibitively complex, it has been shown that sphere decoder (SD) achieves the optimal bit error rate (BER) performance with polynomial time complexity for smaller array sizes. However, the worst‐case complexity of SD is exponential in the problem dimensions, this brings in question its practical implementation for larger number of spatial layers and for higher‐order signal constellation. The proposed detector shows promising results for this overly difficult and complicated operating environment, confirmed through simulation results. A performance comparison of the UMDA detector with SD is presented for higher‐order complex MIMO architectures with limited average transmit power. The proposed detector achieves substantial performance gain for higher‐order systems attaining a near optimal BER performance with reduced computational complexity as compared with SD. Copyright © 2009 John Wiley & Sons, Ltd. 相似文献
136.
Staszewski R. Staszewski R. B. Jung T. Murphy T. Bashir I. Eliezer O. Muhammad K. Entezari M. 《Solid-State Circuits, IEEE Journal of》2010,45(2):276-288
137.
Saru Kumari Muhammad Khurram Khan Xiong Li Fan Wu 《International Journal of Communication Systems》2016,29(3):441-458
Recently, Jiang et al. and He et al. independently found security problems in Chen et al.'s remote user authentication scheme for non‐tamper‐proof storage devices like Universal Serial Bus stick and proposed improvements. Nonetheless, we detect that the schemes proposed by Jiang et al. and He et al. overlook a user's privacy. We also observe that Jiang et al.'s scheme is vulnerable to insider attack and denial of service attacks and lacks forward secrecy. We point out that the password changing facility in He et al.'s scheme is equivalent to undergoing registration, whereas in Jiang et al.'s scheme, it is unsuitable. Moreover, the login phase of both the schemes is incapable to prevent the use of wrong password leading to the computation of an unworkable login request. Therefore, we design a new scheme with user anonymity to surmount the identified weaknesses. Without adding much in communication/computational cost, our scheme provides more security characteristics and keeps the merits of the original schemes. As compared with its predecessor schemes, the proposed scheme stands out as a more apt user authentication method for common storage devices. We have also presented a formal proof of security of the proposed scheme based on the logic proposed by Burrows, Abadi and Needham (BAN logic). Copyright © 2014 John Wiley & Sons, Ltd. 相似文献
138.
Chughtai Gohar Rehman Lee Jia Shahzadi Mahnoor Kabir Asif Hassan Muhammad Arshad Shehzad 《Scientometrics》2020,122(1):249-265
Scientometrics - In general peer review is accredited as the vital and utmost cornerstone of the scientific publishing and research developments. Undeniably, the reviewers play a decisive role in... 相似文献
139.
Iftikhar Ahmad Ambreen Shahnaz Muhammad Asfand-e-Yar Wajeeha Khalil Yasmin Bano 《计算机、材料和连续体(英文)》2023,74(1):279-293
The demand for cloud computing has increased manifold in the recent past. More specifically, on-demand computing has seen a rapid rise as organizations rely mostly on cloud service providers for their day-to-day computing needs. The cloud service provider fulfills different user requirements using virtualization - where a single physical machine can host multiple Virtual Machines. Each virtual machine potentially represents a different user environment such as operating system, programming environment, and applications. However, these cloud services use a large amount of electrical energy and produce greenhouse gases. To reduce the electricity cost and greenhouse gases, energy efficient algorithms must be designed. One specific area where energy efficient algorithms are required is virtual machine consolidation. With virtual machine consolidation, the objective is to utilize the minimum possible number of hosts to accommodate the required virtual machines, keeping in mind the service level agreement requirements. This research work formulates the virtual machine migration as an online problem and develops optimal offline and online algorithms for the single host virtual machine migration problem under a service level agreement constraint for an over-utilized host. The online algorithm is analyzed using a competitive analysis approach. In addition, an experimental analysis of the proposed algorithm on real-world data is conducted to showcase the improved performance of the proposed algorithm against the benchmark algorithms. Our proposed online algorithm consumed 25% less energy and performed 43% fewer migrations than the benchmark algorithms. 相似文献
140.
Muhammad Nadeem Ali Arshad Saman Riaz SyedaWajiha Zahra Muhammad Rashid Shahab S. Band Amir Mosavi 《计算机、材料和连续体(英文)》2023,74(2):2641-2654
Cloud computing is one of the most attractive and cost-saving models, which provides online services to end-users. Cloud computing allows the user to access data directly from any node. But nowadays, cloud security is one of the biggest issues that arise. Different types of malware are wreaking havoc on the clouds. Attacks on the cloud server are happening from both internal and external sides. This paper has developed a tool to prevent the cloud server from spamming attacks. When an attacker attempts to use different spamming techniques on a cloud server, the attacker will be intercepted through two effective techniques: Cloudflare and K-nearest neighbors (KNN) classification. Cloudflare will block those IP addresses that the attacker will use and prevent spamming attacks. However, the KNN classifiers will determine which area the spammer belongs to. At the end of the article, various prevention techniques for securing cloud servers will be discussed, a comparison will be made with different papers, a conclusion will be drawn based on different results. 相似文献