全文获取类型
收费全文 | 5210篇 |
免费 | 313篇 |
国内免费 | 42篇 |
专业分类
电工技术 | 73篇 |
综合类 | 15篇 |
化学工业 | 980篇 |
金属工艺 | 103篇 |
机械仪表 | 162篇 |
建筑科学 | 211篇 |
矿业工程 | 6篇 |
能源动力 | 193篇 |
轻工业 | 364篇 |
水利工程 | 30篇 |
石油天然气 | 21篇 |
无线电 | 851篇 |
一般工业技术 | 1051篇 |
冶金工业 | 465篇 |
原子能技术 | 25篇 |
自动化技术 | 1015篇 |
出版年
2024年 | 7篇 |
2023年 | 32篇 |
2022年 | 106篇 |
2021年 | 142篇 |
2020年 | 110篇 |
2019年 | 129篇 |
2018年 | 143篇 |
2017年 | 119篇 |
2016年 | 144篇 |
2015年 | 147篇 |
2014年 | 212篇 |
2013年 | 437篇 |
2012年 | 299篇 |
2011年 | 302篇 |
2010年 | 270篇 |
2009年 | 284篇 |
2008年 | 282篇 |
2007年 | 258篇 |
2006年 | 222篇 |
2005年 | 183篇 |
2004年 | 149篇 |
2003年 | 170篇 |
2002年 | 140篇 |
2001年 | 115篇 |
2000年 | 101篇 |
1999年 | 112篇 |
1998年 | 166篇 |
1997年 | 117篇 |
1996年 | 80篇 |
1995年 | 72篇 |
1994年 | 52篇 |
1993年 | 55篇 |
1992年 | 42篇 |
1991年 | 28篇 |
1990年 | 36篇 |
1989年 | 34篇 |
1988年 | 20篇 |
1987年 | 22篇 |
1986年 | 19篇 |
1985年 | 25篇 |
1984年 | 19篇 |
1983年 | 22篇 |
1982年 | 22篇 |
1981年 | 16篇 |
1980年 | 10篇 |
1979年 | 12篇 |
1978年 | 6篇 |
1977年 | 13篇 |
1976年 | 14篇 |
1973年 | 8篇 |
排序方式: 共有5565条查询结果,搜索用时 15 毫秒
61.
Tirthankar?GhoshEmail author Niki?Pissinou Kami?Sam?Makki 《Mobile Networks and Applications》2005,10(6):985-995
Designing a trusted and secure routing solution in an untrustworthy scenario is always a challenging problem. Lack of physical
security and low trust levels among nodes in an ad hoc network demands a secure end-to-end route free of any malicious entity.
This is particularly challenging when malicious nodes collude with one another to disrupt the network operation. In this paper
we have designed a secure routing solution to find an end-to-end route free of malicious nodes with collaborative effort from
the neighbors. We have also extended the solution to secure the network against colluding malicious nodes, which, to the best
of our knowledge, is the first such solution proposed. We have also proposed a framework for computing and distributing trusts
that can be used with out trusted routing protocol. Our proposed framework is unique and different from the other schemes
in that it tries to analyze the psychology of the attacker and quantifies the behavior in the computational model. Extensive
simulation has been carried out to evaluate the design of our protocol.
Partially funded by Department of Defense Award No. H98230-04-C-0460, Department of Transportation Project No. FL-26-7102-00
and National Science Foundation Grant Nos. ANI-0123950 and CCR-0196557.
Tirthankar Ghosh is a PhD candidate in the Telecommunications and Information Technology Institute at Florida International University. His
area of research is routing security and trust computation in wireless ad hoc and sensor networks. He received his Bachelor
of Electrical Engineering from Jadavpur University, India and Masters in Computer Engineering from Florida International University.
Dr. Niki Pissinou received her Ph.D. in Computer Science from the University of Southern California, her M.S. in Computer Science from the
University of California at Riverside, and her B.S.I.S.E. in Industrial and Systems Engineering from The Ohio State University.
She is currently a tenured professor and the director of the Telecommunication & Information Technology Institute at FIU.
Previously Dr. Pissinou was a tenured faculty at the Center for Advanced Computer Studies at the University of Louisiana at
Lafayette where she was also the director of the Telecommunication & Information & Technology Laboratory partially funded
by NASA, and the co-director of the NOMAD: A Wireless and Nomadic Laboratory partially funded by NSF, and the Advanced Network
Laboratory. Dr. Pissinou is active in the fields computer networks, information technology and distributed systems.
Dr. Kami (Sam) Makki has earned his Ph.D. in Computer Science from the University of Queensland in Brisbane Australia, his Masters degree in Computer
Science and Engineering from the University of New South Wales in Sydney Australia, and his Bachelor and Masters Degrees in
Civil Engineering from the University of Tehran Iran. Before joining the department of Electrical Engineering and Computer
Science at the University of Toledo he has held a number of academic positions and research appointments at the Queensland
University of Technology in Brisbane, Royal Melbourne Institution of Technology in Melbourne and at The University of Queensland
in Brisbane Australia. He is an active researcher in the fields of distributed systems, databases, mobile and wireless communications,
and has more than 30 publications in peerreviewed journals and international proceedings. He has served as a chair and technical
program committee member and reviewer for a number of IEEE and ACM sponsored technical conferences and has received a number
of achievement awards. 相似文献
62.
Because of rapid development in network technology,Internet usage has become widespread.It allows users with sensing devices to obtain medical data for healthcare,such as physiological signals,voice,and video streams from telemedicine systems,and to send the healthcare data to back-end database systems,creating a ubiquitous healthcare environment.However,this environment requires a widespread and suitable network.IPv6(Internet protocol version 6) is the next-generation Internet protocol that will be the protocol of future networks;it improves many shortcomings of IPv4.In this paper,we propose an IPv6/IPv4 U-home-care test system and analyze the network’s parameters though a series of tests by adjusting network parameters to find the optimal design for applications in the IPv6/IPv4 U-home-care service so as to assure good performance and high quality. 相似文献
63.
Numerous directional medium access control (DMAC) protocols have been developed to enhance the capacity of ad hoc networks using the underlying advanced physical layer techniques, such as beam-forming, multiuser detection (MUD), and multiple-input–multiple-output (MIMO). In this paper, we propose an innovative fully distributed DMAC protocol that cooperatively makes use of polarization diversity in low-mobility urban/suburban outdoor wireless ad hoc network environment. In the proposed cooperative polarization DMAC protocol (CPDMAC), each node directionally senses on both vertical and horizontal polarizations and dynamically adapts polarization that minimizes overall interference in the ad hoc network. Analysis is performed to establish relationship between vertically and horizontally polarized nodes in the network. Further, a theoretical lower bound is derived for probability of successful transmission to show capacity improvement as a function of cross polarization ratio (CPR). Simulation results confirm from 2% up to 400% improvement in average node throughput at data rate of 1.95 Mbps when compared to the traditional DMAC protocol. Moreover, our study clearly shows that the average throughput difference increases with increasing node density when compared to the traditional DMAC protocol. 相似文献
64.
Joerg Velten Sam Schauland Anton Kummert 《Multidimensional Systems and Signal Processing》2008,19(3-4):401-410
Automotive scenery often contains objects that can be classified by object speed and movement direction. These features can be extracted from video data by linear n-D filters, which have already been analyzed in the past. While soundness of results was convincing, interest in those systems declined due to the reduced computational abilities of contemporary computers. Modern hardware allows realization of velocity filters, if the n-D system is carefully adapted to the analysis problem. The present paper analyzes the premises for application of velocity filters in the domain of automotive driver assistance systems, i.e. with respect to detectability of objects and implementability in a cost effective way. Especially the influence of the frame rate and the temporal violation of the sampling theorem are analyzed. Transfer functions for n-D filters working in a vision-based blind spot collision avoidance system are presented and discussed, and promising approaches for future application fields are proposed. 相似文献
65.
虽然无线通信技术一直都在不断发展,但当前却处于一个前所未有的变革期,新兴的4G空中接口如WiMAX、LTE、UMB、802.20、WiBRo以及下一代PHS等等都有一个共同的特点:即都是基于正交频分多址接入(OFDMA)、都采用MIMo(多入多出)技术、都具有“扁平化架构”且均基于IP(互联网协议)。 相似文献
66.
I. Jialal M.D. FACN DABCC Cindy J. Fuller Ph.D. R.D. Dr. Sam Parthasarathy 《Critical reviews in food science and nutrition》1996,36(4):341-355
Much evidence has accumulated that implicates the oxidative modification of low‐density lipoprotein (LDL) in the early stages of atherogenesis. The antioxidant nutrients alpha‐tocopherol, ascorbic acid, and beta‐carotene have been shown to inhibit in vitro LDL oxidation. In addition, they have been shown to increase the resistance of LDL to oxidation when given to animals and humans. Because plasma levels of these nutrients can be increased by dietary supplementation with minimal side effects, they may show promise in the prevention of coronary artery disease. 相似文献
67.
Two efficient time slot assignment algorithms, called the two-phase algorithm for the nonhierarchical and the three-phase algorithm for the hierarchical time-division multiplex (TDM) switching systems, are proposed. The simple idea behind these two algorithms is to schedule the traffic on the critical lines/trunks of a traffic matrix first. The time complexities of these two algorithms are found to be O(LN2) and O(LM2), where L is the frame length, N is the switch size, and M is the number of input/output users connected to a hierarchical TDM switch. Unlike conventional algorithms, they are fast, iterative and simple for hardware implementation. Since no backtracking is used, pipelined packet transmission and packet scheduling can be performed for reducing the scheduling complexity of a transmission matrix to O(N2) and O(M2), respectively. Extensive simulations reveal that the two proposed algorithms give close-to-optimal performance under various traffic conditions 相似文献
68.
Yu-Pao Tsai Cheng-Hung Ko Yi-Ping Hung Zen-Chung Shih 《IEEE transactions on image processing》2007,16(10):2607-2616
Image-based rendering has been successfully used to display 3-D objects for many applications. A well-known example is the object movie, which is an image-based 3-D object composed of a collection of 2-D images taken from many different viewpoints of a 3-D object. In order to integrate image-based 3-D objects into a chosen scene (e.g., a panorama), one has to meet a hard challenge--to efficiently and effectively remove the background from the foreground object. This problem is referred to as multiview images (MVIs) segmentation. Another task requires MVI segmentation is image-based 3-D reconstruction using multiview images. In this paper, we propose a new method for segmenting MVI, which integrates some useful algorithms, including the well-known graph-cut image segmentation and volumetric graph-cut. The main idea is to incorporate the shape prior into the image segmentation process. The shape prior introduced into every image of the MVI is extracted from the 3-D model reconstructed by using the volumetric graph cuts algorithm. Here, the constraint obtained from the discrete medial axis is adopted to improve the reconstruction algorithm. The proposed MVI segmentation process requires only a small amount of user intervention, which is to select a subset of acceptable segmentations of the MVI after the initial segmentation process. According to our experiments, the proposed method can provide not only good MVI segmentation, but also provide acceptable 3-D reconstructed models for certain less-demanding applications. 相似文献
69.
Hwang‐Cheng Wang Isaac Woungang Kuo‐Chang Ting Chih‐Cheng Tseng Fang‐Chang Kuo Hung‐Te Huang 《International Journal of Communication Systems》2016,29(17):2534-2541
With the adoption of long‐term evolution standard for 4G mobile communications, the deployment of femtocell base stations (FBSs) to cope with the surging traffic in mobile wireless communication is becoming increasingly popular. However, with the random installation of FBSs, the problem of interference among FBSs is still a challenge. In this paper, assuming the presence of a femtocell management system that can control and coordinate the densely deployed FBSs, a novel power backoff scheme is proposed that determines the appropriate transmit power of each FBS so that the interference is reduced. Simulation results for randomly deployed FBSs in an environment with shadowing using MATLAB are provided, showing that our proposed methods can effectively mitigate the co‐tier downlink interference while improving the system capacity in a densely deployed femtocell network with shared spectrum use. Quantitatively, the average interference is reduced by roughly 90% to 100% of dBm, and the average capacity is increased by more than 80%. These results attest to the effectiveness of the proposed scheme. 相似文献
70.