收费全文 | 49562篇 |
免费 | 704篇 |
国内免费 | 791篇 |
电工技术 | 795篇 |
综合类 | 55篇 |
化学工业 | 7465篇 |
金属工艺 | 3202篇 |
机械仪表 | 1591篇 |
建筑科学 | 1095篇 |
矿业工程 | 184篇 |
能源动力 | 1615篇 |
轻工业 | 2784篇 |
水利工程 | 403篇 |
石油天然气 | 1397篇 |
武器工业 | 2篇 |
无线电 | 4608篇 |
一般工业技术 | 11823篇 |
冶金工业 | 9729篇 |
原子能技术 | 906篇 |
自动化技术 | 3403篇 |
2021年 | 404篇 |
2020年 | 324篇 |
2019年 | 426篇 |
2018年 | 722篇 |
2017年 | 725篇 |
2016年 | 814篇 |
2015年 | 598篇 |
2014年 | 911篇 |
2013年 | 2623篇 |
2012年 | 1562篇 |
2011年 | 2137篇 |
2010年 | 1664篇 |
2009年 | 1963篇 |
2008年 | 1833篇 |
2007年 | 1974篇 |
2006年 | 1613篇 |
2005年 | 1378篇 |
2004年 | 1343篇 |
2003年 | 1232篇 |
2002年 | 1203篇 |
2001年 | 1261篇 |
2000年 | 1098篇 |
1999年 | 1175篇 |
1998年 | 2837篇 |
1997年 | 2056篇 |
1996年 | 1774篇 |
1995年 | 1179篇 |
1994年 | 942篇 |
1993年 | 990篇 |
1992年 | 710篇 |
1991年 | 684篇 |
1990年 | 631篇 |
1989年 | 597篇 |
1988年 | 456篇 |
1987年 | 497篇 |
1986年 | 465篇 |
1985年 | 483篇 |
1984年 | 409篇 |
1983年 | 385篇 |
1982年 | 383篇 |
1981年 | 410篇 |
1980年 | 450篇 |
1979年 | 434篇 |
1978年 | 376篇 |
1977年 | 525篇 |
1976年 | 812篇 |
1975年 | 384篇 |
1974年 | 338篇 |
1973年 | 379篇 |
1972年 | 318篇 |
This paper deals with the secrecy performance analysis of a multicast network over mixed fading scenarios in which a cluster of passive eavesdroppers is trying to overhear the secret transmission. Our key contribution is to prevent this malicious attack of the illegitimate receivers. Rayleigh/ Rician mixed fading channels are considered to model alternately the multicast/ eavesdropper and eavesdropper/ multicast channels as such mixed fading scenarios are often encountered in cellular communication where only one link (either multicast or eavesdropper) undergo a line-of-sight propagation path. At first, we derive the probability density functions for the single-input-multiple-output multicast scenarios and then the secrecy analysis is carried out by obtaining closed-form expressions for the performance matrices such as the probability of non-zero secrecy multicast capacity, ergodic secrecy multicast capacity, and secure outage probability for multicasting. The derived expressions are beneficial to investigate how the antenna diversity can combat the detrimental impact of fading as well as the number of multicast users and eavesdroppers, and improve the secrecy level to the acceptable limit. Moreover, the best secure scenario in terms of the secrecy parameters is obtained when the multicast channels undergo Rician fading whereas the eavesdropper channels experience Rayleigh fading. Finally, the analytical expressions are justified via the Monte-Carlo simulations.
相似文献Modern scientific research challenges require new technologies, integrated tools, reusable and complex experiments in distributed computing infrastructures. But above all, computing power for efficient data processing and analyzing. Containers technologies have emerged as a new paradigm to address such intensive scientific applications problems. Their easy deployment in a reasonable amount of time and the few required computational resource make them more suitable. Containers are considered light virtualization solutions. They enable performance isolation and flexible deployment of complex, parallel, and high-performance systems. Moreover, they gained popularity to modernize and migrate scientific applications in computing infrastructure management. Additionally, they reduce computational time processing. In this paper, we first give an overview of virtualization and containerization technologies. We discuss the taxonomies of containerization technologies of the literature, and then we provide a new one that covers and completes those proposed in the literature. We identify the most important application domains of containerization and their technological progress. Furthermore, we discuss the performance metrics used in most containerization techniques. Finally, we point out research gaps in the related aspects of containerization technology that require more research.
相似文献