全文获取类型
收费全文 | 59771篇 |
免费 | 5561篇 |
国内免费 | 2584篇 |
专业分类
电工技术 | 3756篇 |
技术理论 | 3篇 |
综合类 | 4035篇 |
化学工业 | 9820篇 |
金属工艺 | 3501篇 |
机械仪表 | 4098篇 |
建筑科学 | 4684篇 |
矿业工程 | 1868篇 |
能源动力 | 1790篇 |
轻工业 | 3987篇 |
水利工程 | 1060篇 |
石油天然气 | 4041篇 |
武器工业 | 539篇 |
无线电 | 6639篇 |
一般工业技术 | 7287篇 |
冶金工业 | 2665篇 |
原子能技术 | 712篇 |
自动化技术 | 7431篇 |
出版年
2025年 | 10篇 |
2024年 | 933篇 |
2023年 | 1282篇 |
2022年 | 1873篇 |
2021年 | 2600篇 |
2020年 | 2127篇 |
2019年 | 1608篇 |
2018年 | 1818篇 |
2017年 | 2001篇 |
2016年 | 1749篇 |
2015年 | 2354篇 |
2014年 | 3025篇 |
2013年 | 3358篇 |
2012年 | 3634篇 |
2011年 | 4080篇 |
2010年 | 3547篇 |
2009年 | 3324篇 |
2008年 | 3258篇 |
2007年 | 3045篇 |
2006年 | 3117篇 |
2005年 | 2610篇 |
2004年 | 1855篇 |
2003年 | 1661篇 |
2002年 | 1644篇 |
2001年 | 1417篇 |
2000年 | 1320篇 |
1999年 | 1570篇 |
1998年 | 1308篇 |
1997年 | 1149篇 |
1996年 | 1034篇 |
1995年 | 845篇 |
1994年 | 681篇 |
1993年 | 491篇 |
1992年 | 434篇 |
1991年 | 272篇 |
1990年 | 223篇 |
1989年 | 170篇 |
1988年 | 125篇 |
1987年 | 85篇 |
1986年 | 71篇 |
1985年 | 47篇 |
1984年 | 35篇 |
1983年 | 33篇 |
1982年 | 33篇 |
1981年 | 20篇 |
1980年 | 17篇 |
1979年 | 6篇 |
1959年 | 3篇 |
1940年 | 3篇 |
1928年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
971.
Xiaoying Jia Neeraj Kumar Kim‐Kwang Raymond Choo Debiao He 《International Journal of Communication Systems》2018,31(1)
The capability to efficiently revoke compromised/misbehaving users is important in identity‐based encryption (IBE) applications, as it is not a matter of if but of when that one or more users are compromised. Existing solutions generally require a trusted third party to update the private keys of nonrevoked users periodically, which impact on scalability and result in high computation and communication overheads at the key generation center. Li et al proposed a revocable IBE scheme, which outsources most of the computation and communication overheads to a Key Update Cloud Service Provider (KU‐CSP). However, their scheme is lack of scalability since the KU‐CSP must maintain a secret value for each user. Tseng et al proposed another revocable IBE scheme with a cloud revocation authority, seeking to provide scalability and improve both performance and security level. In this paper, we present a new revocable IBE scheme with a cloud revocation server (CRS). The CRS holds only one secret time update key for all users, which provides the capability to scale our scheme. We demonstrate that our scheme is secure against adaptive‐ID and chosen ciphertext attacks under the k‐CAA assumption and outperforms both schemes mentioned above, in terms of having lower computation and communication overheads. 相似文献
972.
Qiang He Xingwei Wang Min Huang Yuliang Cai Chuangchuang Zhang Lianbo Ma 《International Journal of Communication Systems》2018,31(15)
To synthetically and dynamically make strategic choices in social networks, a novel adaptive approach to deal with two‐dimension influence maximization problem (TIMP) is proposed with game‐based diffusion model, which can achieve trade‐off between diffusion time and the number of active nodes. At first, TIMP model is synthetically formulated, and diffusion time and the number of active nodes are defined mathematically. In particular, budget efficiency is presented to describe TIMP in order that an appropriate trade‐off between diffusion time and the number of active nodes can be reached. Then, an adaptive heuristic (A‐Heuristic) scheme is proposed to dynamically determine the initial seed nodes (ie, the most influential nodes). Finally, experiments are performed, and their results verify the superior performance of the proposed scheme in terms of budget efficiency, running time, and the number of active nodes. 相似文献
973.
Li Tao He Jian-an Zhang Liang Ye Ying Gu Dayong Zhang Sixiang Zhang Pengjun Hu Xuenan Wei Shuang 《Journal of Infrared, Millimeter and Terahertz Waves》2021,42(5):572-587
Journal of Infrared, Millimeter, and Terahertz Waves - Terahertz radiation has many unique characteristics that make it useful for noninvasive mail inspection. While qualitative analysis of mail... 相似文献
974.
975.
Yi Dong Zhaohui Li Xiangqing Tian Qijie Wang Hao He Chao Lu Yixin Wang Weisheng Hu Tee Hiang Cheng 《Photonics Technology Letters, IEEE》2007,19(16):1236-1238
An extinction ratio tunable optical fiber polarization interferometer (OFPI) is proposed and implemented to increase the optical modulation depth in radio-over-fiber (RoF) systems by suppressing the optical carrier power. The extinction ratio of the OFPI can be simply tuned by adjusting the polarization state of the launched RoF signal. Experimental results illustrate that the receiver sensitivity and dynamic range of RoF systems are greatly improved using the proposed scheme. 相似文献
976.
Weiwen Zou Zuyuan He Yablon A.D. Hotate K. 《Photonics Technology Letters, IEEE》2007,19(18):1389-1391
The dependence of Brillouin frequency shift (BFS) in optical fibers on the residual elastic and inelastic strains induced by different draw tensions during fiber fabrication is investigated experimentally and theoretically. The BFS is linearly proportional to the draw tension with a measured coefficient of -42.0 MHz/100 g, which agrees with the theoretical value of -41.96 MHz/100 g. Theoretical analysis further shows that the elastic strain in fiber core influences predominantly the BFS due to the second-order nonlinearity of Young's modulus while the effect of the inelastic strain in fiber cladding is less than 1.0%. 相似文献
977.
Banerjee P.P. Avila R. He D. Shenliang Wu Bechhoefer E. 《IEEE transactions on systems, man and cybernetics. Part C, Applications and reviews》2007,37(6):1318-1326
In this paper, a novel discriminant analysis based predictive model for preventing false alarms leading to unnecessary replacement of an avionic system component is presented. The model is validated by prediction of false alarms (also known as false positives, type I, or alpha errors) in the left generator shaft of a Sikorsky helicopter UH-60, using the Goodrich health and usage management system (HUMS). The paper presents one of the first approaches based on applying discriminant analysis for prognostics of avionic systems, specifically in the context of identifying false positives within the next 1 or 2 h. In practice, predictions for the next 2 h are sufficient as typical helicopter flight schedules and durations are such that up to 2 h advance notice is most useful. This is an important contribution because drive train components of helicopters are normally very robust with very rare failures; therefore, the cost of unnecessary preventive maintenance based on false alarms is very high. 相似文献
978.
HE Shi-ya DENG Yan-hao YU Yang HU Shu-yang GUAN Zheng 《光电子快报》2007,3(3):219-221
In this paper,a two-function light source is recommended. It can both amplify the light power and demodulate the wave-length signal. Its output power is 1000 times as high as traditional broadband light source(BBS) and it can demodulate the signal by scanning wavelength in 30 nm of bandwidth range in the situation of 1550 nm central wavelength. This kind of light source effectively solves the problem of light energy supply in more-point measurement of FBG and simplifies the structure of sensing measurement. 相似文献
979.
宽带PON系统测试、设备进展和应用展望 总被引:1,自引:0,他引:1
宽带正成为国内外运营商战略和业务转型的基础.在国内,宽带已成为拉动固网运营商业务收入增长的主要动力.作为推动宽带业务发展的宽带接入技术正在不断发展和演进,特别是近两年新推出的宽带PON(无源光网络)技术由于带宽高、扩展性好、运维成本低等优点,正成为电信领域的热点.本文就主流宽带PON技术、系统测试、芯片和设备进展进行简要介绍,最后对其应用予以展望. 相似文献
980.
一种低静态电流、高稳定性的LDO线性稳压器 总被引:4,自引:0,他引:4
该文提出了一种低静态电流、高稳定性低压差(LDO)线性稳压器。LDO中的电流偏置电路产生30nA的低温度漂移偏置电流,可使LDO的静态工作电流降低到4A。另外,通过设计一种新型的动态Miller频率补偿结构使得电路的稳定性与输出电流无关,达到了高稳定性的设计要求。芯片设计基于CSMC公司的0.5m CMOS混合信号模型,并通过了流片验证。测试结果表明,该稳压器的线性调整和负载调整的典型值分别为2mV和14mV;输出的最大电流为300mA;其输出压差在150mA输出电流,3.3V输出电压下为170mV;输出噪声在频率从22Hz到80kHz间为150VRMS。 相似文献