全文获取类型
收费全文 | 1904篇 |
免费 | 73篇 |
国内免费 | 10篇 |
专业分类
电工技术 | 22篇 |
综合类 | 3篇 |
化学工业 | 378篇 |
金属工艺 | 68篇 |
机械仪表 | 30篇 |
建筑科学 | 26篇 |
矿业工程 | 4篇 |
能源动力 | 44篇 |
轻工业 | 63篇 |
水利工程 | 5篇 |
石油天然气 | 5篇 |
无线电 | 291篇 |
一般工业技术 | 513篇 |
冶金工业 | 229篇 |
原子能技术 | 15篇 |
自动化技术 | 291篇 |
出版年
2023年 | 31篇 |
2022年 | 37篇 |
2021年 | 53篇 |
2020年 | 50篇 |
2019年 | 52篇 |
2018年 | 60篇 |
2017年 | 67篇 |
2016年 | 70篇 |
2015年 | 46篇 |
2014年 | 73篇 |
2013年 | 109篇 |
2012年 | 75篇 |
2011年 | 78篇 |
2010年 | 67篇 |
2009年 | 73篇 |
2008年 | 63篇 |
2007年 | 67篇 |
2006年 | 50篇 |
2005年 | 33篇 |
2004年 | 43篇 |
2003年 | 54篇 |
2002年 | 45篇 |
2001年 | 29篇 |
2000年 | 32篇 |
1999年 | 32篇 |
1998年 | 55篇 |
1997年 | 33篇 |
1996年 | 45篇 |
1995年 | 32篇 |
1994年 | 42篇 |
1993年 | 30篇 |
1992年 | 26篇 |
1991年 | 21篇 |
1990年 | 23篇 |
1989年 | 15篇 |
1988年 | 22篇 |
1987年 | 22篇 |
1986年 | 22篇 |
1985年 | 26篇 |
1984年 | 22篇 |
1983年 | 17篇 |
1982年 | 11篇 |
1981年 | 14篇 |
1980年 | 13篇 |
1979年 | 12篇 |
1978年 | 17篇 |
1977年 | 20篇 |
1976年 | 10篇 |
1973年 | 7篇 |
1968年 | 6篇 |
排序方式: 共有1987条查询结果,搜索用时 15 毫秒
41.
Survivable WDM mesh networks 总被引:9,自引:0,他引:9
In a wavelength-division-multiplexing (WDM) optical network, the failure of network elements (e.g., fiber links and cross connects) may cause the failure of several optical channels, thereby leading to large data losses. This study examines different approaches to protect a mesh-based WDM optical network from such failures. These approaches are based on two survivability paradigms: 1) path protection/restoration and 2) link protection/restoration. The study examines the wavelength capacity requirements, and routing and wavelength assignment of primary and backup paths for path and link protection and proposes distributed protocols for path and link restoration. The study also examines the protection-switching time and the restoration time for each of these schemes, and the susceptibility of these schemes to multiple link failures. The numerical results obtained for a representative network topology with random traffic demands demonstrate that there is a tradeoff between the capacity utilization and the susceptibility to multiple link failures. We find that, on one hand, path protection provides significant capacity savings over link protection, and shared protection provides significant savings over dedicated protection; while on the other hand, path protection is more susceptible to multiple link failures than link protection, and shared protection is more susceptible to multiple link failures than dedicated protection. We formulate a model of protection-switching times for the different protection schemes based on a fully distributed control network. We propose distributed control protocols for path and link restoration. Numerical results obtained by simulating these protocols indicate that, for a representative network topology, path restoration has a better restoration efficiency than link restoration, and link restoration has a faster restoration time compared with path restoration. 相似文献
42.
WDM optical communication networks: progress and challenges 总被引:25,自引:0,他引:25
While optical-transmission techniques have been researched for quite some time, optical "networking" studies have been conducted only over the past dozen years or so. The field has matured enormously over this time: many papers and Ph.D. dissertations have been produced, a number of prototypes and testbeds have been built, several books have been written, a large number of startups have been formed, and optical WDM technology is being deployed in the marketplace at a very rapid rate. The objective of this paper is to summarize the basic optical networking approaches, report on the WDM deployment strategies of two major US carriers, and outline the current research and development trends on WDM optical networks. 相似文献
43.
We present a graph-theoretic interpretation of convergence of fractal encoding based on partial iterated function system (PIFS). First we have considered a special circumstance, where no spatial contraction has been allowed in the encoding process. The concept leads to the development of a linear time fast decoding algorithm from the compressed image. This concept is extended for the general scheme of fractal compression allowing spatial contraction (on averaging) from larger domains to smaller ranges. A linear time fast decoding algorithm is also proposed in this situation, which produces a decoded image very close to the result obtained by an ordinary iterative decompression algorithm. 相似文献
44.
Ivan Damgård Sebastian Faust Pratyay Mukherjee Daniele Venturi 《Journal of Cryptology》2017,30(1):152-190
Related key attacks (RKAs) are powerful cryptanalytic attacks where an adversary can change the secret key and observe the effect of such changes at the output. The state of the art in RKA security protects against an a-priori unbounded number of certain algebraic induced key relations, e.g., affine functions or polynomials of bounded degree. In this work, we show that it is possible to go beyond the algebraic barrier and achieve security against arbitrary key relations, by restricting the number of tampering queries the adversary is allowed to ask for. The latter restriction is necessary in case of arbitrary key relations, as otherwise a generic attack of Gennaro et al. (TCC 2004) shows how to recover the key of almost any cryptographic primitive. We describe our contributions in more detail below. (1) We show that standard ID and signature schemes constructed from a large class of \(\Sigma \)-protocols (including the Okamoto scheme, for instance) are secure even if the adversary can arbitrarily tamper with the prover’s state a bounded number of times and obtain some bounded amount of leakage. Interestingly, for the Okamoto scheme we can allow also independent tampering with the public parameters. (2) We show a bounded tamper and leakage resilient CCA-secure public key cryptosystem based on the DDH assumption. We first define a weaker CCA-like security notion that we can instantiate based on DDH, and then we give a general compiler that yields CCA security with tamper and leakage resilience. This requires a public tamper-proof common reference string. (3) Finally, we explain how to boost bounded tampering and leakage resilience [as in (1) and (2) above] to continuous tampering and leakage resilience, in the so-called floppy model where each user has a personal hardware token (containing leak- and tamper-free information) which can be used to refresh the secret key. We believe that bounded tampering is a meaningful and interesting alternative to avoid known impossibility results and can provide important insights into the security of existing standard cryptographic schemes. 相似文献
45.
Fabrication of microrods from multi-quantum well (MQW) PbSe–PbSrSe structure grown in molecular beam epitaxy (MBE) followed by its morphological as well as optical characterizations are described. Pulsed PL intensity is increased by 64 times per unit surface area from a free-standing MQW microrod mounted on copper heat sink compared with the bulk sample. Enhancement in side emission power due to the higher optical confinement effect during pulsed photoluminescence (PL) from MQW semiconductor microtube inserted in hollow quartz optical fiber signifies that these microstructures are robust in nature and crucial contenders for portable mid-infrared optoelectronic devices to be used in the field of industrial trace-gas sensing. 相似文献
46.
Suman Mukherjee John Federici Paulo Lopes Miguel Cabral 《Journal of Infrared, Millimeter and Terahertz Waves》2013,34(9):539-555
For the past few decades there has been tremendous innovation and development of Terahertz (THz) science and imaging. In particular, the technique of 3-D computed tomography has been adapted from the X-Ray to the THz range. However, the finite refractive index of materials in the THz range can severally refract probing THz beams during the acquisition of tomography data. Due to Fresnel reflection power losses at the boundaries as well as steering of the THz beam through the sample, refractive effects lead to anomalously high local attenuation coefficients near the material boundaries of a reconstructed image. These boundary phenomena can dominate the reconstructed THz-CT images making it difficult to distinguish structural defect(s) inside the material. In this paper an algorithm has been developed to remove the effects of refraction in THz-CT reconstructed images. The algorithm is successfully implemented on cylindrical shaped objects. 相似文献
47.
In this paper we review THz radiation properties, generation methods, and antenna configurations. This paper suggests some new class of antennas that can be used at THz frequency, like optical antennas or Carbon nanotube antennas. THz technology has become attractive due to the low energy content and nonionizing nature of the signal. This property makes them suitable for imaging and sensing applications. But at the same time detection and generation of THz signals has been technologically challenging. This paper presents a comparative study of the generation techniques for THz frequency signals giving emphasis to the some new techniques like Quantum Cascade lasers which has created significant research interest. The main aim for this study is to find out the materials suitable for fabricating THz devices and antennas, a suitable method for generation of high power at THz frequency and an antenna that will make THz communication possible. 相似文献
48.
We consider a new heuristic method for design of survivable wavelength-division multiplexing (WDM) networks with preconfigured protection cycles (p-cycles). Numerical studies show that the new heuristic works well for different traffic patterns, and the spare capacity obtained by the new heuristic is very close to that of the optimal solution but with much reduced computational time. 相似文献
49.
Shayanti Mukherjee Jayarama Reddy Venugopal Rajeswari Ravichandran Seeram Ramakrishna Michael Raghunath 《Advanced functional materials》2011,21(12):2291-2300
Pioneering research suggests various modes of cellular therapeutics and biomaterial strategies for myocardial tissue engineering. Despite several advantages, such as safety and improved function, the dynamic myocardial microenvironment prevents peripherally or locally administered therapeutic cells from homing and integrating of biomaterial constructs with the infarcted heart. The myocardial microenvironment is highly sensitive due to the nanoscale cues that it exerts to control bioactivities, such as cell migration, proliferation, differentiation, and angiogenesis. Nanoscale control of cardiac function has not been extensively analyzed in the field of myocardial tissue engineering. Inspired by microscopic analysis of the ventricular organization in native tissue, a scalable in‐vitro model of nanoscale poly(L ‐lactic acid)‐co ‐poly(? ‐caprolactone)/collagen biocomposite scaffold is fabricated, with nanofibers in the order of 594 ± 56 nm to mimic the native myocardial environment for freshly isolated cardiomyocytes from rabbit heart, and the specifically underlying extracellular matrix architecture: this is done to address the specificity of the underlying matrix in overcoming challenges faced by cellular therapeutics. Guided by nanoscale mechanical cues provided by the underlying random nanofibrous scaffold, the tissue constructs display anisotropic rearrangement of cells, characteristic of the native cardiac tissue. Surprisingly, cell morphology, growth, and expression of an interactive healthy cardiac cell population are exquisitely sensitive to differences in the composition of nanoscale scaffolds. It is shown that suitable cell–material interactions on the nanoscale can stipulate organization on the tissue level and yield novel insights into cell therapeutic science, while providing materials for tissue regeneration. 相似文献
50.
The hybrid wireless-optical broadband-access network (WOBAN) is a promising architecture for future access networks. Recently, the wireless part of WOBAN has been gaining increasing attention, and early versions are being deployed as municipal access solutions to eliminate the wired drop to every wireless router at customer premises. This architecture saves on network deployment cost because the fiber need not penetrate each end-user, and it extends the reach of emerging optical-access solutions, such as passive optical networks. This paper first presents an architecture and a vision for the WOBAN and articulates why the combination of wireless and optical presents a compelling solution that optimizes the best of both worlds. While this discussion briefly touches upon the business drivers, the main arguments are based on technical and deployment considerations. Consequently, the rest of this paper reviews a variety of relevant research challenges, namely, network setup, network connectivity, and fault-tolerant behavior of the WOBAN. In the network setup, we review the design of a WOBAN where the back end is a wired optical network, the front end is managed by a wireless connectivity, and, in between, the tail ends of the optical part [known as optical network unit (ONU)] communicate directly with wireless base stations (known as ldquogateway routersrdquo). We outline algorithms to optimize the placement of ONUs in a WOBAN and report on a survey that we conducted on the distribution and types of wireless routers in the Wildhorse residential neighborhood of North Davis, CA. Then, we examine the WOBAN's routing properties (network connectivity), discuss the pros and cons of various routing algorithms, and summarize the idea behind fault-tolerant design of such hybrid networks. 相似文献