全文获取类型
收费全文 | 1523篇 |
免费 | 250篇 |
国内免费 | 154篇 |
专业分类
电工技术 | 24篇 |
综合类 | 154篇 |
化学工业 | 217篇 |
金属工艺 | 13篇 |
机械仪表 | 40篇 |
建筑科学 | 6篇 |
矿业工程 | 20篇 |
能源动力 | 7篇 |
轻工业 | 137篇 |
水利工程 | 5篇 |
石油天然气 | 37篇 |
武器工业 | 9篇 |
无线电 | 567篇 |
一般工业技术 | 148篇 |
冶金工业 | 9篇 |
原子能技术 | 3篇 |
自动化技术 | 531篇 |
出版年
2024年 | 6篇 |
2023年 | 22篇 |
2022年 | 45篇 |
2021年 | 64篇 |
2020年 | 71篇 |
2019年 | 80篇 |
2018年 | 70篇 |
2017年 | 82篇 |
2016年 | 80篇 |
2015年 | 105篇 |
2014年 | 107篇 |
2013年 | 133篇 |
2012年 | 148篇 |
2011年 | 122篇 |
2010年 | 96篇 |
2009年 | 101篇 |
2008年 | 102篇 |
2007年 | 101篇 |
2006年 | 68篇 |
2005年 | 80篇 |
2004年 | 57篇 |
2003年 | 44篇 |
2002年 | 37篇 |
2001年 | 23篇 |
2000年 | 16篇 |
1999年 | 17篇 |
1998年 | 5篇 |
1997年 | 14篇 |
1996年 | 6篇 |
1995年 | 5篇 |
1994年 | 4篇 |
1993年 | 2篇 |
1992年 | 4篇 |
1991年 | 3篇 |
1989年 | 1篇 |
1987年 | 1篇 |
1981年 | 1篇 |
1980年 | 2篇 |
1975年 | 2篇 |
排序方式: 共有1927条查询结果,搜索用时 343 毫秒
31.
Jansi Rani Sella Veluswami 《计算机系统科学与工程》2022,43(3):1231-1239
Most of the internet users connect through wireless networks. Major part of internet traffic is carried by Transmission Control Protocol (TCP). It has some design constraints while operated across wireless networks. TCP is the traditional predominant protocol designed for wired networks. To control congestion in the network, TCP used acknowledgment to delivery of packets by the end host. In wired network, packet loss signals congestion in the network. But rather in wireless networks, loss is mainly because of the wireless characteristics such as fading, signal strength etc. When a packet travels across wired and wireless networks, TCP congestion control theory faces problem during handshake between them. This paper focuses on finding this misinterpretation of the losses using cross layer approach. This paper focuses on increasing bandwidth usage by improving TCP throughput in wireless environments using cross layer approach and hence named the proposed system as CRLTCP. TCP misinterprets wireless loss as congestion loss and unnecessarily reduces congestion window size. Using the signal strength and frame error rate, the type of loss is identified and accordingly the response of TCP is modified. The results show that there is a significant improvement in the throughput of proposed TCP upon which bandwidth usage is increased. 相似文献
32.
Microfluidics: Inertial Microfluidic Cell Stretcher (iMCS): Fully Automated,High‐Throughput,and Near Real‐Time Cell Mechanotyping (Small 28/2017)
下载免费PDF全文
![点击此处可从《Small (Weinheim an der Bergstrasse, Germany)》网站下载免费的PDF全文](/ch/ext_images/free.gif)
33.
Tumor Cell Phenotyping: Circulating Tumor Cell Phenotyping via High‐Throughput Acoustic Separation (Small 32/2018)
下载免费PDF全文
![点击此处可从《Small (Weinheim an der Bergstrasse, Germany)》网站下载免费的PDF全文](/ch/ext_images/free.gif)
34.
Sajjad Ahmad Imran Raza M. Hasan Jamal Sirojiddin Djuraev Soojung Hur Imran Ashraf 《计算机、材料和连续体(英文)》2023,74(2):2363-2377
Vehicle-to-grid technology is an emerging field that allows unused power from Electric Vehicles (EVs) to be used by the smart grid through the central aggregator. Since the central aggregator is connected to the smart grid through a wireless network, it is prone to cyber-attacks that can be detected and mitigated using an intrusion detection system. However, existing intrusion detection systems cannot be used in the vehicle-to-grid network because of the special requirements and characteristics of the vehicle-to-grid network. In this paper, the effect of denial-of-service attacks of malicious electric vehicles on the central aggregator of the vehicle-to-grid network is investigated and an intrusion detection system for the vehicle-to-grid network is proposed. The proposed system, central aggregator–intrusion detection system (CA-IDS), works as a security gateway for EVs to analyze and monitor incoming traffic for possible DoS attacks. EVs are registered with a Central Aggregator (CAG) to exchange authenticated messages, and malicious EVs are added to a blacklist for violating a set of predefined policies to limit their interaction with the CAG. A denial of service (DoS) attack is simulated at CAG in a vehicle-to-grid (V2G) network manipulating various network parameters such as transmission overhead, receiving capacity of destination, average packet size, and channel availability. The proposed system is compared with existing intrusion detection systems using different parameters such as throughput, jitter, and accuracy. The analysis shows that the proposed system has a higher throughput, lower jitter, and higher accuracy as compared to the existing schemes. 相似文献
35.
36.
37.
38.
39.
Mostafa I. SolimanAuthor Vitae Ghada Y. AbozaidAuthor Vitae 《Journal of Parallel and Distributed Computing》2011,71(8):1075-1084
This paper describes the FPGA implementation of FastCrypto, which extends a general-purpose processor with a crypto coprocessor for encrypting/decrypting data. Moreover, it studies the trade-offs between FastCrypto performance and design parameters, including the number of stages per round, the number of parallel Advance Encryption Standard (AES) pipelines, and the size of the queues. Besides, it shows the effect of memory latency on the FastCrypto performance. FastCrypto is implemented with VHDL programming language on Xilinx Virtex V FPGA. A throughput of 222 Gb/s at 444 MHz can be achieved on four parallel AES pipelines. To reduce the power consumption, the frequency of four parallel AES pipelines is reduced to 100 MHz while the other components are running at 400 MHz. In this case, our results show a FastCrypto performance of 61.725 bits per clock cycle (b/cc) when 128-bit single-port L2 cache memory is used. However, increasing the memory bus width to 256-bit or using 128-bit dual-port memory, improves the performance to 112.5 b/cc (45 Gb/s at 400 MHz), which represents 88% of the ideal performance (128 b/cc). 相似文献
40.