全文获取类型
收费全文 | 9988篇 |
免费 | 874篇 |
国内免费 | 452篇 |
专业分类
电工技术 | 1137篇 |
综合类 | 968篇 |
化学工业 | 439篇 |
金属工艺 | 171篇 |
机械仪表 | 465篇 |
建筑科学 | 1891篇 |
矿业工程 | 419篇 |
能源动力 | 310篇 |
轻工业 | 121篇 |
水利工程 | 878篇 |
石油天然气 | 315篇 |
武器工业 | 118篇 |
无线电 | 985篇 |
一般工业技术 | 564篇 |
冶金工业 | 257篇 |
原子能技术 | 78篇 |
自动化技术 | 2198篇 |
出版年
2024年 | 29篇 |
2023年 | 77篇 |
2022年 | 158篇 |
2021年 | 197篇 |
2020年 | 253篇 |
2019年 | 196篇 |
2018年 | 216篇 |
2017年 | 259篇 |
2016年 | 287篇 |
2015年 | 341篇 |
2014年 | 765篇 |
2013年 | 545篇 |
2012年 | 897篇 |
2011年 | 871篇 |
2010年 | 647篇 |
2009年 | 693篇 |
2008年 | 643篇 |
2007年 | 777篇 |
2006年 | 622篇 |
2005年 | 532篇 |
2004年 | 436篇 |
2003年 | 412篇 |
2002年 | 325篇 |
2001年 | 253篇 |
2000年 | 196篇 |
1999年 | 146篇 |
1998年 | 106篇 |
1997年 | 89篇 |
1996年 | 69篇 |
1995年 | 63篇 |
1994年 | 42篇 |
1993年 | 38篇 |
1992年 | 30篇 |
1991年 | 16篇 |
1990年 | 18篇 |
1989年 | 16篇 |
1988年 | 10篇 |
1987年 | 5篇 |
1986年 | 5篇 |
1985年 | 7篇 |
1984年 | 5篇 |
1982年 | 3篇 |
1981年 | 5篇 |
1980年 | 4篇 |
1979年 | 3篇 |
1978年 | 2篇 |
1974年 | 1篇 |
1965年 | 1篇 |
1964年 | 1篇 |
1959年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
51.
Leila Benarous Benamar Kadri Salim Bitam Abdelhamid Mellouk 《International Journal of Communication Systems》2020,33(10)
Privacy in Vehicular Ad Hoc Networks (VANET) is fundamental because the user's safety may be threatened by the identity and the real‐time spatiotemporal data exchanged on the network. This issue is commonly addressed by the use of certified temporal pseudonyms and their updating strategies to ensure the user's unlinkability and anonymity. IEEE 1609.2 Standard specified the process of certifying pseudonym along with certificates structure. However, the communication procedure between the certifying authority and the requesting vehicle was not defined. In this paper, a new privacy‐preserving solution for pseudonym on‐road on‐demand refilling is proposed where the vehicle anonymously authenticates itself to the regional authority subsidiary of the central trusted authority to request a new pseudonyms pool. The authentication method has two phases, the first one uses anonymous tickets, and the second one is a challenge‐based authentication. The anonymous tickets are certificates that do not include the identity of the user. Instead, it contains a reference number and the certifying authority signature. The challenge authentication is identity‐less to preserve the privacy, yet it is used to prevent the misuse of tickets and the impersonation of its owner. Our proposed scheme is analyzed by the use of Burrows, Abadi and Needham (BAN) logic to demonstrate its correctness. It is also specified and checked by using the Security Protocol ANimator (SPAN) and the Automated Validation of Internet Security Protocols and Applications (AVISPA) tools. The logical demonstration proved that this privacy‐preserving authentication is assured. The SPAN and AVISPA tools illustrated that it is resilient to security attacks. 相似文献
52.
为了实现对湿法烟气脱硫控制的需求,本文提出了石灰石-石膏湿法烟气脱硫系统设计方案。主要从控制方式设计、控制系统硬件配置、I/O清单设计、自动调节系统设计、增压风机联锁保护条件的设计、重要顺控设计、重要仪表的选型和设计等方面进行阐述,以实现湿法烟气脱硫的自动化控制。 相似文献
53.
54.
A lightweight authentication scheme based on self‐updating strategy for space information network 下载免费PDF全文
Yuchen Liu Aixin Zhang Shenghong Li Junhua Tang Jianhua Li 《International Journal of Satellite Communications and Networking》2017,35(3):231-248
The security of space information network (SIN) is getting more and more important now. Because of the special features of SIN (e.g., the dynamic and unstable topology, the highly exposed links, the restricted computation power, the flexible networking methods, and so on), the security protocol for SIN should have a balance between security properties and computation/storage overhead. Although a lot of security protocols have been proposed recently, few can provide overall attacks resistance power with low computation and storage cost. To solve this problem, in this paper we propose a lightweight authentication scheme for space information network. It is mainly based on the self‐updating strategy for user's temporary identity. The scheme consists of two phases, namely, the registration phase and the authentication phase. All the computing operations involved are just hash function (h), the bit‐wise exclusive‐or operation (⊕), and the string concatenation operation (||), which are of low computation cost. The security properties discussion and the attacks–resistance power analysis show that the proposed authentication scheme can defend against various typical attacks, especially denial of service attacks. It is sufficiently secure with the lowest computation and storage costs. Furthermore, the formal security proof in SVO logic also demonstrates that the scheme can satisfy the security goals very well. Copyright © 2016 John Wiley & Sons, Ltd. 相似文献
55.
低轨星座卫星通信系统中多业务条件下的非充分保证切换策略 总被引:1,自引:0,他引:1
该文提出了一种适用于低轨星座卫星通信系统多业务条件下的非充分保证切换策略。该策略在小于一个小区最大驻留时间的时间间隔内为到达小区的呼叫安排和预定信道,在呼叫结束环节作为补充策略对存在切换失败风险的信道进行调整。提出了策略在多业务条件下具体的实施方法,根据实时的切换呼叫性能调整策略的非充分程度。通过仿真,分析比较了不同程度非充分保证切换策略的QoS性能,验证了动态自适应调整非充分程度值的IGH策略的有效性。仿真结果表明,相对于保证切换策略,新策略以存在微小切换失败概率为代价,换取了新呼叫阻塞概率的显著降低,是一种适用于多业务低轨卫星通信系统的信道分配策略。 相似文献
56.
图像处理中扩散方程的快速数值解法 总被引:1,自引:1,他引:1
该文给出图像处理中常用的二阶非线性扩散方程的快速求解算法。首先提出一种线性差分离散格式,既包含了显格式,也包含了隐格式;其次给出了数值稳定性条件,最后讨论了3种快速解法:多重网格法(MG),交替方向隐格式(ADI),和加性算子分离格式(AOS)。对3种方法进行了比较和评价,结果表明:用3种方法得到的去噪效果基本相同;ADI和AOS实现较简单;多重网格法得到的恢复图像在光滑区域视觉上优于两种直接法。 相似文献
57.
Dimitrios N. Skoutas Saied M. Abd El-atty Angelos N. Rouskas 《International Journal of Wireless Information Networks》2008,15(2):98-104
A key performance indicator of mobile wireless networks is failure probability of handover calls. In this paper, we propose
a Call Admission Control policy which prioritizes handover calls over new calls in WCDMA systems. The OVSF code occupancy
of the system is modeled by a Markov chain and the differentiation between handover and new calls is performed at the code
level by introducing a “guard code” scheme. The scheme belongs to the well-known family of guard channel schemes and reserves
some code capacity to favor the continuation of handover calls over the new calls. As the management of the general case is
intractable, we solve certain numerical instances of the problem and manage to calculate several performance metrics like
new call blocking and handover failure probabilities and code utilization. We complete our study with simulation results in
the case of higher OVSF code tree capacity.
相似文献
Angelos N. RouskasEmail: |
58.
59.
小波提升算法是一种新的双正交小波构造方法,通过预测算子,确定高频信息,并初步确定低频信息,然后通过更新算子,对初步确定的低频信息进行修正,从而确定低频信息。它在空域对信号进行变换,完成了对信号频域的分析。在图像处理中,基于离散小波变换的提升算法比传统的卷积算法运算简单,实时性好,易于实现,因而被新一代图像压缩标准JPEG2000所采用。文中简要介绍了小波提升算法的原理,分析了其特点,并介绍了JPEG2000标准中采用的W5/3、D9/7两种小波的提升格式和实现算法。 相似文献
60.