全文获取类型
收费全文 | 15597篇 |
免费 | 1867篇 |
国内免费 | 1706篇 |
专业分类
电工技术 | 515篇 |
技术理论 | 4篇 |
综合类 | 956篇 |
化学工业 | 132篇 |
金属工艺 | 70篇 |
机械仪表 | 248篇 |
建筑科学 | 748篇 |
矿业工程 | 103篇 |
能源动力 | 175篇 |
轻工业 | 88篇 |
水利工程 | 118篇 |
石油天然气 | 79篇 |
武器工业 | 54篇 |
无线电 | 2799篇 |
一般工业技术 | 690篇 |
冶金工业 | 152篇 |
原子能技术 | 44篇 |
自动化技术 | 12195篇 |
出版年
2024年 | 130篇 |
2023年 | 412篇 |
2022年 | 515篇 |
2021年 | 715篇 |
2020年 | 786篇 |
2019年 | 547篇 |
2018年 | 594篇 |
2017年 | 803篇 |
2016年 | 1022篇 |
2015年 | 982篇 |
2014年 | 1576篇 |
2013年 | 1339篇 |
2012年 | 1377篇 |
2011年 | 1256篇 |
2010年 | 816篇 |
2009年 | 763篇 |
2008年 | 897篇 |
2007年 | 893篇 |
2006年 | 673篇 |
2005年 | 609篇 |
2004年 | 457篇 |
2003年 | 440篇 |
2002年 | 321篇 |
2001年 | 281篇 |
2000年 | 173篇 |
1999年 | 175篇 |
1998年 | 110篇 |
1997年 | 86篇 |
1996年 | 74篇 |
1995年 | 58篇 |
1994年 | 56篇 |
1993年 | 29篇 |
1992年 | 42篇 |
1991年 | 22篇 |
1990年 | 17篇 |
1989年 | 17篇 |
1988年 | 13篇 |
1987年 | 10篇 |
1986年 | 11篇 |
1985年 | 8篇 |
1984年 | 8篇 |
1983年 | 6篇 |
1979年 | 3篇 |
1977年 | 5篇 |
1976年 | 3篇 |
1972年 | 3篇 |
1968年 | 3篇 |
1965年 | 3篇 |
1962年 | 4篇 |
1954年 | 3篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
121.
122.
Nan Zhang Xiaolong Yang Min Zhang Yan Sun Keping Long 《International Journal of Communication Systems》2018,31(1)
With the rapid development of cloud computing, the number of cloud users is growing exponentially. Data centers have come under great pressure, and the problem of power consumption has become increasingly prominent. However, many idle resources that are geographically distributed in the network can be used as resource providers for cloud tasks. These distributed resources may not be able to support the resource‐intensive applications alone because of their limited capacity; however, the capacity will be considerably increased if they can cooperate with each other and share resources. Therefore, in this paper, a new resource‐providing model called “crowd‐funding” is proposed. In the crowd‐funding model, idle resources can be collected to form a virtual resource pool for providing cloud services. Based on this model, a new task scheduling algorithm is proposed, RC‐GA (genetic algorithm for task scheduling based on a resource crowd‐funding model). For crowd‐funding, the resources come from different heterogeneous devices, so the resource stability should be considered different. The scheduling targets of the RC‐GA are designed to increase the stability of task execution and reduce power consumption at the same time. In addition, to reduce random errors in the evolution process, the roulette wheel selection operator of the genetic algorithm is improved. The experiment shows that the RC‐GA can achieve good results. 相似文献
123.
Azeem Irshad Shehzad Ashraf Chaudhry Muhammad Shafiq Muhammad Usman Muhammad Asif Anwar Ghani 《International Journal of Communication Systems》2019,32(14)
The mobile cloud computing (MCC) has enriched the quality of services that the clients access from remote cloud‐based servers. The growth in the number of wireless users for MCC has further augmented the requirement for a robust and efficient authenticated key agreement mechanism. Formerly, the users would access cloud services from various cloud‐based service providers and authenticate one another only after communicating with the trusted third party (TTP). This requirement for the clients to access the TTP during each mutual authentication session, in earlier schemes, contributes to the redundant latency overheads for the protocol. Recently, Tsai et al have presented a bilinear pairing based multi‐server authentication (MSA) protocol, to bypass the TTP, at least during mutual authentication. The scheme construction works fine, as far as the elimination of TTP involvement for authentication has been concerned. However, Tsai et al scheme has been found vulnerable to server spoofing attack and desynchronization attack, and lacks smart card‐based user verification, which renders the protocol inapt for practical implementation in different access networks. Hence, we have proposed an improved model designed with bilinear pairing operations, countering the identified threats as posed to Tsai scheme. Additionally, the proposed scheme is backed up by performance evaluation and formal security analysis. 相似文献
124.
125.
126.
The mobile ad hoc network (MANET) has recently been recognized as an attractive network architecture for wireless communication. Reliable broadcast is an important operation in MANET (e.g., giving orders, searching routes, and notifying important signals). However, using a naive flooding to achieve reliable broadcasting may be very costly, causing a lot of contention, collision, and congestion, to which we refer as the broadcast storm problem. This paper proposes an efficient reliable broadcasting protocol by taking care of the potential broadcast storm problem that could occur in the medium-access level. Existing protocols are either unreliable, or reliable but based on a too costly approach. Our protocol differs from existing protocols by adopting a low-cost broadcast, which does not guarantee reliability, as a basic operation. The reliability is ensured by additional acknowledgement and handshaking. Simulation results do justify the efficiency of the proposed protocol. 相似文献
127.
Javier Hormigo Julio Villalba Emilio L. Zapata 《The Journal of VLSI Signal Processing》2004,37(1):21-39
In this paper we present a specific CORDIC processor for variable-precision coordinates. This system allows us to specify the precision to perform the CORDIC operation, and control the accuracy of the result, in such a way that re-computation of inaccurate results can be carried out with higher precision. It permits a reliable and accurate evaluation of a wide range of elementary functions. The specific architecture designed greatly improves the computational time of previous solutions based on classic polynomial approximation. For controlling error in numerical computation (where intervals are normally narrow) the proposed design performs an interval operation in a time close to that of a point operation. 相似文献
128.
Trust for Ubiquitous,Transparent Collaboration 总被引:1,自引:0,他引:1
In this paper, trust-based recommendations control the exchange of personal information between handheld computers. Combined with explicit risk analysis, this enables unobtrusive information exchange, while limiting access to confidential information. The same model can be applied to a wide range of mobile computing tasks, such as managing personal address books and electronic diaries, to automatically provide an appropriate level of security. Recommendations add structure to the information, by associating categories with data and with each other, with degrees of trust belief and disbelief. Since categories also in turn confer privileges and restrict actions, they are analogous to rôles in a Rôle-Based Access Control system, while principals represent their trust policies in recommendations. Participants first compute their trust in information, by combining their own trust assumptions with others' policies. Recommendations are thus linked together to compute a considered, local trust assessment. Actions are then moderated by a risk assessment, which weighs up costs and benefits, including the cost of the user's time, before deciding whether to allow or forbid the information exchange, or ask for help. By unifying trust assessments and access control, participants can take calculated risks to automatically yet safely share their personal information. 相似文献
129.
130.