全文获取类型
收费全文 | 14819篇 |
免费 | 1821篇 |
国内免费 | 1614篇 |
专业分类
电工技术 | 635篇 |
技术理论 | 1篇 |
综合类 | 1516篇 |
化学工业 | 162篇 |
金属工艺 | 154篇 |
机械仪表 | 823篇 |
建筑科学 | 280篇 |
矿业工程 | 260篇 |
能源动力 | 44篇 |
轻工业 | 155篇 |
水利工程 | 77篇 |
石油天然气 | 70篇 |
武器工业 | 117篇 |
无线电 | 5455篇 |
一般工业技术 | 532篇 |
冶金工业 | 67篇 |
原子能技术 | 21篇 |
自动化技术 | 7885篇 |
出版年
2024年 | 65篇 |
2023年 | 171篇 |
2022年 | 297篇 |
2021年 | 382篇 |
2020年 | 467篇 |
2019年 | 344篇 |
2018年 | 380篇 |
2017年 | 547篇 |
2016年 | 609篇 |
2015年 | 719篇 |
2014年 | 1318篇 |
2013年 | 1265篇 |
2012年 | 1356篇 |
2011年 | 1376篇 |
2010年 | 1113篇 |
2009年 | 1071篇 |
2008年 | 1126篇 |
2007年 | 1183篇 |
2006年 | 959篇 |
2005年 | 763篇 |
2004年 | 637篇 |
2003年 | 553篇 |
2002年 | 412篇 |
2001年 | 385篇 |
2000年 | 189篇 |
1999年 | 132篇 |
1998年 | 103篇 |
1997年 | 86篇 |
1996年 | 75篇 |
1995年 | 79篇 |
1994年 | 37篇 |
1993年 | 12篇 |
1992年 | 15篇 |
1991年 | 7篇 |
1990年 | 7篇 |
1989年 | 4篇 |
1988年 | 5篇 |
1987年 | 2篇 |
1985年 | 2篇 |
1980年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 109 毫秒
81.
The varying population density leads to imbalanced utilization rate of satellites. To ensure an intelligent engineering of traffic over satellite networks, a distributed routing scheme for single-layered satellite network, load balancing routing protocol based on mobile agent (LBRP-MA) is proposed. For LBRP-MA, mobile agents explore route by migrating autonomously. Upon arriving at destination, mobile agents migrate back. On each intermediate satellite, mobile agents evaluate path cost considering satellite geographical position as well as inter-satellite link (ISL) cost, and finally take ISL congestion index into account to update routing tables. Through simulations on the Courier-like constellation, the proposed approach is shown to achieve guaranteed end-to-end delay bound and decrease packet loss ratio with better throughput, which is especially suitable for data transferring in case of high traffic load. Moreover, results of the complexity analysis demonstrate that LBRP-MA can have low onboard signaling, storage and computation requirements. Furthermore, issues of LBRP-MA such as ISL congestion index and cost modification factor are discussed. 相似文献
82.
针对蜂窝移动系统的越区切换,提出了一种基于模糊逻辑的切换判决算法.通过仿真与只以信号强度为指标的传统切换算法进行了性能比较,结果表明:采用多指标判决的模糊逻辑切换算法能够有效降低系统的掉话率和切换数量,提高服务等级. 相似文献
83.
移动代理在智能电子商务中的建模分析 总被引:1,自引:0,他引:1
从电子商务的概念出发,分析了移动代理技术和智能电子商务的关系,同时提出了使用代理技术的电子商务概念模型;并按照这一概念设计了一个以Aglet为代理平台的网上交易系统的实现模型。 相似文献
84.
吴俊岭 《电信工程技术与标准化》2008,21(4):8-13
本文主要从运营角度,根据移动通信向数据业务方向发展的特点,结合几种通信技术设备对数据业务支持的差异性,从客户发展、建设成本、支持速度、未来升级等方面,利用理论数据和运营经验,通过对比,得出结论,数据专网+(GSM或3G)双网覆盖,发挥各自长处,会大大提高移动数据业务的品质,促进信息化的大发展,进一步提高工作效率,改善人民生活质量。 相似文献
85.
86.
介绍手机申请CE,FCC和IC认证的需要提供的产品资料,重点阐述认证资料中方框图、电路图、测试报告、充电器报告、产品说明书等应该注意的事项,以帮助手机厂商及相关的从业人员了解认证的具体要求。 相似文献
87.
Most of the Radio Frequency IDentification (RFID) authentication protocols, proposed to preserve security and privacy, are analysed to show that they can not provide security against some passive or active attacks. In this paper, the security of two matrix-based protocols, proposed by Karthikeyan and Nesterenko (KN protocol) and Ramachandra et al. (RRS protocol) that conform to Electronic Product Code Class-1 Generation-2 (EPC Class-1 Gen-2) standard, are investigated. Using the linear relationship of multiplication of matrix and vector, we point out that both protocols can not provide scalability, and they are vulnerable to passive impersonation attack. In addition, both protocols are totally insecure if the adversary can compromise one tag to extract the secrets. A modified lightweight matrix-based authentication protocol is presented, which can resist mainly common attacks on an RFID authentication system including eavesdropping, relay attack, desynchronization attack, impersonation attack and tag tracking attack. The new protocol also has the desirable scalability property and can keep secure under compromising attack. 相似文献
88.
Hoang T. Dinh Chonho Lee Dusit Niyato Ping Wang 《Wireless Communications and Mobile Computing》2013,13(18):1587-1611
Together with an explosive growth of the mobile applications and emerging of cloud computing concept, mobile cloud computing (MCC) has been introduced to be a potential technology for mobile services. MCC integrates the cloud computing into the mobile environment and overcomes obstacles related to the performance (e.g., battery life, storage, and bandwidth), environment (e.g., heterogeneity, scalability, and availability), and security (e.g., reliability and privacy) discussed in mobile computing. This paper gives a survey of MCC, which helps general readers have an overview of the MCC including the definition, architecture, and applications. The issues, existing solutions, and approaches are presented. In addition, the future research directions of MCC are discussed. Copyright © 2011 John Wiley & Sons, Ltd. 相似文献
89.
对于移动网络而言,目前采用永远在线的实现方式对移动网络存在着巨大的影响。为了适应永远在线的移动互联网应用的发展,同时也考虑降低对现有网络的冲击,需要运营商在现有网络上采取相应的措施,使得未来网络能够在减少"心跳"等对网络的破坏性行为的基础上提供按需的永远在线能力。本文旨在阐述一种基于IP PUSH实现移动互联网应用的永远在线方式。 相似文献
90.
Modern network systems have much trouble in security vulnerabilities such as buffer overflow, bugs in Microsoft Internet, sensor network routing protocol too simple, security flaws of applications, and operating systems. Moreover, wireless devices such as smart phones, personal digital assistants (PDAs), and sensors have become economically feasible because of technological advances in wireless communication and manufacturing of small and low-cost sensors. There are typologies of vulnerabilities to be exploited in these devices. In order to improve securities, many mechanisms are adopted, including authentication, cryptography, access control, and intrusion detection systems (IDS). In general, intrusion detection techniques can be categorized into two groups: misuse detection and anomaly detection. The misuse detection systems use patterns of weB-known attacks or weak spots of the systems to identify intrusions. The weakness of misuse detection systems is unable to detect any future (unknown) intrusion until corresponding attack signatures are intruded into the signature database. Anomaly detection methods try to determine whether the deviation is from the established normal usage patterns or not. The critical success of anomaly detection relies on the model of normal behaviors. 相似文献