首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   14819篇
  免费   1821篇
  国内免费   1614篇
电工技术   635篇
技术理论   1篇
综合类   1516篇
化学工业   162篇
金属工艺   154篇
机械仪表   823篇
建筑科学   280篇
矿业工程   260篇
能源动力   44篇
轻工业   155篇
水利工程   77篇
石油天然气   70篇
武器工业   117篇
无线电   5455篇
一般工业技术   532篇
冶金工业   67篇
原子能技术   21篇
自动化技术   7885篇
  2024年   65篇
  2023年   171篇
  2022年   297篇
  2021年   382篇
  2020年   467篇
  2019年   344篇
  2018年   380篇
  2017年   547篇
  2016年   609篇
  2015年   719篇
  2014年   1318篇
  2013年   1265篇
  2012年   1356篇
  2011年   1376篇
  2010年   1113篇
  2009年   1071篇
  2008年   1126篇
  2007年   1183篇
  2006年   959篇
  2005年   763篇
  2004年   637篇
  2003年   553篇
  2002年   412篇
  2001年   385篇
  2000年   189篇
  1999年   132篇
  1998年   103篇
  1997年   86篇
  1996年   75篇
  1995年   79篇
  1994年   37篇
  1993年   12篇
  1992年   15篇
  1991年   7篇
  1990年   7篇
  1989年   4篇
  1988年   5篇
  1987年   2篇
  1985年   2篇
  1980年   1篇
排序方式: 共有10000条查询结果,搜索用时 109 毫秒
81.
The varying population density leads to imbalanced utilization rate of satellites. To ensure an intelligent engineering of traffic over satellite networks, a distributed routing scheme for single-layered satellite network, load balancing routing protocol based on mobile agent (LBRP-MA) is proposed. For LBRP-MA, mobile agents explore route by migrating autonomously. Upon arriving at destination, mobile agents migrate back. On each intermediate satellite, mobile agents evaluate path cost considering satellite geographical position as well as inter-satellite link (ISL) cost, and finally take ISL congestion index into account to update routing tables. Through simulations on the Courier-like constellation, the proposed approach is shown to achieve guaranteed end-to-end delay bound and decrease packet loss ratio with better throughput, which is especially suitable for data transferring in case of high traffic load. Moreover, results of the complexity analysis demonstrate that LBRP-MA can have low onboard signaling, storage and computation requirements. Furthermore, issues of LBRP-MA such as ISL congestion index and cost modification factor are discussed.  相似文献   
82.
黄浩  申群泰 《电讯技术》2007,47(3):171-173
针对蜂窝移动系统的越区切换,提出了一种基于模糊逻辑的切换判决算法.通过仿真与只以信号强度为指标的传统切换算法进行了性能比较,结果表明:采用多指标判决的模糊逻辑切换算法能够有效降低系统的掉话率和切换数量,提高服务等级.  相似文献   
83.
移动代理在智能电子商务中的建模分析   总被引:1,自引:0,他引:1  
陈向东  宋强 《通信技术》2007,40(6):42-43
从电子商务的概念出发,分析了移动代理技术和智能电子商务的关系,同时提出了使用代理技术的电子商务概念模型;并按照这一概念设计了一个以Aglet为代理平台的网上交易系统的实现模型。  相似文献   
84.
本文主要从运营角度,根据移动通信向数据业务方向发展的特点,结合几种通信技术设备对数据业务支持的差异性,从客户发展、建设成本、支持速度、未来升级等方面,利用理论数据和运营经验,通过对比,得出结论,数据专网+(GSM或3G)双网覆盖,发挥各自长处,会大大提高移动数据业务的品质,促进信息化的大发展,进一步提高工作效率,改善人民生活质量。  相似文献   
85.
杨茂强  鲁璐  杨龙  穆雪 《电子质量》2012,(4):15-18,22
卫星移动通信信道是典型的衰落信道,信道的衰落会降低信号的接收质量,严重时可能导致通信中断。该文针对卫星移动通信在复杂信道条件下的衰落特性,简要介绍了分集接收抗衰落技术、自适应均衡抗衰落技术、编码抗衰落技术等方法,通过分析衰落产生的原理并结合抗衰落技术研究的现状,总结了相应的抗衰落性能。  相似文献   
86.
介绍手机申请CE,FCC和IC认证的需要提供的产品资料,重点阐述认证资料中方框图、电路图、测试报告、充电器报告、产品说明书等应该注意的事项,以帮助手机厂商及相关的从业人员了解认证的具体要求。  相似文献   
87.
Most of the Radio Frequency IDentification (RFID) authentication protocols, proposed to preserve security and privacy, are analysed to show that they can not provide security against some passive or active attacks. In this paper, the security of two matrix-based protocols, proposed by Karthikeyan and Nesterenko (KN protocol) and Ramachandra et al. (RRS protocol) that conform to Electronic Product Code Class-1 Generation-2 (EPC Class-1 Gen-2) standard, are investigated. Using the linear relationship of multiplication of matrix and vector, we point out that both protocols can not provide scalability, and they are vulnerable to passive impersonation attack. In addition, both protocols are totally insecure if the adversary can compromise one tag to extract the secrets. A modified lightweight matrix-based authentication protocol is presented, which can resist mainly common attacks on an RFID authentication system including eavesdropping, relay attack, desynchronization attack, impersonation attack and tag tracking attack. The new protocol also has the desirable scalability property and can keep secure under compromising attack.  相似文献   
88.
Together with an explosive growth of the mobile applications and emerging of cloud computing concept, mobile cloud computing (MCC) has been introduced to be a potential technology for mobile services. MCC integrates the cloud computing into the mobile environment and overcomes obstacles related to the performance (e.g., battery life, storage, and bandwidth), environment (e.g., heterogeneity, scalability, and availability), and security (e.g., reliability and privacy) discussed in mobile computing. This paper gives a survey of MCC, which helps general readers have an overview of the MCC including the definition, architecture, and applications. The issues, existing solutions, and approaches are presented. In addition, the future research directions of MCC are discussed. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   
89.
对于移动网络而言,目前采用永远在线的实现方式对移动网络存在着巨大的影响。为了适应永远在线的移动互联网应用的发展,同时也考虑降低对现有网络的冲击,需要运营商在现有网络上采取相应的措施,使得未来网络能够在减少"心跳"等对网络的破坏性行为的基础上提供按需的永远在线能力。本文旨在阐述一种基于IP PUSH实现移动互联网应用的永远在线方式。  相似文献   
90.
Modern network systems have much trouble in security vulnerabilities such as buffer overflow, bugs in Microsoft Internet, sensor network routing protocol too simple, security flaws of applications, and operating systems. Moreover, wireless devices such as smart phones, personal digital assistants (PDAs), and sensors have become economically feasible because of technological advances in wireless communication and manufacturing of small and low-cost sensors. There are typologies of vulnerabilities to be exploited in these devices. In order to improve securities, many mechanisms are adopted, including authentication, cryptography, access control, and intrusion detection systems (IDS). In general, intrusion detection techniques can be categorized into two groups: misuse detection and anomaly detection. The misuse detection systems use patterns of weB-known attacks or weak spots of the systems to identify intrusions. The weakness of misuse detection systems is unable to detect any future (unknown) intrusion until corresponding attack signatures are intruded into the signature database. Anomaly detection methods try to determine whether the deviation is from the established normal usage patterns or not. The critical success of anomaly detection relies on the model of normal behaviors.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号