全文获取类型
收费全文 | 25437篇 |
免费 | 3231篇 |
国内免费 | 2725篇 |
专业分类
电工技术 | 720篇 |
综合类 | 2488篇 |
化学工业 | 377篇 |
金属工艺 | 179篇 |
机械仪表 | 948篇 |
建筑科学 | 7573篇 |
矿业工程 | 1247篇 |
能源动力 | 313篇 |
轻工业 | 128篇 |
水利工程 | 1968篇 |
石油天然气 | 67篇 |
武器工业 | 196篇 |
无线电 | 2046篇 |
一般工业技术 | 1184篇 |
冶金工业 | 228篇 |
原子能技术 | 38篇 |
自动化技术 | 11693篇 |
出版年
2024年 | 188篇 |
2023年 | 254篇 |
2022年 | 528篇 |
2021年 | 616篇 |
2020年 | 624篇 |
2019年 | 451篇 |
2018年 | 409篇 |
2017年 | 683篇 |
2016年 | 687篇 |
2015年 | 789篇 |
2014年 | 1589篇 |
2013年 | 1374篇 |
2012年 | 2087篇 |
2011年 | 2306篇 |
2010年 | 2106篇 |
2009年 | 2227篇 |
2008年 | 2303篇 |
2007年 | 2538篇 |
2006年 | 2205篇 |
2005年 | 1768篇 |
2004年 | 1498篇 |
2003年 | 1188篇 |
2002年 | 846篇 |
2001年 | 654篇 |
2000年 | 509篇 |
1999年 | 321篇 |
1998年 | 166篇 |
1997年 | 92篇 |
1996年 | 91篇 |
1995年 | 50篇 |
1994年 | 52篇 |
1993年 | 41篇 |
1992年 | 27篇 |
1991年 | 22篇 |
1990年 | 14篇 |
1989年 | 18篇 |
1988年 | 8篇 |
1987年 | 5篇 |
1986年 | 3篇 |
1985年 | 6篇 |
1984年 | 12篇 |
1983年 | 1篇 |
1982年 | 3篇 |
1981年 | 2篇 |
1980年 | 6篇 |
1979年 | 25篇 |
1978年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
121.
Chen‐Xu Liu Yun Liu Zhen‐Jiang Zhang Zi‐Yao Cheng 《International Journal of Communication Systems》2013,26(3):380-394
An efficient data process technology is needed for wireless sensor networks composed of many sensors with constrained communication, computational, and memory resources. Data aggregation is presented as an efficient and significant method to reduce transmitted data and prolong lifetime for wireless sensor networks. Meanwhile, many applications require preserving privacy for secure data aggregation. In this paper, we propose a high energy‐efficient and privacy‐preserving scheme for secure data aggregation. Because of the importance of communication overhead and accuracy, our scheme achieves less communication overhead and higher data accuracy besides providing for privacy preservation. For extensive simulations, we evaluate and conclude the performance of our high energy‐efficient and privacy‐preserving scheme. The conclusion shows that the high energy‐efficient and privacy‐preserving scheme provides better privacy preservation and is more efficient than existing schemes. Copyright © 2012 John Wiley & Sons, Ltd. 相似文献
122.
123.
为了验证极限状态法在隧道衬砌设计中的可操作性,分别采用极限状态法和破损阶段法对铁路隧道衬砌进行了试设计,并对比分析了两种方法的试设计结果。研究结果表明:(1)当衬砌为素混凝土结构时,极限状态法的计算厚度均比破损阶段法计算厚度大,最大相差20 cm,需对极限状态法抗裂验算公式中的调整系数γd重新校核,校核后γd=1.55;(2)针对钢筋混凝土衬砌结构及明洞结构,极限状态法的设计结果与破损阶段法设计结果基本相同,钢筋混凝土结构的极限状态方程中相关分项系数及调整系数取值是合理的。(3)采用极限状态法(γd=1.55)与破损阶段法试设计工程投资相当,极限状态法较破损阶段法工程投资增加237万元,增加1%。 相似文献
124.
DongQingkuan ChenYuan XiaoGuozhen 《电子科学学刊(英文版)》2004,21(6):467-470
Two types of new subliminal channels are constructed respectively based on provable secure public key cryptosystems and identity recognition in some network applications. Research shows that there are some new characteristics which are in favor of covert communication in our constructions. It is hard to make the subliminal channels free, and the channels have large capacity and high transmission efficiency. We also point out that the hardness to make the channels free is disadvantageous to the warden who tries to thwart the covert communication. 相似文献
125.
“网络银行安全支付系统”的设计与实现 总被引:1,自引:0,他引:1
探讨了“网络银行安全支付系统”方案的设计与实现,提出了这一方案的设计模型,重点讨论了基于公钥密码体制和私钥密码体制的身份鉴别、数据加密、数字签名等现代密码技术在“网络银行安全支付系统”中的应用。 相似文献
126.
所谓共同沟,即通常所说的地下综合管沟或管廊,是专门用于集中敷设各种市政管线的地下隧道。与传统直接埋地的敷设方式相比,共同沟是一种先进的敷设方式。按相似原理和“最不利原则”设计模型实验,采用甲烷模拟共同沟(狭长空间)中天然气管道的微小泄漏,分析了甲烷的泄漏量和模型的断面宽度对纵向布置的探头报警时间的影响,提出了“单宽泄漏量”的概念,并得出了模型实验的相似条件。根据实验数据的走势,采用抛物线函数进行数据拟合,最终得出报警响应时间的经验公式。 相似文献
127.
Electrode Dependence of Tunneling Electroresistance and Switching Stability in Organic Ferroelectric P(VDF‐TrFE)‐Based Tunnel Junctions 下载免费PDF全文
Sayani Majumdar Binbin Chen Qi Hang Qin Himadri S. Majumdar Sebastiaan van Dijken 《Advanced functional materials》2018,28(15)
Ferroelectric tunnel junctions (FTJs) are promising candidates for nonvolatile memories and memristor‐based computing circuits. Thus far, most research has focused on FTJs with a perovskite oxide ferroelectric tunnel barrier. As the need for high‐temperature epitaxial film growth challenges the technological application of such inorganic junctions, more easily processable organic ferroelectrics can serve as alternative if large tunneling electroresistance (TER) and good switching durability would persist. This study reports on the performance of FTJs with a spin‐coated ferroelectric P(VDF‐TrFE) copolymer tunnel barrier. The use of three different bottom electrodes, indium tin oxide (ITO), La0.67Sr0.33MnO3, (LSMO), and Nb‐doped SrTiO3 (STO) are compared and it is shown that the polarity and magnitude of the TER effect depend on their conductivity. The largest TER of up to 107% at room temperature is measured on FTJs with a semiconducting Nb‐doped STO electrode. This large switching effect is attributed to the formation of an extra barrier over the space charge region in the substrate. The organic FTJs exhibit good resistance retention and switching endurance up to 380 K, which is just below the ferroelectric Curie temperature of the P(VDF‐TrFE) barrier. 相似文献
128.
Software‐defined networking simplifies network management by decoupling the control plane from the data plane and centralizing it to the controller. As the brain of the network, the controller gains up‐to‐date holistic network visibility via topology discovery. However, as a key service of topology discovery, the link discovery service opens problems on efficiency and security. On the one hand, sending link discovery packets to all ports wastes not only the limited controller resources (such as CPU and memory) but also control channel bandwidth. On the other hand, attackers may use these packets to create fake links and perform link fabrication attack. Because of the centralized control paradigm, wasting controller resources may degrade network performance, and all the fake links may severely poison the network topology, even causing the denial of service or man‐in‐the‐middle attack. In this paper, we propose an efficient and secure link discovery scheme to improve link discovery performance and resist link fabrication attack caused by the software‐defined networking link discovery service. By adopting port classification technique and directionally transmitting packets to appropriate ports, our approach can reduce or eliminate redundant packets and improve link discovery performance. Meanwhile, we adopt the directional packet transmitting approach and the time‐marked hash‐based message authentication code authenticate scheme to resist the link fabrication attack. A prototype system is implemented on the basis of POX controller and Mininet simulator to evaluate our scheme. Simulation results demonstrate that our scheme can solve the link fabrication problems with less overload of both the control plane and the data plane. 相似文献
129.
随着通信技术以及移动终端的发展,Android系统由于其本身的开源性,滋生了大量的恶意代码。为了满足Android手机用户的安全需求,文中基于Android,采用SVM机器学习思想,构建了恶意代码检测模型,并开发了一套手机恶意代码检测与防护系统,可以对其进行快速检测和深度检测。系统经Android手机测试结果表明,其具有较好的检测精度以及较低的恶意代码漏报率。 相似文献
130.
针对AJAX与CGI的嵌入式瘦Web服务器软件结构,产生的HTML文件不易于维护和更新的问题,提出了建立一个AJAX处理机制结合CGI程序的嵌入式Web服务器软件结构.应用AJAX处理机制实现了客户端校验和客户端处理,以及无刷新访问服务器端资源.实现后的嵌入式Web服务器降低了嵌入式Web服务器开销的同时,使得页面文件易于维护和更新,是一种既降低成本又易于维护和更新页面文件的网络服务器设计方法. 相似文献