全文获取类型
收费全文 | 4289篇 |
免费 | 188篇 |
国内免费 | 52篇 |
专业分类
化学 | 281篇 |
晶体学 | 8篇 |
力学 | 59篇 |
综合类 | 14篇 |
数学 | 623篇 |
物理学 | 408篇 |
无线电 | 3136篇 |
出版年
2024年 | 16篇 |
2023年 | 102篇 |
2022年 | 113篇 |
2021年 | 125篇 |
2020年 | 129篇 |
2019年 | 108篇 |
2018年 | 84篇 |
2017年 | 113篇 |
2016年 | 129篇 |
2015年 | 142篇 |
2014年 | 263篇 |
2013年 | 347篇 |
2012年 | 242篇 |
2011年 | 230篇 |
2010年 | 207篇 |
2009年 | 223篇 |
2008年 | 215篇 |
2007年 | 196篇 |
2006年 | 187篇 |
2005年 | 140篇 |
2004年 | 180篇 |
2003年 | 144篇 |
2002年 | 147篇 |
2001年 | 86篇 |
2000年 | 107篇 |
1999年 | 99篇 |
1998年 | 87篇 |
1997年 | 77篇 |
1996年 | 62篇 |
1995年 | 33篇 |
1994年 | 46篇 |
1993年 | 19篇 |
1992年 | 24篇 |
1991年 | 22篇 |
1990年 | 14篇 |
1989年 | 18篇 |
1988年 | 9篇 |
1987年 | 6篇 |
1986年 | 6篇 |
1985年 | 4篇 |
1984年 | 6篇 |
1983年 | 7篇 |
1982年 | 3篇 |
1981年 | 4篇 |
1978年 | 5篇 |
1977年 | 2篇 |
1969年 | 1篇 |
排序方式: 共有4529条查询结果,搜索用时 15 毫秒
991.
在电信网络丰富的异构特征下,终端是网络互通和融合的关键节点.在异构环境中,终端的四个基本组成部分——移动终端、终端设备、UICC和对外接口需要按照不同的方法进行增强.对于移动终端,通过可编程、可配置、模块化的处理方式,在不增加体积、功耗和成本的前提下,实现对多种甚至是任意无线接入技术的感知和选择;对于终端设备,使用对外接口聚合外围的输入输出设备,使用户的获得更加丰富和优质的业务体验;对于UICC需要增加容量;对于对外接口,需要扩展带宽和稳定性. 相似文献
992.
993.
简述新疆移动通信营业帐务系统的网络体系结构、网络系统性能估算、总体设计,以及与其他业务处理系统之间的网络接口。 相似文献
994.
Gianluigi Tiberi Navid Ghavami David J. Edwards A. Monorchio 《AEUE-International Journal of Electronics and Communications》2012,66(11):913-919
The aim of this work is to develop an analytically-based approach for ultra wide band (UWB) body area network (BAN) channel modeling. In detail, the body will be modeled as multi-layered stratified cylinders of infinite length, and the Maxwell's equation will be solved for plane wave and line source excitations. Human-type tissues will be assumed in the multi-layered stratified cylindrical model. Validation of the procedure through measurement results has been provided. 相似文献
995.
Wireless Sensor Networks nowadays find wide variety of applications especially in real time. Innovative methods of energy efficient protocols and transmission reduction techniques keep improving to enhance the lifetime of the sensor nodes as they are powered by non-rechargeable batteries. Multi hop transmission and data aggregation are major techniques to reduce the power spent by the sensor node. In this paper, we propose a new ribbon structure for the existing multi hop WSN topologies with modified media access control mechanism called co-operative MAC. The ribbon structure is proposed to reap benefits of PEGASIS and APTEEN protocols. The low power consumption as in PEGASIS is maintained but the number of data packets transmitted is reduced by half. In the proposed scheme, only one of the two nodes along the parallel path involves in data transmission alternating roles in every cycle of aggregation. However, for values sensed above threshold, the inactive node interferes with normal cycle and gets its data transmitted to the sink node. This algorithm is compared with cluster based and chain based protocols and the simulation results show significant energy savings. 相似文献
996.
Catering to the public nature of Ad hoc network in open channel and data communication be-ing easily eavesdropped, this paper proposed an anti-eavesdropping algorithm which is based on network coding. The algorithm is based on the RSA signature algorithm introducing the timestamp and homomorphic mechanism to detect tampering and replay attacks, as the basis for calculating safety, being used as one of measurement in-dicators in router by node safety to establish t pieces of routing entry. It generates encoding vectors by introduc-ing the random number when the source node is encoded and the random number will be divided into n pieces. As long as the sink node receives t pieces of fragments, we can restore the original encoding vector and decode it. If the eavesdropper wiretaps are less than t, they can not get any meaningful information. It is designed for increas-ing the number of linearly independent coded packets.It can improve the decoding efficiency by adopting genera-tional grouping strategy while being encoded. Simulation and theoretical analysis shows that the anti-eavesdropping algorithm based on network coding improves network per-formance and security by coding gain. 相似文献
997.
提出可以实现EPON系统业务保护和故障恢复的快速环网方式。在OLT上通过快速以太网环网,在PON口采用主干光纤保护或全保护,在ONU侧通过手拉手保护组网方式,实现整个EPON系统的冗余保护。此保护方式达到了保护时间小于50 ms的电信级要求,而且具有算法简单、拓扑收敛速度快,业务恢复时间快等显著优势。EPON系统网络拓扑,采用此种组网方式能有效地提高以太网环网的可靠性和稳定性,实现较好的业务保护效果。 相似文献
998.
吉林联通开展PSTN瘦身工作,实现了网络资源的优化配置,降低了网络运营成本;为了适应固网光纤到户的趋势,引入IMS技术,使其成为吉林联通未来触合的核心网络的演进方向。 相似文献
999.
随着Internet高速发展和普及,网络安全问题日益突出。虽然传统的安全防御技术(如防火墙、入侵检测技术等)在某种程度上对防止系统和网络的非法入侵起到了一定的作用,但这些安全技术自身存在先天的缺点,以及对日新月异的网络攻击手法缺乏主动响应。在广大计算机学者的研究和不断探索下,入侵防护系统作为一个新型、动态的安全防护系统诞生了。本文对IPS这种动态安全技术进行了分析和研究。 相似文献
1000.
With the development of the network, the network security has become the focus problem. How to guarantee the privacy, integrity, and availability of network information also becomes the issue to solve. This paper applies plan recognition method to recognize the network attack. First, a network attack recognition model has been built, which is more clearly to observe and recognize the process of network attack, and it is the foundation for the next work. Secondly, the temporal constraints has been added in the causal network, it can provide the help for alert correlation analysis, analyze the attack planning more effectively, predict the next action, and recognize the invalid planning. Finally, we put forward an effective method for network attack recognition based on the goal graph. 相似文献