全文获取类型
收费全文 | 8613篇 |
免费 | 1129篇 |
国内免费 | 292篇 |
专业分类
化学 | 1287篇 |
晶体学 | 21篇 |
力学 | 208篇 |
综合类 | 113篇 |
数学 | 1506篇 |
物理学 | 624篇 |
无线电 | 6275篇 |
出版年
2024年 | 22篇 |
2023年 | 58篇 |
2022年 | 164篇 |
2021年 | 191篇 |
2020年 | 287篇 |
2019年 | 277篇 |
2018年 | 248篇 |
2017年 | 311篇 |
2016年 | 372篇 |
2015年 | 437篇 |
2014年 | 652篇 |
2013年 | 622篇 |
2012年 | 602篇 |
2011年 | 646篇 |
2010年 | 474篇 |
2009年 | 441篇 |
2008年 | 569篇 |
2007年 | 549篇 |
2006年 | 473篇 |
2005年 | 461篇 |
2004年 | 359篇 |
2003年 | 368篇 |
2002年 | 329篇 |
2001年 | 240篇 |
2000年 | 227篇 |
1999年 | 148篇 |
1998年 | 99篇 |
1997年 | 71篇 |
1996年 | 60篇 |
1995年 | 36篇 |
1994年 | 48篇 |
1993年 | 25篇 |
1992年 | 27篇 |
1991年 | 14篇 |
1990年 | 16篇 |
1989年 | 17篇 |
1988年 | 11篇 |
1987年 | 13篇 |
1986年 | 11篇 |
1985年 | 17篇 |
1984年 | 9篇 |
1983年 | 6篇 |
1982年 | 4篇 |
1981年 | 8篇 |
1979年 | 5篇 |
1978年 | 2篇 |
1977年 | 3篇 |
1974年 | 1篇 |
1972年 | 1篇 |
1959年 | 2篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
91.
本文首先分析了分组域离线计费方式在运营中存在的局限性,随后介绍了3GPP基于Gy接口的分组域在线计费的基本原理。然后提出了适用于移动运营商的分组域实时计费系统架构,最后提出了分组域实时计费系统在实际部署中应重点关注的问题,并提出了解决方案。 相似文献
92.
随着多媒体业务的不断发展,如何保证无线网络上的QoS成为一个很重要的问题.基于传统的分层设计方法很难适应快速变化的无线通信环境.主要研究无线网络QoS的跨层设计技术,分析了无线网络的特点及其QoS需求,在此基础上阐述跨层设计的思想和方法,讨论了QoS跨层设计目前存在的问题,对QoS跨层设计技术进行了展望. 相似文献
93.
本文通过简单的介绍电信运行维护综合管理系统(OMA2000)的技术要求、CORBA技术的背景和内容,分析了计算机网络计算技术的发展趋势,实现了将CORBA标准应用于电信运行维护综合管理系统的开发应用. 相似文献
94.
设计并实现了基于成都市电子政务网的信息技术服务运维支撑平台,包括服务质量评价系统和运维服务交付系统.该平台符合国家信息技术服务标准,对电子政务网的服务外包企业进行服务交付过程监督和服务质量评价,有效地提升电子政务网对外提供服务的水平和能力,也为标准验证与试点提供技术载体. 相似文献
95.
Davide Adami Christian Callegari Stefano Giordano Michele Pagano Teresa Pepe 《International Journal of Communication Systems》2010,23(3):369-389
In the last years, Service Overlay Networks (SONs) have emerged as a promising means to address some of the issues (e.g. end‐to‐end QoS) affecting the current Internet and to favor the development and deployment of new value‐added Internet services. The deployment of an SON is a capital‐intensive investment, since bandwidth with certain QoS guarantees must be purchased from the individual network domains through bilateral Service Level Agreements. Thus, minimizing the economic cost of the logical end‐to‐end service delivery infrastructure is one of the key objectives for the SON provider. When a SON is aimed at end‐to‐end QoS provisioning, its topology must be designed so as to also satisfy the specific requirements of QoS‐sensitive applications. This paper deals with the problem of planning the SON topology in order to take into account both cost and QoS constraints. More specifically, the paper proposes a set of new algorithms for the design of an optimized SON topology, which minimizes the economic cost while simultaneously meeting bandwidth and delay constraints. A performance comparison among such algorithms is finally carried out. Copyright © 2009 John Wiley & Sons, Ltd. 相似文献
96.
97.
Implementation of depth‐based routing and its enhancement in AquaSim–Next Generation for underwater wireless sensor networks 下载免费PDF全文
Mohsin Jafri Simonetta Balsamo Andrea Marin Robert Martin 《International Journal of Communication Systems》2018,31(12)
In the last decade, underwater wireless sensor networks have been widely studied because of their peculiar aspects that distinguish them from common terrestrial wireless networks. Their applications range from environmental monitoring to military defense. The definition of efficient routing protocols in underwater sensor networks is a challenging topic of research because of the intrinsic characteristics of these networks, such as the need of handling the node mobility and the difficulty in balancing the energy consumed by the nodes. Depth‐based routing protocol is an opportunistic routing protocol for underwater sensor networks, which provides good performance both under high and low node mobility scenarios. The main contribution of our work is presenting a novel simulator for studying depth‐based routing protocol and its variants as well as novel routing protocols. Our simulator is based on AquaSim–Next Generation, which is a specialized tool for studying underwater networks. With our work, we improve the state of the art of underwater routing protocol simulators by implementing, among other features, a detailed cross‐layer communication and an accurate model of the operational modes of acoustic modem and their energy consumption. The simulator is open source and freely downloadable. Moreover, we propose a novel and completely distributed routing protocol, named residual energy–depth‐based routing. It takes into account the residual energy at the nodes' batteries to select the forwarder nodes and improve the network lifetime by providing a more uniform energy consumption among them. We compare its performance with that of depth‐based routing protocol and a receiver‐based routing protocol implementing a probabilistic opportunistic forwarding scheme. 相似文献
98.
Yasin Gormez Zafer Aydin Ramazan Karademir Vehbi C. Gungor 《International Journal of Communication Systems》2020,33(11)
Detecting malicious behavior is important for preventing security threats in a computer network. Denial of Service (DoS) is among the popular cyber attacks targeted at web sites of high‐profile organizations and can potentially have high economic and time costs. In this paper, several machine learning methods including ensemble models and autoencoder‐based deep learning classifiers are compared and tuned using Bayesian optimization. The autoencoder framework enables to extract new features by mapping the original input to a new space. The methods are trained and tested both for binary and multi‐class classification on Digiturk and Labris datasets, which were introduced recently for detecting various types of DDoS attacks. The best performing methods are found to be ensembles though deep learning classifiers achieved comparable level of accuracy. 相似文献
99.
在通用协议栈概念的基础上,引入集中式协议栈管理和分散式分层协议管理相结合的新的重配置控制管理功能,提出一种改进的、基于组件的分层可重配置协议栈模型,给出其协议栈重配置方法,详尽阐述了利用面向对象方法实现协议组件分解、合成、替换和通信的软件技术。 相似文献
100.
A lightweight authentication scheme based on self‐updating strategy for space information network 下载免费PDF全文
Yuchen Liu Aixin Zhang Shenghong Li Junhua Tang Jianhua Li 《International Journal of Satellite Communications and Networking》2017,35(3):231-248
The security of space information network (SIN) is getting more and more important now. Because of the special features of SIN (e.g., the dynamic and unstable topology, the highly exposed links, the restricted computation power, the flexible networking methods, and so on), the security protocol for SIN should have a balance between security properties and computation/storage overhead. Although a lot of security protocols have been proposed recently, few can provide overall attacks resistance power with low computation and storage cost. To solve this problem, in this paper we propose a lightweight authentication scheme for space information network. It is mainly based on the self‐updating strategy for user's temporary identity. The scheme consists of two phases, namely, the registration phase and the authentication phase. All the computing operations involved are just hash function (h), the bit‐wise exclusive‐or operation (⊕), and the string concatenation operation (||), which are of low computation cost. The security properties discussion and the attacks–resistance power analysis show that the proposed authentication scheme can defend against various typical attacks, especially denial of service attacks. It is sufficiently secure with the lowest computation and storage costs. Furthermore, the formal security proof in SVO logic also demonstrates that the scheme can satisfy the security goals very well. Copyright © 2016 John Wiley & Sons, Ltd. 相似文献