全文获取类型
收费全文 | 6932篇 |
免费 | 858篇 |
国内免费 | 100篇 |
专业分类
化学 | 76篇 |
力学 | 29篇 |
综合类 | 40篇 |
数学 | 168篇 |
物理学 | 373篇 |
无线电 | 7204篇 |
出版年
2024年 | 21篇 |
2023年 | 112篇 |
2022年 | 109篇 |
2021年 | 137篇 |
2020年 | 234篇 |
2019年 | 133篇 |
2018年 | 133篇 |
2017年 | 214篇 |
2016年 | 285篇 |
2015年 | 401篇 |
2014年 | 629篇 |
2013年 | 549篇 |
2012年 | 683篇 |
2011年 | 619篇 |
2010年 | 409篇 |
2009年 | 396篇 |
2008年 | 451篇 |
2007年 | 461篇 |
2006年 | 397篇 |
2005年 | 308篇 |
2004年 | 272篇 |
2003年 | 263篇 |
2002年 | 212篇 |
2001年 | 160篇 |
2000年 | 92篇 |
1999年 | 69篇 |
1998年 | 26篇 |
1997年 | 33篇 |
1996年 | 35篇 |
1995年 | 21篇 |
1994年 | 10篇 |
1993年 | 2篇 |
1991年 | 3篇 |
1990年 | 1篇 |
1989年 | 1篇 |
1988年 | 6篇 |
1986年 | 1篇 |
1985年 | 1篇 |
1957年 | 1篇 |
排序方式: 共有7890条查询结果,搜索用时 31 毫秒
91.
92.
This paper presents a geocast technique for underwater sensor networks. The model named as Routing and Multicast Tree based Geocasting (RMTG) (TRACE'10, Bhopal, India, 2010; ICWET'10, Mumbai, India, 2010) has been designed for underwater sensor networks. In our previous work (TRACE'10, Bhopal, India, 2010; ICWET'10, Mumbai, India, 2010) we proposed only a theoretical model for underwater geocasting. The RMTG technique uses greedy forwarding and previous hop handshaking to route the packets towards the geocast region and further disseminates the data within the geocast region by creating a multicast shortest path tree. We also presented various link broken scenarios along with their solutions. The proposed model does not use the flooding technique to deliver the packets inside the geocast region that is used in most of the geocasting techniques. In this paper, we present the simulated RMTG model. The simulation results show that the proposed model provides an efficient distribution of data in the geocast region in terms of node mobility handling, packet delivery ratio and a better end‐to‐end latency. Most of the work on geocasting has been done for mobile and vehicular ad hoc networks; hence we present in this paper a novel simulated model for underwater environment. Copyright © 2011 John Wiley & Sons, Ltd. 相似文献
93.
Raqibul Mostafa Ramesh C. Pallat Uwe Ringel Ashok A. Tikku Jeffrey H. Reed 《ETRI Journal》2012,34(3):319-329
Closed‐loop transmit diversity is considered an important technique for improving the link budget in the third generation and future wireless communication standards. This paper proposes several transmit diversity algorithms suitable for small wireless terminals and presents performance assessment in terms of average signal‐to‐noise ratio (SNR) and outage improvement, convergence, and complexity of operations. The algorithms presented herein are verified using data from measured indoor channels with variable antenna spacing and the results explained using measured radiation patterns for a two‐element array. It is shown that for a two‐element array, the best among the proposed techniques provides SNR improvement of about 3 dB in a tightly spaced array (inter‐element spacing of 0.1 wavelength at 2 GHz) typical of small wireless devices. Additionally, these techniques are shown to perform significantly better than a single antenna device in an indoor channel considering realistic values of latency and propagation errors. 相似文献
94.
Modern network systems have much trouble in security vulnerabilities such as buffer overflow, bugs in Microsoft Internet, sensor network routing protocol too simple, security flaws of applications, and operating systems. Moreover, wireless devices such as smart phones, personal digital assistants (PDAs), and sensors have become economically feasible because of technological advances in wireless communication and manufacturing of small and low-cost sensors. There are typologies of vulnerabilities to be exploited in these devices. In order to improve securities, many mechanisms are adopted, including authentication, cryptography, access control, and intrusion detection systems (IDS). In general, intrusion detection techniques can be categorized into two groups: misuse detection and anomaly detection. The misuse detection systems use patterns of weB-known attacks or weak spots of the systems to identify intrusions. The weakness of misuse detection systems is unable to detect any future (unknown) intrusion until corresponding attack signatures are intruded into the signature database. Anomaly detection methods try to determine whether the deviation is from the established normal usage patterns or not. The critical success of anomaly detection relies on the model of normal behaviors. 相似文献
95.
《先进技术聚合物》2018,29(1):216-225
Rubber magnetic composites were prepared by incorporation of strontium ferrite into rubber compounds based on acrylonitrile butadiene rubber and ethylene propylene diene monomer rubber. The sulfur, peroxide, and mixed sulfur/peroxide curing systems were introduced as cross‐linking agents for rubber matrices. The aim was to investigate the influence of curing system composition on curing process and cross‐link density of composite materials. Then, static and dynamic mechanical properties and thermal and magnetic characteristics were investigated in relation to the cross‐link density of rubber magnetic composites and structure of the formed cross‐links. The changes of dynamical and physicomechanical properties were in close correlation with the change of cross‐link density, whereas the tensile strength of magnetic composites showed increasing trend with increasing amount of peroxide in mixed curing systems. On the other hand, thermal conductivity and magnetic characteristics were found not to be dependent on the curing system composition. 相似文献
96.
随着无线技术的发展和移动智能终端的普及,医疗行业对无线网络的需求也越来越多,建设医院无线局域网,能提高工作效率和服务质量。文章提出了以无线控制器和AP为架构形式的无线局域网的解决方案,能克服传统无线网络漫游、无法统一管理等的问题,同时给出了安全防护的措施,从而为医院建立一个稳定安全的无线网络环境。 相似文献
97.
The traditional deployment strategy of static chargers in wireless rechargeable sensor networks (WRSN) covers all the area.The basic idea is to cover all the positions of nodes.A mathematical model of distance between a charger and the farthest node was established,the relationship between the number of nodes and the mathematical expectation of minimum radius of charging was analyzed,and deployment strategy for static chargers was proposed.The method based on the locations of all nodes that need to be charged in the area,used the smallest enclosing circle (SEC) algorithm and finds the optimal location of the charger through Euclidean delivery boy algorithm.It will decrease charging radius,reduce the minimum required transmitted power,thereby saving the average charging energy consumption.The experimental results demonstrated that the less the number locations that the nodes existed,the more energy will be saved. 相似文献
98.
连铸机所配备的专用精确诱导无线位置检测系统必须具备高精度和高可靠性。文章通过对某钢厂实际工程应用,证明诱导无线定位在横移台车上使用,定位准确,误差满足设计要求,不大于10mm。 相似文献
99.
提出了一种新的带有二元连接函数的广义半参数模型,即二元连接模型(简称为BLM).使用轮廓似然方法估计模型的参数和非参数部分,并给出了计算算法.证明了所得的未知参数的估计量为n~(1/2)-相合,渐近正态且具有渐近最小方差,给出了实际数据分析和模拟研究,最终采用局部功效方法来检验非参数部分的线性性. 相似文献
100.