首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   39724篇
  免费   4948篇
  国内免费   2808篇
电工技术   10347篇
技术理论   1篇
综合类   3594篇
化学工业   802篇
金属工艺   702篇
机械仪表   3498篇
建筑科学   1111篇
矿业工程   950篇
能源动力   745篇
轻工业   383篇
水利工程   498篇
石油天然气   754篇
武器工业   393篇
无线电   10767篇
一般工业技术   1795篇
冶金工业   371篇
原子能技术   201篇
自动化技术   10568篇
  2024年   77篇
  2023年   449篇
  2022年   777篇
  2021年   1049篇
  2020年   1299篇
  2019年   938篇
  2018年   942篇
  2017年   1379篇
  2016年   1613篇
  2015年   2120篇
  2014年   3339篇
  2013年   2843篇
  2012年   4190篇
  2011年   4068篇
  2010年   2956篇
  2009年   2795篇
  2008年   2762篇
  2007年   2859篇
  2006年   2327篇
  2005年   1811篇
  2004年   1440篇
  2003年   1140篇
  2002年   829篇
  2001年   763篇
  2000年   537篇
  1999年   432篇
  1998年   321篇
  1997年   278篇
  1996年   252篇
  1995年   190篇
  1994年   160篇
  1993年   116篇
  1992年   87篇
  1991年   60篇
  1990年   62篇
  1989年   61篇
  1988年   31篇
  1987年   17篇
  1986年   13篇
  1985年   15篇
  1984年   22篇
  1983年   14篇
  1982年   20篇
  1981年   4篇
  1980年   4篇
  1979年   5篇
  1978年   4篇
  1977年   2篇
  1976年   3篇
  1975年   2篇
排序方式: 共有10000条查询结果,搜索用时 125 毫秒
21.
22.
智能交通的出现使得车辆自组织网络受到越来越多的关注。车辆自组织网络的动态拓扑结构变化非常剧烈,这对网络的吞吐率、传输速率等性能提出了很高的要求。提出1种具有握手机制协议的自适应多通道双时钟NP-CSMA随机多址接入协议。该协议首先区分2种P-CSMA协议,握手机制成功解决了隐藏的终端问题,双时钟机制减少了平均空闲时间,多通道机制增加通道数量和划分用户优先级的同时提高了系统吞吐率,自适应机制能够使系统在高负载下保持稳定吞吐率。还对该协议的传输速率进行了分析,得出该协议的传输速率相对较高的结论。通过平均周期方法推导吞吐率和传输速率的计算公式,仿真结果与理论推导一致。  相似文献   
23.
24.
25.
在通讯设备爆炸式增长的时代,移动边缘计算作为5G通讯技术的核心技术之一,对其进行合理的资源分配显得尤为重要。移动边缘计算的思想是把云计算中心下沉到基站部署(边缘云),使云计算中心更加靠近用户,以快速解决计算资源分配问题。但是,相对于大型的云计算中心,边缘云的计算资源有限,传统的虚拟机分配方式不足以灵活应对边缘云的计算资源分配问题。为解决此问题,提出一种根据用户综合需求变化的动态计算资源和频谱分配算法(DRFAA),采用"分治"策略,并将资源模拟成"流体"资源进行分配,以寻求较大的吞吐量和较低的传输时延。实验仿真结果显示,动态计算资源和频谱分配算法可以有效地降低用户与边缘云之间的传输时延,也可以提高边缘云的吞吐量。  相似文献   
26.
Transmission electron microscopy (TEM) is an important analysis technique to visualize (bio)macromolecules and their assemblies, including collagen fibers. Many protocols for TEM sample preparation of collagen involve one or more washing steps to remove excess salts from the dispersion that could hamper analysis when dried on a TEM grid. Such protocols are not standardized and washing times as well as washing solvents vary from procedure to procedure, with each research group typically having their own protocol. Here, we investigate the influence of washing with water, ethanol, but also methanol and 2-propanol, for both mineralized and unmineralized collagen samples via a protocol based on centrifugation. Washing with water maintains the hydrated collagen structure and the characteristic banding pattern can be clearly observed. Conversely, washing with ethanol results in dehydration of the fibrils, often leading to aggregation of the fibers and a less obvious banding pattern, already within 1 min of ethanol exposure. As we show, this process is fully reversible. Similar observations were made for methanol and propanol. Based on these results, a standardized washing protocol for collagenous samples is proposed.  相似文献   
27.
In this article, we introduce a new bi-directional dual-relay selection strategy with its bit error rate (BER) performance analysis. During the first step of the proposed strategy, two relays out of a set of N relay-nodes are selected in a way to optimize the system performance in terms of BER, based on the suggested algorithm which checks if the selected relays using the max-min criterion are the best ones. In the second step, the chosen relay-nodes perform an orthogonal space-time coding scheme using the two-phase relaying protocol to establish a bi-directional communication between the communicating terminals, leading to a significant improvement in the achievable coding and diversity gain. To further improve the overall system performance, the selected relay-nodes apply also a digital network coding scheme. Furthermore, this paper discusses the analytical approximation of the BER performance of the proposed strategy, where we prove that the analytical results match almost perfectly the simulated ones. Finally, our simulation results show that the proposed strategy outperforms the current state-of-the-art ones.  相似文献   
28.
针对无线传感器网络在对移动目标节点覆盖过程中出现网络能量快速消耗问题,提出了一种基于联合节点行为策略的覆盖算法。根据网络模型建立传感器节点与目标节点从属关系,确定覆盖关联模型;利用概率理论求解邻居节点冗余覆盖度,确定最少传感器节点数量;给出了邻居节点覆盖期望值的求解方法;仿真实验表明,该算法与其他算法在网络覆盖率和网络生存周期两个性能指标上均提升了12.39%和15.01%,从而验证了算法的有效性。  相似文献   
29.
This paper investigates the state estimation issue for a class of wireless sensor networks (WSNs) with the consideration of limited energy resources. First, a multirate estimation model is established, and then, a new event‐triggered two‐stage information fusion algorithm is developed based on the optimal fusion criterion weighted by matrices. Compared with the existing methods, the presented fusion algorithm can significantly reduce the communication cost in WSNs and save energy resources of sensors efficiently. Furthermore, by presetting a desired containment probability over the interval [0,1] with the developed event‐triggered mechanism, one can obtain a suitable compromise between the communication cost and the estimation accuracy. Finally, a numerical simulation for the WSN tracking system is given to demonstrate the effectiveness of the proposed method.  相似文献   
30.
As an Industrial Wireless Sensor Network (IWSN) is usually deployed in a harsh or unattended environment, the privacy security of data aggregation is facing more and more challenges. Currently, the data aggregation protocols mainly focus on improving the efficiency of data transmitting and aggregating, alternately, the aim at enhancing the security of data. The performances of the secure data aggregation protocols are the trade-off of several metrics, which involves the transmission/fusion, the energy efficiency and the security in Wireless Sensor Network (WSN). Unfortunately, there is no paper in systematic analysis about the performance of the secure data aggregation protocols whether in IWSN or in WSN. In consideration of IWSN, we firstly review the security requirements and techniques in WSN data aggregation in this paper. Then, we give a holistic overview of the classical secure data aggregation protocols, which are divided into three categories: hop-by-hop encrypted data aggregation, end-to-end encrypted data aggregation and unencrypted secure data aggregation. Along this way, combining with the characteristics of industrial applications, we analyze the pros and cons of the existing security schemes in each category qualitatively, and realize that the security and the energy efficiency are suitable for IWSN. Finally, we make the conclusion about the techniques and approach in these categories, and highlight the future research directions of privacy preserving data aggregation in IWSN.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号