首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   39724篇
  免费   4948篇
  国内免费   2808篇
电工技术   10347篇
技术理论   1篇
综合类   3594篇
化学工业   802篇
金属工艺   702篇
机械仪表   3498篇
建筑科学   1111篇
矿业工程   950篇
能源动力   745篇
轻工业   383篇
水利工程   498篇
石油天然气   754篇
武器工业   393篇
无线电   10767篇
一般工业技术   1795篇
冶金工业   371篇
原子能技术   201篇
自动化技术   10568篇
  2024年   77篇
  2023年   449篇
  2022年   777篇
  2021年   1049篇
  2020年   1299篇
  2019年   938篇
  2018年   942篇
  2017年   1379篇
  2016年   1613篇
  2015年   2120篇
  2014年   3339篇
  2013年   2843篇
  2012年   4190篇
  2011年   4068篇
  2010年   2956篇
  2009年   2795篇
  2008年   2762篇
  2007年   2859篇
  2006年   2327篇
  2005年   1811篇
  2004年   1440篇
  2003年   1140篇
  2002年   829篇
  2001年   763篇
  2000年   537篇
  1999年   432篇
  1998年   321篇
  1997年   278篇
  1996年   252篇
  1995年   190篇
  1994年   160篇
  1993年   116篇
  1992年   87篇
  1991年   60篇
  1990年   62篇
  1989年   61篇
  1988年   31篇
  1987年   17篇
  1986年   13篇
  1985年   15篇
  1984年   22篇
  1983年   14篇
  1982年   20篇
  1981年   4篇
  1980年   4篇
  1979年   5篇
  1978年   4篇
  1977年   2篇
  1976年   3篇
  1975年   2篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
Resource reservation or the other prioritization strategies adopted by Call Admission Control (CAC) schemes in wireless networks lead to unfair resource allocation to users belonging to different service classes (SCs) due to high divergence among the respective call blocking probabilities (CBPs). In this paper, we propose dynamic optimization of probabilistic CAC (P‐CAC) schemes to assure CAC fairness among users of different SCs in wireless networks. The approach is based on users utility combined with fairness optimization, aiming at dynamically determining the probability value in the P‐CAC scheme. This optimal probability is adjusted to network ongoing traffic, CBPs of each SC, prioritization levels characterizing the SCs supported, and the users risk aversion, which reflects their behavior toward the perceived QoS. The existence and uniqueness of the optimal probability that leads to absolute fairness among the users of a wireless network are proven. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   
992.
In this work, the coplanar waveguide is fabricated on a PES (poly[ether sulfone]) substrate for application to a flexible monolithic microwave integrated circuit, and its RF characteristics were thoroughly investigated. The quality factor of the coplanar waveguide on PES is 40.3 at a resonance frequency of 46.7 GHz. A fishbone‐type transmission line (FTTL) structure is also fabricated on the PES substrate, and its RF characteristics are investigated. The wavelength of the FTTL on PES is 5.11 mm at 20 GHz, which is 55% of the conventional coplanar waveguide on PES. Using the FTTL, an impedance transformer is fabricated on PES. The size of the impedance transformer is 0.318 mm × 0.318 mm, which is 69.2% of the size of the transformer fabricated by the conventional coplanar waveguide on PES. The impedance transformer showed return loss values better than –12.9 dB from 5 GHz to 50 GHz and an insertion loss better than –1.13 dB in the same frequency range.  相似文献   
993.
The source authentication is an important issue for the multicast applications because it can let the receiver know whether the multicast message is sent from a legal source or not. However, the previously related schemes did not provide the confidentiality for data packets. In addition, the communication costs of these schemes are still high for real‐time applications in the multicast environments. To solve the aforementioned problems, we propose a new source authentication scheme based on message recovery signature for multicast in this paper. In the proposed scheme, the encrypted data can be embedded in the digital signature, so the communication loads can be greatly reduced. In addition, the digital signature contains the encrypted data, and thus the confidentiality of data packets can be well protected. According to the aforementioned advantages, the proposed scheme is securer and more efficient than the related works for the real‐time applications. Copyright © 2013 John Wiley & Sons, Ltd.  相似文献   
994.
Energy consumption is an important issue in body area networks (BANs). In this letter, we propose an energy efficient transmission power control scheme for IEEE 802.15.6 BANs, which can improve energy efficiency by adaptively adjusting the transmit power in an on‐demand way to adapt to varying channel environments. Simulations are performed to evaluate the performance, and it is shown that the proposed power control scheme outperforms traditional ones in terms of energy efficiency without significant reliability degradation.  相似文献   
995.
为了提高无线传感器网络的稳定期,提出了一种高效节能的加权选举协议。该协议使用集群策略结合链状路由算法,在异构的无线传感器网络环境下改善节能并且延长稳定期。仿真结果表明该协议在网络寿命和稳定期方面的性能都优于LEACH,SEP和HEARP。另外,实验表明在异构环境下稳定期依赖于节点的额外能量。  相似文献   
996.
In this paper, we propose a novel task scheduling algorithm (Divisible Task scheduling Algorithm for Wireless sensor networks (DTAW)) based on divisible load theory in heterogeneous wireless sensor networks to complete the tasks within the shortest possible time and reduce the sensors' energy‐consuming. In DTAW, the tasks are distributed to the wireless sensor network by the (SINK) on the basis of the processing and communication capacity of each sensor. After receiving the subtasks, the intracluster sensors carry out its tasks simultaneously and send the results to cluster head sequentially. By removing communication interference between each sensor, reduced task completion time and improved network resource utilization are achieved. Each cluster head simultaneously finishes sending fused data to the SINK after fusing the data obtained from intracluster sensors. In this way, the overlap between the task performing and communication phase would be much better. Simulation results are presented to demonstrate the impacts of different network parameters on the makespan and energy consumption. The results show that the algorithm enables to reasonably distribute tasks to each sensor and then effectively reduces the time‐consuming and energy‐consuming. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   
997.
Time‐division multiple‐access (TDMA) is a common medium access control paradigm in wireless sensor networks. However, in its traditional form, the TDMA‐based protocols suffer from low channel utilization and high message delay because of a long frame length needed to provide collision‐free transmissions, which is particularly damaging in dense wireless sensor networks. In this paper, we investigate the performance and the energy efficiency of a class of TDMA‐based protocols, called reduced‐frame TDMA, where every TDMA slot is augmented with a short time period dedicated for carrier sense multiple access‐based contention resolution mechanism. Because of their ability to dynamically resolve collisions caused by conflicting slot assignments, the reduced‐frame TDMA protocols can be configured with any frame length, independently of node density. In addition, we present a distributed heuristic slot assignment algorithm that minimizes interslot interference in the presence of limited number of slots per frame. The simulation results indicate that the reduced‐frame TDMA protocols significantly reduce the message delay and increase the maximum throughput without incurring significant penalty in energy efficiency compared with the traditional TDMA scheme. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   
998.
提出智能家居控制系统及其应用意义,采用的是ARM9嵌入式处理器S3C2410进行核心控制电路的设计,完成了主控芯片电路、存储电路以及电源电路。同时LCD接口、USB接口以及无线通信模块等电路作为必不可少的部分,本文也给出了设计方案,另外还专门开发了针对煤气泄漏的报警模块。  相似文献   
999.
As H.264/AVC video streams are highly compressed, they become sensitive to errors caused by unreliable transmission channels. In order to address this issue, an improved version of Chung et al.’s reversible data hiding-based approach for intra-frame error concealment is proposed for H.264/AVC codec. By using the histogram shifting technique, the original work reversibly embeds the motion vector (MV) of a macroblock (MB) into other MB within the same intra-frame. If an MB is corrupted at the decoder side, the embedded MV can be extracted from the corresponding MB for the recovery of the corrupted MB. However, Chung et al.’s work did not fully exploit the number of coefficients which need to be modified in order to reversibly hiding data, and did not consider many extra nonzero residual blocks produced by data hiding. These two issues could reduce the visual quality of the stego-video. This paper adopts MV data pre-processing, the selection of most suitable embedding region, and the minimum possible amount of histogram modification, which lead to higher PSNR of the stego-video for a given payload. Experimental results further reveal that the proposed method offers stego-video with better visual quality over Chung et al.’s work.  相似文献   
1000.
The problem of distributed estimation in a wireless sensor network with unknown observation noise distribution is investigated, where each sensor only sends quantized data to a fusion center. The sensing field is modeled as a spatially random field. The objective was to accurately estimate a hidden parameter at the location where no sensor exists, while minimizing the total energy consumption. Driven by the lack of a prior knowledge of the sensing field and the existence of some outliers, an indicator kriging estimator is developed for distributed estimation under imperfect communication channels between the sensors and the fusion center. The tradeoff between estimation performance and energy consumption is formulated as an optimization problem, and a global search algorithm is proposed to approximate the solution. The results show that the proposed indicator kriging estimator achieves better performance than the inverse distance estimator and the simple averaging estimator. Moreover, the proposed search algorithm can schedule the sensors to reach the tradeoff. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号