首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   688篇
  免费   55篇
  国内免费   8篇
电工技术   5篇
综合类   5篇
化学工业   148篇
金属工艺   9篇
机械仪表   25篇
建筑科学   18篇
能源动力   47篇
轻工业   71篇
水利工程   2篇
石油天然气   3篇
无线电   74篇
一般工业技术   183篇
冶金工业   17篇
原子能技术   13篇
自动化技术   131篇
  2023年   17篇
  2022年   44篇
  2021年   71篇
  2020年   50篇
  2019年   59篇
  2018年   55篇
  2017年   41篇
  2016年   61篇
  2015年   41篇
  2014年   27篇
  2013年   53篇
  2012年   42篇
  2011年   44篇
  2010年   18篇
  2009年   24篇
  2008年   13篇
  2007年   19篇
  2006年   7篇
  2005年   8篇
  2003年   6篇
  2002年   5篇
  2001年   4篇
  2000年   2篇
  1999年   2篇
  1998年   7篇
  1996年   3篇
  1995年   2篇
  1994年   7篇
  1993年   4篇
  1992年   1篇
  1991年   2篇
  1990年   2篇
  1989年   3篇
  1988年   1篇
  1980年   3篇
  1977年   1篇
  1976年   1篇
  1975年   1篇
排序方式: 共有751条查询结果,搜索用时 15 毫秒
1.
The objective of this work is to analyse the performance of the newly proposed two-tap FIR digital filter-based first-order zero-crossing digital phase-locked loop (ZCDPLL) in the absence or presence of additive white Gaussian noise (AWGN). The introduction of the two-tap FIR digital filter widens the lock range of a ZCDPLL and improves the loop’s operation in the presence of AWGN. The FIR digital filter tap coefficients affect the loop convergence behaviour and appropriate selection of those gains should be taken into consideration. The new proposed loop has wider locking range and faster acquisition time and reduces the phase error variations in the presence of noise.  相似文献   
2.
In the past, security protocols including key transport protocols are designed with the assumption that there are two parties communication with each other and an adversary tries to intercept this communication. In Delay/Disruption Tolerant Networking (DTN), packet delivery relies on intermediate parties in the communication path to store and forward the packets. DTN security architecture requires that integrity and authentication should be verified at intermediate nodes as well as at end nodes and confidentiality should be maintained for end communicating parties. This requires new security protocols and key management to be defined for DTN as traditional end-to-end security protocols will not work with DTN. To contribute towards solving this problem, we propose a novel Efficient and Scalable Key Transport Scheme (ESKTS) to transport the symmetric key generated at a DTN node to other communicating body securely using public key cryptography and proxy signatures. It is unique effort to design a key transport protocol in compliance with DTN architecture. ESKTS ensures that integrity and authentication is achieved at hop-by-hop level as well as end-to-end level. It also ensures end-to-end confidentiality and freshness for end communicating parties. This scheme provides a secure symmetric key transport mechanism based on public key cryptography to exploit the unique bundle buffering characteristics of DTN to reduce communication and computation cost .  相似文献   
3.
In this paper, we address a super-resolution problem of generating a high-resolution image from low-resolution images. The proposed super-resolution method consists of three steps: image registration, singular value decomposition (SVD)-based image fusion and interpolation. The contribution of this work is two-fold. First we customize an image registration approach using Scale Invariant Feature Transform (SIFT), Belief Propagation and Random Sampling Consensus (RANSAC) for super-resolution. Second, we propose SVD-based fusion to integrate the important features from the low-resolution images. The proposed image registration and fusion steps effectively maintain the important features and greatly improve the super-resolution results. Results, for a variety of image examples, show that the proposed method successfully generates high-resolution images from low-resolution images.  相似文献   
4.
5.
Wireless sensor networks (WSN) consist of hundreds of miniature sensor nodes to sense various events in the surrounding environment and report back to the base station. Sensor networks are at the base of internet of things (IoT) and smart computing applications where a function is performed as a result of sensed event or information. However, in resource‐limited WSN authenticating a remote user is a vital security concern. Recently, researchers put forth various authentication protocols to address different security issues. Gope et al presented a protocol claiming resistance against known attacks. A thorough analysis of their protocol shows that it is vulnerable to user traceability, stolen verifier, and denial of service (DoS) attacks. In this article, an enhanced symmetric key‐based authentication protocol for IoT‐based WSN has been presented. The proposed protocol has the ability to counter user traceability, stolen verifier, and DoS attacks. Furthermore, the proposed protocol has been simulated and verified using Proverif and BAN logic. The proposed protocol has the same communication cost as the baseline protocol; however, in computation cost, it has 52.63% efficiency as compared with the baseline protocol.  相似文献   
6.
Technology has revolutionized medical practices by enabling more convenient and non‐intrusive monitoring of patient's health, leading to next generation ubiquitous healthcare (u‐healthcare). The exploitation of the Internet protocol version 6 addressing space along with the miniaturization of electronic devices has fostered providing interoperability and connectivity of wearable sensor devices in wireless body area networks to the Internet of Things. In this paper, we propose to integrate the IPv6 over low power wireless personal area network (6LoWPAN) to the u‐healthcare monitoring system architecture. The main objective is to study the feasibility of the 6LoWPAN‐enabled platform in real‐world scenarios dealing with medical data. The performance evaluation of this platform is carried out initially through simulations using OMNet++ and then supported by an experimental study using sensor motes and a customized micro‐computing unit. Performance metrics such as throughput, end‐to‐end delay, packet error rate, and energy consumption are investigated under acute health conditions, where patient's health information has to be sent continuously and at maximum rate to the care provider. The obtained results show that the proposed 6LoWPAN solution fulfills the main quality of service requirements of u‐healthcare applications. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   
7.
Empirical modeling of wireless fading channels using common schemes such as autoregression and the finite state Markov chain (FSMC) is investigated. The conceptual background of both channel structures and the establishment of their mutual dependence in a confined manner are presented. The novel contribution lies in the proposal of a new approach for deriving the state transition probabilities borrowed from economic disciplines, which has not been studied so far with respect to the modeling of FSMC wireless fading channels. The proposed approach is based on equal portioning of the received signal‐to‐noise ratio, realized by using an alternative probability construction that was initially highlighted by Tauchen. The associated statistical procedure shows that a first‐order FSMC with a limited number of channel states can satisfactorily approximate fading. The computational overheads of the proposed technique are analyzed and proven to be less demanding compared to the conventional FSMC approach based on the level crossing rate. Simulations confirm the analytical results and promising performance of the new channel model based on the Tauchen approach without extra complexity costs.  相似文献   
8.
9.
In the present work we focus on cubic type I Ba-Ge-based clathrates, where Ge in Ba8Ge43 \square3\rm Ba_8Ge_{43} \square_3 (where □ is a vacancy) is substituted by Cu, Zn, Pd, and Si. Structural investigations in all cases confirm cubic primitive symmetry consistent with the space group type Pm[`3]nPm\bar{3}n of a typical type I clathrate structure with lattice parameter a ≈ 1.06 nm. Electronic transport has been studied in a broad temperature range from 4.2 K to about 800 K, demonstrating that substitution allows fine-tuning of the charge carrier density, shifting the materials into the proximity of a metal-to-insulator transition. This is evidenced from giant thermopower reaching values of 400 μV/K in the case of Ba8Cu5.2Zn0.8Ge40.0 at temperatures well below room temperature (T max S  ≈ 150 K).  相似文献   
10.
A frequency domain analysis is presented to optimize the Predictive Least Mean Square (PLMS) algorithm used for wireless channel tracking. Simulation results show that the PLMS offers significant improvement in tracking performance compared to that of the conventional LMS based method. The algorithm parameters should be carefully selected in order to gain such improvements. The objective of this paper is to use frequency domain analysis to determine an expression for the Mean Square Tracking Error (MSTE) and use it to obtain the optimum PLMS algorithm parameters such as step size (μ) and smoothing constant (θ) with numerical optimization methods.
Qassim NasirEmail:
  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号