全文获取类型
收费全文 | 688篇 |
免费 | 55篇 |
国内免费 | 8篇 |
专业分类
电工技术 | 5篇 |
综合类 | 5篇 |
化学工业 | 148篇 |
金属工艺 | 9篇 |
机械仪表 | 25篇 |
建筑科学 | 18篇 |
能源动力 | 47篇 |
轻工业 | 71篇 |
水利工程 | 2篇 |
石油天然气 | 3篇 |
无线电 | 74篇 |
一般工业技术 | 183篇 |
冶金工业 | 17篇 |
原子能技术 | 13篇 |
自动化技术 | 131篇 |
出版年
2023年 | 17篇 |
2022年 | 44篇 |
2021年 | 71篇 |
2020年 | 50篇 |
2019年 | 59篇 |
2018年 | 55篇 |
2017年 | 41篇 |
2016年 | 61篇 |
2015年 | 41篇 |
2014年 | 27篇 |
2013年 | 53篇 |
2012年 | 42篇 |
2011年 | 44篇 |
2010年 | 18篇 |
2009年 | 24篇 |
2008年 | 13篇 |
2007年 | 19篇 |
2006年 | 7篇 |
2005年 | 8篇 |
2003年 | 6篇 |
2002年 | 5篇 |
2001年 | 4篇 |
2000年 | 2篇 |
1999年 | 2篇 |
1998年 | 7篇 |
1996年 | 3篇 |
1995年 | 2篇 |
1994年 | 7篇 |
1993年 | 4篇 |
1992年 | 1篇 |
1991年 | 2篇 |
1990年 | 2篇 |
1989年 | 3篇 |
1988年 | 1篇 |
1980年 | 3篇 |
1977年 | 1篇 |
1976年 | 1篇 |
1975年 | 1篇 |
排序方式: 共有751条查询结果,搜索用时 15 毫秒
1.
Qassim Nasir 《International Journal of Electronics》2016,103(4):736-746
The objective of this work is to analyse the performance of the newly proposed two-tap FIR digital filter-based first-order zero-crossing digital phase-locked loop (ZCDPLL) in the absence or presence of additive white Gaussian noise (AWGN). The introduction of the two-tap FIR digital filter widens the lock range of a ZCDPLL and improves the loop’s operation in the presence of AWGN. The FIR digital filter tap coefficients affect the loop convergence behaviour and appropriate selection of those gains should be taken into consideration. The new proposed loop has wider locking range and faster acquisition time and reduces the phase error variations in the presence of noise. 相似文献
2.
Muhammad Nasir Mumtaz Bhutta Haitham S. Cruickshank Zhili Sun 《Wireless Networks》2014,20(6):1597-1609
In the past, security protocols including key transport protocols are designed with the assumption that there are two parties communication with each other and an adversary tries to intercept this communication. In Delay/Disruption Tolerant Networking (DTN), packet delivery relies on intermediate parties in the communication path to store and forward the packets. DTN security architecture requires that integrity and authentication should be verified at intermediate nodes as well as at end nodes and confidentiality should be maintained for end communicating parties. This requires new security protocols and key management to be defined for DTN as traditional end-to-end security protocols will not work with DTN. To contribute towards solving this problem, we propose a novel Efficient and Scalable Key Transport Scheme (ESKTS) to transport the symmetric key generated at a DTN node to other communicating body securely using public key cryptography and proxy signatures. It is unique effort to design a key transport protocol in compliance with DTN architecture. ESKTS ensures that integrity and authentication is achieved at hop-by-hop level as well as end-to-end level. It also ensures end-to-end confidentiality and freshness for end communicating parties. This scheme provides a secure symmetric key transport mechanism based on public key cryptography to exploit the unique bundle buffering characteristics of DTN to reduce communication and computation cost . 相似文献
3.
Haidawati Nasir Vladimir Stanković Stephen Marshall 《Signal Processing: Image Communication》2012,27(2):180-191
In this paper, we address a super-resolution problem of generating a high-resolution image from low-resolution images. The proposed super-resolution method consists of three steps: image registration, singular value decomposition (SVD)-based image fusion and interpolation. The contribution of this work is two-fold. First we customize an image registration approach using Scale Invariant Feature Transform (SIFT), Belief Propagation and Random Sampling Consensus (RANSAC) for super-resolution. Second, we propose SVD-based fusion to integrate the important features from the low-resolution images. The proposed image registration and fusion steps effectively maintain the important features and greatly improve the super-resolution results. Results, for a variety of image examples, show that the proposed method successfully generates high-resolution images from low-resolution images. 相似文献
4.
5.
Anwar Ghani Khwaja Mansoor Shahid Mehmood Shehzad Ashraf Chaudhry Arif Ur Rahman Malik Najmus Saqib 《International Journal of Communication Systems》2019,32(16)
Wireless sensor networks (WSN) consist of hundreds of miniature sensor nodes to sense various events in the surrounding environment and report back to the base station. Sensor networks are at the base of internet of things (IoT) and smart computing applications where a function is performed as a result of sensed event or information. However, in resource‐limited WSN authenticating a remote user is a vital security concern. Recently, researchers put forth various authentication protocols to address different security issues. Gope et al presented a protocol claiming resistance against known attacks. A thorough analysis of their protocol shows that it is vulnerable to user traceability, stolen verifier, and denial of service (DoS) attacks. In this article, an enhanced symmetric key‐based authentication protocol for IoT‐based WSN has been presented. The proposed protocol has the ability to counter user traceability, stolen verifier, and DoS attacks. Furthermore, the proposed protocol has been simulated and verified using Proverif and BAN logic. The proposed protocol has the same communication cost as the baseline protocol; however, in computation cost, it has 52.63% efficiency as compared with the baseline protocol. 相似文献
6.
Farid Touati Adel Ben Mnaouer Ochirkhand Erdene‐Ochir Waiser Mehmood Ammad Hassan Brahim Gaabab 《Wireless Communications and Mobile Computing》2016,16(10):1271-1281
Technology has revolutionized medical practices by enabling more convenient and non‐intrusive monitoring of patient's health, leading to next generation ubiquitous healthcare (u‐healthcare). The exploitation of the Internet protocol version 6 addressing space along with the miniaturization of electronic devices has fostered providing interoperability and connectivity of wearable sensor devices in wireless body area networks to the Internet of Things. In this paper, we propose to integrate the IPv6 over low power wireless personal area network (6LoWPAN) to the u‐healthcare monitoring system architecture. The main objective is to study the feasibility of the 6LoWPAN‐enabled platform in real‐world scenarios dealing with medical data. The performance evaluation of this platform is carried out initially through simulations using OMNet++ and then supported by an experimental study using sensor motes and a customized micro‐computing unit. Performance metrics such as throughput, end‐to‐end delay, packet error rate, and energy consumption are investigated under acute health conditions, where patient's health information has to be sent continuously and at maximum rate to the care provider. The obtained results show that the proposed 6LoWPAN solution fulfills the main quality of service requirements of u‐healthcare applications. Copyright © 2015 John Wiley & Sons, Ltd. 相似文献
7.
Ahmed Abdul Salam Ray Sheriff Saleh Al‐Araji Kahtan Mezher Qassim Nasir 《ETRI Journal》2017,39(5):718-728
Empirical modeling of wireless fading channels using common schemes such as autoregression and the finite state Markov chain (FSMC) is investigated. The conceptual background of both channel structures and the establishment of their mutual dependence in a confined manner are presented. The novel contribution lies in the proposal of a new approach for deriving the state transition probabilities borrowed from economic disciplines, which has not been studied so far with respect to the modeling of FSMC wireless fading channels. The proposed approach is based on equal portioning of the received signal‐to‐noise ratio, realized by using an alternative probability construction that was initially highlighted by Tauchen. The associated statistical procedure shows that a first‐order FSMC with a limited number of channel states can satisfactorily approximate fading. The computational overheads of the proposed technique are analyzed and proven to be less demanding compared to the conventional FSMC approach based on the level crossing rate. Simulations confirm the analytical results and promising performance of the new channel model based on the Tauchen approach without extra complexity costs. 相似文献
8.
9.
I. Bednar E. Royanian S. Bühler-Paschen E. Bauer N. Nasir A. Grytsiv N. Melnychenko-Koblyuk P. Rogl 《Journal of Electronic Materials》2010,39(9):1687-1691
In the present work we focus on cubic type I Ba-Ge-based clathrates, where Ge in
Ba8Ge43 \square3\rm Ba_8Ge_{43} \square_3 (where □ is a vacancy) is substituted by Cu, Zn, Pd, and Si. Structural investigations in all cases confirm cubic primitive
symmetry consistent with the space group type Pm[`3]nPm\bar{3}n of a typical type I clathrate structure with lattice parameter a ≈ 1.06 nm. Electronic transport has been studied in a broad temperature range from 4.2 K to about 800 K, demonstrating that
substitution allows fine-tuning of the charge carrier density, shifting the materials into the proximity of a metal-to-insulator
transition. This is evidenced from giant thermopower reaching values of 400 μV/K in the case of Ba8Cu5.2Zn0.8Ge40.0 at temperatures well below room temperature (T
max
S
≈ 150 K). 相似文献
10.
Qassim Nasir 《Wireless Personal Communications》2009,48(4):511-519
A frequency domain analysis is presented to optimize the Predictive Least Mean Square (PLMS) algorithm used for wireless channel
tracking. Simulation results show that the PLMS offers significant improvement in tracking performance compared to that of
the conventional LMS based method. The algorithm parameters should be carefully selected in order to gain such improvements.
The objective of this paper is to use frequency domain analysis to determine an expression for the Mean Square Tracking Error
(MSTE) and use it to obtain the optimum PLMS algorithm parameters such as step size (μ) and smoothing constant (θ) with numerical optimization methods.
相似文献
Qassim NasirEmail: |