首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   150846篇
  免费   6682篇
  国内免费   1943篇
电工技术   4620篇
技术理论   3篇
综合类   6362篇
化学工业   22192篇
金属工艺   8715篇
机械仪表   7232篇
建筑科学   6859篇
矿业工程   2786篇
能源动力   2993篇
轻工业   7804篇
水利工程   2356篇
石油天然气   4372篇
武器工业   527篇
无线电   17395篇
一般工业技术   24471篇
冶金工业   5687篇
原子能技术   977篇
自动化技术   34120篇
  2025年   207篇
  2024年   1704篇
  2023年   1466篇
  2022年   1969篇
  2021年   2772篇
  2020年   2365篇
  2019年   2139篇
  2018年   16164篇
  2017年   15342篇
  2016年   11853篇
  2015年   3140篇
  2014年   3331篇
  2013年   3845篇
  2012年   7143篇
  2011年   13716篇
  2010年   11835篇
  2009年   8987篇
  2008年   10061篇
  2007年   11009篇
  2006年   3773篇
  2005年   4238篇
  2004年   3223篇
  2003年   2954篇
  2002年   2115篇
  2001年   1535篇
  2000年   1732篇
  1999年   1768篇
  1998年   1561篇
  1997年   1298篇
  1996年   1193篇
  1995年   961篇
  1994年   847篇
  1993年   579篇
  1992年   450篇
  1991年   396篇
  1990年   266篇
  1989年   215篇
  1988年   193篇
  1987年   122篇
  1986年   101篇
  1985年   60篇
  1968年   43篇
  1966年   42篇
  1965年   45篇
  1959年   36篇
  1958年   40篇
  1957年   36篇
  1956年   34篇
  1955年   63篇
  1954年   68篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
991.
The objective of this work is to correctly detect and recognize faces in an image collection using a database of known faces. This has applications in photo-tagging, video indexing, surveillance and recognition in wearable computers. We propose a two-stage approach for both detection and recognition tasks. In the first stage, we generate a seed set from the given image collection using off-the-shelf face detection and recognition algorithms. In the second stage, the obtained seed set is used to improve the performance of these algorithms by adapting them to the domain at hand. We propose an exemplar-based semi-supervised framework for improving the detections. For recognition of images, we use sparse representation classifier and generate seed images based on a confidence measure. The labels of the seed set are then propagated to other faces using label propagation framework by imposing appropriate constraints. Unlike traditional approaches, our approach exploits the similarities among the faces in collection to obtain improved performance. We conduct extensive experiments on two real-world photo-album and video collections. Our approach consistently provides an improvement of \({\sim } 4\)% for detection and \(5{-}9\)% for recognition on all these datasets.  相似文献   
992.
A major challenge in the study of cryptography is characterizing the necessary and sufficient assumptions required to carry out a given cryptographic task. The focus of this work is the necessity of a broadcast channel for securely computing symmetric functionalities (where all the parties receive the same output) when one third of the parties, or more, might be corrupted. Assuming all parties are connected via a point-to-point network, but no broadcast channel (nor a secure setup phase) is available, we prove the following characterization:
  • A symmetric n-party functionality can be securely computed facing \(n/3\le t<n/2\) corruptions (i.e., honest majority), if and only if it is \((n-2t)\) -dominated; a functionality is k-dominated, if any k-size subset of its input variables can be set to determine its output to some predetermined value.
  • Assuming the existence of one-way functions, a symmetric n-party functionality can be securely computed facing \(t\ge n/2\) corruptions (i.e., no honest majority), if and only if it is 1-dominated and can be securely computed with broadcast.
It follows that, in case a third of the parties might be corrupted, broadcast is necessary for securely computing non-dominated functionalities (in which “small” subsets of the inputs cannot determine the output), including, as interesting special cases, the Boolean XOR and coin-flipping functionalities.
  相似文献   
993.
Multiple access control (MAC) protocols play a significant role in wireless LANs. The IEEE 802.11 MAC protocol specifies two coordination functions that are Distributed Coordination Function (DCF) and Point Coordination Function (PCF). While both DCF and PCF are available in a wireless cell, we propose a novel access mechanism called Adaptive Coordination Function (ACF) to support various classes of traffic. The ACF superframe comprises two periods, one TDMA period designed for real-time traffic and followed by an adaptive period which adaptively employs DCF or PCF to support non-real-time traffic. In this paper, we apply the theory of M/G/1 queues to analyze the performance of adaptive period in terms of queuing delay, end-to-end delay, and saturation throughput. With our analytic model, DCF or PCF can be invoked appropriately according to the number of stations, packet arrival rate, packet payload size, and effective channel bit rate. Analytical results are derived for an extensive throughput and delay performance evaluation of both DCF and PCF.  相似文献   
994.
The commonly used models for shadowed fading channels arise by compounding the Nakagami distribution with others such as the log-normal and gamma distributions. A distribution that is more flexible than the Nakagami distribution is the well known Weibull distribution. In this paper, we derive a collection of generalized models for shadowed fading channels by compounding the Weibull distribution with other distributions belong to some fifteen flexible families. We also illustrate the superior performance of these models over the standard Nakagami models.  相似文献   
995.
In this paper, two novel energy-efficient rate adaptation schemes are presented. The proposed protocols use the Distributed Power Control (DPC) algorithm to predict the channel state and determine the necessary transmission power which optimizes the energy consumption. The first proposed rate adaptation scheme heuristically alters the modulation rate to balance the energy-efficiency and the required throughput which is estimated with queue fill ratio. Moreover, the back-off scheme is incorporated to mitigate congestion and reduce packet losses due to buffer overflows thus minimizing energy consumption. Consequently, the nodes will conserve energy when the traffic is low, offer higher throughput when needed and save energy during congestion by limiting transmission rates. The second rate adaptation scheme employs dynamic programming (DP) principle to analytically select modulation rate and a burst size to be used during transmission. The proposed quadratic cost-function minimizes the energy consumption while alleviating network congestions and buffer overflows. The proposed DP solution renders a Riccati equation ultimately providing an optimal rate selection. The simulation results indicate that an increase in throughput by 96% and energy-efficiency by 131% is observed when compared to other available protocols, for example Receiver Based AutoRate (RBAR).
Sarangapani JagannathanEmail:
  相似文献   
996.
The computation of outage probability in cellular radio system has been extensively studied. The Signal-to-Interference-plus-Noise Ratio (SINR) distribution involves the sum of lognormal distributions due to dominant effect of shadowing in both the signal and interference components. Since no closed-form expression can be found for the sum of lognormal distributions, many approximation methods and bounds were proposed in the past. In this paper, Log Shifted Gamma (LSG) approximation is proposed to calculate the sum of correlated lognormal random variables (RVs), hence the outage probability, accurately with a wide range of dB spreads, number of interferers M, correlation coefficients r among interference components, and noise power N. Overall, LSG approximation shows consistent accuracy due to its flexibility over the classical lognormal approximation, especially with small correlation coefficients r and/or large dB spreads.  相似文献   
997.
This paper describes a non-recursive fault diagnosis technique for scan-based designs with convolutional test response compaction. The proposed approach allows a time-efficient and accurate identification of failing scan cells using Gauss–Jordan elimination method.
Jerzy Tyszer (Corresponding author)Email:
  相似文献   
998.
传统的安全管理框架缺少对底层数据的整合分析,不能形成有效的网络安全态势信息和风险评估,也不能满足用户对其扩展性和健壮性的要求。文中利用TMN(电信管理网)管理与受管资源分开的思路启发,提出了一种新的综合安全管理框架。新的框架在J2EE分布式架构平台加以实现,能够满足用户对综合安管系统扩展性、易用性和健壮性的需求。  相似文献   
999.
文章介绍了辐射发射测量所用宽带天线天线系数的校准方法,并对影响测试结果的因素进行分析。  相似文献   
1000.
移动通信和无线局域网的快速发展使两者的融合成为热点。描述了融合网络的场景和耦合方案,对现有融合网的认证机制缺点进行了分析,提出把传输层安全协议TLS引入到融合网认证中,并对该认证机制对融合网络安全的增强进行了详细描述和分析。最后搭建了融合网络的试验平台,测量了新的认证机制在执行时延、吞吐量以及能量耗费方面的性能。结果表明,新认证机制在大大增强了融合网络安全性的同时提高了网络的性能和效率。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号