首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5131篇
  免费   347篇
  国内免费   32篇
电工技术   103篇
综合类   5篇
化学工业   1482篇
金属工艺   173篇
机械仪表   153篇
建筑科学   190篇
矿业工程   12篇
能源动力   289篇
轻工业   536篇
水利工程   40篇
石油天然气   90篇
无线电   490篇
一般工业技术   951篇
冶金工业   296篇
原子能技术   36篇
自动化技术   664篇
  2023年   53篇
  2022年   141篇
  2021年   171篇
  2020年   141篇
  2019年   203篇
  2018年   285篇
  2017年   204篇
  2016年   214篇
  2015年   178篇
  2014年   209篇
  2013年   456篇
  2012年   246篇
  2011年   313篇
  2010年   264篇
  2009年   262篇
  2008年   234篇
  2007年   176篇
  2006年   187篇
  2005年   118篇
  2004年   115篇
  2003年   150篇
  2002年   108篇
  2001年   82篇
  2000年   97篇
  1999年   76篇
  1998年   112篇
  1997年   65篇
  1996年   52篇
  1995年   45篇
  1994年   36篇
  1993年   32篇
  1992年   21篇
  1991年   30篇
  1990年   19篇
  1989年   21篇
  1988年   25篇
  1987年   42篇
  1986年   23篇
  1985年   25篇
  1984年   24篇
  1983年   25篇
  1982年   15篇
  1981年   18篇
  1980年   24篇
  1979年   14篇
  1978年   20篇
  1977年   21篇
  1976年   26篇
  1975年   21篇
  1973年   18篇
排序方式: 共有5510条查询结果,搜索用时 31 毫秒
61.
In this correspondence, the performance of the automatic repeat request-dynamic decode and forward (ARQ-DDF) cooperation protocol is analyzed in two distinct scenarios. The first scenario is the multiple access relay channel where a single relay is dedicated to simultaneously help two multiple access users. For this setup, it is shown that the ARQ-DDF protocol achieves the channel's optimal diversity multiplexing tradeoff (DMT). The second scenario is the cooperative vector multiple access channel where two users cooperate in delivering their messages to a destination equipped with two receiving antennas. For this setup, a new variant of the ARQ-DDF protocol is developed where the two users are purposefully instructed not to cooperate in the first round of transmission. Lower and upper bounds on the achievable DMT are then derived. These bounds are shown to converge to the optimal tradeoff as the number of transmission rounds increases.  相似文献   
62.
Khmissi  H.  El Sayed  A. M. 《Semiconductors》2019,53(10):1414-1414
Semiconductors - Later One of the co-authors, A.M. El Sayed withdrew his name as a co-author of this article claiming that he has not contributed to this work, since it is out of the scope of his...  相似文献   
63.
The problem of direction of arrival (DOA) estimation of mobile users using linear antenna arrays is addressed. To reduce the computational complexity of superresolution algorithms, e.g. multiple signal classification (MUSIC), the DOA problem is approached as a mapping which can be modeled using a suitable artificial neural network trained with input output pairs. This paper discusses the application of a three-layer radial-basis function neural network (RBFNN), which can learn multiple source-direction findings of a six-element array. The network weights are modified using the normalized cumulative delta rule. The performance of this network is compared to that of the MUSIC algorithm for both uncorrelated and correlated signals. It is also shown that the RBFNN substantially reduced the CPU time for the DOA estimation computations  相似文献   
64.
A new iterative receiver for joint detection and decoding of code division multiple access (CDMA) signals is presented. The new scheme is based on a combination of the minimum mean square error (MMSE) criterion and the turbo processing principle by Hagenauer (see Proc. Int. Symp. Turbo Codes and Related Topics, Brest, France, p.1-9, 1997). The complexity of the new scheme is of polynomial order in the number of users. The new scheme is applicable to two situations: (a) when the receiver is capable of decoding the signals from all users and (b) when the receiver is only capable of decoding the signals from a subset of users. In the first scenario, we establish that the proposed receiver achieves superior performance to the iterative soft interference cancellation technique under certain conditions. On the other hand, in the second scenario, we argue that the proposed receiver outperforms both the iterative soft interference canceler and the iterative maximum a posteriori (MAP) receiver because of its superior near-far resistance. For operation over fading channels, the estimation of the complex fading parameters for all users becomes an important ingredient in any multiuser detector. In our scheme, the soft information provided by the decoders is used to enhance this estimation process. Two iterative soft-input channel estimation algorithms are presented: the first is based on the MMSE criterion, and the second is a lower-complexity approximation of the first. The proposed multiuser detection algorithm(s) are suitable for both terrestrial and satellite applications of CDMA  相似文献   
65.
Most radar targets are complex objects and produce a wide variety of reflections. An important class of targets is represented by the so-called moderately fluctuating Rayleigh targets, which, when illuminated by a coherent pulse train, return a train of correlated pulses with a correlation coefficient in the range 0<ρ<1 (intermediate between SWII and SWI models). The detection of this type of fluctuating targets is therefore of great interest. On the other hand, the CFAR detection is one of the desirable features for radar receivers. Because of the simplicity of cell-averaging (CA detectors in their implementation, they are commonly used in modern radar systems to automatically adapt the detection threshold to the local background noise or clutter power in an attempt to maintain an approximately constant rate of false alarm. In this paper, we analyze the performance of these detectors for the case where the radar receiver postdetection integrates M square-law detected pulses and the signal fluctuation obeys chi-square statistics with two degrees of freedom. These detectors include the mean-level ML), the greatest-of (GO) and the smallest-of (SO) schemes. In these processors, the estimation of the noise power levels from the leading and the trailing reference windows is based on the CA technique. Exact formulas for the detection probabilities are derived, in the absence as well as in the presence of spurious targets. The primary and the secondary interfering targets are assumed to be fluctuating in accordance with the chi-square fluctuation model with two degrees of freedom. Swerling's well known fluctuation models I and II represent the cases where the signal is completely correlated and completely decorrelated, respectively, from pulse to pulse. Probability of detection curves are presented for the chi-square family of fluctuations, including the Swerling cases I and II. The ML detector has the best homogeneous performance, the SO processor has the best multiple-target performance, while the GO scheme does not offer any merits neither in the absence nor in the presence of outlying targets.  相似文献   
66.
The major problem with the empirical mode decomposition (EMD) algorithm is its lack of a theoretical framework. So, it is difficult to characterize and evaluate this approach. In this paper, we propose, in the 2-D case, the use of an alternative implementation to the algorithmic definition of the so-called "sifting process" used in the original Huang's EMD method. This approach, especially based on partial differential equations (PDEs), was presented by Niang in previous works, in 2005 and 2007, and relies on a nonlinear diffusion-based filtering process to solve the mean envelope estimation problem. In the 1-D case, the efficiency of the PDE-based method, compared to the original EMD algorithmic version, was also illustrated in a recent paper. Recently, several 2-D extensions of the EMD method have been proposed. Despite some effort, 2-D versions for EMD appear poorly performing and are very time consuming. So in this paper, an extension to the 2-D space of the PDE-based approach is extensively described. This approach has been applied in cases of both signal and image decomposition. The obtained results confirm the usefulness of the new PDE-based sifting process for the decomposition of various kinds of data. Some results have been provided in the case of image decomposition. The effectiveness of the approach encourages its use in a number of signal and image applications such as denoising, detrending, or texture analysis.  相似文献   
67.
This paper presents the design,implementation and testing of an embedded system that integrates solar and storage energy resources to smart homes within the smart microgrid.The proposed system provides the required home energy by installing renewable energy and storage devices.It also manages and schedules the power flow during peak and off-peak periods.In addition,a two-way communication protocol is developed to enable the home owners and the utility service provider to improve the energy flow and the consumption efficiency.The system can be an integral part for homes in a smart grid or smart microgrid power networks.A prototype for the proposed system was designed,implemented and tested by using a controlled load bank to simulate a scaled random real house consumption behavior.Three different scenarios were tested and the results and findings are reported.Moreover,data flow security among the home,home owners and utility server is developed to minimize cyber-attacks.  相似文献   
68.
The pedagogical product presented below is a practical work intended to the electrical engineering students, fourth year, of the National Institut of Applied Sciences of Rennes. This work is a part of filter realisation programme either in microstrip technology or lumped element. The aim of this practical work is restricted to calculate by optimizing all the basic parameters of the filter realization. Thus, an optimization and simulation work is performed on computer, by using a Touchstone software product of the Electronic Engineering Software society, to obtain parameter values close to the wished ones. This practical work is performed by groups of two students during three hours.  相似文献   
69.
A technique for the classification and evaluation of hierarchical access integration policies of ISDN channels is proposed. The essence of the basic control decisions based on several parameters of the servers and channel is captured in a single priority-based-layered model of multiple queues. We solve for the resulting delay of different policies and investigate the performance in one tractable limit of this model. Using our understanding of the problem parameters and their interaction, we propose a number of heuristic policies for the general model. The results of the general problem complexity investigations suggest the use of simulation models. Problem parameters considered are channel acceptable access delay value, number of servers needed, and flow duration time of a request. Preemptive and non-pre-emptive policies on queued traffic are considered. Performance considers average delay, delay variation and channel utilization. Simulation data on these policies suggest that policies that favour shorter services given better overall delay over a wide range of system parameters. Policies that favour longer and broadband services, on the other hand, show better quality and smaller delay variation.  相似文献   
70.
Mehta  Vipin  El Zarki  Magda 《Wireless Networks》2004,10(4):401-412
Communicating with sensors has long been limited either to wired connections or to proprietary wireless communication protocols. Using a ubiquitous and inexpensive wireless communication technology to create Sensor Area Networks (SANs) will accelerate the extensive deployment of sensor technology. Bluetooth, an emerging, worldwide standard for inexpensive, local wireless communication is a viable choice for SANs because of its inherent support for some of the important requirements – low power, small form factor, low cost and sufficient communication range. In this paper we outline an approach, centered on the Bluetooth technology, to support a sensor network composed of fixed wireless sensors for health monitoring of highways, bridges and other civil infrastructures. We present a topology formation scheme that not only takes into account the traffic generated by different sensors but also the associated link strengths, buffer capacities and energy availability. The algorithm makes no particular assumptions as to the placement of nodes, and not all nodes need to be in radio proximity of each other. The output is a tree shaped scatternet rooted at the sensor hub (data logger) that is balanced in terms of traffic carried on each of the links. We also analyze the scheduling, routing and healing aspects of the resulting sensor-net topology.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号