首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6849篇
  免费   237篇
  国内免费   7篇
电工技术   74篇
综合类   5篇
化学工业   1330篇
金属工艺   135篇
机械仪表   152篇
建筑科学   406篇
矿业工程   17篇
能源动力   216篇
轻工业   690篇
水利工程   111篇
石油天然气   32篇
无线电   463篇
一般工业技术   1230篇
冶金工业   1145篇
原子能技术   55篇
自动化技术   1032篇
  2023年   35篇
  2022年   78篇
  2021年   103篇
  2020年   92篇
  2019年   99篇
  2018年   118篇
  2017年   128篇
  2016年   128篇
  2015年   144篇
  2014年   193篇
  2013年   428篇
  2012年   346篇
  2011年   426篇
  2010年   293篇
  2009年   341篇
  2008年   443篇
  2007年   373篇
  2006年   309篇
  2005年   321篇
  2004年   256篇
  2003年   232篇
  2002年   226篇
  2001年   124篇
  2000年   98篇
  1999年   118篇
  1998年   149篇
  1997年   115篇
  1996年   122篇
  1995年   91篇
  1994年   92篇
  1993年   88篇
  1992年   67篇
  1991年   53篇
  1990年   63篇
  1989年   84篇
  1988年   47篇
  1987年   55篇
  1986年   48篇
  1985年   65篇
  1984年   66篇
  1983年   57篇
  1982年   46篇
  1981年   55篇
  1980年   32篇
  1979年   39篇
  1978年   36篇
  1977年   25篇
  1976年   29篇
  1975年   32篇
  1974年   20篇
排序方式: 共有7093条查询结果,搜索用时 15 毫秒
81.
This study tested arguments in the largely anecdotal debate over the existence of Asian values in Asian journalism. News stories uploaded to 10 Asian on-line newspapers were content analyzed for the prevalence of "harmony" and "supportiveness," which the literature suggests as key Asian values. The findings show that the journalistic emphasis on Asian values is concentrated in the Southeast Asia subregion and tracks restrictions on press freedom.  相似文献   
82.
In this paper, we apply a new time-frequency spectral estimation method for multichannel data to epileptiform electroencephalography (EEG). The method is based on the smooth localized complex exponentials (SLEX) functions which are time-frequency localized versions of the Fourier functions and, hence, are ideal for analyzing nonstationary signals whose spectral properties evolve over time. The SLEX functions are simultaneously orthogonal and localized in time and frequency because they are obtained by applying a projection operator rather than a window or taper. In this paper, we present the Auto-SLEX method which is a statistical method that 1) computes the periodogram using the SLEX transform, 2) automatically segments the signal into approximately stationary segments using an objective criterion that is based on log energy, and 3) automatically selects the optimal bandwidth of the spectral smoothing window. The method is applied to the intracranial EEG from a patient with temporal lobe epilepsy. This analysis reveals a reduction in average duration of stationarity in preseizure epochs of data compared to baseline. These changes begin up to hours prior to electrical seizure onset in this patient.  相似文献   
83.
84.
Brian Dipert 《电子设计技术》2004,11(1):68-70,72,74,75
看来您已认定,采取购买并组装现成的专用标准产品(ASSP),如嵌入式控制器、外设芯片等,然后再编写您自己的软件这种做法将不能使您设计的产品与您竞争对手的产品有足够大的差别.因此,您会决定选择芯片级设计.两大硅平台竞争对手及其各自的折衷方案已经在各种工业论坛上引起广泛的争论.不过如果您刚涉足这场争论,则很有必要了解下述有关争论的概要.  相似文献   
85.
An indoor personal rowing machine (Concept 2 Inc., Morrisville, VT) has been modified for functional electrical stimulation assisted rowing exercise in paraplegia. To successfully perform the rowing maneuver, the voluntarily controlled upper body movements must be coordinated with the movements of the electrically stimulated paralyzed legs. To achieve such coordination, an automatic controller was developed that employs two levels of hierarchy. A high level finite state controller identifies the state or phase of the rowing motion and activates a low-level state-dedicated fuzzy logic controller (FLC) to deliver the electrical stimulation to the paralyzed leg muscles. A pilot study with participation of two paraplegic volunteers showed that FLC spent less muscle energy, and produced smoother rowing maneuvers than the existing On-Off constant-level stimulation controller.  相似文献   
86.
Trust for Ubiquitous,Transparent Collaboration   总被引:1,自引:0,他引:1  
Shand  Brian  Dimmock  Nathan  Bacon  Jean 《Wireless Networks》2004,10(6):711-721
In this paper, trust-based recommendations control the exchange of personal information between handheld computers. Combined with explicit risk analysis, this enables unobtrusive information exchange, while limiting access to confidential information. The same model can be applied to a wide range of mobile computing tasks, such as managing personal address books and electronic diaries, to automatically provide an appropriate level of security. Recommendations add structure to the information, by associating categories with data and with each other, with degrees of trust belief and disbelief. Since categories also in turn confer privileges and restrict actions, they are analogous to rôles in a Rôle-Based Access Control system, while principals represent their trust policies in recommendations. Participants first compute their trust in information, by combining their own trust assumptions with others' policies. Recommendations are thus linked together to compute a considered, local trust assessment. Actions are then moderated by a risk assessment, which weighs up costs and benefits, including the cost of the user's time, before deciding whether to allow or forbid the information exchange, or ask for help. By unifying trust assessments and access control, participants can take calculated risks to automatically yet safely share their personal information.  相似文献   
87.
嵌入式设备在很多应用场合正在和因特网相连接,比如蜂窝电话、机顶盒、无线接入点、医疗设备和公共信息电话亭。当这些能够上网的设备与因特网连接,但是没有足够的安全考虑时,他们将很容易受到攻击,这些攻击包括无意的访问和恶意攻击。如果没有一些相应安全措施,这些攻击可能会使设备的功能、操作以及包含的信息遭受破坏。  相似文献   
88.
An ultra-wideband (UWB) transmitted reference (TR) system transmits an un-modulated pulse and a delayed modulated pulse pair. Then, a correlation receiver uses the former to demodulate the latter. Because of the long spread of a typical UWB channel, time delay between the two pulses is preferable to be larger than the channel delay spread for reduced noise at the receiver. However, for bandwidth efficiency, that delay should be made small, resulting in inter-pulse interference at the receiver. In this paper, digital receivers are constructed for TR-UWB systems including inter-pulse interference. A typical mean matching technique, appropriate for both PPM and PAM schemes, is implemented digitally to obtain a good template for symbol detection. Joint estimation and detection performance of this family of digital receivers, using finite number of bits in analog-to-digital conversion and finite noisy observations, is analyzed. Closed form results are derived and verified by computer simulations. In addition, the effect of time offset between the reference pulse and information carrying pulse is studied. Overlap of the two pulses does not incur noticeable performance degradation. The proposed analytical framework can be applied to study detection performance of other related digital receivers not covered in this paper  相似文献   
89.
从过去来看,电视上出现字幕是再平常不过的事情的。当你换台时,字幕就会出现告诉你现在是哪一个频道。甚至当你调节音量时,很多电视机上也会出现字幕。  相似文献   
90.
In a mobile ad hoc network (MANET), the nodes act both as traffic sources and as relays that forward packets from other nodes along multi-hop routes to the destination. Such networks are suited to situations in which a wireless infrastructure is unavailable, infeasible, or prohibitively expensive. However, the lack of a secure, trusted infrastructure in such networks make secure and reliable packet delivery very challenging. A given node acting as a relay may exhibit Byzantine behavior with respect to packet forwarding, i.e., arbitrary, deviant behavior, which disrupts packet transmission in the network. For example, a Byzantine node may arbitrarily choose to drop or misroute a certain percentage of the packets that are passed to it for forwarding to the next hop. In earlier work, we proposed a trust establishment framework, called Hermes, which enables a given node to determine the “trustworthiness” of other nodes with respect to reliable packet delivery by combining first-hand trust information obtained independently of other nodes and second-hand trust information obtained via recommendations from other nodes. A deficiency of the Hermes scheme is that a node can fail to detect certain types of Byzantine behavior, such as packet misforwarding directed at a particular source node. In this paper, we propose new mechanisms to make Hermes robust to Byzantine behavior and introduce a punishment policy that discourages selfish node behavior. We present simulation results that demonstrate the effectiveness of the proposed scheme in a variety of scenarios involving Byzantine nodes that are malicious both with respect to packet forwarding and trust propagation.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号