全文获取类型
收费全文 | 3189篇 |
免费 | 153篇 |
国内免费 | 4篇 |
专业分类
电工技术 | 35篇 |
综合类 | 3篇 |
化学工业 | 839篇 |
金属工艺 | 58篇 |
机械仪表 | 79篇 |
建筑科学 | 96篇 |
矿业工程 | 35篇 |
能源动力 | 151篇 |
轻工业 | 390篇 |
水利工程 | 29篇 |
石油天然气 | 8篇 |
无线电 | 259篇 |
一般工业技术 | 437篇 |
冶金工业 | 354篇 |
原子能技术 | 31篇 |
自动化技术 | 542篇 |
出版年
2024年 | 10篇 |
2023年 | 42篇 |
2022年 | 104篇 |
2021年 | 150篇 |
2020年 | 98篇 |
2019年 | 82篇 |
2018年 | 103篇 |
2017年 | 90篇 |
2016年 | 108篇 |
2015年 | 79篇 |
2014年 | 148篇 |
2013年 | 211篇 |
2012年 | 207篇 |
2011年 | 212篇 |
2010年 | 167篇 |
2009年 | 130篇 |
2008年 | 162篇 |
2007年 | 131篇 |
2006年 | 92篇 |
2005年 | 84篇 |
2004年 | 63篇 |
2003年 | 46篇 |
2002年 | 52篇 |
2001年 | 45篇 |
2000年 | 41篇 |
1999年 | 37篇 |
1998年 | 61篇 |
1997年 | 44篇 |
1996年 | 45篇 |
1995年 | 45篇 |
1994年 | 29篇 |
1993年 | 39篇 |
1992年 | 20篇 |
1991年 | 26篇 |
1990年 | 14篇 |
1989年 | 14篇 |
1988年 | 15篇 |
1987年 | 15篇 |
1986年 | 14篇 |
1985年 | 18篇 |
1984年 | 17篇 |
1983年 | 13篇 |
1982年 | 21篇 |
1981年 | 15篇 |
1980年 | 11篇 |
1979年 | 11篇 |
1977年 | 16篇 |
1972年 | 11篇 |
1944年 | 10篇 |
1943年 | 21篇 |
排序方式: 共有3346条查询结果,搜索用时 15 毫秒
41.
Some statistical properties of mathematical morphology 总被引:4,自引:0,他引:4
Wang D. Haese-Coat V. Bruno A. Ronsin J. 《Signal Processing, IEEE Transactions on》1995,43(8):1955-1965
Analyzes the statistical properties of the basic binary and multilevel morphological operations with both 1-D and 2D structuring elements. Very simple expressions for the output distribution of erosion and opening are derived in the case of any independent identically or nonidentically distributed inputs. The probability relations between erosion and dilation, also between opening and closing, are developed. The output expectation bias and variances are analyzed and computed to show the efficiency of morphological operations for noise supression. As applications of theoretical results, the effects of the morphological operations on noisy signals are illustrated by several examples. The study reveals certain interesting phenomena. For example, the output variances of opening for some input distributions are greater than those of erosion, and morphological operations perform better than median filters in edge preservation 相似文献
42.
David Hély Frédéric Bancel Marie-Lise Flottes Bruno Rouzeyre 《Journal of Electronic Testing》2007,23(5):457-464
The design of secure ICs requires fulfilling means conforming to many design rules in order to protect access to secret data.
On the other hand, designers of secure chips cannot neglect the testability of their chip since high quality production testing
is primordial to a good level of security. However, security requirements may be in conflict with test needs and testability
improvement techniques that increase both observability and controllability. In this paper, we propose to merge security and
testability requirements in a control-oriented design for security scan technique. The proposed security scan design methodology
induces an adaptation of two main aspects of testability technique design: protection at protocol level and at scan path level.
Without loss of generality, the proposed solution is evaluated on a simple crypto chip in terms of security and design cost.
相似文献
Bruno Rouzeyre (Corresponding author)Email: |
43.
Design of an enhanced access point to optimize TCP performance in Wi-Fi hotspot networks 总被引:1,自引:0,他引:1
In the last years, the number of Wi-Fi hotspots at public venues has undergone a substantial growth, promoting the WLAN technologies
as the ubiquitous solution to provide high-speed wireless connectivity in public areas. However, the adoption of a random
access CSMA-based paradigm for the 802.11 MAC protocol makes difficult to ensure high throughput and a fair allocation of
radio resources in 802.11-based WLANs. In this paper we evaluate extensively via simulations the interaction between the flow
control mechanisms implemented at the TCP layer and the contention avoidance techniques used at the 802.11 MAC layer. We conducted
our study considering initially M wireless stations performing downloads from the Internet. From our results, we observed that the TCP downlink throughput
is not limited by the collision events, but by the inability of the MAC protocol to assign a higher chance of accessing the
channel to the base station. We propose a simple and easy to implement modification of the base station’s behavior with the
purpose of increasing the TCP throughput reducing useless MAC protocol overheads. With our scheme, the base station is allowed
to transmit periodically bursts of data frames towards the mobile hosts. We design a resource allocation protocol aimed at
maximizing the success probability of the uplink transmissions by dynamically adapting the burst length to the collision probability
estimated by the base station. By its design, our scheme is also beneficial to achieve a fairer allocation of the channel
bandwidth among the downlink and uplink flows, and among TCP and UDP flows. Simulation results confirm both the improvement
in the TCP downlink throughput and the reduction of system unfairness. 相似文献
44.
Luis Henrique Gibeli Gean Davis Breda Rodrigo Sanches Miani Bruno Bogaz Zarpelão Leonardo de Souza Mendes 《International Journal of Network Management》2013,23(2):137-153
In the last century, owing to the constant evolution of technologies telecommunication networks have become increasingly robust, being able to support multiple services. These services are part of the heterogeneous network traffic that can be carried through the Internet. Many of these services, including VoIP, are latency sensitive. In other words, this means that their quality depends directly on the network quality of service. Since users tend to become more sensitive with the instability and unavailability of the network, it is important to improve traffic management. A particular type of data that could be used to improve VoIP traffic management is the Internet Protocol Detail Record (IPDR). IPDRs are tickets created by all VoIP call attempts which contain a group of information related to the call history. Because of its full range of information, IPDRs can be used to create VoIP traffic baselines. This paper presents the development of baselines based on IPDRs to support VoIP traffic management in open‐access Metropolitan Area Networks (MAN). Copyright © 2013 John Wiley & Sons, Ltd. 相似文献
45.
The complexity of modern hardware design has created the need for higher levels of abstraction, where system modeling is used to integrate modules into complex System-on-Chip (SoCs) platforms. SystemC, and its TLM (Transaction Level Modeling) extensions, have been used for this purpose mainly because of their fast prototyping and simulation features, which allow for early design space exploration. This paper proposes an approach to explore and interact with SystemC models by means of an introspection technique known as Computational Reflection. We use reflection to implement a white-box introspection mechanism called ReflexBox. We show that ReflexBox is a fast, non-intrusive technique that can be used to dynamically gather and inject stimuli into any SystemC module, without the need to use a proprietary SystemC implementation, change the SystemC library, instrument or even inspect the module source code. Our approach can be used to support many different verification tasks like platform debugging, performance evaluation and communication analysis. To show ReflexBox effectiveness we used it in three platforms case studies to address tasks like register inspection, performance analysis and signal replaying for testbench reuse. In all cases we assumed no source code availability and measured the impact on the overall platform performance. 相似文献
46.
47.
48.
Hokland SL Pedersen M Salomir R Quesson B Stødkilde-Jørgensen H Moonen CT 《IEEE transactions on medical imaging》2006,25(6):723-731
Focused ultrasound is very well suited for inducing noninvasive local hyperthermia. Since magnetic resonance imaging (MRI) may be employed to obtain real-time temperature maps noninvasively the combination of these two technologies offers great advantages specifically aimed toward oncological studies. Real-time identification of the target region and accurate control of the temperature evolution during the treatment has now become possible. Thermal ablation of pathological tissue, local drug delivery using thermosensitive micro-carriers and controlled transgene expression using thermosensitive promoters have recently been demonstrated with this unique technology. Based on these experiments combined focused ultrasound and MRI thermometry holds promise for future oncological diagnostics and treatment. In this paper, we review some of the recent methodological developments as well as experimental and first clinical studies using this approach. 相似文献
49.
Jean Augereau Yves Ousten Bruno Levrier Laurent Bechou 《Microelectronics Reliability》2006,46(9-11):1922-1925
Assembly technologies follow the reduction in size of circuit board components and correlatively the number of active layers increases significantly. Therefore, during a conventional acoustic analysis, the obtained image becomes more and more complicated to analyze. In a previous paper, we focused our research on a method for a suitable visualization of the timescale of an acoustic signal (CWT). In this paper we present the use of the non-destructive control for the study of a 3D package submitted to accelerated ageing tests using harsh conditions. 相似文献
50.
This letter presents a novel analytical framework that jointly accounts the energy consumption and the link stability of mobile nodes. Two indexes for energy and link-lifetime are defined and a multiobjective integer linear programming problem has been defined. The proposed target function separates the energy and the link-stability contributions in order to differently change the weights of two opposite characteristics of mobile ad hoc networks. Some simulation results has been presented and the jointed impact of energy and stability has been evaluated. 相似文献