首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3189篇
  免费   153篇
  国内免费   4篇
电工技术   35篇
综合类   3篇
化学工业   839篇
金属工艺   58篇
机械仪表   79篇
建筑科学   96篇
矿业工程   35篇
能源动力   151篇
轻工业   390篇
水利工程   29篇
石油天然气   8篇
无线电   259篇
一般工业技术   437篇
冶金工业   354篇
原子能技术   31篇
自动化技术   542篇
  2024年   10篇
  2023年   42篇
  2022年   104篇
  2021年   150篇
  2020年   98篇
  2019年   82篇
  2018年   103篇
  2017年   90篇
  2016年   108篇
  2015年   79篇
  2014年   148篇
  2013年   211篇
  2012年   207篇
  2011年   212篇
  2010年   167篇
  2009年   130篇
  2008年   162篇
  2007年   131篇
  2006年   92篇
  2005年   84篇
  2004年   63篇
  2003年   46篇
  2002年   52篇
  2001年   45篇
  2000年   41篇
  1999年   37篇
  1998年   61篇
  1997年   44篇
  1996年   45篇
  1995年   45篇
  1994年   29篇
  1993年   39篇
  1992年   20篇
  1991年   26篇
  1990年   14篇
  1989年   14篇
  1988年   15篇
  1987年   15篇
  1986年   14篇
  1985年   18篇
  1984年   17篇
  1983年   13篇
  1982年   21篇
  1981年   15篇
  1980年   11篇
  1979年   11篇
  1977年   16篇
  1972年   11篇
  1944年   10篇
  1943年   21篇
排序方式: 共有3346条查询结果,搜索用时 15 毫秒
41.
Some statistical properties of mathematical morphology   总被引:4,自引:0,他引:4  
Analyzes the statistical properties of the basic binary and multilevel morphological operations with both 1-D and 2D structuring elements. Very simple expressions for the output distribution of erosion and opening are derived in the case of any independent identically or nonidentically distributed inputs. The probability relations between erosion and dilation, also between opening and closing, are developed. The output expectation bias and variances are analyzed and computed to show the efficiency of morphological operations for noise supression. As applications of theoretical results, the effects of the morphological operations on noisy signals are illustrated by several examples. The study reveals certain interesting phenomena. For example, the output variances of opening for some input distributions are greater than those of erosion, and morphological operations perform better than median filters in edge preservation  相似文献   
42.
The design of secure ICs requires fulfilling means conforming to many design rules in order to protect access to secret data. On the other hand, designers of secure chips cannot neglect the testability of their chip since high quality production testing is primordial to a good level of security. However, security requirements may be in conflict with test needs and testability improvement techniques that increase both observability and controllability. In this paper, we propose to merge security and testability requirements in a control-oriented design for security scan technique. The proposed security scan design methodology induces an adaptation of two main aspects of testability technique design: protection at protocol level and at scan path level. Without loss of generality, the proposed solution is evaluated on a simple crypto chip in terms of security and design cost.
Bruno Rouzeyre (Corresponding author)Email:
  相似文献   
43.
In the last years, the number of Wi-Fi hotspots at public venues has undergone a substantial growth, promoting the WLAN technologies as the ubiquitous solution to provide high-speed wireless connectivity in public areas. However, the adoption of a random access CSMA-based paradigm for the 802.11 MAC protocol makes difficult to ensure high throughput and a fair allocation of radio resources in 802.11-based WLANs. In this paper we evaluate extensively via simulations the interaction between the flow control mechanisms implemented at the TCP layer and the contention avoidance techniques used at the 802.11 MAC layer. We conducted our study considering initially M wireless stations performing downloads from the Internet. From our results, we observed that the TCP downlink throughput is not limited by the collision events, but by the inability of the MAC protocol to assign a higher chance of accessing the channel to the base station. We propose a simple and easy to implement modification of the base station’s behavior with the purpose of increasing the TCP throughput reducing useless MAC protocol overheads. With our scheme, the base station is allowed to transmit periodically bursts of data frames towards the mobile hosts. We design a resource allocation protocol aimed at maximizing the success probability of the uplink transmissions by dynamically adapting the burst length to the collision probability estimated by the base station. By its design, our scheme is also beneficial to achieve a fairer allocation of the channel bandwidth among the downlink and uplink flows, and among TCP and UDP flows. Simulation results confirm both the improvement in the TCP downlink throughput and the reduction of system unfairness.  相似文献   
44.
In the last century, owing to the constant evolution of technologies telecommunication networks have become increasingly robust, being able to support multiple services. These services are part of the heterogeneous network traffic that can be carried through the Internet. Many of these services, including VoIP, are latency sensitive. In other words, this means that their quality depends directly on the network quality of service. Since users tend to become more sensitive with the instability and unavailability of the network, it is important to improve traffic management. A particular type of data that could be used to improve VoIP traffic management is the Internet Protocol Detail Record (IPDR). IPDRs are tickets created by all VoIP call attempts which contain a group of information related to the call history. Because of its full range of information, IPDRs can be used to create VoIP traffic baselines. This paper presents the development of baselines based on IPDRs to support VoIP traffic management in open‐access Metropolitan Area Networks (MAN). Copyright © 2013 John Wiley & Sons, Ltd.  相似文献   
45.
The complexity of modern hardware design has created the need for higher levels of abstraction, where system modeling is used to integrate modules into complex System-on-Chip (SoCs) platforms. SystemC, and its TLM (Transaction Level Modeling) extensions, have been used for this purpose mainly because of their fast prototyping and simulation features, which allow for early design space exploration. This paper proposes an approach to explore and interact with SystemC models by means of an introspection technique known as Computational Reflection. We use reflection to implement a white-box introspection mechanism called ReflexBox. We show that ReflexBox is a fast, non-intrusive technique that can be used to dynamically gather and inject stimuli into any SystemC module, without the need to use a proprietary SystemC implementation, change the SystemC library, instrument or even inspect the module source code. Our approach can be used to support many different verification tasks like platform debugging, performance evaluation and communication analysis. To show ReflexBox effectiveness we used it in three platforms case studies to address tasks like register inspection, performance analysis and signal replaying for testbench reuse. In all cases we assumed no source code availability and measured the impact on the overall platform performance.  相似文献   
46.
47.
48.
Focused ultrasound is very well suited for inducing noninvasive local hyperthermia. Since magnetic resonance imaging (MRI) may be employed to obtain real-time temperature maps noninvasively the combination of these two technologies offers great advantages specifically aimed toward oncological studies. Real-time identification of the target region and accurate control of the temperature evolution during the treatment has now become possible. Thermal ablation of pathological tissue, local drug delivery using thermosensitive micro-carriers and controlled transgene expression using thermosensitive promoters have recently been demonstrated with this unique technology. Based on these experiments combined focused ultrasound and MRI thermometry holds promise for future oncological diagnostics and treatment. In this paper, we review some of the recent methodological developments as well as experimental and first clinical studies using this approach.  相似文献   
49.
Assembly technologies follow the reduction in size of circuit board components and correlatively the number of active layers increases significantly. Therefore, during a conventional acoustic analysis, the obtained image becomes more and more complicated to analyze. In a previous paper, we focused our research on a method for a suitable visualization of the timescale of an acoustic signal (CWT). In this paper we present the use of the non-destructive control for the study of a 3D package submitted to accelerated ageing tests using harsh conditions.  相似文献   
50.
This letter presents a novel analytical framework that jointly accounts the energy consumption and the link stability of mobile nodes. Two indexes for energy and link-lifetime are defined and a multiobjective integer linear programming problem has been defined. The proposed target function separates the energy and the link-stability contributions in order to differently change the weights of two opposite characteristics of mobile ad hoc networks. Some simulation results has been presented and the jointed impact of energy and stability has been evaluated.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号