首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5612篇
  免费   280篇
  国内免费   53篇
电工技术   79篇
综合类   14篇
化学工业   1162篇
金属工艺   125篇
机械仪表   166篇
建筑科学   122篇
矿业工程   29篇
能源动力   295篇
轻工业   481篇
水利工程   59篇
石油天然气   42篇
无线电   639篇
一般工业技术   1266篇
冶金工业   551篇
原子能技术   66篇
自动化技术   849篇
  2024年   24篇
  2023年   120篇
  2022年   295篇
  2021年   442篇
  2020年   269篇
  2019年   300篇
  2018年   318篇
  2017年   270篇
  2016年   262篇
  2015年   175篇
  2014年   227篇
  2013年   433篇
  2012年   257篇
  2011年   285篇
  2010年   192篇
  2009年   161篇
  2008年   152篇
  2007年   135篇
  2006年   119篇
  2005年   85篇
  2004年   65篇
  2003年   79篇
  2002年   61篇
  2001年   54篇
  2000年   49篇
  1999年   64篇
  1998年   156篇
  1997年   129篇
  1996年   98篇
  1995年   73篇
  1994年   61篇
  1993年   57篇
  1992年   36篇
  1991年   43篇
  1990年   35篇
  1989年   31篇
  1988年   25篇
  1987年   29篇
  1986年   34篇
  1985年   32篇
  1984年   26篇
  1983年   30篇
  1982年   13篇
  1981年   13篇
  1980年   11篇
  1978年   16篇
  1977年   17篇
  1976年   23篇
  1973年   8篇
  1972年   8篇
排序方式: 共有5945条查询结果,搜索用时 15 毫秒
101.
Network quality of service (NQoS) of IP networks is unpredictable and impacts the quality of networked multimedia services. Adaptive voice and video schemes are therefore vital for the provision of voice over IP (VoIP) services for optimised quality of experience (QoE). Traditional adaptation schemes based on NQoS do not take perceived quality into consideration even though the user is the best judge of quality. Additionally, uncertainties inherent in NQoS parameter measurements make the design of adaptation schemes difficult and their performance suboptimal. This paper presents a QoE-driven adaptation scheme for voice and video over IP to solve the optimisation problem to provide optimal QoE for networked voice and video applications. The adaptive VoIP architecture was implemented and tested both in NS2 and in an Open IMS Core network to allow extensive simulation and test-bed evaluation. Results show that the scheme was optimally responsive to available network bandwidth and congestion for both voice and video and optimised delivered QoE for different network conditions, and is friendly to TCP traffic.  相似文献   
102.
In this work, a fast approach for the fabrication of hundreds of ultraclean field‐effect transistors (FETs) is introduced, using single‐walled carbon nanotubes (SWCNTs). The synthesis of the nanomaterial is performed by floating‐catalyst chemical vapor deposition, which is employed to fabricate high‐performance thin‐film transistors. Combined with palladium metal bottom contacts, the transport properties of individual SWCNTs are directly unveiled. The resulting SWCNT‐based FETs exhibit a mean field‐effect mobility, which is 3.3 times higher than that of high‐quality solution‐processed CNTs. This demonstrates that the hereby used SWCNTs are superior to comparable materials in terms of their transport properties. In particular, the on–off current ratios reach over 30 million. Thus, this method enables a fast, detailed, and reliable characterization of intrinsic properties of nanomaterials. The obtained ultraclean SWCNT‐based FETs shed light on further study of contamination‐free SWCNTs on various metal contacts and substrates.  相似文献   
103.
Our understanding of social insect behavior has significantly influenced artificial intelligence (AI) and multirobot systems' research (e.g., ant algorithms and swarm robotics). In this work, however, we focus on the opposite question: "How can multirobot systems research contribute to the understanding of social animal behavior?" As we show, we are able to contribute at several levels. First, using algorithms that originated in the robotics community, we can track animals under observation to provide essential quantitative data for animal behavior research. Second, by developing and applying algorithms originating in speech recognition and computer vision, we can automatically label the behavior of animals under observation. In some cases the automatic labeling is more accurate and consistent than manual behavior identification. Our ultimate goal, however, is to automatically create, from observation, executable models of behavior. An executable model is a control program for an agent that can run in simulation (or on a robot). The representation for these executable models is drawn from research in multirobot systems programming. In this paper we present the algorithms we have developed for tracking, recognizing, and learning models of social animal behavior, details of their implementation, and quantitative experimental results using them to study social insects.  相似文献   
104.
A waveguide crossing utilizing a high index contrast material system is presented. The structure is based on coupling with an octagonal resonant cavity inserted at the waveguide junction. It also employs four identical square metal strips placed at the four comers of the waveguide crossing. The spectral response of the structure calculated using the method of line numerical technique, in general, shows a high power transmission in the forward arm with sufficiently low crosstalk and fraction of radiated power.  相似文献   
105.
Sb-doped magnesium silicide compounds have been prepared through ball milling and solid-state reaction. Materials produced were near-stoichiometric. The structural modifications have been studied with powder x-ray diffraction. Highly dense pellets of Mg2Si1?x Sb x (0 ≤ x ≤ 0.04) were fabricated via hot pressing and studied in terms of Seebeck coefficient, electrical and thermal conductivity, and free carrier concentration as a function of Sb concentration. Their thermoelectric performance in the high temperature range is presented, and the maximum value of the dimensionless figure of merit was found to be 0.46 at 810 K, for the Mg2Si0.915Sb0.015 member.  相似文献   
106.
107.
Last decade belongs to business intelligence (BI) because it is one of the few concepts that have actually lived to the expectations. Not only the businesses have adopted it but also have reaped the fruits out of it. But the cost of BI solutions is very high and has restricted small and medium enterprises to use BI solutions. The human resource is also limited and resultantly expensive in this field. This research proposes a web support system for business intelligence which provides automated data mapping and loading from user application to BI framework and also validates it. The system also assists users in getting the outputs in terms of reports and dashboards. The implementation of the proposed framework demonstrates convenience of use and effective cost saving as it does not require any technical expertise. The beauty of this web support system is that all the steps are menu driven and any non-technical user can get hold of it easily.  相似文献   
108.
The paper discusses a sequence detector based on univariate marginal distribution algorithm (UMDA) that jointly estimates the symbols transmitted in a multiple input multiple output (MIMO) communication system. While an optimal maximum likelihood detection using an exhaustive search method is prohibitively complex, it has been shown that sphere decoder (SD) achieves the optimal bit error rate (BER) performance with polynomial time complexity for smaller array sizes. However, the worst‐case complexity of SD is exponential in the problem dimensions, this brings in question its practical implementation for larger number of spatial layers and for higher‐order signal constellation. The proposed detector shows promising results for this overly difficult and complicated operating environment, confirmed through simulation results. A performance comparison of the UMDA detector with SD is presented for higher‐order complex MIMO architectures with limited average transmit power. The proposed detector achieves substantial performance gain for higher‐order systems attaining a near optimal BER performance with reduced computational complexity as compared with SD. Copyright © 2009 John Wiley & Sons, Ltd.  相似文献   
109.
Recently, Jiang et al. and He et al. independently found security problems in Chen et al.'s remote user authentication scheme for non‐tamper‐proof storage devices like Universal Serial Bus stick and proposed improvements. Nonetheless, we detect that the schemes proposed by Jiang et al. and He et al. overlook a user's privacy. We also observe that Jiang et al.'s scheme is vulnerable to insider attack and denial of service attacks and lacks forward secrecy. We point out that the password changing facility in He et al.'s scheme is equivalent to undergoing registration, whereas in Jiang et al.'s scheme, it is unsuitable. Moreover, the login phase of both the schemes is incapable to prevent the use of wrong password leading to the computation of an unworkable login request. Therefore, we design a new scheme with user anonymity to surmount the identified weaknesses. Without adding much in communication/computational cost, our scheme provides more security characteristics and keeps the merits of the original schemes. As compared with its predecessor schemes, the proposed scheme stands out as a more apt user authentication method for common storage devices. We have also presented a formal proof of security of the proposed scheme based on the logic proposed by Burrows, Abadi and Needham (BAN logic). Copyright © 2014 John Wiley & Sons, Ltd.  相似文献   
110.
A non-intrusive design for monitoring everyday activities of an elderly person is presented. The proposed system is intended to be used in the bedroom, allowing the elders to stay at home in a safe environment. The required hardware design is simple in structure and cost effective. The sensor design is implemented by using capacitive sensors and an Arduino microcontroller unit. And a real time graphical user interface is implemented to monitor the elderly person. The performance analysis shows that the sensor design is able to differentiate between a human body and a house pet.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号