首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3596篇
  免费   197篇
  国内免费   22篇
电工技术   60篇
综合类   8篇
化学工业   1009篇
金属工艺   84篇
机械仪表   101篇
建筑科学   85篇
矿业工程   8篇
能源动力   262篇
轻工业   299篇
水利工程   39篇
石油天然气   51篇
无线电   373篇
一般工业技术   628篇
冶金工业   189篇
原子能技术   39篇
自动化技术   580篇
  2024年   7篇
  2023年   57篇
  2022年   167篇
  2021年   190篇
  2020年   154篇
  2019年   180篇
  2018年   229篇
  2017年   176篇
  2016年   205篇
  2015年   133篇
  2014年   179篇
  2013年   365篇
  2012年   197篇
  2011年   228篇
  2010年   170篇
  2009年   153篇
  2008年   121篇
  2007年   79篇
  2006年   95篇
  2005年   58篇
  2004年   56篇
  2003年   46篇
  2002年   52篇
  2001年   28篇
  2000年   27篇
  1999年   17篇
  1998年   64篇
  1997年   38篇
  1996年   41篇
  1995年   28篇
  1994年   27篇
  1993年   26篇
  1992年   24篇
  1991年   18篇
  1990年   14篇
  1989年   18篇
  1988年   13篇
  1987年   13篇
  1986年   6篇
  1985年   12篇
  1984年   10篇
  1983年   9篇
  1982年   8篇
  1981年   10篇
  1980年   10篇
  1979年   8篇
  1978年   9篇
  1977年   8篇
  1976年   13篇
  1971年   4篇
排序方式: 共有3815条查询结果,搜索用时 11 毫秒
71.
A simple selective erasure forward error correction (FEC) technique for differential phase shift keyed (DPSK) data is presented. The method provides a modest coding gain and requires very little overhead and computation. It is very similar to the Wagner code and may be useful as a stand alone technique in some applications and as a preconditioner to more sophisticated FEC techniques in others  相似文献   
72.

Considering the internet of things (IoT), end nodes such as wireless sensor network, RFID and embedded systems are used in many applications. These end nodes are known as resource-constrained devices in the IoT network. These devices have limitations such as computing and communication power, memory capacity and power. Key pre-distribution schemes (KPSs) have been introduced as a lightweight solution to key distribution in these devices. Key pre-distribution is a special type of key agreement that aims to select keys called session keys in order to establish secure communication between devices. One of these design types is the using of combinatorial designs in key pre-distribution, which is a deterministic scheme in key pre-distribution and has been considered in recent years. In this paper, by introducing a key pre-distribution scheme of this type, we stated that the model introduced in the two benchmarks of KPSs comparability had full connectivity and scalability among the designs introduced in recent years. Also, in recent years, among the combinatorial design-based key pre-distribution schemes, in order to increase resiliency as another criterion for comparing KPSs, attempts were made to include changes in combinatorial designs or they combine them with random key pre-distribution schemes and hybrid schemes were introduced that would significantly reduce the design connectivity. In this paper, using theoretical analysis and maintaining full connectivity, we showed that the strength of the proposed design was better than the similar designs while maintaining higher scalability.

  相似文献   
73.
This paper presents a simple and efficient multiple access interference (MAI) cancelation technique in optical code division multiple access (OCDMA) system. The proposed technique is based on hybrid frequency shift keying (FSK) with an enhanced modified prime code as a signature sequence for coding techniques. Coherent FSK modulation along with incoherent demodulation using Arrayed-Waveguide Grating has been examined in the transceiver structure. In the proposed technique, a reference signal is constructed by using one of the addressed spreading sequences, and MAI cancelation is performed by subtracting the reference signal from the received signal of the desired user. The performance of the proposed FSK-OCDMA system is compared with the performance of the existing pulse position modulation (PPM)–OCDMA system. The simulation results reveal that the bit-error rate performance of the proposed technique is superior to the performance of the pulse position modulation (PPM) technique. Also, the results indicate that the proposed technique is very power efficient, and when the bit rate is constant, the network capacity can be expanded to accommodate a large number of simultaneous active users with low error rate. Moreover, the proposed technique simplifies the hardware of the receiver design.  相似文献   
74.
75.
The emission and conductivity characteristics of oxide cathodes depend largely on the activation process. In this paper, the electrical properties of new type of oxide cathodes for cathode ray tube (CRT) application, supplied by LG Philips Displays, have been investigated in relation to different cathode activation regimes. The influence of the activation process over different durations has been investigated. A temperature of T=1425 K was chosen to be higher than the optimum cathode activation temperature (T=1200 K), and the other temperature of T=1125 K was lower than that. The electron activation energy (E) was found to vary in the range from 0.58 to 2.28 eV for cathodes activated at the higher temperature regime, and from 1.08 to 1.9 eV for those activated at the lower temperature regime. Scanning electron microscopy (SEM) and electron diffraction X-ray (EDX) analyses show a structural phase transformation in the oxide material that was activated at 1125 K for a period of 1-12 hours. The SEM mapping shows a large contamination of Ba in the top layer of oxide material. The activator agents tungsten and aluminum are found to penetrate into the BaO/spl bsol/SrO layer in two different ways.  相似文献   
76.

The edge computing model offers an ultimate platform to support scientific and real-time workflow-based applications over the edge of the network. However, scientific workflow scheduling and execution still facing challenges such as response time management and latency time. This leads to deal with the acquisition delay of servers, deployed at the edge of a network and reduces the overall completion time of workflow. Previous studies show that existing scheduling methods consider the static performance of the server and ignore the impact of resource acquisition delay when scheduling workflow tasks. Our proposed method presented a meta-heuristic algorithm to schedule the scientific workflow and minimize the overall completion time by properly managing the acquisition and transmission delays. We carry out extensive experiments and evaluations based on commercial clouds and various scientific workflow templates. The proposed method has approximately 7.7% better performance than the baseline algorithms, particularly in overall deadline constraint that gives a success rate.

  相似文献   
77.
In cooperative wireless networks, relay nodes are employed to improve the performance of the network in terms of throughput and reliability. However, the presence of malicious relay nodes in the network may severely degrade the performance of the system. When a relay node behaves maliciously, there exists a possibility that such a node refuses to cooperate when it is selected for cooperation or deliberately drops the received packets. Trust establishment is a mechanism to detect misbehaving nodes in a network. In this paper, we propose a trust establishment method for cooperative wireless networks by using Bayesian framework. In contrast with the previous schemes proposed in wireless networks, this approach takes the channel state information and the relay selection decisions into account to derive a pure trust value for each relay node. The proposed method can be applied to any cooperative system with a general relay selection policy whose decisions in each cooperative transmission are independent of the previous ones. Moreover, it does not impose additional communication overhead on the system as it uses the available information in relay selection procedure. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   
78.
In this paper, a hybrid method is proposed for multi-channel electroencephalograms (EEG) signal compression. This new method takes advantage of two different compression techniques: fractal and wavelet-based coding. First, an effective decorrelation is performed through the principal component analysis of different channels to efficiently compress the multi-channel EEG data. Then, the decorrelated EEG signal is decomposed using wavelet packet transform (WPT). Finally, fractal encoding is applied to the low frequency coefficients of WPT, and a modified wavelet-based coding is used for coding the remaining high frequency coefficients. This new method provides improved compression results as compared to the wavelet and fractal compression methods.  相似文献   
79.
One great challenge in wireless communication systems is to ensure reliable communications. Turbo codes are known by their interesting capabilities to deal with transmission errors. In this paper, we present a novel turbo decoding scheme based on soft combining principle. Our method improves decoding performance using soft combining technique inside the turbo decoder. Working on Max-Log-Maximum a Posteriori (Max-Log-MAP) turbo decoding algorithm and using an Additive White Gaussian Noise (AWGN) channel model and 16 Quadrature Amplitude Modulation (16QAM), simulation results show that the suggested solution is efficient and outperforms the conventional Max-Log-MAP algorithm in terms of Bit Error Rate (BER). The performance analysis is carried out in terms of BER by varying parameters such as the Energy per bit to Noise power spectral density ratio ( \(\text {E}_{\text {b}}/\text {N}_{\text {o}}\) ), and decoding iterations number. We call our proposed solution Soft Combined Turbo Codes.  相似文献   
80.
Hershey  J.E. Molnar  K. Hassan  A. 《Electronics letters》1992,28(18):1721-1722
The authors suggest that effective algorithms for spectrum search, such as those used for detecting spread spectrum signals, may be derived by selecting suboptimal algorithms and then recovering some of the lost efficacy through parallelisation methods. This thesis is motivated by considering a simple yet meaningful example of a spectrum search technique that exhibits what at first may seem to be counterintuitive behaviour.<>  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号