首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3597篇
  免费   197篇
  国内免费   22篇
电工技术   60篇
综合类   8篇
化学工业   1010篇
金属工艺   84篇
机械仪表   101篇
建筑科学   85篇
矿业工程   8篇
能源动力   262篇
轻工业   299篇
水利工程   39篇
石油天然气   51篇
无线电   373篇
一般工业技术   628篇
冶金工业   189篇
原子能技术   39篇
自动化技术   580篇
  2024年   7篇
  2023年   57篇
  2022年   167篇
  2021年   190篇
  2020年   154篇
  2019年   180篇
  2018年   229篇
  2017年   176篇
  2016年   205篇
  2015年   133篇
  2014年   179篇
  2013年   365篇
  2012年   197篇
  2011年   228篇
  2010年   170篇
  2009年   153篇
  2008年   121篇
  2007年   79篇
  2006年   95篇
  2005年   58篇
  2004年   57篇
  2003年   46篇
  2002年   52篇
  2001年   28篇
  2000年   27篇
  1999年   17篇
  1998年   64篇
  1997年   38篇
  1996年   41篇
  1995年   28篇
  1994年   27篇
  1993年   26篇
  1992年   24篇
  1991年   18篇
  1990年   14篇
  1989年   18篇
  1988年   13篇
  1987年   13篇
  1986年   6篇
  1985年   12篇
  1984年   10篇
  1983年   9篇
  1982年   8篇
  1981年   10篇
  1980年   10篇
  1979年   8篇
  1978年   9篇
  1977年   8篇
  1976年   13篇
  1971年   4篇
排序方式: 共有3816条查询结果,搜索用时 15 毫秒
31.
A detailed review of the archival reveals that the heat transfer and fluid flow characteristics of circular cavities have not been investigated so far and of course their physical features are not understood. A prominent application of these cavities arises in the miniaturized packaging of electronic components that are subject to strict constraints. This paper addresses primarily steady-state laminar natural convection of air in a circular cavity of diameter H inscribed in a square cavity of side H where the corresponding sides are in contact at four points. A third cavity, an arc–square cavity whose shape lies between the square and circular cavity shapes is included in the analysis. The finite volume method is used to perform the numerical simulations. The methodology takes into account the second-order-accurate QUICK scheme for the discretization of the convective term, whereas the pressure–velocity coupling is handled with the SIMPLE scheme. Since the air is not assumed a Boussinesq gas, it was decided to take all thermophysical properties as temperature-dependent. In the end, it has been demonstrated that the circular cavity possesses a superior balance between heat transfer enhancement and size in cross-section area in comparison with the standard square cavity. The side of the square cavity is similar to the diameter of the circular cavity.  相似文献   
32.
The orthogonal frequency-division multiplexing (OFDM) systems are highly sensitive to the nonlinear distortions introduced by the high-power amplifier at the transmitter and to the in-phase and quadrature (IQ) imbalance of the down converter at the receiver. In this paper, the joint effects of these impairments on the performance of the OFDM systems with M signal points quadrature amplitude modulation (M-QAM) are investigated. Moreover, the analytical formulations for the error vector magnitude, the bit error rate, and the total degradation performances of the M-QAM-OFDM systems in additive white Gaussian noise channels as a function of the output back off and IQ imbalance parameters are derived. The computer simulation results confirm the accuracy and validity of our proposed analytical approach.  相似文献   
33.
In cooperative wireless networks, relay nodes are employed to improve the performance of the network in terms of throughput and reliability. However, the presence of malicious relay nodes in the network may severely degrade the performance of the system. When a relay node behaves maliciously, there exists a possibility that such a node refuses to cooperate when it is selected for cooperation or deliberately drops the received packets. Trust establishment is a mechanism to detect misbehaving nodes in a network. In this paper, we propose a trust establishment method for cooperative wireless networks by using Bayesian framework. In contrast with the previous schemes proposed in wireless networks, this approach takes the channel state information and the relay selection decisions into account to derive a pure trust value for each relay node. The proposed method can be applied to any cooperative system with a general relay selection policy whose decisions in each cooperative transmission are independent of the previous ones. Moreover, it does not impose additional communication overhead on the system as it uses the available information in relay selection procedure. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   
34.
In this paper, a digitally controlled current conveyo(DCCC) is presented. The proposed DCCC is based on rail-to-rail folded cascode implementation with a current division network (CDN). The CDN is used to provide control on the current gain of the DCCC. The CDN uses a novel current division technique based on differential pairs. The proposed DCCC can operate from ±1.5 V supply voltages. Applications of the proposed DCCC such as variable gain amplifiers (VGA) and digitally tunedfilters have been investigated. PSpice simulations based on the AMI 1.2 µm N-well level 3 parameters are in agreement with the presented work.  相似文献   
35.
A point matching method is developed for the evaluation of the performance of the log-periodic dipole antenna (LPDA. Based on this method, the anomalous behaviour of the LPDA is studied and found to be improved at an optimum spacing factor and by selecting a small dipole length to diameter ratio; that is, an LPDA, operating over a given frequency band, must possess an optimum dimension that gives a pattern with eliminated anomalous backlobe peaks.<>  相似文献   
36.
Technology has revolutionized medical practices by enabling more convenient and non‐intrusive monitoring of patient's health, leading to next generation ubiquitous healthcare (u‐healthcare). The exploitation of the Internet protocol version 6 addressing space along with the miniaturization of electronic devices has fostered providing interoperability and connectivity of wearable sensor devices in wireless body area networks to the Internet of Things. In this paper, we propose to integrate the IPv6 over low power wireless personal area network (6LoWPAN) to the u‐healthcare monitoring system architecture. The main objective is to study the feasibility of the 6LoWPAN‐enabled platform in real‐world scenarios dealing with medical data. The performance evaluation of this platform is carried out initially through simulations using OMNet++ and then supported by an experimental study using sensor motes and a customized micro‐computing unit. Performance metrics such as throughput, end‐to‐end delay, packet error rate, and energy consumption are investigated under acute health conditions, where patient's health information has to be sent continuously and at maximum rate to the care provider. The obtained results show that the proposed 6LoWPAN solution fulfills the main quality of service requirements of u‐healthcare applications. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   
37.
Orthogonal Frequency Division Multiplexing (OFDM) systems are commonly used to mitigate frequency-selective multipath fading and provide high-speed data transmission. In this paper, we derive new union bounds on the error probability of a coded OFDM system in wireless environments. In particular, we consider convolutionally coded OFDM systems employing single and multiple transmit antennas over correlated block fading (CBF) channels with perfect channel state information (CSI). Results show that the new union bound is tight to simulation results. In addition, the bound accurately captures the effect of the correlation between sub-carriers channels. It is shown that as the channel becomes more frequency-selective, the performance get better due to the increased frequency diversity. Moreover, the bound also captures the effect of multi-antenna as space diversity. The proposed bounds can be applied for coded OFDM systems employing different coding schemes over different channel models.  相似文献   
38.
Neodymium-doped tantalum pentoxide waveguide lasers   总被引:1,自引:0,他引:1  
The fabrication, spectroscopic properties, and laser performance of Nd/sup 3+/-doped Ta/sub 2/O/sub 5/ channel waveguide lasers are described. Lasing is obtained at both 1.066 and 1.375 /spl mu/m with threshold pump powers as low as 2.7 mW. The rib waveguides are reactive-ion-etched into Nd:Ta/sub 2/O/sub 5/ layers formed by reactive magnetron sputtering. These high-index low-loss rare-earth-doped waveguides are fabricated on silicon substrates and offer the potential for integration with photonic crystal structures for compact optical circuits.  相似文献   
39.
This paper presents a new approach for efficient image transmission over Multi-Carrier Code Division Multiple Access (MC-CDMA) systems using chaotic interleaving. The chaotic interleaving scheme based on Baker map is applied on the image data prior to transmission. The proposed approach transmits images over wireless channels, efficiently, without posing significant constraints on the wireless communication system bandwidth and noise. The performance of the proposed approach is further improved by applying Frequency-Domain Equalization (FDE) at the receiver. Two types of frequency-domain equalizers are considered and compared for performance evaluation of the proposed MC-CDMA system; the Zero-Forcing equalizer and the Linear Minimum Mean Square Error (LMMSE) equalizer. Several experiments are carried out to test the performance of the image transmission with different sizes over the proposed MC-CDMA system. Simulation results show that image transmission over wireless channels using the proposed chaotic interleaving approach is much more immune to noise and fading. Moreover this chaotic interleaving process adds a degree of encryption to the transmitted data. The results also show a noticeable performance improvement in terms of the Root Mean Square Error and Peak Signal-to-Noise Ratio values when applying FDE in the proposed approach, especially with the LMMSE equalizer.  相似文献   
40.
Many applications, such as e-passport, e-health, credit cards, and personal devices that utilize Radio frequency Identification (RFID) devices for authentication require strict security and privacy. However, RFID tags suffer from some inherent weaknesses due to restricted hardware capabilities and are vulnerable to eavesdropping, interception, or modification. The synchronization and untraceability characteristics are the major determinants of RFID authentication protocols. They are strongly related to privacy of tags and availability, respectively. In this paper, we analyze a new lightweight RFID authentication protocol, Song and Mitchell, in terms of privacy and security. We prove that not only is the scheme vulnerable to desynchronization attack, but it suffers from traceability and backward traceability as well. Finally, our improved scheme is proposed which can prevent aforementioned attacks.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号