首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2947篇
  免费   177篇
  国内免费   1篇
电工技术   86篇
综合类   4篇
化学工业   710篇
金属工艺   61篇
机械仪表   99篇
建筑科学   102篇
矿业工程   8篇
能源动力   118篇
轻工业   489篇
水利工程   14篇
石油天然气   13篇
无线电   179篇
一般工业技术   760篇
冶金工业   28篇
原子能技术   11篇
自动化技术   443篇
  2023年   22篇
  2022年   11篇
  2021年   59篇
  2020年   56篇
  2019年   68篇
  2018年   116篇
  2017年   108篇
  2016年   140篇
  2015年   99篇
  2014年   144篇
  2013年   326篇
  2012年   205篇
  2011年   217篇
  2010年   181篇
  2009年   128篇
  2008年   136篇
  2007年   118篇
  2006年   95篇
  2005年   52篇
  2004年   32篇
  2003年   49篇
  2002年   38篇
  2001年   31篇
  2000年   36篇
  1999年   30篇
  1998年   23篇
  1997年   15篇
  1996年   27篇
  1995年   20篇
  1994年   29篇
  1993年   23篇
  1992年   23篇
  1991年   20篇
  1990年   20篇
  1989年   17篇
  1988年   13篇
  1985年   32篇
  1984年   34篇
  1983年   28篇
  1982年   24篇
  1981年   36篇
  1980年   32篇
  1979年   27篇
  1978年   24篇
  1977年   19篇
  1976年   21篇
  1975年   13篇
  1974年   11篇
  1973年   14篇
  1972年   15篇
排序方式: 共有3125条查询结果,搜索用时 11 毫秒
21.
22.
A statistical approach to cryptanalysis of a memoryless function of clock-controlled shift registers is introduced. In the case of zero-order correlation immunity, an algorithm for a shift register initial state reconstruction based on the sequence comparison concept is proposed. A constrained Levenshtein distance relevant for the cryptanalysis is defined and a novel recursive procedure for its efficient computation is derived. Preliminary experimental results are given and open theoretic problems are discussed.Following [11], a Boolean function f(x 1,..., x n) is said to be mth-order correlation immune if m is the maximum integer such that the random variable f(X 1,..., X n) is statistically independent of every set of m random variables chosen from the balanced and independent binary random variables X 1,..., X n.  相似文献   
23.
A new method for accurate determination of noise parameters of microwave transistors for various bias conditions is proposed in this paper. The proposed model consists of a transistor empirical noise model (modification of Pospieszalski’s noise model) and two artificial neural networks. With the aim to avoid extraction of the empirical model parameters for each bias point, an artificial neural network is used to introduce bias-dependence of the equivalent circuit parameters. Accuracy of such bias-dependent model is further improved by using an additional neural network aimed to correct the noise parameters’ values. The proposed modeling approach is exemplified by modelling of a MESFET device in packaged form. The noise parameters obtained by the simulation agree well with the measured data.  相似文献   
24.
A method for calculation the impulse response of a depletion layer of a semiconductor device based on Ramo's theorem is described. Using this method the impulse response of a reach-through avalanche photodiode is derived.  相似文献   
25.
This paper presents a multimodal biometrie verification system based on the following hand features: palmprint, four digitprints and four fingerprints. The features are obtained using the Karhunen-Loève transform based approach, and information fusion at the matching-score level was applied. We experimented with different resolutions of the regions of interest, different numbers of features and several normalization and fusion techniques at the matching-score level. To increase the reliability of the system to spoof attacks we included an aliveness-detection module based on thermal images of the hand dor sa. The verification performance when using a system configuration with optimum parameters, i.e., resolution, number of features, normalization and fusion technique, showed an equal error rate (EER) of 0.0020%, which makes the system appropriate for the implementation of high-security biometric systems.  相似文献   
26.
This paper presents linear pulse response of a Resonant Cavity Enhanced (RCE) P-i-N fotodiode. The RCE P-i-N photodiode designed for high-speed aplication is analysed for various submicron thicknesses of absorption layer, bias voltages, active areas and incident pulse optical excitations. The results are obtained by numerical simulation of the complete phenomenological model for two valley semiconductor. Great enhancement of the quantum efficiency and the product bandwidth-quantum efficiency, is obvious from obtained results for this photodiode type.  相似文献   
27.
In this article, the all-pole low-pass filter function with mini-max for the summed sensitivity function in the pass-band is considered. With the application of Chebyshev polynomials of the first kind, the proposed filter function is obtained in an explicit form with a maximum number of oscillations of the summed sensitivity function in the pass-band. The calculation of the filter function is derived by using the summed sensitivity function as a starting point. New original approximation function is derived in order to achieve a mini-max summed sensitivity function in the filter pass-band. Sensitivity analysis is carried out and a comparison of the summed sensitivity and the group delay of the proposed and classical all-pole filters is given. Minimisation of the summed sensitivity function is important for reduction of the deviation of the magnitude response caused by temperature changes of the continuous-time active filters implemented into the analogue front end or as programmable chips.  相似文献   
28.
In modern wireless ad hoc networks, with a high speed PHY, every collision means a significant loss of useful bandwidth. In the last few years different binary contention protocols have been introduced to address this problem. In this work we propose a novel binary contention protocol called binary priority countdown (BPC) protocol, whose goal is to reduce collisions as well as contention time. BPC uses a new priority countdown mechanism which exploits the efficiency of binary countdown, but the priority countdown process is not constrained to a single binary countdown round. This way, the priority space is not defined by the length of binary countdown round, like in other binary countdown protocols proposed in the literature, and arbitrary medium access priorities can be decremented through multiple binary countdown rounds if necessary. The ability of a new priority countdown mechanism to count down any priority number without changing the length of a binary countdown round, allows independent management of priority space. This “independence” of priority space introduces new optimization and adaptation possibilities. Collision memory effect is recognized and described. BPC protocol reveals connection between unary, binary and digit contention protocols. All three groups of protocols can now be seen as members of the same class of contention algorithms. Preliminary simulation results are shown.  相似文献   
29.
In this article, we study the blocking probability in a wavelength division multiplexing (WDM) based asynchronous bufferless optical burst switched (OBS) network, equipped with a bank of wavelength converters. Our analysis encloses two wavelength reservation schemes JIT (just-in-time) and JET (just-enough-time), and two-class data rate. The contribution of our work includes: (i) derivation of an accurate model for blocking probability of lower priority bursts in case of a non-preempted model; (ii) provision of the analytical model for blocking probability calculation in the OBS network, which includes these variables: two signaling schemes, partial wavelength conversion, two-class data, traffic intensity, cross-connect speed, number of wavelengths in WDM fiber, number of fibers in the node, number of wavelength converters, and number of nodes in the path; (iii) simulation results, which show that partial wavelength conversion provide quite satisfactory quality of service. We compare performance in a single OBS node, under various sets of parameter values. The OBS network shows great flexibility in terms of used multiclass data, and there is no dependence on the used higher layer protocol.  相似文献   
30.
In this paper, we present a new approach for the progressive compression of three‐dimensional (3D) mesh geometry using redundant frame dictionaries and sparse approximation techniques. We construct the proposed frames from redundant linear combinations of the eigenvectors of a combinatorial mesh Laplacian matrix. We achieve a sparse synthesis of the mesh geometry by selecting atoms from a frame using matching pursuit. Experimental results show that the resulting rate‐distortion performance compares favorably with other progressive mesh compression algorithms in the same category, even when a very simple, sub‐optimal encoding strategy is used for the transmitted data. The proposed frames also have the desirable property of being able to be applied directly to a manifold mesh having arbitrary topology and connectivity types; thus, no initial remeshing is required and the original mesh connectivity is preserved.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号