首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   906833篇
  免费   12629篇
  国内免费   2081篇
电工技术   16544篇
综合类   806篇
化学工业   138336篇
金属工艺   35283篇
机械仪表   27530篇
建筑科学   21565篇
矿业工程   5556篇
能源动力   23700篇
轻工业   75973篇
水利工程   10104篇
石油天然气   19113篇
武器工业   64篇
无线电   99521篇
一般工业技术   178849篇
冶金工业   171325篇
原子能技术   20007篇
自动化技术   77267篇
  2021年   8317篇
  2020年   6139篇
  2019年   7867篇
  2018年   13438篇
  2017年   13475篇
  2016年   14186篇
  2015年   9372篇
  2014年   15602篇
  2013年   41495篇
  2012年   24385篇
  2011年   33422篇
  2010年   26650篇
  2009年   29744篇
  2008年   30381篇
  2007年   29986篇
  2006年   26047篇
  2005年   23764篇
  2004年   22733篇
  2003年   22390篇
  2002年   21455篇
  2001年   21139篇
  2000年   19970篇
  1999年   20560篇
  1998年   51133篇
  1997年   36432篇
  1996年   28139篇
  1995年   21283篇
  1994年   18854篇
  1993年   18474篇
  1992年   13704篇
  1991年   12985篇
  1990年   12865篇
  1989年   12453篇
  1988年   11824篇
  1987年   10627篇
  1986年   10379篇
  1985年   11682篇
  1984年   10677篇
  1983年   9908篇
  1982年   9136篇
  1981年   9274篇
  1980年   8838篇
  1979年   8781篇
  1978年   8587篇
  1977年   9908篇
  1976年   12841篇
  1975年   7582篇
  1974年   7214篇
  1973年   7369篇
  1972年   6170篇
排序方式: 共有10000条查询结果,搜索用时 562 毫秒
951.
Most embedded systems have limited amount of memory. In contrast, the memory requirements of the digital signal processing (DSP) and video processing codes (in nested loops, in particular) running on embedded systems is significant. This paper addresses the problem of estimating and reducing the amount of memory needed for transfers of data in embedded systems. First, the problem of estimating the region associated with a statement or the set of elements referenced by a statement during the execution of nested loops is analyzed. For a fixed execution ordering, a quantitative analysis of the number of elements referenced is presented; exact expressions for uniformly generated references and a close upper and lower bound for nonuniformly generated references are derived. Second, in addition to presenting an algorithm that computes the total memory required, this paper also discusses the effect of transformations (that change the execution ordering) on the lifetimes of array variables, i.e., the time between the first and last accesses to a given array location. The term maximum window size is introduced, and quantitative expressions are derived to compute the maximum window size. A detailed analysis of the effect of unimodular transformations on data locality, including the calculation of the maximum window size, is presented.  相似文献   
952.
The effect of spin splitting caused by structural asymmetry (Rashba’s contribution) and bulk asymmetry (Dresselhaus’s contribution) on the magnetoconductance of two-dimensional structures with high mobility of charge carriers is studied. The theory of weak localization with regard to both of the contributions is developed. The theory is valid in the entire region of classically low magnetic fields for arbitrary relations between the frequencies of spin precession and elastic collisions. The suppression of the correction for antilocalization is demonstrated in the case of equal contributions of structural anisotropy and bulk anisotropy to the spin splitting. The effect of the contribution, cubic in the wave vector, to the spin splitting on the quantum magnetoresistance is studied.  相似文献   
953.
It is well-known that noncoherent equal-gain combining (NC-EGC) is the simplest combining technique for noncoherent and differentially coherent communication systems. However, for nonidentical Nakagami-m channels (channels having nonuniform multipath intensity profile (MIP) and/or arbitrary non-integer fading parameters), the use of NC-EGC has three main disadvantages. First, its performance serves as a lossy upper bound to that of the optimum diversity combiner. Second, it results in complicated expressions for the system average error performance. Third, it incurs noncoherent combining loss (does not aid the use of diversity) at relatively low average signal-to-noise ratio (SNR). In this letter, we propose a modified version of the NC-EGC, which is a noncoherent combiner with weighting coefficients, to overcome the disadvantages of the conventional one. We show that this alternative combiner does provide improvements over the conventional N.C-EGC for all values of average SNRs, it does not incur any noncoherent combining loss, and it leads to a design of the receiver whose average error performance can be evaluated easily.  相似文献   
954.
Nash equilibria of packet forwarding strategies in wireless ad hoc networks   总被引:8,自引:0,他引:8  
In self-organizing ad hoc networks, all the networking functions rely on the contribution of the participants. As a basic example, nodes have to forward packets for each other in order to enable multihop communication. In recent years, incentive mechanisms have been proposed to give nodes incentive to cooperate, especially in packet forwarding. However, the need for these mechanisms was not formally justified. In this paper, we address the problem of whether cooperation can exist without incentive mechanisms. We propose a model,based on game theory and graph theory to investigate equilibrium conditions of packet forwarding strategies. We prove theorems about the equilibrium conditions for both cooperative and noncooperative strategies. We perform simulations to estimate the probability that the conditions for a cooperative equilibrium hold in randomly generated network scenarios.. As the problem is involved, we deliberately restrict ourselves to a static configuration. We conclude that in static ad hoc networks where the relationships between the nodes are likely to be stab le-cooperation needs to be encouraged.  相似文献   
955.
This brief presents and compares several recursive and nonrecursive techniques for the efficient computation of the running average of discrete signals. First of all, the standard recursive algorithm is considered and its long-term accuracy is assessed when the floating-point arithmetic is employed. A cheap refreshing strategy is proposed as a means of keeping the computed value close enough to the exact one. Then, two alternative nonrecursive algorithms, requiring only log2N additions, are developed, which are as reliable and accurate as the direct implementation  相似文献   
956.
A new scheme is introduced for obtaining higher stability performance for the symplectic finite-difference time-domain (FDTD) method. Both the stability limit and the numerical dispersion of the symplectic FDTD are determined by a function zeta. It is shown that when the zeta function is a Chebyshev polynomial the stability limit is linearly proportional to the number of the exponential operators. Thus, the stability limit can be increased as much as possible at the cost of increased number of operators. For example, the stability limit of the four-exponential operator scheme is 0.989 and of the eight-exponential operator scheme it is 1.979 for fourth-order space discretization in three dimensions, which is almost three times the stability limit of previously published symplectic FDTD schemes with a similar number of operators. This study also shows that the numerical dispersion errors for this new scheme are less than those of the previously reported symplectic FDTD schemes  相似文献   
957.
We address the problem of global sensor fusion for the purpose of distributed decision-making, from a control-theoretic perspective. In particular, we introduce a quasi-linear stochastic distributed protocol, using which a network of sensing agents can reach agreement in order to take a collective action. Using control-theoretic methods, we design the parameters of our protocol - which include weights in the local update rules used by the agents and a finite stopping time - to achieve agreement in a fair and rapid manner. We show analytically that the developed protocol achieves fair agreement with certainty in the noise-free case and achieves fair agreement with high probability even in the presence of communication noise and assuming very little information storage capability for the agents. Our development is illustrated throughout with a canonical example motivated by autonomous vehicle control.  相似文献   
958.
Security is becoming an everyday concern for a wide range of electronic systems that manipulate, communicate, and store sensitive data. An important and emerging category of such electronic systems are battery-powered mobile appliances, such as personal digital assistants (PDAs) and cell phones, which are severely constrained in the resources they possess, namely, processor, battery, and memory. This work focuses on one important constraint of such devices-battery life-and examines how it is impacted by the use of various security mechanisms. In this paper, we first present a comprehensive analysis of the energy requirements of a wide range of cryptographic algorithms that form the building blocks of security mechanisms such as security protocols. We then study the energy consumption requirements of the most popular transport-layer security protocol: Secure Sockets Layer (SSL). We investigate the impact of various parameters at the protocol level (such as cipher suites, authentication mechanisms, and transaction sizes, etc.) and the cryptographic algorithm level (cipher modes, strength) on the overall energy consumption for secure data transactions. To our knowledge, this is the first comprehensive analysis of the energy requirements of SSL. For our studies, we have developed a measurement-based experimental testbed that consists of an iPAQ PDA connected to a wireless local area network (LAN) and running Linux, a PC-based data acquisition system for real-time current measurement, the OpenSSL implementation of the SSL protocol, and parameterizable SSL client and server test programs. Based on our results, we also discuss various opportunities for realizing energy-efficient implementations of security protocols. We believe such investigations to be an important first step toward addressing the challenges of energy-efficient security for battery-constrained systems.  相似文献   
959.
Fifty-eight commercial yogurt products of seven brands (which claimed to include bifidobacteria) were obtained from local stores in Greensboro, North Carolina, USA. These products were examined at 0, 1, 2, 3 and 4 weeks for the viability of bifidobacteria and yogurt starter culture during refrigerated storage at 4°C. Our results showed that bifidobacteria counts were variable, ranging from 0 to 5.5 log cfu/mL. The average yogurt starter culture counts ranged from 5.20 to 8.87 log cfu/mL and 7.51–8.94 log cfu/mL for Lactobacillus delbrueckii spp. bulgaricus and Streptococcus thermophilus , respectively. Of the 58 products tested, only 44 products (76%) contained viable cultures. Viability of bifidobacteria in yogurt samples remained within the same levels during 3 weeks of storage at 4°C; however, the bacterial count started to decline during the fourth week. These results suggest optimal beneficial consumption of yogurt foods with live bifidobacteria should occur within 3 weeks of production. Results obtained from this research could be used by the industry to develop new technologies to ensure consumers receive high-quality products.  相似文献   
960.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号