首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4639篇
  免费   318篇
  国内免费   16篇
电工技术   60篇
综合类   12篇
化学工业   1286篇
金属工艺   106篇
机械仪表   135篇
建筑科学   161篇
矿业工程   5篇
能源动力   358篇
轻工业   598篇
水利工程   71篇
石油天然气   27篇
武器工业   1篇
无线电   490篇
一般工业技术   878篇
冶金工业   147篇
原子能技术   28篇
自动化技术   610篇
  2024年   16篇
  2023年   123篇
  2022年   221篇
  2021年   389篇
  2020年   248篇
  2019年   243篇
  2018年   284篇
  2017年   276篇
  2016年   281篇
  2015年   203篇
  2014年   299篇
  2013年   418篇
  2012年   305篇
  2011年   386篇
  2010年   221篇
  2009年   191篇
  2008年   113篇
  2007年   104篇
  2006年   88篇
  2005年   54篇
  2004年   46篇
  2003年   60篇
  2002年   43篇
  2001年   25篇
  2000年   33篇
  1999年   19篇
  1998年   33篇
  1997年   21篇
  1996年   23篇
  1995年   15篇
  1994年   14篇
  1993年   17篇
  1992年   8篇
  1991年   11篇
  1990年   9篇
  1989年   8篇
  1988年   9篇
  1987年   7篇
  1986年   16篇
  1985年   10篇
  1984年   9篇
  1983年   9篇
  1982年   16篇
  1981年   8篇
  1979年   5篇
  1978年   6篇
  1977年   6篇
  1974年   4篇
  1973年   4篇
  1972年   3篇
排序方式: 共有4973条查询结果,搜索用时 15 毫秒
81.
Wireless Personal Communications - Current research in wireless communication undoubtedly points towards the tremendous advantages of using visible light as a spectrum for significantly boosting...  相似文献   
82.
Miniaturization and energy consumption by computational systems remain major challenges to address. Optoelectronics based synaptic and light sensing provide an exciting platform for neuromorphic processing and vision applications offering several advantages. It is highly desirable to achieve single-element image sensors that allow reception of information and execution of in-memory computing processes while maintaining memory for much longer durations without the need for frequent electrical or optical rehearsals. In this work, ultra-thin (<3 nm) doped indium oxide (In2O3) layers are engineered to demonstrate a monolithic two-terminal ultraviolet (UV) sensing and processing system with long optical state retention operating at 50 mV. This endows features of several conductance states within the persistent photocurrent window that are harnessed to show learning capabilities and significantly reduce the number of rehearsals. The atomically thin sheets are implemented as a focal plane array (FPA) for UV spectrum based proof-of-concept vision system capable of pattern recognition and memorization required for imaging and detection applications. This integrated light sensing and memory system is deployed to illustrate capabilities for real-time, in-sensor memorization, and recognition tasks. This study provides an important template to engineer miniaturized and low operating voltage neuromorphic platforms across the light spectrum based on application demand.  相似文献   
83.
Base station's location privacy in a wireless sensor network (WSN) is critical for information security and operational availability of the network. A key part of securing the base station from potential compromise is to secure the information about its physical location. This paper proposes a technique called base station location privacy via software-defined networking (SDN) in wireless sensor networks (BSLPSDN). The inspiration comes from the architecture of SDN, where the control plane is separated from the data plane, and where control plane decides the policy for the data plane. BSLPSDN uses three categories of nodes, namely, a main controller to instruct the overall operations, a dedicated node to buffer and forward data, and lastly, a common node to sense and forward the packet. We employ three kinds of nodes to collaborate and achieve stealth for the base station and thus protecting it against the traffic-analysis attacks. Different traits of the WSN including energy status and traffic density can actively be monitored by BSLPSDN, which positively affects the energy goals, expected life of the network, load on common nodes, and the possibility of creating diversion in the wake of an attack on the base station. We incorporated multiple experiments to analyze and evaluate the performance of our proposed algorithm. We use single controller with multiple sensor nodes and multiple controllers with multiple sensor nodes to show the level of anonymity of BS. Experiments show that providing BS anonymity via multiple controllers is the best method both in terms of energy and privacy.  相似文献   
84.
Islam  Md. Motaharul  Khan  Zaheer  Alsaawy  Yazed 《Wireless Networks》2021,27(6):4331-4342

Internet of Things (IoT) refers to uniquely identifiable entities. Its vision is the world of connected objects. Due to its connected nature the data produced by IoT is being used for different purposes. Since IoT generates huge amount of data, we need some scalable storage to store and compute the data sensed from the sensors. To overcome this issue, we need the integration of cloud and IoT, so that the data might be stored and computed in a scalable environment. Harmonization of IoT in Cloud might be a novel solution in this regard. IoT devices will interact with each other using Constrained Application Protocol (CoAP). In this paper, we have implemented harmonizing IoT in Cloud. We have used CoAP to get things connected to each other through the Internet. For the implementation we have used two sensors, fire detector and the sensor attached with the door which is responsible for opening it. Thus our implementation will be storing and retrieving the sensed data from the cloud. We have also compared our implementation with different parameters. The comparison shows that our implementation significantly improves the performance compared to the existing system.

  相似文献   
85.
86.
In classical public‐key infrastructure (PKI), the certificate authorities (CAs) are fully trusted, and the security of the PKI relies on the trustworthiness of the CAs. However, recent failures and compromises of CAs showed that if a CA is corrupted, fake certificates may be issued, and the security of clients will be at risk. As emerging solutions, blockchain‐ and log‐based PKI proposals potentially solved the shortcomings of the PKI, in particular, eliminating the weakest link security and providing a rapid remedy to CAs' problems. Nevertheless, log‐based PKIs are still exposed to split‐world attacks if the attacker is capable of presenting two distinct signed versions of the log to the targeted victim(s), while the blockchain‐based PKIs have scaling and high‐cost issues to be overcome. To address these problems, this paper presents a secure and accountable transport layer security (TLS) certificate management (SCM), which is a next‐generation PKI framework. It combines the two emerging architectures, introducing novel mechanisms, and makes CAs and log servers accountable to domain owners. In SCM, CA‐signed domain certificates are stored in log servers, while the management of CAs and log servers is handed over to a group of domain owners, which is conducted on the blockchain platform. Different from existing blockchain‐based PKI proposals, SCM decreases the storage cost of blockchain from several hundreds of GB to only hundreds of megabytes. Finally, we analyze the security and performance of SCM and compare SCM with previous blockchain‐ and log‐based PKI schemes.  相似文献   
87.
88.
In orthogonal frequency division multiplexing (OFDM) system, high value of peak-to-average power ratio (PAPR) is an operational problem that may cause non-linear distortion resulting in high bit error rate. Selected mapping (SLM) is a well known technique that shows good PAPR reduction capability but inflicts added computational overhead. In this paper, using Riemann sequence based SLM method, we applied reverse searching technique to find out low PAPR yielding phase sequences with significant reduction in computational complexity. Additionally, we explored side-information free transmission that achieves higher throughput but sacrifices PAPR reduction. Finally, to overcome this loss in PAPR reduction, we proposed application of Square-rooting companding technique over the output OFDM transmitted signal. Simulation results show that the proposed method is able to compensate the sacrifice in PAPR and achieved PAPR reduction of 8.9 dB with very low computational overhead.  相似文献   
89.
卫星通信系统安全技术综述   总被引:1,自引:0,他引:1  
由于空间环境的特殊性,地面网络中的安全机制不能直接用于卫星通信.介绍了卫星通信系统安全技术的最新进展.首先从空间信道环境、卫星节点能力、星座网络结构等方面指出了卫星通信系统的安全弱点.然后总结了物理层、数据链路层、网络层和传输层所面临的安全威胁和防护对策.着重介绍了抗损毁技术、抗干扰技术、认证机制和密钥管理协议,并对有代表性的安全策略进行了分析、对比和讨论.最后对卫星通信系统安全技术发展方向做出预测.  相似文献   
90.
Coarse wavelength division multiplexing (CWDM) network has proven to be promising lower cost network architecture for a significant cost advantage over dense wavelength division multiplexing due to the lower cost of lasers and the filters used in CWDM modules. A compatible amplifier module having bidirectional amplification capability was deployed for introducing inside stackable reconfigurable optical add/drop multiplexers in realizing large-scale CWDM networks. The amplifier module for use in the bidirectional IP transmission confirmed that the insertion losses of the nodes and the losses of the fibers connecting the nodes can be compensated effectively, allowing the network administrator to increase the number of nodes and fiber length of the network. However, the noise generated from the amplification due to amplified spontaneous emission must be considered in network design issues. In this paper, optical power penalties due to the bidirectional amplification were estimated by conducting experimentation on minimum detectable power of optical transceivers. After analyzing the power penalty issue, an IP-over-CWDM ring network was implemented and the performance of network was evaluated by monitoring the power and packet transmissions before and after the amplifier module was turned on.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号