首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7144篇
  免费   324篇
  国内免费   53篇
电工技术   133篇
综合类   26篇
化学工业   1792篇
金属工艺   118篇
机械仪表   211篇
建筑科学   282篇
矿业工程   6篇
能源动力   466篇
轻工业   726篇
水利工程   76篇
石油天然气   115篇
无线电   673篇
一般工业技术   1150篇
冶金工业   338篇
原子能技术   83篇
自动化技术   1326篇
  2024年   24篇
  2023年   151篇
  2022年   318篇
  2021年   406篇
  2020年   296篇
  2019年   337篇
  2018年   416篇
  2017年   358篇
  2016年   357篇
  2015年   237篇
  2014年   322篇
  2013年   643篇
  2012年   358篇
  2011年   507篇
  2010年   353篇
  2009年   327篇
  2008年   292篇
  2007年   220篇
  2006年   203篇
  2005年   141篇
  2004年   114篇
  2003年   119篇
  2002年   91篇
  2001年   64篇
  2000年   73篇
  1999年   52篇
  1998年   81篇
  1997年   41篇
  1996年   51篇
  1995年   42篇
  1994年   37篇
  1993年   45篇
  1992年   36篇
  1991年   32篇
  1990年   30篇
  1989年   21篇
  1988年   35篇
  1987年   30篇
  1986年   20篇
  1985年   15篇
  1984年   27篇
  1983年   22篇
  1982年   22篇
  1981年   16篇
  1980年   20篇
  1979年   16篇
  1978年   18篇
  1976年   18篇
  1975年   19篇
  1974年   12篇
排序方式: 共有7521条查询结果,搜索用时 12 毫秒
91.
With 3GPP Release-17, global 5G standards now support non-terrestrial mobile networks comprising radio access network, terminals, and core network. This enables multi-vendor interoperability as well as interoperability with 3GPP-compliant 5G systems. This paper describes the key features enabling the NG-RAN architecture defined for 5G to support non-terrestrial networks. Starting from a general overview of NG-RAN and of the new paradigms of NTN, we introduce the NTN functionality in NG-RAN specifications with respect to feeder link switchover, cell handling, terminal registration, and OAM aspects. We also discuss different scenarios combining satellite access with 3GPP-defined core networks. We also describe some further enhancements expected to be seen in the next 3GPP release (Rel-18). We believe current and upcoming 3GPP work for NTN represents a solid basis on which 5G satellite networks can be built in the upcoming future.  相似文献   
92.
Nonsinusoidal radar signal design for stealth targets   总被引:1,自引:0,他引:1  
The detection of stealth point targets challenges the design of conventional radars using sinusoidal carriers since the objective of stealth technology is to reduce the radar cross section (RCS) of targets to a level where the radar receiver cannot detect the target. While there are a number of techniques employing different technologies to reduce the RCS of targets, shaping and coating the target with absorbing material are the most useful ones. The analysis and design of nonsinusoidal radar signals is based on modeling stealth point targets by a two-layer structure consisting of a metal surface covered with a coat of absorbing material. The design is presented for two classes of signals: uncoded signals and pulse compression signals using Barker codes. The relationship between target response, absorbing material time delay, time variation of transmitted pulses and coding features are determined and analyzed. While sliding correlators are used for detection and selection of various target responses, their output autocorrelation functions are determined analytically in terms of transmitted signal autocorrelation functions. Thumbtack range-velocity resolution functions are obtained for transmitted signal characters with a single pulse and characters with coded waveforms, for different pulse duration. It is shown that the range resolution can be improved by the proper choice of the transmitted signal duration relative to absorbing material time delay. Thumbtack range-velocity resolution functions similar to those of conventional point targets can also be realized  相似文献   
93.
Hisham  Mohamed  Elmogy  Ahmed  Sarhan  Amany  Sallam  Alsayed 《Wireless Networks》2020,26(1):685-698
Wireless Networks - In Wireless Local Area Networks (WLAN), portable devices such as notebooks, tabs, and smart phones are powered by batteries with limited energy. With the great increase of using...  相似文献   
94.
The need to secure information systems and networked infrastructures is now commonplace in most enterprises. The use of novel communication technologies has became a crucial factor that can considerably improve or affect productivity. This is essentially due to the importance of the information transmitted across communication networks and stored in servers. As a consequence, strong ties are being built between security and the enterprise business activity. Risk management, which is the discipline that deals with this aspect, integrates a litany of architectures, techniques, and models that are described in this paper. A global view is proposed to the reader through a presentation of the research activity that has been directed towards this field. Copyright © 2005 John Wiley & Sons, Ltd.  相似文献   
95.
In this paper, we propose an Efficient Secure routing Scheme based on searchable encryption with vehicle Proxy Re-encryption, called ESSPR, for achieving privacy preservation of message in vehicular peer-to-peer social network (VP2PSN). Specifically, the proposed ESSPR scheme consists of six phases: system initializations phase, peer registration phase, document generation phase, document forwarding phase, vehicle proxy re-encryption phase, and document receiving phase. Based on rationale of QoS-based clustering strategy, public key encryption with keyword search, identity based aggregate signature, and proxy re-encryption, ESSPR provides privacy for keyword, privacy for resources, and authentication and data integrity of the demand’s source. In addition, ESSPR is robust against eavesdropping attack, wormhole attack, packet analysis attack, packet tracing attack, and replay attack. Through performance evaluation, we demonstrate the effectiveness of ESSPR in terms of delivery ratio, average delay, average fairness, and detection ratio under malicious peers proportions in VP2PSN.  相似文献   
96.
In this paper, a channel assignment scheme is proposed for use in CDMA/TDMA mobile networks carrying voice and data traffic. In each cell, three types of calls are assumed to compete for access to the limited number of available channels by the cell: new voice calls, handoff voice calls, and data calls. The scheme uses the movable boundary concept in both the code and time domains in order to guarantee the quality of service (QoS) requirements of each type. A traditional Markov analysis method is employed to evaluate the performance of the proposed scheme. Measures, namely, the new call blocking probability, the handoff call forced termination probability, the data call loss probability, the expected number of handoff and the handoff link maintenance probability are obtained from the analysis. The numerical results, which are validated by simulation, indicate that the scheme helps meet the QoS requirements of the different call types.  相似文献   
97.
Many useful DSP algorithms have high dimensions and complex logic. Consequently, an efficient implementation of these algorithms on parallel processor arrays must involve a structured design methodology. Full-search block-matching motion estimation is one of those algorithms that can be developed using parallel processor arrays. In this paper, we present a hierarchical design methodology for the full-search block matching motion estimation. Our proposed methodology reduces the complexity of the algorithm into simpler steps and then explores the different possible design options at each step. Input data timing restrictions are taken into consideration as well as buffering requirements. A designer is able to modify system performance by selecting some of the algorithm variables for pipelining or broadcasting. Our proposed design strategy also allows the designer to study time and hardware complexities of computations at each level of the hierarchy. The resultant architecture allows easy modifications to the organization of data buffers and processing elements-their number, datapath pipelining, and complexity-to produce a system whose performance matches the video data sample rate requirements.  相似文献   
98.
The aim of this article is to analyze the spectral stability of the three phase shift distributed feedback (3ps-dfb) laser by using Time domain model (tdm). We have developed a software that simulates static and dynamic properties of distributed feedback (dfb) multi-sections laser at large signal. The best single-mode stability operation up to 18mW of the 3ps-dfb is achieved for three phase shifts at (π, π, π) whatever the phase position. These results showed that the 3ps-dfb laser was a much more suitable structure to realize stable single-mode high-power operation for a coherent optical communication system.  相似文献   
99.
Photonic Network Communications - The huge data demand envisioned for the 5G requires radical changes in the mobile network architecture and technology. Centralized radio access network (C-RAN) is...  相似文献   
100.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号