首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   13924篇
  免费   960篇
  国内免费   110篇
电工技术   280篇
综合类   48篇
化学工业   3737篇
金属工艺   361篇
机械仪表   559篇
建筑科学   479篇
矿业工程   23篇
能源动力   966篇
轻工业   1399篇
水利工程   249篇
石油天然气   187篇
武器工业   6篇
无线电   1429篇
一般工业技术   2473篇
冶金工业   466篇
原子能技术   97篇
自动化技术   2235篇
  2024年   54篇
  2023年   275篇
  2022年   491篇
  2021年   878篇
  2020年   722篇
  2019年   877篇
  2018年   987篇
  2017年   930篇
  2016年   932篇
  2015年   582篇
  2014年   930篇
  2013年   1463篇
  2012年   940篇
  2011年   1068篇
  2010年   689篇
  2009年   587篇
  2008年   389篇
  2007年   310篇
  2006年   254篇
  2005年   171篇
  2004年   162篇
  2003年   140篇
  2002年   119篇
  2001年   89篇
  2000年   91篇
  1999年   64篇
  1998年   98篇
  1997年   71篇
  1996年   71篇
  1995年   62篇
  1994年   37篇
  1993年   49篇
  1992年   20篇
  1991年   37篇
  1990年   35篇
  1989年   27篇
  1988年   37篇
  1987年   32篇
  1986年   31篇
  1985年   26篇
  1984年   32篇
  1983年   24篇
  1982年   15篇
  1981年   13篇
  1979年   15篇
  1978年   11篇
  1977年   9篇
  1976年   9篇
  1974年   7篇
  1973年   8篇
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
41.
In WDM networks, path protection has emerged as a widely accepted technique for providing guaranteed survivability of network traffic. However, it requires allocating resources for backup lightpaths, which remain idle under normal fault-free conditions. In this paper, we introduce a new design strategy for survivable network design, which guarantees survivability of all ongoing connections that requires significantly fewer network resources than protection based techniques. In survivable routing, the goal is to find a Route and Wavelength Assignment (RWA) such that the logical topology remains connected for all single link failures. However, even if the logical topology remains connected after any single link fault, it may not have sufficient capacity to support all the requests for data communication, for all single fault scenarios. To address this deficiency, we have proposed two independent but related problem formulations. To handle our first formulation, we have presented an Integer Linear Program (ILP) that augments the concept of survivable routing by allowing rerouting of sub-wavelength traffic carried on each lightpath and finding an RWA that maximizes the amount of traffic that can be supported by the network in the presence of any single link failure. To handle our second formulation, we have proposed a new design approach that integrates the topology design and the RWA in such a way that the resulting logical topology is able to handle the entire set of traffic requests after any single link failure. For the second problem, we have first presented an ILP formulation for optimally designing a survivable logical topology, and then proposed a heuristic for larger networks. Experimental results demonstrate that this new approach is able to provide guaranteed bandwidth, and is much more efficient in terms of resource utilization, compared to both dedicated and shared path protection schemes.  相似文献   
42.
In classical public‐key infrastructure (PKI), the certificate authorities (CAs) are fully trusted, and the security of the PKI relies on the trustworthiness of the CAs. However, recent failures and compromises of CAs showed that if a CA is corrupted, fake certificates may be issued, and the security of clients will be at risk. As emerging solutions, blockchain‐ and log‐based PKI proposals potentially solved the shortcomings of the PKI, in particular, eliminating the weakest link security and providing a rapid remedy to CAs' problems. Nevertheless, log‐based PKIs are still exposed to split‐world attacks if the attacker is capable of presenting two distinct signed versions of the log to the targeted victim(s), while the blockchain‐based PKIs have scaling and high‐cost issues to be overcome. To address these problems, this paper presents a secure and accountable transport layer security (TLS) certificate management (SCM), which is a next‐generation PKI framework. It combines the two emerging architectures, introducing novel mechanisms, and makes CAs and log servers accountable to domain owners. In SCM, CA‐signed domain certificates are stored in log servers, while the management of CAs and log servers is handed over to a group of domain owners, which is conducted on the blockchain platform. Different from existing blockchain‐based PKI proposals, SCM decreases the storage cost of blockchain from several hundreds of GB to only hundreds of megabytes. Finally, we analyze the security and performance of SCM and compare SCM with previous blockchain‐ and log‐based PKI schemes.  相似文献   
43.

The latest developments in mobile computing technology have increased the computing capabilities of smart mobile devices (SMDs). However, SMDs are still constrained by low bandwidth, processing potential, storage capacity, and battery lifetime. To overcome these problems, the rich resources and powerful computational cloud is tapped for enabling intensive applications on SMDs. In Mobile Cloud Computing (MCC), application processing services of computational clouds are leveraged for alleviating resource limitations in SMDs. The particular deficiency of distributed architecture and runtime partitioning of the elastic mobile application are the challenging aspects of current offloading models. To address these issues of traditional models for computational offloading in MCC, this paper proposes a novel distributed and elastic applications processing (DEAP) model for intensive applications in MCC. We present an analytical model to evaluate the proposed DEAP model, and test a prototype application in the real MCC environment to demonstrate the usefulness of DEAP model. Computational offloading using the DEAP model minimizes resources utilization on SMD in the distributed processing of intensive mobile applications. Evaluation indicates a reduction of 74.6% in the overhead of runtime application partitioning and a 66.6% reduction in the CPU utilization for the execution of the application on SMD.

  相似文献   
44.

Wireless body area network (WBAN) has witnessed significant attentions in the healthcare domain using biomedical sensor-based monitoring of heterogeneous nature of vital signs of a patient’s body. The design of frequency band, MAC superframe structure, and slots allocation to the heterogeneous nature of the patient’s packets have become the challenging problems in WBAN due to the diverse QoS requirements. In this context, this paper proposes an Energy Efficient Traffic Prioritization for Medium Access Control (EETP-MAC) protocol, which provides sufficient slots with higher bandwidth and guard bands to avoid channels interference causing longer delay. Specifically, the design of EETP-MAC is broadly divided in to four folds. Firstly, patient data traffic prioritization is presented with broad categorization including Non-Constrained Data (NCD), Delay-Constrained Data (DCD), Reliability-Constrained Data (RCD) and Critical Data (CD). Secondly, a modified superframe structure design is proposed for effectively handling the traffic prioritization. Thirdly, threshold based slot allocation technique is developed to reduce contention by effectively quantifying criticality on patient data. Forth, an energy efficient frame design is presented focusing on beacon interval, superframe duration, and packet size and inactive period. Simulations are performed to comparatively evaluate the performance of the proposed EETP-MAC with the state-of-the-art MAC protocols. The comparative evaluation attests the benefit of EETP-MAC in terms of efficient slot allocation resulting in lower delay and energy consumption.

  相似文献   
45.
Wireless Personal Communications - Current research in wireless communication undoubtedly points towards the tremendous advantages of using visible light as a spectrum for significantly boosting...  相似文献   
46.
This paper presents a fully integrated, low transmit-power and high-efficiency 2.4 GHz class-E power amplifier (PA) in TSMC 0.18 μm CMOS process for low-power transmitters such as wireless sensor networks (WSN). In this paper, a new output load has been proposed. Also, analytical design equations have been included to design an efficient low power circuit. This PA, employs the pad capacitance and bond-wire inductance of the output node, for satisfying class-E zero-voltage switching (ZVS) condition and matching the antenna’s 50 Ω resistance. By using bond-wire inductance instead of inductor in the output filter, smaller chip size and higher efficiency has been achieved compared to other works for low transmit-power applications. Also, the effectiveness of bulk-drive technique on faster switching and increasing efficiency have been evaluated. It has been proved that this technique leads to increase the efficiency of switching PAs. This PA delivers a range of output power from 2.7 to 7.2 dBm with a supply voltage range from 500 to 850 mV while achieving overall power efficiency range of 57.3–60.7%.  相似文献   
47.
Rhenium disulfide (ReS2) is a two‐dimensional (2D) group VII transition metal dichalcogenide (TMD). It is attributed with structural and vibrational anisotropy, layer‐independent electrical and optical properties, and metal‐free magnetism properties. These properties are unusual compared with more widely used group VI‐TMDs, e.g., MoS2, MoSe2, WS2 and WSe2. Consequently, it has attracted significant interest in recent years and is now being used for a variety of applications including solid state electronics, catalysis, and, energy harvesting and energy storage. It is anticipated that ReS2 has the potential to be equally used in parallel with isotropic TMDs from group VI for all known applications and beyond. Therefore, a review on ReS2 is very timely. In this first review on ReS2, we critically analyze the available synthesis procedures and their pros/cons, atomic structure and lattice symmetry, crystal structure, and growth mechanisms with an insight into the orientation and architecture of domain and grain boundaries, decoupling of structural and vibrational properties, anisotropic electrical, optical, and magnetic properties impacted by crystal imperfections, doping and adatoms adsorptions, and contemporary applications in different areas.  相似文献   
48.
Polysulfated nanomaterials that mimic the extracellular cell matrix are of great interest for their potential to modulate cellular responses and to bind and neutralize pathogens. However, control over the density of active functional groups on such biomimetics is essential for efficient interactions, and this remains a challenge. In this regard, producing polysulfated graphene derivatives with control over their functionality is an intriguing accomplishment in order to obtain highly effective 2D platforms for pathogen interactions. Here, a facile and efficient method for the controlled attachment of a heparin sulfate mimic on the surface of graphene is reported. Dichlorotriazine groups are conjugated to the surface of graphene by a one‐pot [2+1] nitrene cycloaddition reaction at ambient conditions, providing derivatives with defined functionality. Consecutive step by step conjugation of hyperbranched polyglycerol to the dichlorotriazine groups and eventual conversion to the polyglycerol sulfate result in the graphene based heparin biomimetics. Scanning force microscopy, cryo‐transmission electron microscopy, and in vitro bioassays reveal strong interactions between the functionalized graphene (thoroughly covered by a sulfated polymer) and vesicular stomatitis virus. Infection experiments with highly sulfated versions of graphene drastically promote the infection process, leading to higher viral titers compared to nonsulfated analogues.  相似文献   
49.
In orthogonal frequency division multiplexing (OFDM) system, high value of peak-to-average power ratio (PAPR) is an operational problem that may cause non-linear distortion resulting in high bit error rate. Selected mapping (SLM) is a well known technique that shows good PAPR reduction capability but inflicts added computational overhead. In this paper, using Riemann sequence based SLM method, we applied reverse searching technique to find out low PAPR yielding phase sequences with significant reduction in computational complexity. Additionally, we explored side-information free transmission that achieves higher throughput but sacrifices PAPR reduction. Finally, to overcome this loss in PAPR reduction, we proposed application of Square-rooting companding technique over the output OFDM transmitted signal. Simulation results show that the proposed method is able to compensate the sacrifice in PAPR and achieved PAPR reduction of 8.9 dB with very low computational overhead.  相似文献   
50.
We give generic constructions of several fundamental cryptographic primitives based on a new encryption primitive that combines circular security for bit encryption with the so-called reproducibility property (Bellare et al. in Public key cryptography—PKC 2003, vol. 2567, pp. 85–99, Springer, 2003). At the heart of our constructions is a novel technique which gives a way of de-randomizing reproducible public-key bit encryption schemes and also a way of reducing one-wayness conditions of a constructed trapdoor function family (TDF) to circular security of the base scheme. The main primitives that we build from our encryption primitive include k-wise one-way TDFs (Rosen and Segev in SIAM J Comput 39(7):3058–3088, 2010), chosen-ciphertext-attack-secure encryption and deterministic encryption. Our results demonstrate a new set of applications of circularly secure encryption beyond fully homomorphic encryption and symbolic soundness. Finally, we show the plausibility of our assumptions by showing that the decisional Diffie–Hellman-based circularly secure scheme of Boneh et al. (Advances in cryptology—CRYPTO 2008, vol. 5157, Springer, 2008) and the subgroup indistinguishability-based scheme of Brakerski and Goldwasser (Advances in cryptology—CRYPTO 2010, vol. 6223, pp. 1–20, Springer, 2010) are both reproducible.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号