首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   8063篇
  免费   420篇
  国内免费   61篇
电工技术   112篇
综合类   23篇
化学工业   2031篇
金属工艺   211篇
机械仪表   259篇
建筑科学   185篇
矿业工程   29篇
能源动力   483篇
轻工业   770篇
水利工程   83篇
石油天然气   54篇
无线电   828篇
一般工业技术   1659篇
冶金工业   606篇
原子能技术   73篇
自动化技术   1138篇
  2024年   30篇
  2023年   165篇
  2022年   416篇
  2021年   609篇
  2020年   373篇
  2019年   408篇
  2018年   457篇
  2017年   409篇
  2016年   424篇
  2015年   284篇
  2014年   363篇
  2013年   696篇
  2012年   464篇
  2011年   485篇
  2010年   306篇
  2009年   264篇
  2008年   230篇
  2007年   197篇
  2006年   164篇
  2005年   126篇
  2004年   93篇
  2003年   102篇
  2002年   83篇
  2001年   76篇
  2000年   63篇
  1999年   77篇
  1998年   178篇
  1997年   137篇
  1996年   114篇
  1995年   89篇
  1994年   81篇
  1993年   64篇
  1992年   45篇
  1991年   45篇
  1990年   42篇
  1989年   38篇
  1988年   28篇
  1987年   30篇
  1986年   35篇
  1985年   34篇
  1984年   28篇
  1983年   30篇
  1982年   14篇
  1981年   13篇
  1980年   12篇
  1978年   19篇
  1977年   17篇
  1976年   23篇
  1973年   8篇
  1972年   8篇
排序方式: 共有8544条查询结果,搜索用时 15 毫秒
121.
122.
Keystream reuse, also known as the two time pad problem, is a well known weakness in stream ciphers. The implementers of the cryptographic algorithms are still underestimating this threat. The keystream reuse exploitation techniques presented so far assume the underlying plaintext to be textual data and all the heuristics presented previously are based on the language characteristics of the underlying text based data, which fail when compression is applied on the plaintext before encryption. This paper presents exploitation techniques for two time pads in case of stream ciphered digitized and compressed speech signals. In this paper we show that how an adversary can automatically recover the digitized speech signals encrypted under the same keystream provided the language (e.g. English) and digital encoding/compression scheme details of the underlying speech signals are known. Our technique of cryptanalysis is based on the modeling of the speech parameters by exploiting the inter frame correlations between each components of the speech vectors in different frames and then using these models to decode the two speech signals in the keystream reuse scenario. The technique is flexible enough to incorporate all modern speech coding schemes based on parameter or hybrid encoding and compression techniques. The simulation experiments have showed promising results for most of the present day speech digitization and compression techniques.  相似文献   
123.
124.
This paper presents all-digital time-mode \(\Delta \Sigma\) modulators. The proposed modulators consist of a voltage-to-time integrator, a seven-stage gated ring oscillator functioning as a 3-bit quantizer, and seven digital differentiators. A detailed analysis of the nonlinear characteristics of the modulators is provided. Designed in IBM 130 nm 1.2 V CMOS technology with a 100 mV 100 kHz sinusoidal input and a 4.4 MHz frequency clock, the first-order modulator provides 47 dB SNR over 0–150 KHz bandwidth while consuming 1.1 mW while the second-order modulator provides 55 dB SNR over the same bandwidth while consuming consumes 1.45 mW.  相似文献   
125.
The mobile agent paradigm has been adopted by several systems in the area of wireless sensor networks as it enables a flexible distribution and placement of application components on nodes, at runtime. Most agent placement and migration algorithms proposed in the literature, assume that the communication rates between agents remain stable for a sufficiently long time to amortize the migration costs. Then, the problem is that frequent changes in the application-level communication may lead to several non-beneficial agent migrations, which may actually increase the total network cost, instead of decreasing it. To tackle this problem, we propose two distributed algorithms that take migration decisions in an online fashion, trying to deal with fluctuations in agent communication. The first algorithm is more of theoretical value, as it assumes infinite storage to keep information about the message exchange history of agents, while the second algorithm is a refined version that works with finite storage and limited information. We describe these algorithms in detail, and provide proofs for their competitive ratio vs. an optimal oracle. In addition, we evaluate the performance of the proposed algorithms for different parameter settings through a series of simulated experiments, also comparing their results with those achieved by an optimal static placement that is computed with full (a posteriori) knowledge of the execution scenarios. Our theoretical and experimental results are a strong indication for the robustness and effectiveness of the proposed algorithms.  相似文献   
126.
A new biologically-inspired vision sensor made of one hundred “eyes” is presented, which is suitable for real-time acquisition and processing of 3-D image sequences. This device, named the Panoptic camera, consists of a layered arrangement of approximately 100 classical CMOS imagers, distributed over a hemisphere of 13 cm in diameter. The Panoptic camera is a polydioptric system where all imagers have their own vision of the world, each with a distinct focal point, which is a specific feature of the Panoptic system. This enables 3-D information recording such as omnidirectional stereoscopy or depth estimation, applying specific signal processing. The algorithms dictating the image reconstruction of an omnidirectional observer located at any point inside the hemisphere are presented. A hardware architecture which has the capability of handling these algorithms, and the flexibility to support additional image processing in real time, has been developed as a two-layer system based on FPGAs. The detail of the hardware architecture, its internal blocks, the mapping of the algorithms onto the latter elements, and the device calibration procedure are presented, along with imaging results.  相似文献   
127.
CdS is one of the highly photosensitive candidate of II–VI group semiconductor material. Therefore CdS has variety of applications in optoelectronic devices. In this paper, we have fabricated CdS nanocrystalline thin film on ultrasonically cleaned glass substrates using the sol–gel spin coating method. The structural and surface morphologies of the CdS thin film were investigated by X-ray Diffraction (XRD) and Field Emission Scanning Electron Microscopy (FESEM) respectively. The surface morphology of thin films showed that the well covered substrate is without cracks, voids and hole. The round shape particle has been observed in SEM micrographs. The particles sizes of CdS nanocrystals from SEM were estimated to be~10–12 nm. Spectroscopic properties of thin films were investigated using the UV–vis spectroscopy, Photoluminescence and Raman spectroscopy. The optical band gap of the CdS thin film was estimated by UV–vis spectroscopy. The average transmittance of CdS thin film in the visible region of solar spectrum found to be~85%. Optical band gap of CdS thin film was calculated from transmittance spectrum ~2.71 eV which is higher than bulk CdS (2.40 eV) material. This confirms the blue shifting in band edge of CdS nanocrystalline thin films. PL spectrum of thin films showed that the fundamental band edge emission peak centred at 459 nm also recall as green band emission.  相似文献   
128.
We have utilized the contact-block-reduction (CBR) method, which we extended to allow a charge self-consistent scheme, to simulate experimentally fabricated 10-nm-FinFET device. The self-consistent CBR simulator has been modified to simulate devices with channels along arbitrary crystallographic orientation. A series of fully quantum-mechanical transport simulations has been performed. First, the fin extension length and doping profile have been calibrated to match the experimental data. The process control window for the threshold voltage as a function of fin extension has been extracted for the considered device. Then, a set of transfer characteristics and gate leakage currents have been calculated for different drain voltages. The simulation results have been found to be in good agreement with the experimental data in the subthreshold regime. The device turn-off and turn-on behavior has been examined for different fin widths: 12 (experimental), 10, 8, and 6 nm. Finally, the subthreshold slope degradation at high temperatures has been studied  相似文献   
129.
The activation energy of the drain current in polysilicon thin-film transistors (TFTs) and the effects of hydrogenation on this energy are discussed. The activation energy data are fitted using different models of the density of states in the material. It is shown that a model which assumes a distribution of brand tail states and localized deep states can account for the activation energy data of unhydrogenated polysilicon TFTs. However, the activation energy data on hydrogenated TFTs cannot be explained with the band tail model. Instead, a simple model of deep states localized at the grain boundary can fit this data quite accurately. Also, it is shown that there is a characteristic kink in the activation energy data of the hydrogenated TFTs which is a signature of the location of the deep states relative to the valence band edge. Analysis indicates that these deep states are located approximately 0.36 eV from the valence band edge. This value is consistent with that obtained from absorption measurements using photothermal deflection spectroscopy  相似文献   
130.
Over the last few years, vehicular ad hoc networks (VANETs) have gained popularity for their interesting applications. To make efficient routing decisions, VANET routing protocols require road traffic density information for which they use density estimation schemes. This paper presents a distributed mechanism for road vehicular density estimation that considers multiple road factors, such as road length and junctions. Extensive simulations are carried out to analyze the effectiveness of the proposed technique. Simulation results suggested that, the proposed technique is more accurate compared to the existing technique. Moreover, it facilitate VANET routing protocols to increase packet delivery ratio and reduce end-to-end delay.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号