首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5369篇
  免费   432篇
  国内免费   55篇
电工技术   62篇
综合类   21篇
化学工业   1245篇
金属工艺   75篇
机械仪表   261篇
建筑科学   99篇
矿业工程   8篇
能源动力   327篇
轻工业   707篇
水利工程   64篇
石油天然气   33篇
武器工业   1篇
无线电   687篇
一般工业技术   1198篇
冶金工业   83篇
原子能技术   51篇
自动化技术   934篇
  2024年   36篇
  2023年   207篇
  2022年   479篇
  2021年   749篇
  2020年   454篇
  2019年   513篇
  2018年   465篇
  2017年   387篇
  2016年   388篇
  2015年   235篇
  2014年   284篇
  2013年   384篇
  2012年   226篇
  2011年   285篇
  2010年   159篇
  2009年   136篇
  2008年   87篇
  2007年   87篇
  2006年   33篇
  2005年   24篇
  2004年   34篇
  2003年   25篇
  2002年   17篇
  2001年   7篇
  2000年   10篇
  1999年   13篇
  1998年   17篇
  1997年   9篇
  1996年   13篇
  1995年   16篇
  1994年   8篇
  1993年   10篇
  1992年   8篇
  1991年   7篇
  1990年   1篇
  1989年   5篇
  1988年   4篇
  1987年   5篇
  1986年   1篇
  1985年   6篇
  1984年   3篇
  1983年   2篇
  1982年   4篇
  1981年   3篇
  1980年   1篇
  1979年   3篇
  1978年   2篇
  1977年   3篇
  1961年   1篇
排序方式: 共有5856条查询结果,搜索用时 0 毫秒
81.
Blending of small‐molecule organic semiconductors (OSCs) with amorphous polymers is known to yield high performance organic thin film transistors (OTFTs). Vertical stratification of the OSC and polymer binder into well‐defined layers is crucial in such systems and their vertical order determines whether the coating is compatible with a top and/or a bottom gate OTFT configuration. Here, we investigate the formation of blends prepared via spin‐coating in conditions which yield bilayer and trilayer stratifications. We use a combination of in situ experimental and computational tools to study the competing effects of formulation thermodynamics and process kinetics in mediating the final vertical stratification. It is shown that trilayer stratification (OSC/polymer/OSC) is the thermodynamically favored configuration and that formation of the buried OSC layer can be kinetically inhibited in certain conditions of spin‐coating, resulting in a bilayer stack instead. The analysis reveals here that preferential loss of the OSC, combined with early aggregation of the polymer phase due to rapid drying, inhibit the formation of the buried OSC layer. The fluid dynamics and drying kinetics are then moderated during spin‐coating to promote trilayer stratification with a high quality buried OSC layer which yields unusually high mobility >2 cm2 V?1 s?1 in the bottom‐gate top‐contact configuration.  相似文献   
82.
Multi-server scheduling of traffic flows over heterogeneous wireless channels affix fresh concerns of inter-packet delay variations and associated problems of out-of-sequence reception, buffer management complexity, packet drops and re-ordering overhead. In this paper, we have presented an exclusive multi-server scheduling algorithm that is specifically tuned for mobile routers equipped with multiple wireless interfaces and has attained multiple care-of-address registrations with its home agent (HA). The proposed adaptive, Self-clocked, Multi-server (ASM) scheduling algorithm is based on predetermined transmission deadlines for each arrived packet at the mobile router. The mobile flows receive desired service levels in accordance with their negotiated service rates and are only constraint by the cumulative capacity of all active links. The major challenge lies in the handling of asymmetric channels to stitch into a unified virtual channel of higher capacity with reliable service guarantees during mobility. The sorted list of transmission schedules is used to assign physical channels in increasing order of their availability. This approach specifically encapsulates the physical layer disconnections during the handovers and ensures continuous service to ongoing flows. The proposed scheduling scheme is supplemented by an analytical model and simulations to verify its efficacy. The simulation results demonstrate higher degree of reliability and scalability of service provisioning to flows during mobility.  相似文献   
83.
Wireless Networks - This paper discusses a framework for algorithm-architecture synergy for (1) performance evaluation and (2) FPGA implementation complexity analysis of linear massive MIMO...  相似文献   
84.
Using full 3D TCAD, an evaluation of process parameter space of bulk FinFET is presented from the point of view of DRAM, SRAM and I/O applications. Process and device simulations are performed with varying uniform fin doping, anti-punch implant dose and energy, fin width, fin height and gate oxide thickness. Bulk FinFET architecture with anti-punch implant is introduced beneath the channel region to reduce the punch-through and junction leakage. For 30 nm bulk FinFET, anti-punch implant with low energy of 15 to 25 keV and dose of 5.0 × 1013 to 1.0 × 1014 cm−2 is beneficial to effectively suppress the punch-through leakage with reduced GIDL and short channel effects. Our simulations show that bulk FinFETs are approximately independent of back bias effect. With identical fin geometry, bulk FinFETs with anti-punch implant show same ION-IOFF behavior and approximately equal short channel effects like SOI FinFETs.  相似文献   
85.
This paper presents a Vivaldi antenna. The antenna incorporates a slot-line feed, and is designed to operate in a wideband mode, along with four narrowband modes. The wideband mode extends from 1 to 3 GHz. A series of PIN diode switches is employed to reconfigure between the five different operating modes. Wideband-to-multiband reconfigurations are achieved by adjusting the antenna loading internally, and also by the incorporation of band-stop filters. To obtain the wideband mode, wideband matches load is used. On the other hand, to obtain the narrowband modes, two rectangular slits with narrowband matches load are used. The proposed Vivaldi antenna provides wideband operation. It is also supports operation within the LTE, GSM (L-band), GPS, and WiMAX bands.  相似文献   
86.
The incredible growth of telecom data and fierce competition among telecommunication operators for customer retention demand continues improvements, both strategically and analytically, in the current customer relationship management (CRM) systems. One of the key objectives of a typical CRM system is to classify and predict a group of potential churners form a large set of customers to devise profitable and targeted retention campaigns for keeping a long-term relationship with valued customers. For achieving the aforementioned objective, several churn prediction models have been proposed in the past for the accurate identification of the customers who are prone to churn. However, these previously proposed models suffer from a number of limitations which place strong barriers towards the direct applicability of such models for accurate prediction. Firstly, the feature selection methods adopted in majority of the past work neglected the information rich variables present in call details record for model development. Secondly, selection of important features was done through statistical methods only. Although statistical methods have been applied successfully in diverse domains, however, these methods alone without the augmentation of domain knowledge have the tendency to yield erroneous results. Thirdly, the previous models have been validated mainly with benchmark datasets which do not provide a true representation of real world telecom data consisting of noise and large number of missing values. Fourthly, the evaluation measures used in the past neglected the True Positive (TP) rate, which actually highlights the ability of a model to correctly classify the percentage of churners as compared to non-churners. Finally, the classifiers used in the previous models completely neglected the use of fuzzy classification methods which perform reasonably well for data sets with noise. In this paper, a fuzzy based churn prediction model has been proposed and validated using a real data from a telecom company in South Asia. A number of predominant classifiers namely, Neural Network, Linear regression, C4.5, SVM, AdaBoost, Gradient Boosting and Random Forest have been compared with fuzzy classifiers to highlight the superiority of fuzzy classifiers in predicting the accurate set of churners.  相似文献   
87.
Ion migration induced interfacial degradation is a detrimental factor for the stability of perovskite solar cells (PSCs) and hence requires special attention to address this issue for the development of efficient PSCs with improved stability. Here, an “S‐shaped, hook‐like” organic small molecule, naphthalene diimide derivative (NDI‐BN), is employed as a cathode interface layer (CIL) to tailor the [6,6]‐phenylC61‐butyric acid methylester (PCBM)/Ag interface in inverted PSCs. By realizing enhanced electron extraction capability via the incorporation of NDI‐BN, a peak power conversion efficiency of 21.32% is achieved. Capacitance–voltage measurements and X‐ray photoelectron spectroscopy analysis confirmed an obvious role of this new organic CIL in successfully blocking ionic diffusion pathways toward the Ag cathode, thereby preventing interfacial degradation and improving device stability. The molecular packing motif of NDI‐BN further unveils its densely packed structure with π–π stacking force which has the ability to effectually hinder ion migration. Furthermore, theoretical calculations reveal that intercalation of decomposed perovskite species into the NDI clusters is considerably more difficult compared with the PCBM counterparts. This substantial contrast between NDI‐BN and PCBM molecules in terms of their structures and packing fashion determines the different tendencies of ion migration and unveils the superior potential of NDI‐BN in curtailing interfacial degradation.  相似文献   
88.

Conductive polymeric blends (CPBs) of polystyrene and polyaniline (PS/PANI) were prepared by solution casting method in various compositions. Film thickness of CPBs was achieved?~?250 micron. PS/PANI blend films were analyzed for electromagnetic interference (EMI) shielding characteristics in microwave and near-infrared (NIR) regions. PS/PANI blends showed remarkable features. Most mobile telecommunications use GHz frequency range and shielding effectiveness was observed in 9 GHz to 18 GHz. In 9 GHz to 18 GHz frequency range, 45 dB shielding effectiveness was measured. CPBs were also analyzed in the NIR region and showed transmittance of <1%. Microwaves and NIR radiation are the most abundant in the environment and cause damage to human health. Both types of radiation causes serious damage to electronic devices as well.

  相似文献   
89.
In general, online signature capturing devices provide outputs in the form of shape and velocity signals. In the past, strokes have been extracted while tracking velocity signal minimas. However, the resulting strokes are larger and complicated in shape and thus make the subsequent job of generating a discriminative template difficult. We propose a new stroke-based algorithm that splits velocity signal into various bands. Based on these bands, strokes are extracted which are smaller and more simpler in nature. Training of our proposed system revealed that low- and high-velocity bands of the signal are unstable, whereas the medium-velocity band can be used for discrimination purposes. Euclidean distances of strokes extracted on the basis of medium velocity band are used for verification purpose. The experiments conducted show improvement in discriminative capability of the proposed stroke-based system.  相似文献   
90.
Wireless ad hoc networks consist of nodes with no central administration and rely on the participating nodes to share network responsibilities. Such networks are more vulnerable to security attacks than conventional wireless networks. We propose two efficient security schemes for these networks that use pairwise symmetric keys computed non-interactively by the nodes which reduces communication overhead. We allow nodes to generate their broadcast keys for different groups and propose a collision-free method for computing such keys. We use identity-based keys that do not require certificates which simplifies key management. Our key escrow free scheme also uses identity-based keys but eliminates inherent key escrow in identity-based keys. Our system requires a minimum number of keys to be generated by the third party as compared to conventional pairwise schemes. We also propose an authenticated broadcast scheme based on symmetric keys and a corresponding signature scheme.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号