首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5782篇
  免费   457篇
  国内免费   64篇
电工技术   66篇
综合类   25篇
化学工业   1343篇
金属工艺   81篇
机械仪表   275篇
建筑科学   108篇
矿业工程   8篇
能源动力   350篇
轻工业   744篇
水利工程   69篇
石油天然气   30篇
武器工业   1篇
无线电   746篇
一般工业技术   1295篇
冶金工业   94篇
原子能技术   53篇
自动化技术   1015篇
  2024年   37篇
  2023年   217篇
  2022年   510篇
  2021年   787篇
  2020年   481篇
  2019年   533篇
  2018年   498篇
  2017年   407篇
  2016年   417篇
  2015年   255篇
  2014年   310篇
  2013年   419篇
  2012年   255篇
  2011年   315篇
  2010年   183篇
  2009年   147篇
  2008年   99篇
  2007年   98篇
  2006年   39篇
  2005年   30篇
  2004年   42篇
  2003年   30篇
  2002年   23篇
  2001年   10篇
  2000年   13篇
  1999年   14篇
  1998年   18篇
  1997年   10篇
  1996年   11篇
  1995年   18篇
  1994年   7篇
  1993年   10篇
  1992年   8篇
  1991年   7篇
  1990年   1篇
  1989年   6篇
  1988年   4篇
  1987年   5篇
  1986年   1篇
  1985年   6篇
  1984年   3篇
  1983年   2篇
  1982年   4篇
  1981年   3篇
  1980年   1篇
  1979年   3篇
  1978年   2篇
  1977年   3篇
  1961年   1篇
排序方式: 共有6303条查询结果,搜索用时 29 毫秒
91.
Multi-server scheduling of traffic flows over heterogeneous wireless channels affix fresh concerns of inter-packet delay variations and associated problems of out-of-sequence reception, buffer management complexity, packet drops and re-ordering overhead. In this paper, we have presented an exclusive multi-server scheduling algorithm that is specifically tuned for mobile routers equipped with multiple wireless interfaces and has attained multiple care-of-address registrations with its home agent (HA). The proposed adaptive, Self-clocked, Multi-server (ASM) scheduling algorithm is based on predetermined transmission deadlines for each arrived packet at the mobile router. The mobile flows receive desired service levels in accordance with their negotiated service rates and are only constraint by the cumulative capacity of all active links. The major challenge lies in the handling of asymmetric channels to stitch into a unified virtual channel of higher capacity with reliable service guarantees during mobility. The sorted list of transmission schedules is used to assign physical channels in increasing order of their availability. This approach specifically encapsulates the physical layer disconnections during the handovers and ensures continuous service to ongoing flows. The proposed scheduling scheme is supplemented by an analytical model and simulations to verify its efficacy. The simulation results demonstrate higher degree of reliability and scalability of service provisioning to flows during mobility.  相似文献   
92.
Wireless Networks - This paper discusses a framework for algorithm-architecture synergy for (1) performance evaluation and (2) FPGA implementation complexity analysis of linear massive MIMO...  相似文献   
93.
Using full 3D TCAD, an evaluation of process parameter space of bulk FinFET is presented from the point of view of DRAM, SRAM and I/O applications. Process and device simulations are performed with varying uniform fin doping, anti-punch implant dose and energy, fin width, fin height and gate oxide thickness. Bulk FinFET architecture with anti-punch implant is introduced beneath the channel region to reduce the punch-through and junction leakage. For 30 nm bulk FinFET, anti-punch implant with low energy of 15 to 25 keV and dose of 5.0 × 1013 to 1.0 × 1014 cm−2 is beneficial to effectively suppress the punch-through leakage with reduced GIDL and short channel effects. Our simulations show that bulk FinFETs are approximately independent of back bias effect. With identical fin geometry, bulk FinFETs with anti-punch implant show same ION-IOFF behavior and approximately equal short channel effects like SOI FinFETs.  相似文献   
94.
This paper presents a Vivaldi antenna. The antenna incorporates a slot-line feed, and is designed to operate in a wideband mode, along with four narrowband modes. The wideband mode extends from 1 to 3 GHz. A series of PIN diode switches is employed to reconfigure between the five different operating modes. Wideband-to-multiband reconfigurations are achieved by adjusting the antenna loading internally, and also by the incorporation of band-stop filters. To obtain the wideband mode, wideband matches load is used. On the other hand, to obtain the narrowband modes, two rectangular slits with narrowband matches load are used. The proposed Vivaldi antenna provides wideband operation. It is also supports operation within the LTE, GSM (L-band), GPS, and WiMAX bands.  相似文献   
95.
The incredible growth of telecom data and fierce competition among telecommunication operators for customer retention demand continues improvements, both strategically and analytically, in the current customer relationship management (CRM) systems. One of the key objectives of a typical CRM system is to classify and predict a group of potential churners form a large set of customers to devise profitable and targeted retention campaigns for keeping a long-term relationship with valued customers. For achieving the aforementioned objective, several churn prediction models have been proposed in the past for the accurate identification of the customers who are prone to churn. However, these previously proposed models suffer from a number of limitations which place strong barriers towards the direct applicability of such models for accurate prediction. Firstly, the feature selection methods adopted in majority of the past work neglected the information rich variables present in call details record for model development. Secondly, selection of important features was done through statistical methods only. Although statistical methods have been applied successfully in diverse domains, however, these methods alone without the augmentation of domain knowledge have the tendency to yield erroneous results. Thirdly, the previous models have been validated mainly with benchmark datasets which do not provide a true representation of real world telecom data consisting of noise and large number of missing values. Fourthly, the evaluation measures used in the past neglected the True Positive (TP) rate, which actually highlights the ability of a model to correctly classify the percentage of churners as compared to non-churners. Finally, the classifiers used in the previous models completely neglected the use of fuzzy classification methods which perform reasonably well for data sets with noise. In this paper, a fuzzy based churn prediction model has been proposed and validated using a real data from a telecom company in South Asia. A number of predominant classifiers namely, Neural Network, Linear regression, C4.5, SVM, AdaBoost, Gradient Boosting and Random Forest have been compared with fuzzy classifiers to highlight the superiority of fuzzy classifiers in predicting the accurate set of churners.  相似文献   
96.
In road network, the decision accuracy of event message under location privacy-enhanced scheme, fast forwarding falsification message, and collusion attacks are all knotty problems that arise in event trust management. In this paper, we proposed protocol verification to check vehicles activity in privacy manner. We proposed a new method to adjusted vehicles speed which reduces the vehicle delay suffers from network gap problem. We established privacy preserving authentication protocol to verify vehicle activities in the term of privacy preserving manner. Vehicles moving trend, velocity differences, and distance differences are taken into consideration so, to maintain as many common users as possible to reduce the cost. The cost analysis and performance evaluation indicate that our frame-work can reduced cost factor and achieve good performance. The proposed model achieved reliably and efficiently with packet rate information. The evaluation experiments based on NS-3 to our improve user’s authenticated key establishment protocol has comparatively shorter time response, reduce cost, less packet lost information and enhanced privacy preservation compared with existing methods.  相似文献   
97.
Ion migration induced interfacial degradation is a detrimental factor for the stability of perovskite solar cells (PSCs) and hence requires special attention to address this issue for the development of efficient PSCs with improved stability. Here, an “S‐shaped, hook‐like” organic small molecule, naphthalene diimide derivative (NDI‐BN), is employed as a cathode interface layer (CIL) to tailor the [6,6]‐phenylC61‐butyric acid methylester (PCBM)/Ag interface in inverted PSCs. By realizing enhanced electron extraction capability via the incorporation of NDI‐BN, a peak power conversion efficiency of 21.32% is achieved. Capacitance–voltage measurements and X‐ray photoelectron spectroscopy analysis confirmed an obvious role of this new organic CIL in successfully blocking ionic diffusion pathways toward the Ag cathode, thereby preventing interfacial degradation and improving device stability. The molecular packing motif of NDI‐BN further unveils its densely packed structure with π–π stacking force which has the ability to effectually hinder ion migration. Furthermore, theoretical calculations reveal that intercalation of decomposed perovskite species into the NDI clusters is considerably more difficult compared with the PCBM counterparts. This substantial contrast between NDI‐BN and PCBM molecules in terms of their structures and packing fashion determines the different tendencies of ion migration and unveils the superior potential of NDI‐BN in curtailing interfacial degradation.  相似文献   
98.

Conductive polymeric blends (CPBs) of polystyrene and polyaniline (PS/PANI) were prepared by solution casting method in various compositions. Film thickness of CPBs was achieved?~?250 micron. PS/PANI blend films were analyzed for electromagnetic interference (EMI) shielding characteristics in microwave and near-infrared (NIR) regions. PS/PANI blends showed remarkable features. Most mobile telecommunications use GHz frequency range and shielding effectiveness was observed in 9 GHz to 18 GHz. In 9 GHz to 18 GHz frequency range, 45 dB shielding effectiveness was measured. CPBs were also analyzed in the NIR region and showed transmittance of <1%. Microwaves and NIR radiation are the most abundant in the environment and cause damage to human health. Both types of radiation causes serious damage to electronic devices as well.

  相似文献   
99.
In general, online signature capturing devices provide outputs in the form of shape and velocity signals. In the past, strokes have been extracted while tracking velocity signal minimas. However, the resulting strokes are larger and complicated in shape and thus make the subsequent job of generating a discriminative template difficult. We propose a new stroke-based algorithm that splits velocity signal into various bands. Based on these bands, strokes are extracted which are smaller and more simpler in nature. Training of our proposed system revealed that low- and high-velocity bands of the signal are unstable, whereas the medium-velocity band can be used for discrimination purposes. Euclidean distances of strokes extracted on the basis of medium velocity band are used for verification purpose. The experiments conducted show improvement in discriminative capability of the proposed stroke-based system.  相似文献   
100.
Wireless ad hoc networks consist of nodes with no central administration and rely on the participating nodes to share network responsibilities. Such networks are more vulnerable to security attacks than conventional wireless networks. We propose two efficient security schemes for these networks that use pairwise symmetric keys computed non-interactively by the nodes which reduces communication overhead. We allow nodes to generate their broadcast keys for different groups and propose a collision-free method for computing such keys. We use identity-based keys that do not require certificates which simplifies key management. Our key escrow free scheme also uses identity-based keys but eliminates inherent key escrow in identity-based keys. Our system requires a minimum number of keys to be generated by the third party as compared to conventional pairwise schemes. We also propose an authenticated broadcast scheme based on symmetric keys and a corresponding signature scheme.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号