首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5820篇
  免费   449篇
  国内免费   60篇
电工技术   63篇
综合类   21篇
化学工业   1388篇
金属工艺   84篇
机械仪表   277篇
建筑科学   111篇
矿业工程   9篇
能源动力   345篇
轻工业   742篇
水利工程   66篇
石油天然气   34篇
武器工业   1篇
无线电   755篇
一般工业技术   1273篇
冶金工业   119篇
原子能技术   58篇
自动化技术   983篇
  2024年   38篇
  2023年   208篇
  2022年   486篇
  2021年   766篇
  2020年   465篇
  2019年   524篇
  2018年   480篇
  2017年   399篇
  2016年   408篇
  2015年   247篇
  2014年   304篇
  2013年   421篇
  2012年   249篇
  2011年   320篇
  2010年   188篇
  2009年   178篇
  2008年   111篇
  2007年   104篇
  2006年   56篇
  2005年   45篇
  2004年   44篇
  2003年   33篇
  2002年   25篇
  2001年   16篇
  2000年   18篇
  1999年   17篇
  1998年   29篇
  1997年   13篇
  1996年   14篇
  1995年   23篇
  1994年   12篇
  1993年   14篇
  1992年   8篇
  1991年   7篇
  1990年   4篇
  1989年   8篇
  1988年   4篇
  1987年   8篇
  1985年   6篇
  1984年   3篇
  1983年   2篇
  1982年   4篇
  1981年   5篇
  1980年   1篇
  1979年   3篇
  1978年   3篇
  1977年   4篇
  1976年   1篇
  1970年   1篇
  1961年   1篇
排序方式: 共有6329条查询结果,搜索用时 0 毫秒
61.
The mobile vehicle is gaining popularity nowadays using map services like Google Maps and other mapping services. However, map services users have to expose sensitive information like geographic locations (GPS coordinates) or address to personal privacy concerns as users share their locations and queries to obtain desired services. Existing mix zones location privacy protection methods are most general purposed and theoretical value while not applicable when applied to provide location privacy for map service users. In this paper, we present new (multiple mix zones location privacy protection) MMLPP method specially designed for map services on mobile vehicles over the road network. This method enables mobile vehicle users to query a route between 2 endpoints on the map, without revealing any confidential location and queries information. The basic idea is to strategically endpoints to nearby ones, such that (1) the semantic meanings encoded in these endpoints (eg, their GPS coordinates) change much, ie, location privacy is protected; (2) the routes returned by map services little change, ie, services usability are maintained. Specifically, a mobile client first privately retrieves point of interest close to the original endpoints, and then selects 2 points of interest as the shifted endpoints satisfying the property of geoindistinguishability. We evaluate our MMLPP approach road network application for GTMobiSim on different scales of map services and conduct experiments with real traces. Results show that MMLPP strikes a good balance between location privacy and service usability.  相似文献   
62.
Nano-sized, nonreacting, noncoarsening Al2O3 particles have been incorporated into eutectic Sn–Zn solder alloys to investigate the microstructure, hardness and shear strength on Au/Ni metallized Cu pads ball grid array substrate (BGA). In the plain Sn–Zn solder joint and solder joints containing Al2O3 nano-particles, a scallop-shaped AuZn3 intermetallic compound layer was found at the interfaces. In the solder joints containing Al2O3 nano-particles, a fine acicular-shaped Zn-rich phase and Al2O3 nano-particles were found to be homogeneously distributed in the β-Sn matrix. The shear strengths and hardness of solder joints containing higher percentage of Al2O3 nano-particles exhibited consistently higher value than those of plain solder joint and solder joints containing lower percentage of Al2O3 nano-particles due to control the fine microstructure as well as homogeneous distribution of Al2O3 nano-particles acting as a second phase dispersion strengthening mechanism. The fracture surfaces of plain Sn–Zn solder joints exhibited a brittle fracture mode with smooth surfaces while Sn–Zn solder joints containing Al2O3 nano-particles showed a typical ductile failure with very rough dimpled surfaces.  相似文献   
63.
Using a unified representation for a class of the two current-feedback operational amplifier (CFOA) sinusoidal oscillators, new circuits of this type can be systematically discovered. A catalogue of two circuit structures, each structure realizing 18 oscillator circuits, is presented. Moreover, using the RC:CR transformation, additional 18 oscillator circuits can be obtained from each structure. A third structure realizing additional two oscillator circuits is also presented. Some of the circuits enjoy one or more of the following attractive features: use of grounded capacitors, feasibility of absorbing the parasitic components of the CFOAs, availability of a buffered output voltage and orthogonal tuning of the frequency and the startup condition of oscillation. Moreover, it is shown that the use of the Barkhausen criterion for the determination of the startup condition of oscillation and the frequency of oscillation yields inaccurate results with relatively large errors depending on the selected component values. Furthermore, it is shown that using the roots of the characteristic equation of a specific oscillator structure will result in a startup condition that cannot be adjusted without disturbing the frequency of oscillation.  相似文献   
64.
In the past, security protocols including key transport protocols are designed with the assumption that there are two parties communication with each other and an adversary tries to intercept this communication. In Delay/Disruption Tolerant Networking (DTN), packet delivery relies on intermediate parties in the communication path to store and forward the packets. DTN security architecture requires that integrity and authentication should be verified at intermediate nodes as well as at end nodes and confidentiality should be maintained for end communicating parties. This requires new security protocols and key management to be defined for DTN as traditional end-to-end security protocols will not work with DTN. To contribute towards solving this problem, we propose a novel Efficient and Scalable Key Transport Scheme (ESKTS) to transport the symmetric key generated at a DTN node to other communicating body securely using public key cryptography and proxy signatures. It is unique effort to design a key transport protocol in compliance with DTN architecture. ESKTS ensures that integrity and authentication is achieved at hop-by-hop level as well as end-to-end level. It also ensures end-to-end confidentiality and freshness for end communicating parties. This scheme provides a secure symmetric key transport mechanism based on public key cryptography to exploit the unique bundle buffering characteristics of DTN to reduce communication and computation cost .  相似文献   
65.
66.
New circuit configurations for realizing current mode biquadratic filter sections using operational amplifiers are presented. Each circuit uses a single operational amplifier and seven passive elements at most. The merits and demerits of the proposed realizations are discussed.  相似文献   
67.
Blending of small‐molecule organic semiconductors (OSCs) with amorphous polymers is known to yield high performance organic thin film transistors (OTFTs). Vertical stratification of the OSC and polymer binder into well‐defined layers is crucial in such systems and their vertical order determines whether the coating is compatible with a top and/or a bottom gate OTFT configuration. Here, we investigate the formation of blends prepared via spin‐coating in conditions which yield bilayer and trilayer stratifications. We use a combination of in situ experimental and computational tools to study the competing effects of formulation thermodynamics and process kinetics in mediating the final vertical stratification. It is shown that trilayer stratification (OSC/polymer/OSC) is the thermodynamically favored configuration and that formation of the buried OSC layer can be kinetically inhibited in certain conditions of spin‐coating, resulting in a bilayer stack instead. The analysis reveals here that preferential loss of the OSC, combined with early aggregation of the polymer phase due to rapid drying, inhibit the formation of the buried OSC layer. The fluid dynamics and drying kinetics are then moderated during spin‐coating to promote trilayer stratification with a high quality buried OSC layer which yields unusually high mobility >2 cm2 V?1 s?1 in the bottom‐gate top‐contact configuration.  相似文献   
68.

In this paper, the impact of varying path loss exponent (PLE) on user association probability, decoupled uplink coverage probability as well as decoupled uplink average spectral efficiency in downlink uplink decoupled (DUDe) multi-tier heterogeneous networks, is investigated. We investigate the effect of the difference in path loss exponents in both macro and small cell environments over uplink network performance. It is assumed that the mobile user connected to the macro base station experience different path loss exponent as compared to when connected to small base station. It is observed that the difference of path loss exponents in both cases has significant effect on the user association probability, decoupled uplink coverage probability as well as decoupled uplink average spectral efficiency. Moreover, in order to further support key findings and make sound comparison between coupled and DUDe performance in varying PLE environment, generalized analytical expressions for coupled association probabilities, along with coupled uplink coverage probability and coupled uplink average spectral efficiency have been derived. The analytical results evaluated in this paper are compared with the computer simulation and found in good agreement. Our analysis shows that decoupling technique performs suboptimal for cases where the environments around macro and small base stations are different with respect to each other. The work explained in this paper highlights the limitation of applying DUDe technique in realistic conditions where the PLEs of cellular tiers are not exactly equal to one another.

  相似文献   
69.
In this article, novel approaches to perform efficient motion estimation specific to surveillance video compression are proposed. These includes (i) selective (ii) tracker-based and (iii) multi-frame-based motion estimation. In selective approach, motion vector search is performed for only those frames that contain some motion activity. In another approach, contrary to performing motion estimation on the encoder side, motion vectors are calculated using information of a surveillance video tracker. This approach is quicker but for some scenarios it degrades the visual perception of the video compared with selective approach. In an effort to speed up multi-frame motion estimation, we propose a fast multiple reference frames-based motion estimation technique for surveillance videos. Experimental evaluation shows that significant reduction in computational complexity can be achieved by applying the proposed strategies.  相似文献   
70.
In this paper we address the problem of radio resource allocation in cooperative relaying networks. We focus on the resource block and power allocations for the downlink of OFDM-based relaying multi-user network. The resource allocation is investigated for both amplify and forward and decode and forward protocols under the constraints of power, resource block pairing and data rate fairness. To reduce complexity, the optimization problem is solved in two steps. In the first step, resource block pairing and allocation are conducted jointly with equal transmission power for both the base station and the relay. In the second step, transmission power is further optimized to maximize the system throughput. Our analysis is focused on the total achievable system throughput and the achievable individual throughput for each user.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号