首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1924篇
  免费   110篇
  国内免费   12篇
电工技术   29篇
综合类   5篇
化学工业   493篇
金属工艺   26篇
机械仪表   75篇
建筑科学   49篇
矿业工程   2篇
能源动力   170篇
轻工业   184篇
水利工程   13篇
石油天然气   31篇
无线电   186篇
一般工业技术   397篇
冶金工业   48篇
原子能技术   17篇
自动化技术   321篇
  2024年   10篇
  2023年   73篇
  2022年   141篇
  2021年   155篇
  2020年   110篇
  2019年   116篇
  2018年   129篇
  2017年   99篇
  2016年   133篇
  2015年   74篇
  2014年   129篇
  2013年   174篇
  2012年   108篇
  2011年   102篇
  2010年   83篇
  2009年   75篇
  2008年   51篇
  2007年   42篇
  2006年   41篇
  2005年   23篇
  2004年   20篇
  2003年   15篇
  2002年   16篇
  2001年   15篇
  2000年   7篇
  1999年   12篇
  1998年   18篇
  1997年   6篇
  1996年   13篇
  1995年   5篇
  1994年   8篇
  1993年   6篇
  1992年   6篇
  1991年   4篇
  1990年   4篇
  1989年   1篇
  1988年   2篇
  1987年   2篇
  1986年   4篇
  1985年   3篇
  1984年   3篇
  1983年   2篇
  1981年   1篇
  1979年   1篇
  1978年   1篇
  1977年   2篇
  1976年   1篇
排序方式: 共有2046条查询结果,搜索用时 15 毫秒
31.
This paper reports the synthesis of highly conductive niobium doped titanium dioxide (Nb:TiO2) films from the decomposition of Ti(OEt)4 with dopant quantities of Nb(OEt)5 by aerosol‐assisted chemical vapor deposition (AACVD). Doping Nb into the Ti sites results in n‐type conductivity, as determined by Hall effect measurements. The doped films display significantly improved electrical properties compared to pristine TiO2 films. For 5 at.% Nb in the films, the charge carrier concentration was 2 × 1021 cm?3 with a mobility of 2 cm2 V–1 s–1 . The corresponding sheet resistance is as low as 6.5 Ω sq–1 making the films suitable candidates for transparent conducting oxide (TCO) materials. This is, to the best of our knowledge, the lowest reported sheet resistance for Nb:TiO2 films synthesized by vapour deposition. The doped films are also blue in colour, with the intensity dependent on the Nb concentration in the films. A combination of synchrotron, laboratory and theoretical techniques confirmed niobium doping into the anatase TiO2 lattice. Computational methods also confirmed experimental results of both delocalized (Ti4+) and localized polaronic states (Ti3+) states. Additionally, the doped films also functioned as photocatalysts. Thus, Nb:TiO2 combines four functional properties (photocatalysis, electrical conductivity, optical transparency and blue colouration) within the same layer, making it a promising alternative to conventional TCO materials.  相似文献   
32.
Advancements in the area of computing and the networking gave birth to a new concept Internet of Things (IoT). This can be thought as “network of future” connecting diverse objects/things together. The focus is on scheduling the messages in an IoT environment where things/sensors are clustered into IoT subgroups, each subgroup has a message broker that delivers the messages originated from the group to the ultimate receiver of the sensed data. The message scheduler works at the broker level to decide which message to be transmitted first. This scheduling improves the overall IoT system efficiency. Furthermore to keep the flow of services provided by these things/sensors continuous and non-disruptive, the optimal tackling of the faulty or failed nodes has become the salient feature of the proposed scheduling algorithm. The faults or failures identified on time help to initiate recovery or replacement procedures. To find the right level of replacement nodes deployed for the sensor network, we consider the energy a scarce resource and the cost of deployment of the backup nodes as per failure of the node occurring in the underlying environment. In this work we propose an energy efficient recovery and backup node selection for IoT systems followed with energy efficient message scheduling. Simulation results show the effectiveness and efficiency of the proposed message scheduling considering the node failure with recovery and replacement technique.  相似文献   
33.
Wireless Personal Communications - The multiple user’s based transmission systems are developed in the past using various multiple access techniques for fibre optic communications. Among...  相似文献   
34.
Detail preserving impulsive noise removal   总被引:8,自引:0,他引:8  
Most image processing applications require noise elimination. For example, in applications where derivative operators are applied, any noise in the image can result in serious errors. Impulsive noise appears as a sprinkle of dark and bright spots. Transmission errors, corrupted pixel elements in the camera sensors, or faulty memory locations can cause impulsive noise. Linear filters fail to suppress impulsive noise. Thus, non-linear filters have been proposed. Windyga's peak-and-valley filter, introduced to remove impulsive noise, identifies noisy pixels and then replaces their values with the minimum or maximum value of their neighbors depending on the noise (dark or bright). Its main disadvantage is that it removes fine image details. In this work, a variation of the peak-and-valley filter is proposed to overcome this problem. It is based on a recursive minimum–maximum method, which replaces the noisy pixel with a value based on neighborhood information. This method preserves constant and edge areas even under high impulsive noise probability. Finally, a comparison study of the peak-and-valley filter, the median filter, and the proposed filter is carried-out using different types of images. The proposed filter outperforms other filters in the noise reduction and the image details preservation. However, it operates slightly slower than the peak-and-valley filter.  相似文献   
35.
36.

In communication industry one of the most rapidly growing area is wireless technology and its applications. The efficient access to radio spectrum is a requirement to make this communication feasible for the users that are running multimedia applications and establishing real-time connections on an already overcrowded spectrum. In recent times cognitive radios (CR) are becoming the prime candidates for improved utilization of available spectrum. The unlicensed secondary users share the spectrum with primary licensed user in such manners that the interference at the primary user does not increase from a predefined threshold. In this paper, we propose an algorithm to address the power control problem for CR networks. The proposed solution models the wireless system with a non-cooperative game, in which each player maximize its utility in a competitive environment. The simulation results shows that the proposed algorithm improves the performance of the network in terms of high SINR and low power consumption.

  相似文献   
37.
This paper presents a stochastic, multi-parameters, divergence optimization method for the auto-tuning of proportional–integral–derivative (PID) controllers according to a fractional-order reference model. The study aimed to approximate the step response of the real closed-loop flight control system to the response of a theoretical reference model for a smoother and more precise flight control experience. The proposed heuristic optimization method can auto-tune a PID controller without a precise plant model. This is very advantageous when dealing with model and parameter uncertainties in real control application and practice. Experimental study confirms the reference model driven auto-tuning of the DC rotor prototype.  相似文献   
38.
Intrusion detection is an important technique in computer and network security. A variety of intrusion detection approaches be present to resolve this severe issue but the main problem is performance. It is important to increase the detection rates and reduce false alarm rates in the area of intrusion detection. Therefore, in this research, an optimized intrusion detection mechanism using soft computing techniques is proposed to overcome performance issues. The KDD-cup dataset is used that is a benchmark for evaluating the security detection mechanisms. The Principal Component Analysis (PCA) is applied to transform the input samples into a new feature space. The selecting of an appropriate number of principal components is a critical problem. So, Genetic Algorithm (GA) is used in the optimum selection of principal components instead of using traditional method. The Support Vector Machine (SVM) is used for classification purpose. The performance of this approach is addresses. Further, a comparative analysis is made with existing approaches. Consequently, this method provides optimal intrusion detection mechanism which is capable to minimize amount of features and maximize the detection rates.  相似文献   
39.
Moments have been used in all sorts of object classification systems based on image. There are lots of moments studied by many researchers in the area of object classification and one of the most preference moments is the Zernike moment. In this paper, the performance of object classification using the Zernike moment has been explored. The classifier based on neural networks has been used in this study. The results indicate the best performance in identifying the aggregate is at 91.4% with a ten orders of the Zernike moment. This encouraging result has shown that the Zernike moment is a suitable moment to be used as a feature of object classification systems.  相似文献   
40.
Patient Physiological Parameters (PPPs) seem to be the most extensively accessed and utilized Personal Health Information (PHI) in hospitals, and their utilization by the various medical entities for treatment and diagnosis creates a real threat to patient privacy. This study aims to investigate whether PPPs access in a hospital environment violates patient privacy. If so, to what extent can we manage patient privacy while accessing PPPs in this environment? We investigated this question by analyzing questionnaire-based data from two Asian countries: Group A (China) and Group B (Pakistan). For data collection, we targeted those medical entities which were directly dealing with PPPs in their routine tasks. Results suggest that patient type directly influences the collection of PPPs: Group A (one-time?=?1.9, follow-up?=?1.06) and Group B (one-time?=?2.0 and follow-up?=?1.9). Both groups agreed that patients have the right to control their own PPPs. In both, doctors are the most trusted entity: for Group A, the Pearson Chi-Square with one degree of freedom is 1.414, p?=?0.234, whereas for Group B, the Pearson Chi-Square with three degrees of freedom is 4.511, p?=?0.11. Most of the Group A entities (92%) are familiar with unauthorized access of PPPs, while in Group B the level was only 35%. In Group B, only 35% of entities stated the purpose, specification and use limitations of PPPs. Doctors in both groups showed a high utilization of PPPs read authorization rights. This empirical evidence about PPPs usage in both countries will benefit health technology and improve policy on patient privacy.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号