首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3769篇
  免费   161篇
  国内免费   25篇
电工技术   55篇
综合类   5篇
化学工业   930篇
金属工艺   104篇
机械仪表   102篇
建筑科学   122篇
矿业工程   9篇
能源动力   463篇
轻工业   330篇
水利工程   22篇
石油天然气   63篇
无线电   309篇
一般工业技术   660篇
冶金工业   256篇
原子能技术   26篇
自动化技术   499篇
  2023年   66篇
  2022年   163篇
  2021年   196篇
  2020年   137篇
  2019年   119篇
  2018年   199篇
  2017年   144篇
  2016年   164篇
  2015年   102篇
  2014年   155篇
  2013年   274篇
  2012年   187篇
  2011年   228篇
  2010年   148篇
  2009年   161篇
  2008年   132篇
  2007年   123篇
  2006年   106篇
  2005年   65篇
  2004年   74篇
  2003年   77篇
  2002年   59篇
  2001年   38篇
  2000年   43篇
  1999年   44篇
  1998年   77篇
  1997年   54篇
  1996年   45篇
  1995年   61篇
  1994年   34篇
  1993年   45篇
  1992年   30篇
  1991年   29篇
  1990年   22篇
  1989年   24篇
  1988年   14篇
  1987年   15篇
  1986年   15篇
  1985年   25篇
  1984年   29篇
  1983年   16篇
  1982年   25篇
  1981年   28篇
  1980年   20篇
  1979年   24篇
  1978年   17篇
  1977年   15篇
  1976年   13篇
  1975年   12篇
  1973年   13篇
排序方式: 共有3955条查询结果,搜索用时 15 毫秒
51.
The explosive growth of the mobile multimedia industry has accentuated the need for efficient VLSI implementations of the associated computationally demanding signal processing algorithms. In particular, the short battery life caused by excessive power consumption of mobile devices has become the biggest obstacle facing truly mobile multimedia. We propose novel hardware accelerator architectures for two of the most computationally demanding algorithms of the MPEG-4 video compression standard––the forward and inverse shape adaptive discrete cosine transforms (SA-DCT/IDCT). These accelerators have been designed using general low-energy design philosophies at the algorithmic/architectural abstraction levels. The themes of these philosophies are avoiding waste and trading area/performance for power and energy gains. Each core has been synthesised targeting TSMC 0.09 μm TCBN90LP technology, and the experimental results presented in this paper show that the proposed cores improve upon the prior art.
Noel O’ConnorEmail:
  相似文献   
52.
Reliability and ageing tests on power semiconductor devices require estimation of junction temperatures in order to control thermal stresses and monitor failure criteria. For this purpose, thermo-electrical parameters, such as voltage forward drop dependence with temperature are usually carried out in low injection level. Nevertheless, it is still difficult to evaluate the limits of such exploitation. An analytical model has been developed and validated by experimental measurements in order to evaluate self-heating effects and to understand high temperature effects. This model should also allow to highlight the role of some physical parameters in the voltage–temperature dependence and to clarify such thermal calibration.  相似文献   
53.
As a network-based localized mobility management protocol, Proxy Mobile IPv6 (PMIPv6) enables a Mobile Host (MH) to roam within a localized domain without MH intervention in the mobility-related signalling. However, the PMIPv6 maintains MH mobility support in a restriction domain. Therefore, whenever the MH roams away from the PMIPv6 domain, its reachability status will be broken-down causing high handover latency and inevitable traffic loss for its communication session. This article proposes a proactive mechanism to mange the MH handover and maintain its data session continually across inter-PMIPv6-domains. The proposed mechanism introduces an intermediate global mobility anchor entity, called, which is responsible to coordinate MH handover as well as redirect its traffic across inter-PMIPv6-domains. Through various simulation evaluations, via ns-2, several experiments were conducted, revealing numerous results that verify the proposed mechanism superior performance over the conventional inter-PMIPv6-domain handover schemes in terms of handover latency, achieved throughput, protocol signalling cost and end-to-end traffic delivery latency.  相似文献   
54.
In this paper the bit error rate performance and error vector magnitude of a tunable impedance matching network is analyzed assuming QPSK, 16-QAM and 64-QAM digital modulation schemes. The characterized tunable impedance matching network is based on barium–strontium–titanate ferroelectric thick-film varactors. Inherent dispersive behavior is subsumed into the forward transmission of the passive device. Due to this nonlinear phase response, in general to maximize the overall system performance, an agile tuning of the varactor values is demonstrated, taking into account the phase and group delay of s21 parameter. Detailed signal simulation results based on measured data of a testbed are presented. The influence of varying matched impedances on the tuning behavior with different modulation bandwidths is discussed at a center frequency of 1.9 GHz.  相似文献   
55.

Radio-frequency identification (RFID) is an up-and-coming technology. The major limitations of RFID technology are security and privacy concerns. Many methods, including encryption, authentication and hardware techniques, have been presented to overcome security and privacy problems. This paper focuses on authentication protocols. The combination of RFID technology being popular but unsecure has led to an influx of mutual authentication protocols. Authentication protocols are classified as being fully fledged, simple, lightweight or ultra-lightweight. Since 2002, much important research and many protocols have been presented, with some of the protocols requiring further development. The present paper reviews in detail recently proposed RFID mutual authentication protocols, according to the classes of the authentication protocols. The protocols were compared mainly in terms of security, the technique that they are based on, protocols that the presented protocol has been compared with, and finally, the method of verifying the protocol. Important points of the comparisons were collected in two tables.

  相似文献   
56.
Handover management for mobile nodes in IPv6 networks   总被引:16,自引:0,他引:16  
We analyze IPv6 handover over wireless LAN. Mobile IPv6 is designed to manage mobile nodes' movements between wireless IPv6 networks. Nevertheless, the active communications of a mobile node are interrupted until the handover completes. Therefore, several extensions to Mobile IPv6 have been proposed to reduce the handover latency and the number of lost packets. We describe two of them, hierarchical Mobile IPv6, which manages local movements into a domain, and fast handover protocol, which allows the use of layer 2 triggers to anticipate the handover. We expose the specific handover algorithms proposed by all these methods. We also evaluate the handover latency over IEEE 802.11b wireless LAN. We compare the layer 2 and layer 3 handover latency in the Mobile IPv6 case in order to show the saving of time expected by using anticipation. We conclude by showing how to adapt the IEEE 802.11b control frames to set up such anticipation.  相似文献   
57.
Sleep scheduling with expected common coverage in wireless sensor networks   总被引:1,自引:0,他引:1  
Sleep scheduling, which is putting some sensor nodes into sleep mode without harming network functionality, is a common method to reduce energy consumption in dense wireless sensor networks. This paper proposes a distributed and energy efficient sleep scheduling and routing scheme that can be used to extend the lifetime of a sensor network while maintaining a user defined coverage and connectivity. The scheme can activate and deactivate the three basic units of a sensor node (sensing, processing, and communication units) independently. The paper also provides a probabilistic method to estimate how much the sensing area of a node is covered by other active nodes in its neighborhood. The method is utilized by the proposed scheduling and routing scheme to reduce the control message overhead while deciding the next modes (full-active, semi-active, inactive/sleeping) of sensor nodes. We evaluated our estimation method and scheduling scheme via simulation experiments and compared our scheme also with another scheme. The results validate our probabilistic method for coverage estimation and show that our sleep scheduling and routing scheme can significantly increase the network lifetime while keeping the message complexity low and preserving both connectivity and coverage.  相似文献   
58.
59.
The mobility and openness of wireless communication technologies make Mobile Healthcare Systems (mHealth) potentially exposed to a number of potential attacks, which significantly undermines their utility and impedes their widespread deployment. Attackers and criminals, even without knowing the context of the transmitted data, with simple eavesdropping on the wireless links, may benefit a lot from linking activities to the identities of patient’s sensors and medical staff members. These vulnerabilities apply to all tiers of the mHealth system. A new anonymous mutual authentication scheme for three-tier mobile healthcare systems with wearable sensors is proposed in this paper. Our scheme consists of three protocols: Protocol-1 allows the anonymous authentication nodes (mobile users and controller nodes) and the HSP medical server in the third tier, while Protocol-2 realizes the anonymous authentication between mobile users and controller nodes in the second tier, and Protocol-3 achieves the anonymous authentication between controller nodes and the wearable body sensors in the first tier. In the design of our protocols, the variation in the resource constraints of the different nodes in the mHealth system are taken into consideration so that our protocols make a better trade-off among security, efficiency and practicality. The security of our protocols are analyzed through rigorous formal proofs using BAN logic tool and informal discussions of security features, possible attacks and countermeasures. Besides, the efficiency of our protocols are concretely evaluated and compared with related schemes. The comparisons show that our scheme outperforms the previous schemes and provides more complete and integrated anonymous authentication services. Finally, the security of our protocols are evaluated by using the Automated Validation of Internet Security Protocols and Applications and the SPAN animator software. The simulation results show that our scheme is secure and satisfy all the specified privacy and authentication goals.  相似文献   
60.

We perceive big data with massive datasets of complex and variegated structures in the modern era. Such attributes formulate hindrances while analyzing and storing the data to generate apt aftermaths. Privacy and security are the colossal perturb in the domain space of extensive data analysis. In this paper, our foremost priority is the computing technologies that focus on big data, IoT (Internet of Things), Cloud Computing, Blockchain, and fog computing. Among these, Cloud Computing follows the role of providing on-demand services to their customers by optimizing the cost factor. AWS, Azure, Google Cloud are the major cloud providers today. Fog computing offers new insights into the extension of cloud computing systems by procuring services to the edges of the network. In collaboration with multiple technologies, the Internet of Things takes this into effect, which solves the labyrinth of dealing with advanced services considering its significance in varied application domains. The Blockchain is a dataset that entertains many applications ranging from the fields of crypto-currency to smart contracts. The prospect of this research paper is to present the critical analysis and review it under the umbrella of existing extensive data systems. In this paper, we attend to critics' reviews and address the existing threats to the security of extensive data systems. Moreover, we scrutinize the security attacks on computing systems based upon Cloud, Blockchain, IoT, and fog. This paper lucidly illustrates the different threat behaviour and their impacts on complementary computational technologies. The authors have mooted a precise analysis of cloud-based technologies and discussed their defense mechanism and the security issues of mobile healthcare.

  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号