首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2551篇
  免费   163篇
  国内免费   2篇
电工技术   21篇
综合类   1篇
化学工业   633篇
金属工艺   81篇
机械仪表   160篇
建筑科学   91篇
矿业工程   8篇
能源动力   86篇
轻工业   362篇
水利工程   32篇
石油天然气   19篇
无线电   150篇
一般工业技术   397篇
冶金工业   52篇
原子能技术   16篇
自动化技术   607篇
  2024年   7篇
  2023年   37篇
  2022年   111篇
  2021年   138篇
  2020年   114篇
  2019年   120篇
  2018年   151篇
  2017年   109篇
  2016年   140篇
  2015年   103篇
  2014年   131篇
  2013年   250篇
  2012年   186篇
  2011年   238篇
  2010年   138篇
  2009年   134篇
  2008年   118篇
  2007年   99篇
  2006年   76篇
  2005年   51篇
  2004年   50篇
  2003年   51篇
  2002年   29篇
  2001年   22篇
  2000年   17篇
  1999年   16篇
  1998年   9篇
  1997年   9篇
  1996年   9篇
  1995年   8篇
  1994年   11篇
  1993年   3篇
  1992年   3篇
  1991年   4篇
  1990年   1篇
  1989年   5篇
  1988年   1篇
  1987年   1篇
  1986年   1篇
  1985年   2篇
  1984年   1篇
  1981年   2篇
  1980年   3篇
  1979年   1篇
  1976年   2篇
  1975年   3篇
  1973年   1篇
排序方式: 共有2716条查询结果,搜索用时 15 毫秒
21.
For the past few decades there has been tremendous innovation and development of Terahertz (THz) science and imaging. In particular, the technique of 3-D computed tomography has been adapted from the X-Ray to the THz range. However, the finite refractive index of materials in the THz range can severally refract probing THz beams during the acquisition of tomography data. Due to Fresnel reflection power losses at the boundaries as well as steering of the THz beam through the sample, refractive effects lead to anomalously high local attenuation coefficients near the material boundaries of a reconstructed image. These boundary phenomena can dominate the reconstructed THz-CT images making it difficult to distinguish structural defect(s) inside the material. In this paper an algorithm has been developed to remove the effects of refraction in THz-CT reconstructed images. The algorithm is successfully implemented on cylindrical shaped objects.  相似文献   
22.
This paper proposes real linear transceivers employing minimum redundancy, unlike the standard block transceivers that require, at least, L elements of redundancy, where L is the channel order. In all block-based systems, there is an inherent interblock interference (IBI) that can be eliminated by inserting redundancy. For transceivers based on the discrete Fourier transform (DFT), the redundancy induces a circulant channel matrix, allowing superfast implementations. Although it has been known for some time that the minimum redundancy for IBI-free designs of block transceivers is ⌈L/2⌉, only recently practical DFT-based solutions using minimum redundancy were proposed. However, the extension of these solutions to real transforms, such as the discrete Hartley transform (DHT), is not straightforward. The only known solution imposes a symmetry on the channel model that is unlikely to be met in practice. This paper proposes transceivers with practical zero-forcing (ZF) and minimum mean-squared error (MMSE) receivers using DHT, diagonal, and antidiagonal matrices. The resulting systems are asymptotically as simple as orthogonal frequency-division multiplex (OFDM) and single-carrier with frequency-domain (SC-FD) equalization transceivers. In addition, they do not enforce constraints on the channel model. Several computer simulations indicate the higher throughput of the proposals as compared to the standard solutions.  相似文献   
23.
In this paper a low-voltage low-power threshold voltage monitor for CMOS process sensing is presented. This circuit works in weak inversion and it can be used as an elementary circuit block for on-chip compensation of the intra-die or inter-die threshold voltage variations in low-power analog and mixed-signal SoC, since it is robust to temperature and power supply voltage variations (similar to the bandgap voltage reference). The proposed threshold voltage monitor has been successfully verified in a standard 0.35-μm n-well CMOS TSMC process. Experimental results have confirmed that the circuit generates an average reference voltage of 758 mV (very close to the typical threshold voltage when extrapolated to absolute zero) for a 950 mV power supply voltage, with a variation of 39 ppm/°C for the −20 to 80°C temperature range.  相似文献   
24.
Graphene-based materials have attracted significant attention in many technological fields, but scaling up graphene-based technologies still faces substantial challenges. High-throughput top-down methods generally require hazardous, toxic, and high-boiling-point solvents. Here, an efficient and inexpensive strategy is proposed to produce graphene dispersions by liquid-phase exfoliation (LPE) through a combination of shear-mixing (SM) and tip sonication (TS) techniques, yielding highly concentrated graphene inks compatible with spray coating. The quality of graphene flakes (e.g., lateral size and thickness) and their concentration in the dispersions are compared using different spectroscopic and microscopy techniques. Several approaches (individual SM and TS, and their combination) are tested in three solvents (N-methyl-2-pyrrolidone, dimethylformamide, and cyrene). Interestingly, the combination of SM and TS in cyrene yields high-quality graphene dispersions, overcoming the environmental issues linked to the other two solvents. Starting from the cyrene dispersion, a graphene-based ink is prepared to spray-coat flexible electrodes and assemble a touch screen prototype. The electrodes feature a low sheet resistance (290 Ω □−1) and high optical transmittance (78%), which provide the prototype with a high signal-to-noise ratio (14 dB) and multi-touch functionality (up to four simultaneous touches). These results illustrate a potential pathway toward the integration of LPE-graphene in commercial flexible electronics.  相似文献   
25.
Non-communicable diseases burden is well-known and care for these diseases goes beyond patients’ engagement, extending to their family, friends, and acquaintances. The ability of social relations in alleviating the harmful effects of health risks is known as social support. Computing can be used to promote social support to enhance the care of non-communicable diseases. However, it is unclear how computing obtains such enhancement. This paper presents a systematic review, in the form of a mapping study, aiming to answer how computing enhances non-communicable diseases care by using social data and by promoting social support. It also looks for available computing models focused on social support promotion in non-communicable diseases care. The study was guided by a two-phase process review, resulting in 38 reviewed papers from journals, conferences, and chapters in the period from 2010 to 2016. In general, the reviewed papers focus on controlled trials, frameworks and systems, knowledge discovery, simulation models or social media usage analysis. Knowledge discovery was the predominant subject, followed by social media usage analysis, and frameworks and systems.  相似文献   
26.
Security is an important concern in any modern network. This also applies to Wireless Sensor Networks (WSNs), especially those used in applications that monitor sensitive information (e.g., health care applications). However, the highly constrained nature of sensors imposes a difficult challenge: their reduced availability of memory, processing power and energy hinders the deployment of many modern cryptographic algorithms considered secure. For this reason, the choice of the most memory-, processing- and energy-efficient security solutions is of vital importance in WSNs. To date, a number of extensive analyses comparing different encryption algorithms and key management schemes have been developed, while very little attention has been given to message authentication solutions. In this paper, aiming to close this gap, we identify cipher-based Message Authentication Codes (MACs) and Authenticated Encryption with Associated Data (AEAD) schemes suitable for WSNs and then evaluate their features and performance on a real platform (TelosB). As a result of this analysis, we identify the recommended choices depending on the characteristics of the target network and available hardware.  相似文献   
27.
Nowadays the increasing interest to perform machining operations is in dry/near-dry environments. The reason includes health and safety of operator, cost, ease of chip recyclability, etc. However one important process, which is difficult to perform in dry, is drilling. Without coolant, drilling leads to excessive thermal distortion and poor tool life. In order to tackle these conflicting requirements, the essentiality of study on machining performances with minimum quantity lubricant (MQL) becomes important.Fuzzy logic rules, which are derived based on fuzzy set theory, are used to develop fuzzy rule based model (FRBM). The performance of FRBM depends on two different aspects: structures of fuzzy rules and the associated fuzzy sets (membership function distributions, MFDs). The aim of this study is to investigate the performances of FRBMs based on Mamdani and TSK-types of fuzzy logic rules with different shapes of MFDs for prediction and performance analysis of machining with MQL in drilling of aluminum alloy. A comparison of the model predictions with experimental results and those published in the literature shows that FRBM with TSK-type fuzzy rules describes excellent trade-off with experimental measurements.  相似文献   
28.
Nowadays, switched Ethernet networks are used in complex systems that encompass tens to hundreds of nodes and thousands of signals. Such scenarios require multi-switch architectures where communications frequently occur in multiple hops. In this paper we investigate techniques to allow efficient multi-hop communication using HaRTES switches. These are modified Ethernet switches that provide real-time traffic scheduling, dynamic bandwidth management and temporal isolation between real-time and non-real-time traffic. This paper addresses the problem of forwarding traffic in HaRTES networks. Two methods have been recently proposed, namely Distributed Global Scheduling (DGS) that buffers traffic between switches, and Reduced Buffering Scheme (RBS), that uses immediate forwarding. In this paper, we discuss the design and implementation of RBS within HaRTES and we carry out an experimental validation with a prototype implementation. Then, we carry out a comparison between RBS and DGS using worst-case response time analysis and simulation. The comparison clearly establishes the superiority of RBS concerning end-to-end response times. In fact, with sample message sets, we achieved reductions in end-to-end delay that were as high as 80 %.  相似文献   
29.
Finite impulse response (FIR) filtering is a ubiquitous operation in digital signal processing systems and is generally implemented in full custom circuits due to high-speed and low-power design requirements. The complexity of an FIR filter is dominated by the multiplication of a large number of filter coefficients by the filter input or its time-shifted versions. Over the years, many high-level synthesis algorithms and filter architectures have been introduced in order to design FIR filters efficiently. This article reviews how constant multiplications can be designed using shifts and adders/subtractors that are maximally shared through a high-level synthesis algorithm based on some optimization criteria. It also presents different forms of FIR filters, namely, direct, transposed, and hybrid and shows how constant multiplications in each filter form can be realized under a shift-adds architecture. More importantly, it explores the impact of the multiplierless realization of each filter form on area, delay, and power dissipation of both custom (ASIC) and reconfigurable (FPGA) circuits by carrying out experiments with different bitwidths of filter input, design libraries, reconfigurable target devices, and optimization criteria in high-level synthesis algorithms.  相似文献   
30.
A design procedure for frequency-response masking (FRM) prototype filters of cosine-modulated filter banks (CMFBs) is proposed. In the given method, we perform minimization of the maximum attenuation level in the filters stopband, subject to intersymbol interference (ISI) and intercarrier interference (ICI) constraints. For optimization, a quasi-Newton algorithm with line search is used, and we provide simplified analytical expressions to impose the interference constraints, which greatly reduce the computational complexity of the optimization procedure. The result is lower levels of ISI and ICI for a predetermined filter order, or a reduced filter complexity for given levels of interferences. It is then illustrated how the FRM-CMFB structure is suitable for implementing filter banks with a large number of bands, yielding sharp transition bands and small roll-off factors, which is an attractive feature for a wide range of practical applications.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号