首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5779篇
  免费   212篇
  国内免费   32篇
电工技术   85篇
综合类   10篇
化学工业   1141篇
金属工艺   206篇
机械仪表   155篇
建筑科学   66篇
矿业工程   16篇
能源动力   353篇
轻工业   285篇
水利工程   46篇
石油天然气   21篇
无线电   732篇
一般工业技术   1350篇
冶金工业   758篇
原子能技术   36篇
自动化技术   763篇
  2023年   84篇
  2022年   141篇
  2021年   211篇
  2020年   175篇
  2019年   146篇
  2018年   214篇
  2017年   195篇
  2016年   220篇
  2015年   130篇
  2014年   221篇
  2013年   482篇
  2012年   272篇
  2011年   294篇
  2010年   231篇
  2009年   311篇
  2008年   221篇
  2007年   161篇
  2006年   156篇
  2005年   124篇
  2004年   112篇
  2003年   118篇
  2002年   97篇
  2001年   76篇
  2000年   76篇
  1999年   82篇
  1998年   146篇
  1997年   118篇
  1996年   129篇
  1995年   88篇
  1994年   92篇
  1993年   82篇
  1992年   62篇
  1991年   76篇
  1990年   72篇
  1989年   51篇
  1988年   47篇
  1987年   49篇
  1986年   43篇
  1985年   51篇
  1984年   36篇
  1983年   27篇
  1982年   32篇
  1981年   37篇
  1980年   22篇
  1979年   30篇
  1978年   30篇
  1977年   27篇
  1976年   33篇
  1975年   16篇
  1973年   14篇
排序方式: 共有6023条查询结果,搜索用时 0 毫秒
71.
In addition to unresponsive UDP traffic, aggressive TCP flows pose a serious challenge to congestion control and stability of the future Internet. This paper considers the problem of dealing with such unresponsive TCP sessions that can be considered to collectively constitute a Denial-of-Service (DoS) attack on conforming TCP sessions. The proposed policing scheme, called HaDQ (HaTCh-based Dynamic Quarantine), is based on a recently proposed HaTCh mechanism, which accurately estimates the number of active flows without maintenance of per-flow states in a router. We augment HaTCh with a small Content Addressable Memory (CAM), called quarantine memory, to dynamically quarantine and penalize the unresponsive TCP flows. We exploit the advantage of the smaller, first-level cache of HaTCh for isolating and detecting the aggressive flows. The aggressive flows from the smaller cache are then moved to the quarantine memory and are precisely monitored for taking appropriate punitive action. While the proposed HaDQ technique is quite generic in that it can work with or without any AQM scheme, in this paper we have integrated HaDQ and an AQM scheme to compare it against some of the existing techniques. For this, we extend the HaTCh scheme to develop a complete AQM mechanism, called HRED. Simulation-based performance analysis indicates that by using a proper configuration of the monitoring period and the detection threshold, the proposed HaDQ scheme can achieve a low false drop rate (false positives) of less than 0.1%. Comparison with two AQM schemes (CHOKe and FRED), which were proposed for handling unresponsive UDP flows, shows that HaDQ is more effective in penalizing the bandwidth attackers and enforcing fairness between conforming and aggressive TCP flows.  相似文献   
72.
Handovers may cause delays and packet losses that affect real-time communication performance. Mobility protocols at several layers are designed to support handover, but they need to be optimized to ensure high-quality application performance. Existing optimization techniques are not sufficient to take care of interdomain and intertechnology handovers involving different access technologies, such as Wi-Fi, GSM, CDMA, and WiMAX. We categorize several types of handover, describe handover delay components, and propose a handover optimization framework called media independent pre-authentication that can provide optimizations for interdomain and intertechnology handover in a manner that is transparent to mobility management protocols. In addition, we also present experimental results demonstrating that this framework can achieve a significant reduction in handover delays for both network-layer and application-layer mobility management protocols.  相似文献   
73.
毫无疑问,近年来计算技术取得了长足的进步。但是,在未来的十年,主流计算技术中新的工作量、使用模式的出现及变化对未来的计算平台提出的要求,与过去十年所取得的进展也差不多,这些巨大的要求包括:更高的性能、更低的功率密度、更好的功能可扩展性。倘若出现这些使用计算机的震撼性的变化,我们怎样定义和构架未来的计算平台,就将不得不做出引人注目的改变。要整体地理解和满足的,不仅仅有计算的需要,而且还有接口以及系统基础设施的需要。Intel对这三个基础平台要素的演化的长期设想,以及驱动演化的架构的创新和核心能力,即是我们称之为平台2015(Platform2015)的内容。除了考察相关的趋势、使用、平台处理含意之外,本文将集中在平台2015的计算单元,描述Intel微处理器架构在未来十年的演化。  相似文献   
74.

In this paper, a multi hybrid decode-amplify-forward relay cooperative network with perfect CSI in flat Rayleigh fading channel is considered. Using moment generating function based approach, the closed form of symbol error rate (SER) with asymptotic approximation is derived. Based on the lower bound of SER (Olfat and Olfat in IET Commun 5(4):2018–2027, 2011), Lagrange multiplier method and differential evolution (DE) algorithm based power allocation schemes are proposed. With fixed source power, the relay powers are optimized with the proposed schemes by the power allocation factor. Further the SER performance of proposed power allocation schemes is investigated by varying the location of the relays. The performance gain of proposed power allocation schemes depends on the channel quality of source to relay and relay to destination links. It is observed that the proposed power allocation schemes outperform the equal power allocation scheme and DE based power allocation provides SER response close to power allocation with Lagrange multiplier method. In order to achieve the target SER (quality of service) minimum power allocation is introduced as minimum relay power allocation and minimum source and relay power allocation.

  相似文献   
75.
Wireless Personal Communications - Privacy issue has become a crucial concern in internet of things (IoT) applications ranging from home appliances to vehicular networks. RFID system has found...  相似文献   
76.

The implementation of machine-to-machine (M2M) communications in fifth-generation (5G) cellular networks can facilitate with several benefits like enhancement of bandwidth utilization, accommodating large number of users and decreasing traffic load on evolved node B (eNB). Integration of location information of unknown machine in communication mode selection mechanism is the key feature of this research. In this paper, a distance based communication mode selection mechanism using non-orthogonal resource sharing scheme is adopted in the proposed system model. Under the proposed mechanism, the expressions of throughput and RBs utilization policy are derived, which are the key parameters to evaluate the performance in the proposed network. Depending on the mode selection condition, such as threshold distance and threshold SINR between M2M users and regular cellular users, a UE can automatically choose its communication mode in the network. It is supposed that selection of mode before data transfer can improve the system performance. On the other hand, designing of efficient distance assisted proposed resource blocks (RBs) utilization policy reduces the traffic load on the eNB. Extensive simulations are carried out for evaluating the performance of the proposed mechanisms. The system performance is compared with various changeable parameters, such as throughput, mode selection threshold SINR, threshold distance and RBs. Besides, the proposed mechanism provides better network performance as well as reduces the traffic load in the proposed network.

  相似文献   
77.
The fluctuation of available link bandwidth in mobilecellular networks motivates the study of adaptive multimediaservices, where the bandwidth of an ongoing multimedia call can bedynamically adjusted. We analyze the diverse objectives of theadaptive multimedia framework and propose two bandwidth adaptationalgorithms (BAAs) that can satisfy these objectives. The firstalgorithm, BAA-RA, takes into consideration revenue and``anti-adaptation' where anti-adaptation means that a user feelsuncomfortable whenever the bandwidth of the user's call ischanged. This algorithm achieves near-optimal total revenue withmuch less complexity compared to an optimal BAA. The secondalgorithm, BAA-RF, considers revenue and fairness, and aims at themaximum revenue generation while satisfying the fairnessconstraint defined herein. Comprehensive simulation experimentsshow that the difference of the total revenue of BAA-RA and thatof an optimal BAA is negligible. Also, numerical results revealthat there is a conflicting relationship between anti-adaptationand fairness.  相似文献   
78.
The capacitance of dielectric coated metallic cylinder and truncated cone are evaluated using the method of moments based on the pulse function and point matching. The analysis is based on the boundary condition for the potential on the conductor surface and the normal component of the displacement density at the dielectric-free space interface. The total free charge on the conductor surface is found from the inversion of a matrix partitioned into submatrices. Numerical data on the capacitance and charge distribution are presented  相似文献   
79.
Often, in synthetic aperture radar (SAR) images of polar ice, one encounters shadow-like features across the images. Such features make it difficult to classify pixels into ice and water. Accordingly, it becomes a challenge to determine the true size and boundaries of ice floes in an SAR image of polar ice. We develop a simple statistical procedure which classifies pixels of an image by eliminating the effects of shadow-like features. Methodology developed in this paper is illustrated using some noisy SAR images of ice floes in the Arctic sea.  相似文献   
80.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号