首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3441篇
  免费   195篇
  国内免费   5篇
电工技术   42篇
综合类   2篇
化学工业   962篇
金属工艺   50篇
机械仪表   82篇
建筑科学   128篇
矿业工程   2篇
能源动力   107篇
轻工业   521篇
水利工程   22篇
石油天然气   17篇
无线电   266篇
一般工业技术   492篇
冶金工业   192篇
原子能技术   19篇
自动化技术   737篇
  2024年   6篇
  2023年   53篇
  2022年   169篇
  2021年   215篇
  2020年   104篇
  2019年   96篇
  2018年   138篇
  2017年   85篇
  2016年   156篇
  2015年   108篇
  2014年   153篇
  2013年   253篇
  2012年   220篇
  2011年   296篇
  2010年   173篇
  2009年   202篇
  2008年   191篇
  2007年   168篇
  2006年   136篇
  2005年   110篇
  2004年   79篇
  2003年   74篇
  2002年   65篇
  2001年   33篇
  2000年   38篇
  1999年   35篇
  1998年   60篇
  1997年   44篇
  1996年   39篇
  1995年   26篇
  1994年   28篇
  1993年   10篇
  1992年   14篇
  1991年   3篇
  1990年   6篇
  1989年   9篇
  1988年   4篇
  1985年   3篇
  1984年   2篇
  1983年   6篇
  1982年   7篇
  1981年   4篇
  1980年   5篇
  1979年   4篇
  1976年   3篇
  1972年   1篇
  1970年   1篇
  1969年   1篇
  1967年   1篇
  1965年   1篇
排序方式: 共有3641条查询结果,搜索用时 0 毫秒
61.
Reliability and effectiveness are essential features of satellite transceivers for telemetry and telecommand applications. Modem performance has a strong impact on the success of a satellite mission, in particular, during critical scenarios as the early operation phase, the disposal of a satellite at the end of its life, or the deep‐space missions. In these specific mission critical scenarios, fast and correct data reception is even more important than high channel capacity. An unknown and fast variable channel condition, which can be caused by uncertain spacecraft attitude and large Doppler shift with respect to the data rate, requires efficient and innovative receiver architecture. This paper introduces a complete digital implementation of a transceiver for TM/TC application in low Earth orbit mission that is perfectly compliant with aforementioned requirements. Particular attention is dedicated to the definition and selection of the most appropriate frequency recovery technique; 2 open‐loop techniques that are derived from ML optimal estimator are presented and compared. Additionally, the performance of the proposed receiver is extensively studied and compared with an incoherent technique that is based on the double differential PSK modulation and is known to be suitable for sat‐com in critical scenarios.  相似文献   
62.
The CO inhibition effect on H2 permeance through commercial Pd-based membranes was analysed by means of permeation measurements at different CO compositions (0–30% molar) and temperatures (593–723 K) with the aim to determine the increase of the membrane area in order to compensate the H2 flux reduction owing to the CO inhibition effect. The permeance of H2 fed with carbon monoxide was observed to decrease with respect to the case of pure hydrogen. At 647 K the H2 permeance of a pure feed of 316 μmol m−2 s−1 Pa−0.5 reduces progressively until 275 μmol m−2 s−1 Pa−0.5 when 15% or more of CO is present in the system, until it reaches a plateau at 20%. The inhibition effect occurring when CO is present in the feed stream reduces with the progressive temperature increase; the reduction of the permeance decreases exponentially by 23% at 593 K and by 3% at 723 K with 10% of CO. The inhibition effect is seen to be reversible. An H2 flux profile in a Sieverts' plot shows the effect produced by the increase of the CO composition along the Pd-based membrane length. The H2 flux profile allows the area of a Pd-based membrane to be evaluated in order to have the same permeate flow rate of H2 when it is fed with CO or as a pure stream. Moreover, a qualitative comparison between the H2 flux profiles and a previously proposed model has been carried out.  相似文献   
63.
This work describes an architectural framework that allows inter-domain Traffic Engineering Label Switched Paths (TE-LSPs) with guaranteed quality of service (QoS) to be setup. Such TE-LSPs, called EQ-links, are setup by coordinating path computation elements (PCEs) of neighboring autonomous systems (ASs) along a pre-determined inter-AS path, computed through cooperative interaction between pairs of neighboring ASs. After defining the architectural requirements for the framework, we describe and analyze the Inter-AS Path Computation Protocol (IA-PCP), which computes an interdomain path at the AS level, i.e., selecting a sequence of ASs to the destination, based on a loose source routing approach. The results of the IA-PCP computations are then fed to the PCEs for complete path computation. The proposed architecture has been actually implemented within the testbed of the EuQoS project, which is aimed at enabling end-to-end QoS in the Internet. We report results related to the setup time of EQ-links, measured in the pan-European testbed of the EuQoS project, showing that path computation and setup takes an affordable time overhead.  相似文献   
64.
This paper describes the effect of geometry in charge-trap (CT) memory devices. We first theoretically analyze the impact of the curvature radius on the behavior of the gate current in Gate-All-Around devices, and then describe the change to make to planar model in order to fit the cylindrical devices characteristics. This model is used to simulate Nanocrystal and SONOS program, erase and retention behaviors. The dynamics enhancement during program/erase due to the bending of the active region in such cylindrical devices is explained. The scaling perspectives conclude this paper.  相似文献   
65.
In WiMAX systems the Base Station scheduler plays a key role as it controls the sharing of the radio resources among the users. The goal of the scheduler is multiple: achieve fair usage of the resources, satisfy the QoS requirements of the users, maximize goodput, and minimize power consumption, and at the same time ensuring feasible algorithm complexity and system scalability. Since most of these goals are contrasting, scheduler designers usually focus their attention on optimizing one aspect only. In this scenario, we propose a scheduling algorithm (called GTSNmathrm{GTS_N}) whose goal is to contemporaneously achieve efficiency and fairness, while also taking into account the QoS requirements and the channel state. GTSNmathrm{GTS_N} exploits the properties of Time Utility Functions (TUFs) and Game Theory. Simulations prove that the performance of GTSN,mathrm{GTS_N}, when compared to that of several well-known schedulers, is remarkable. GTSNmathrm{GTS_N} provides the best compromise between the two contrasting objectives of fairness and efficiency, while QoS requirements are in most cases guaranteed. However, the exponential complexity introduced by the game theory technique makes it rather impractical and not computationally scalable for a large number of users. Thus we developed a suboptimal version, named sub-GTSN.mathrm{GTS_N}. We show that this version retains most of the features and performance figures of its brother, but its complexity is linear with the number of users.  相似文献   
66.
The formation of an energy‐barrier at a metal/molecular semiconductor junction is a universal phenomenon which limits the performance of many molecular semiconductor‐based electronic devices, from field‐effect transistors to light‐emitting diodes. In general, a specific metal/molecular semiconductor combination of materials leads to a fixed energy‐barrier. However, in this work, a graphene/C60 vertical field‐effect transistor is presented in which control of the interfacial energy‐barrier is demonstrated, such that the junction switches from a highly rectifying diode at negative gate voltages to a highly conductive nonrectifying behavior at positive gate voltages and at room temperature. From the experimental data, an energy‐barrier modulation of up to 660 meV, a transconductance of up to five orders of magnitude, and a gate‐modulated photocurrent are extracted. The ability to tune the graphene/molecular semiconductor energy‐barrier provides a promising route toward novel, high performance molecular devices.  相似文献   
67.
By means of theory and experiments, the application capability of nickel ditelluride (NiTe2) transition‐metal dichalcogenide in catalysis and nanoelectronics is assessed. The Te surface termination forms a TeO2 skin in an oxygen environment. In ambient atmosphere, passivation is achieved in less than 30 min with the TeO2 skin having a thickness of about 7 Å. NiTe2 shows outstanding tolerance to CO exposure and stability in water environment, with subsequent good performance in both hydrogen and oxygen evolution reactions. NiTe2‐based devices consistently demonstrate superb ambient stability over a timescale as long as one month. Specifically, NiTe2 has been implemented in a device that exhibits both superior performance and environmental stability at frequencies above 40 GHz, with possible applications as a receiver beyond the cutoff frequency of a nanotransistor.  相似文献   
68.
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems   总被引:4,自引:0,他引:4  
A Distributed Key Generation (DKG) protocol is an essential component of threshold cryptosystems required to initialize the cryptosystem securely and generate its private and public keys. In the case of discrete-log-based (dlog-based) threshold signature schemes (ElGamal and its derivatives), the DKG protocol is further used in the distributed signature generation phase to generate one-time signature randomizers (r = gk). In this paper we show that a widely used dlog-based DKG protocol suggested by Pedersen does not guarantee a uniformly random distribution of generated keys: we describe an efficient active attacker controlling a small number of parties which successfully biases the values of the generated keys away from uniform. We then present a new DKG protocol for the setting of dlog-based cryptosystems which we prove to satisfy the security requirements from DKG protocols and, in particular, it ensures a uniform distribution of the generated keys. The new protocol can be used as a secure replacement for the many applications of Pedersen's protocol. Motivated by the fact that the new DKG protocol incurs additional communication cost relative to Pedersen's original protocol, we investigate whether the latter can be used in specific applications which require relaxed security properties from the DKG protocol. We answer this question affirmatively by showing that Pedersen's protocol suffices for the secure implementation of certain threshold cryptosystems whose security can be reduced to the hardness of the discrete logarithm problem. In particular, we show Pedersen's DKG to be sufficient for the construction of a threshold Schnorr signature scheme. Finally, we observe an interesting trade-off between security (reductions), computation, and communication that arises when comparing Pedersen's DKG protocol with ours.  相似文献   
69.
70.
We discuss the construction of optimized electronic filters using inverse scattering methods. We study a wide range of densities and temperatures, room temperature included. Discretization methods of the potential (including the self-consistent potential of the conduction electrons) are worked out that retain all its properties.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号