首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1584篇
  免费   59篇
  国内免费   8篇
电工技术   19篇
综合类   3篇
化学工业   385篇
金属工艺   60篇
机械仪表   49篇
建筑科学   24篇
能源动力   78篇
轻工业   63篇
水利工程   14篇
石油天然气   4篇
无线电   249篇
一般工业技术   297篇
冶金工业   89篇
原子能技术   8篇
自动化技术   309篇
  2024年   6篇
  2023年   41篇
  2022年   61篇
  2021年   77篇
  2020年   70篇
  2019年   61篇
  2018年   83篇
  2017年   76篇
  2016年   71篇
  2015年   45篇
  2014年   74篇
  2013年   137篇
  2012年   72篇
  2011年   90篇
  2010年   81篇
  2009年   76篇
  2008年   59篇
  2007年   61篇
  2006年   52篇
  2005年   31篇
  2004年   21篇
  2003年   22篇
  2002年   24篇
  2001年   22篇
  2000年   20篇
  1999年   22篇
  1998年   21篇
  1997年   23篇
  1996年   19篇
  1995年   26篇
  1994年   21篇
  1993年   21篇
  1992年   13篇
  1991年   10篇
  1990年   8篇
  1989年   4篇
  1988年   2篇
  1987年   2篇
  1986年   2篇
  1985年   3篇
  1982年   2篇
  1980年   2篇
  1979年   2篇
  1978年   2篇
  1977年   1篇
  1976年   3篇
  1975年   2篇
  1974年   1篇
  1973年   2篇
  1972年   1篇
排序方式: 共有1651条查询结果,搜索用时 31 毫秒
31.
Journal of Electronic Materials - Microwave absorbers are an important topic of interest to mitigate electromagnetic interference. Here, we have investigated electromagnetic absorption properties...  相似文献   
32.
This paper investigates an anycast communication service for a hybrid sensor/actuator network, consisting of both resource-rich and resource-impoverished devices. The key idea is to exploit the capabilities of resource-rich devices (called micro-servers) to reduce the communication burden on smaller, energy, bandwidth and memory constrained sensor nodes. The goal is to deliver sensor data to the nearest micro-server, which can (i) store it (ii) forward it to other micro-servers using out-of-band communication or (iii) perform the desired actuation. We propose and evaluate a reverse tree-based anycast mechanism tailored to deal with the unique event dynamics in sensor networks. Our approach is to construct an anycast tree rooted at each potential event source, which micro-servers can dynamically join and leave. Our anycast mechanism is self-organizing, distributed, robust, scalable, routing-protocol independent and incurs very little overhead. Simulations using Network Simulator (ns-2) show that: our anycast mechanism when added to Directed Diffusion can reduce the network’s energy consumption by more than 50%; can reduce both the mean end-to-end latency of the transmission and the mean number of transmissions by more than 50%; achieves 99% data delivery rate for low and moderate micro-server mobility rate; and handles network dynamics reasonably well.This paper is a comprehensive extension of our earlier work in [1].  相似文献   
33.
34.
This paper presents a robust copyright protection scheme based on fractional Fourier transform (FrFT) and visual cryptography (VC). Unlike the traditional schemes, in our scheme, the original image is not modified by embedding the watermark into the original image. We use the visual secret sharing scheme to construct two shares, namely, master share and ownership share. Features of the original image are extracted using SVD, and are used to generate the master share. Ownership share is generated with the help of secret image (watermark) and the master share, using VC technique. The two shares separately give no information about the secret image, but for ownership identification, the secret image can be revealed by stacking the master share and the ownership share. In order to achieve the robustness and security, the properties of VC, FrFT and SVD are used in our scheme. The experimental results show that the proposed scheme is strong enough to resist various signal processing operations.  相似文献   
35.
Epitaxial (Ti1?xMgx)0.25Al0.75N(0001)/Al2O3(0001) layers are used as a model system to explore how Fermi‐level engineering facilitates structural stabilization of a host matrix despite the intentional introduction of local bonding instabilities that enhance the piezoelectric response. The destabilizing octahedral bonding preference of Ti dopants and the preferred 0.67 nitrogen‐to‐Mg ratio for Mg dopants deteriorate the wurtzite AlN matrix for both Ti‐rich (x < 0.2) and Mg‐rich (x ≥ 0.9) alloys. Conversely, x = 0.5 leads to a stability peak with a minimum in the lattice constant ratio c/a, which is caused by a Fermi‐level shift into the bandgap and a trend toward nondirectional ionic bonding, leading to a maximum in the expected piezoelectric stress constant e33. The refractive index and the subgap absorption decrease with x, the optical bandgap increases, and the elastic constant along the hexagonal axis C33 = 270 ± 14 GPa remains composition independent, leading to an expected piezoelectric constant d33 = 6.4 pC N?1 at x = 0.5, which is 50% larger than for the pure AlN matrix. Thus, contrary to the typical anticorrelation between stability and electromechanical coupling, the (Ti1?xMgx)0.25Al0.75N system exhibits simultaneous maxima in the structural stability and the piezoelectric response at x = 0.5.  相似文献   
36.
To attain ubiquitous connectivity of everything, Internet of Things (IoT) systems must include “multimedia things.” Internet of Multimedia Things (IoMT) is a heterogeneous network of smart multimedia things connected together and with other physical devices to the Internet so as to achieve globally available multimedia services and applications. Due to the ever increasing amount of multimedia data in IoT environments, securing these systems becomes crucial. This is because these systems are easily susceptible to attacks when information or any service is accessed by the users. In this paper, we propose a secure three‐factor remote user authentication scheme for IoMT systems using ECC. The formal security proof performed using ROR model and BAN logic confirms that an attacker will not be able to extract sensitive user information. Through informal security analysis, we justify the resistance of the scheme against several security attacks. The performance comparison shows that the scheme is efficient in terms of computational cost, security features, and attack resistance. Furthermore, simulation of the scheme using AVISPA and Proverif proves that the scheme is secure against all active and passive attacks.  相似文献   
37.
Sanjay  Prasad  B.  Vohra  A. 《Semiconductors》2021,55(12):936-942
Semiconductors - In this work, drain current ID for 5-nm gate length with dual-material (DM) double-surrounding gate (DSG) inversion mode (IM) and junctionless (JL) silicon nanotube (SiNT) MOSFET...  相似文献   
38.
In this paper, various parameters are used to reduce leakage power, leakage current and noise margin of circuits to enhance their performance. A multiplier is proposed with low-leakage current and low ground bounce noise for the microprocessor, digital signal processors (DSP) and graphics engines. The ground bounce noise problem appears when a conventional power-gating circuit transits from sleep-to-active mode. This paper discusses a reduction in leakage current in the stacking power-gating technique by three modes – sleep, active and sleep-to-active. The simulation results are performed on a 4 × 4 carry-save multiplier for leakage current, active power, leakage power and ground bounce noise, and comparison made for different nanoscales. Ground bounce noise is limited to 90%. The leakage current of the circuit is decimated up to 80% and the active power is reduced to 31%. We performed simulations using cadence virtuoso 180 and 45 nm at room temperature at various supply voltages.  相似文献   
39.
Face to virtual face   总被引:1,自引:0,他引:1  
The first virtual humans appeared in the early 1980s in such films as Dreamflight (1982) and The Juggler (1982). Pioneering work in the ensuing period focused on realistic appearance in the simulation of virtual humans. In the 1990s, the emphasis has shifted to real-time animation and interaction in virtual worlds. Virtual humans have begun to inhabit virtual worlds and so have we. To prepare our place in the virtual world we first develop techniques for the automatic representation of a human face capable of being animated in real time using both video and audio input. The objective is for one's representative to look, talk, and behave like oneself in the virtual world. Furthermore, the virtual inhabitants of this world should be able to see our avatars and to react to what we say and to the emotions we convey. We sketch an overview of the problems related to the analysis and synthesis of face-to-virtual-face communication in a virtual world. We describe different components of our system for real-time interaction and communication between a cloned face representing a real person and an autonomous virtual face. It provides an insight into the various problems and gives particular solutions adopted in reconstructing a virtual clone capable of reproducing the shape and movements of the real person's face. It includes the analysis of the facial expression and speech of the cloned face, which can be used to elicit a response from the autonomous virtual human with both verbal and nonverbal facial movements synchronized with the audio voice  相似文献   
40.
Wireless Personal Communications - Femtocell deployment is an important strategy when it comes to improvement of QoS metrics in areas of poor cell coverage like indoors in an LTE environment. This,...  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号