全文获取类型
收费全文 | 1584篇 |
免费 | 59篇 |
国内免费 | 8篇 |
专业分类
电工技术 | 19篇 |
综合类 | 3篇 |
化学工业 | 385篇 |
金属工艺 | 60篇 |
机械仪表 | 49篇 |
建筑科学 | 24篇 |
能源动力 | 78篇 |
轻工业 | 63篇 |
水利工程 | 14篇 |
石油天然气 | 4篇 |
无线电 | 249篇 |
一般工业技术 | 297篇 |
冶金工业 | 89篇 |
原子能技术 | 8篇 |
自动化技术 | 309篇 |
出版年
2024年 | 6篇 |
2023年 | 41篇 |
2022年 | 61篇 |
2021年 | 77篇 |
2020年 | 70篇 |
2019年 | 61篇 |
2018年 | 83篇 |
2017年 | 76篇 |
2016年 | 71篇 |
2015年 | 45篇 |
2014年 | 74篇 |
2013年 | 137篇 |
2012年 | 72篇 |
2011年 | 90篇 |
2010年 | 81篇 |
2009年 | 76篇 |
2008年 | 59篇 |
2007年 | 61篇 |
2006年 | 52篇 |
2005年 | 31篇 |
2004年 | 21篇 |
2003年 | 22篇 |
2002年 | 24篇 |
2001年 | 22篇 |
2000年 | 20篇 |
1999年 | 22篇 |
1998年 | 21篇 |
1997年 | 23篇 |
1996年 | 19篇 |
1995年 | 26篇 |
1994年 | 21篇 |
1993年 | 21篇 |
1992年 | 13篇 |
1991年 | 10篇 |
1990年 | 8篇 |
1989年 | 4篇 |
1988年 | 2篇 |
1987年 | 2篇 |
1986年 | 2篇 |
1985年 | 3篇 |
1982年 | 2篇 |
1980年 | 2篇 |
1979年 | 2篇 |
1978年 | 2篇 |
1977年 | 1篇 |
1976年 | 3篇 |
1975年 | 2篇 |
1974年 | 1篇 |
1973年 | 2篇 |
1972年 | 1篇 |
排序方式: 共有1651条查询结果,搜索用时 31 毫秒
31.
Kaur Harsimrat Marwaha Anupma Singh Charanjeet Narang Sukhleen Bindra Jotania Rajshree Bai Yang Mishra Sanjay R. Singh Dharmendra Sombra A.S.B. Ghimire Madhav Dhruv Preksha 《Journal of Electronic Materials》2020,49(3):1646-1653
Journal of Electronic Materials - Microwave absorbers are an important topic of interest to mitigate electromagnetic interference. Here, we have investigated electromagnetic absorption properties... 相似文献
32.
Wen?HuEmail author Nirupama?Bulusu Sanjay?Jha 《International Journal of Wireless Information Networks》2005,12(1):47-59
This paper investigates an anycast communication service for a hybrid sensor/actuator network, consisting of both resource-rich and resource-impoverished devices. The key idea is to exploit the capabilities of resource-rich devices (called micro-servers) to reduce the communication burden on smaller, energy, bandwidth and memory constrained sensor nodes. The goal is to deliver sensor data to the nearest micro-server, which can (i) store it (ii) forward it to other micro-servers using out-of-band communication or (iii) perform the desired actuation. We propose and evaluate a reverse tree-based anycast mechanism tailored to deal with the unique event dynamics in sensor networks. Our approach is to construct an anycast tree rooted at each potential event source, which micro-servers can dynamically join and leave. Our anycast mechanism is self-organizing, distributed, robust, scalable, routing-protocol independent and incurs very little overhead. Simulations using Network Simulator (ns-2) show that: our anycast mechanism when added to Directed Diffusion can reduce the network’s energy consumption by more than 50%; can reduce both the mean end-to-end latency of the transmission and the mean number of transmissions by more than 50%; achieves 99% data delivery rate for low and moderate micro-server mobility rate; and handles network dynamics reasonably well.This paper is a comprehensive extension of our earlier work in [1]. 相似文献
33.
34.
A blind watermarking algorithm based on fractional Fourier transform and visual cryptography 总被引:1,自引:0,他引:1
Sanjay Rawat 《Signal processing》2012,92(6):1480-1491
This paper presents a robust copyright protection scheme based on fractional Fourier transform (FrFT) and visual cryptography (VC). Unlike the traditional schemes, in our scheme, the original image is not modified by embedding the watermark into the original image. We use the visual secret sharing scheme to construct two shares, namely, master share and ownership share. Features of the original image are extracted using SVD, and are used to generate the master share. Ownership share is generated with the help of secret image (watermark) and the master share, using VC technique. The two shares separately give no information about the secret image, but for ownership identification, the secret image can be revealed by stacking the master share and the ownership share. In order to achieve the robustness and security, the properties of VC, FrFT and SVD are used in our scheme. The experimental results show that the proposed scheme is strong enough to resist various signal processing operations. 相似文献
35.
Baiwei Wang Kiumars Aryana John T. Gaskins Patrick E. Hopkins Sanjay V. Khare Daniel Gall 《Advanced functional materials》2020,30(30)
Epitaxial (Ti1?xMgx)0.25Al0.75N(0001)/Al2O3(0001) layers are used as a model system to explore how Fermi‐level engineering facilitates structural stabilization of a host matrix despite the intentional introduction of local bonding instabilities that enhance the piezoelectric response. The destabilizing octahedral bonding preference of Ti dopants and the preferred 0.67 nitrogen‐to‐Mg ratio for Mg dopants deteriorate the wurtzite AlN matrix for both Ti‐rich (x < 0.2) and Mg‐rich (x ≥ 0.9) alloys. Conversely, x = 0.5 leads to a stability peak with a minimum in the lattice constant ratio c/a, which is caused by a Fermi‐level shift into the bandgap and a trend toward nondirectional ionic bonding, leading to a maximum in the expected piezoelectric stress constant e33. The refractive index and the subgap absorption decrease with x, the optical bandgap increases, and the elastic constant along the hexagonal axis C33 = 270 ± 14 GPa remains composition independent, leading to an expected piezoelectric constant d33 = 6.4 pC N?1 at x = 0.5, which is 50% larger than for the pure AlN matrix. Thus, contrary to the typical anticorrelation between stability and electromechanical coupling, the (Ti1?xMgx)0.25Al0.75N system exhibits simultaneous maxima in the structural stability and the piezoelectric response at x = 0.5. 相似文献
36.
A secure multifactor remote user authentication scheme for Internet of Multimedia Things environment
To attain ubiquitous connectivity of everything, Internet of Things (IoT) systems must include “multimedia things.” Internet of Multimedia Things (IoMT) is a heterogeneous network of smart multimedia things connected together and with other physical devices to the Internet so as to achieve globally available multimedia services and applications. Due to the ever increasing amount of multimedia data in IoT environments, securing these systems becomes crucial. This is because these systems are easily susceptible to attacks when information or any service is accessed by the users. In this paper, we propose a secure three‐factor remote user authentication scheme for IoMT systems using ECC. The formal security proof performed using ROR model and BAN logic confirms that an attacker will not be able to extract sensitive user information. Through informal security analysis, we justify the resistance of the scheme against several security attacks. The performance comparison shows that the scheme is efficient in terms of computational cost, security features, and attack resistance. Furthermore, simulation of the scheme using AVISPA and Proverif proves that the scheme is secure against all active and passive attacks. 相似文献
37.
Semiconductors - In this work, drain current ID for 5-nm gate length with dual-material (DM) double-surrounding gate (DSG) inversion mode (IM) and junctionless (JL) silicon nanotube (SiNT) MOSFET... 相似文献
38.
Bipin Kumar Verma Shyam Akashe Sanjay Sharma 《International Journal of Electronics》2013,100(9):1486-1501
In this paper, various parameters are used to reduce leakage power, leakage current and noise margin of circuits to enhance their performance. A multiplier is proposed with low-leakage current and low ground bounce noise for the microprocessor, digital signal processors (DSP) and graphics engines. The ground bounce noise problem appears when a conventional power-gating circuit transits from sleep-to-active mode. This paper discusses a reduction in leakage current in the stacking power-gating technique by three modes – sleep, active and sleep-to-active. The simulation results are performed on a 4 × 4 carry-save multiplier for leakage current, active power, leakage power and ground bounce noise, and comparison made for different nanoscales. Ground bounce noise is limited to 90%. The leakage current of the circuit is decimated up to 80% and the active power is reduced to 31%. We performed simulations using cadence virtuoso 180 and 45 nm at room temperature at various supply voltages. 相似文献
39.
Face to virtual face 总被引:1,自引:0,他引:1
Thalmann N.M. Kalra P. Escher M. 《Proceedings of the IEEE. Institute of Electrical and Electronics Engineers》1998,86(5):870-883
The first virtual humans appeared in the early 1980s in such films as Dreamflight (1982) and The Juggler (1982). Pioneering work in the ensuing period focused on realistic appearance in the simulation of virtual humans. In the 1990s, the emphasis has shifted to real-time animation and interaction in virtual worlds. Virtual humans have begun to inhabit virtual worlds and so have we. To prepare our place in the virtual world we first develop techniques for the automatic representation of a human face capable of being animated in real time using both video and audio input. The objective is for one's representative to look, talk, and behave like oneself in the virtual world. Furthermore, the virtual inhabitants of this world should be able to see our avatars and to react to what we say and to the emotions we convey. We sketch an overview of the problems related to the analysis and synthesis of face-to-virtual-face communication in a virtual world. We describe different components of our system for real-time interaction and communication between a cloned face representing a real person and an autonomous virtual face. It provides an insight into the various problems and gives particular solutions adopted in reconstructing a virtual clone capable of reproducing the shape and movements of the real person's face. It includes the analysis of the facial expression and speech of the cloned face, which can be used to elicit a response from the autonomous virtual human with both verbal and nonverbal facial movements synchronized with the audio voice 相似文献
40.
Wireless Personal Communications - Femtocell deployment is an important strategy when it comes to improvement of QoS metrics in areas of poor cell coverage like indoors in an LTE environment. This,... 相似文献