首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   549篇
  免费   35篇
  国内免费   5篇
电工技术   7篇
综合类   3篇
化学工业   118篇
金属工艺   12篇
机械仪表   17篇
建筑科学   10篇
矿业工程   1篇
能源动力   43篇
轻工业   58篇
水利工程   4篇
石油天然气   6篇
无线电   71篇
一般工业技术   138篇
冶金工业   30篇
原子能技术   6篇
自动化技术   65篇
  2024年   3篇
  2023年   21篇
  2022年   56篇
  2021年   60篇
  2020年   48篇
  2019年   51篇
  2018年   54篇
  2017年   27篇
  2016年   37篇
  2015年   15篇
  2014年   18篇
  2013年   35篇
  2012年   27篇
  2011年   25篇
  2010年   10篇
  2009年   12篇
  2008年   13篇
  2007年   3篇
  2006年   6篇
  2005年   4篇
  2004年   5篇
  2003年   4篇
  2002年   2篇
  2001年   3篇
  2000年   1篇
  1999年   4篇
  1998年   17篇
  1997年   6篇
  1996年   4篇
  1995年   3篇
  1994年   3篇
  1992年   1篇
  1991年   3篇
  1990年   1篇
  1987年   2篇
  1986年   1篇
  1984年   2篇
  1982年   1篇
  1979年   1篇
排序方式: 共有589条查询结果,搜索用时 15 毫秒
11.
The vision to connect everyday physical objects to the Internet promises to create the Internet of Things (IoT), which is expected to integrate the diverse technologies such as sensors, actuators, radio frequency identification, communication technologies, and Internet protocols. Thus, IoT promises to transfer traditional industry to advance digital industry known as the Industry 4.0. At the core of the Industry 4.0 are the wireless sensor networks (WSNs) and wireless sensor and actuator networks (WSANs) that led to the development of industrial wireless sensor networks (IWSNs) and industrial wireless sensor and actuator networks (IWSANs). These networks play a central role of connecting machines, parts, products, and humans and create a diverse set of new applications to support intelligent and autonomous decision making. The IWSAN is a promising technology for numerous industrial applications because of their several potential benefits such as simple deployment, low cost, less complexity, and mobility support. However, despite such benefits, they impose several unique challenges at different layers of the protocol stack when deploying them for various monitoring and control applications in the Industry 4.0. In this article, we explore IWSAN, its applications, requirements, challenges, and solutions in the context of industrial control applications. Our main focus is on the medium access control (MAC) layer that can be exploited to satisfy such requirements. Our discussion presents extensive background study of the MAC schemes and it reviews the MAC protocols of the existing wireless standards and technologies. A number of application‐specific MAC protocols developed to support industrial applications, which are not part of these standards, are also elaborated. We rationalize to what extent the existing standards and protocols help in solving such requirements as laid down by the Industry 4.0. In the end, we emphasize on existing challenges and present important future directions.  相似文献   
12.
This paper aims to develop an infobutton to automatically retrieve published papers corresponding to a topic-specific online clinical discussion. The knowledge linkages infobutton is designed to supplement online clinical conversations with pertinent medical literature from Pubmed. The project involves three distinct steps: 1) Clinical messages around a specific problem are grouped together into a thread. 2) These threads are processed using Metamap to link the conversations to keywords from the MeSH lexicon. 3) These keywords are used in a novel search strategy to retrieve a set of papers from Pubmed, which are then returned to the user. A pilot study using the messages from 2007 and 2008, was conducted to compare the knowledge linkage search strategy to a vector space model and extended Boolean model. The knowledge linkage model proved to be significantly better in terms of precision ( p = 0.013 and 0.003, respectively) and recall ( p = 0.351 and 0.013). Pertinent papers were returned to over 55% of the threads. This approach has demonstrated how clinicians can supplement their peer communications with evidence based research. Future work should focus on how to improve the threading and keyword-mapping strategies.  相似文献   
13.
Recent advances in hardware technology have led to the development of low cost, power efficient and more feature rich devices that are amongst the most critical parts of communication networks. These devices or sensors can now sense data with more accuracy, process it by themselves and send it to the neighboring node or the sink node. However, robust and reliable security mechanisms are not yet properly implemented on these sensors due to their limited energy and computation power. Sensors also play a very important role in eHealthcare systems where ubiquitous patient monitoring is performed. As data is generated from the sensor nodes, reliable, secure and attack-resistant data acquisition and transmission is important for an efficient eHealthcare systems. This survey focuses on security issues of sensors data acquisition and transmission protocols, describing their main security features and comparing them in the context of a secure eHealthcare system. A taxonomy of open issues and future challenges is also discussed with respect to specific security metrics described in the paper.  相似文献   
14.

Designing a spectrally efficient wireless channel requires a comprehensive understanding of its time and frequency varying characteristics, making it a stochastic medium of communication. These characteristics become more challenging to cater at the receiving terminal in a multipath transmission. This is because of the fading effect and Doppler shift of the transmitted frequency, specifically in cellular mobile radio systems and vehicle to vehicle communications. This paper presents the modeling, simulation, and then characterization of a cellular mobile radio multipath channel over its time and frequency varying fading gain. For this purpose, a discrete-time Finite Impulse Response (FIR) type filter of such a channel is designed, modeled, and simulated using time and frequency varying characteristics of the received signal. The simulated channel response is further analyzed in terms of coherence bandwidth, coherence time, delay spread, Doppler spread, and symbol time.

  相似文献   
15.
In this paper, we analyze the problem of throughput-efficient distributed coalition formation (CF) of selfish/altruistic nodes in ad hoc radio networks. We formulate the problem as a hedonic CF game with non-transferable utility and propose different preference relations (CF rules) based on individual/group rate improvement of distributed nodes. We develop a hedonic CF algorithm, through which distributed nodes may self-organize into stable throughput-efficient disjoint coalitions. We apply the concept of frequency reuse over different coalitions, such that the members of each coalition will transmit over orthogonal sub-bands with the available spectrum being optimally allocated among them. We study the computational complexity and convergence properties of the proposed hedonic CF algorithm under selfish and altruistic preferences, and present means to guarantee Nash-stability. In addition, we identify the scenarios in which a CF process might lead to instability (CF cycle), and we propose methods to avoid cycles and define different exit procedures if a CF cycle is inevitable. Performance analysis shows that the proposed algorithm with optimal bandwidth allocation provides a substantial gain, in terms of average payoff per link, over existing coalition formation algorithms for a wide SNR range.  相似文献   
16.
On the synergy between electrical and photonic switching   总被引:1,自引:0,他引:1  
This article focuses on the values of electrical switching vs. photonic switching in the context of telecom transport networks. In particular, we show that the requirement of providing agility at the optical layer in the face of traffic forecast uncertainties is served better through photonic switching. On the other hand, some of the network-level functions, such as fast protection, subwavelength aggregation, and flexible client connectivity, require electrical switching. We further argue that additional values are achieved with hybrid photonic and electrical switching, which do not exist when either of these options is used in isolation.  相似文献   
17.
Base station's location privacy in a wireless sensor network (WSN) is critical for information security and operational availability of the network. A key part of securing the base station from potential compromise is to secure the information about its physical location. This paper proposes a technique called base station location privacy via software-defined networking (SDN) in wireless sensor networks (BSLPSDN). The inspiration comes from the architecture of SDN, where the control plane is separated from the data plane, and where control plane decides the policy for the data plane. BSLPSDN uses three categories of nodes, namely, a main controller to instruct the overall operations, a dedicated node to buffer and forward data, and lastly, a common node to sense and forward the packet. We employ three kinds of nodes to collaborate and achieve stealth for the base station and thus protecting it against the traffic-analysis attacks. Different traits of the WSN including energy status and traffic density can actively be monitored by BSLPSDN, which positively affects the energy goals, expected life of the network, load on common nodes, and the possibility of creating diversion in the wake of an attack on the base station. We incorporated multiple experiments to analyze and evaluate the performance of our proposed algorithm. We use single controller with multiple sensor nodes and multiple controllers with multiple sensor nodes to show the level of anonymity of BS. Experiments show that providing BS anonymity via multiple controllers is the best method both in terms of energy and privacy.  相似文献   
18.
19.
A new medium access protocol which exploits the physical layer capability of multiuser detection is proposed to help in improving the throughput/delay performance of ad-hoc networks. When more than one node has packets buffered for a common node in the neighborhood, all such nodes can simultaneously transmit their packets to the common receiver after reserving their surrounding channel. This is achieved in our protocol by extending the (sender-initiated) CSMA/CA collision avoidance framework by the receiver-initiated medium access technique and incorporating the transmission power control. We analyze the improvement in the throughput that can be achieved over the basic sender-initiated collision avoidance protocol in the network. Since the throughput improvement via multi-packet reception is influenced by the network layer activity as well, the performance of our protocol rolls back to that of the basic sender-initiated protocol in case of no coordination from the network layer. For the evaluation of performance of our protocol we simulate ad-hoc networks for different network topologies and traffic configurations. We observe the scheme to be capable in significantly improving the throughput/delay performance of the network.  相似文献   
20.
This work evaluated the synergistic effects of combined high-intensity ultrasound (HIU) with β-cyclodextrin (β-CD) treatments on inhibiting browning of apple juice and explored the mechanism through simulation system. The combined treatment of 300 W HIU with 0.006 g mL−1 β-CD had a synergistic impact on maintaining juice colour, resulting in a 39.06% reduction in browning degree, only a 36.64% decrease in total phenolic content, and a 17.82% reduction in PPO activity. The inhibition of enzymatic browning in simulated system revealed that HIU suppressed the enzyme (Polyphenol oxidase, PPO) and β-CD inhibited enzyme (PPO) and embedded substrate (polyphenol). The results of spectroscopic analysis showed that the particle-size distribution of PPO narrowed, the content of α-helix in the secondary structure increased, the fluorescence intensity increased, and the maximum wavelength was red-shifted after HIU and β-CD treatment. Changes in structure could further result in PPO activity loss. Hence, the combined treatment could synthetically alleviate the browning of apple juice.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号