首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6755篇
  免费   221篇
  国内免费   7篇
电工技术   65篇
综合类   5篇
化学工业   1326篇
金属工艺   138篇
机械仪表   148篇
建筑科学   411篇
矿业工程   13篇
能源动力   214篇
轻工业   681篇
水利工程   108篇
石油天然气   30篇
无线电   469篇
一般工业技术   1190篇
冶金工业   1119篇
原子能技术   49篇
自动化技术   1017篇
  2023年   35篇
  2022年   80篇
  2021年   103篇
  2020年   91篇
  2019年   97篇
  2018年   114篇
  2017年   128篇
  2016年   125篇
  2015年   139篇
  2014年   189篇
  2013年   416篇
  2012年   344篇
  2011年   422篇
  2010年   289篇
  2009年   333篇
  2008年   447篇
  2007年   364篇
  2006年   316篇
  2005年   319篇
  2004年   254篇
  2003年   233篇
  2002年   222篇
  2001年   120篇
  2000年   94篇
  1999年   117篇
  1998年   136篇
  1997年   101篇
  1996年   124篇
  1995年   91篇
  1994年   89篇
  1993年   83篇
  1992年   71篇
  1991年   50篇
  1990年   59篇
  1989年   78篇
  1988年   39篇
  1987年   55篇
  1986年   47篇
  1985年   63篇
  1984年   65篇
  1983年   60篇
  1982年   47篇
  1981年   54篇
  1980年   30篇
  1979年   42篇
  1978年   40篇
  1977年   27篇
  1976年   28篇
  1975年   28篇
  1974年   23篇
排序方式: 共有6983条查询结果,搜索用时 0 毫秒
71.
In this paper, we apply a new time-frequency spectral estimation method for multichannel data to epileptiform electroencephalography (EEG). The method is based on the smooth localized complex exponentials (SLEX) functions which are time-frequency localized versions of the Fourier functions and, hence, are ideal for analyzing nonstationary signals whose spectral properties evolve over time. The SLEX functions are simultaneously orthogonal and localized in time and frequency because they are obtained by applying a projection operator rather than a window or taper. In this paper, we present the Auto-SLEX method which is a statistical method that 1) computes the periodogram using the SLEX transform, 2) automatically segments the signal into approximately stationary segments using an objective criterion that is based on log energy, and 3) automatically selects the optimal bandwidth of the spectral smoothing window. The method is applied to the intracranial EEG from a patient with temporal lobe epilepsy. This analysis reveals a reduction in average duration of stationarity in preseizure epochs of data compared to baseline. These changes begin up to hours prior to electrical seizure onset in this patient.  相似文献   
72.
73.
Brian Dipert 《电子设计技术》2004,11(1):68-70,72,74,75
看来您已认定,采取购买并组装现成的专用标准产品(ASSP),如嵌入式控制器、外设芯片等,然后再编写您自己的软件这种做法将不能使您设计的产品与您竞争对手的产品有足够大的差别.因此,您会决定选择芯片级设计.两大硅平台竞争对手及其各自的折衷方案已经在各种工业论坛上引起广泛的争论.不过如果您刚涉足这场争论,则很有必要了解下述有关争论的概要.  相似文献   
74.
An indoor personal rowing machine (Concept 2 Inc., Morrisville, VT) has been modified for functional electrical stimulation assisted rowing exercise in paraplegia. To successfully perform the rowing maneuver, the voluntarily controlled upper body movements must be coordinated with the movements of the electrically stimulated paralyzed legs. To achieve such coordination, an automatic controller was developed that employs two levels of hierarchy. A high level finite state controller identifies the state or phase of the rowing motion and activates a low-level state-dedicated fuzzy logic controller (FLC) to deliver the electrical stimulation to the paralyzed leg muscles. A pilot study with participation of two paraplegic volunteers showed that FLC spent less muscle energy, and produced smoother rowing maneuvers than the existing On-Off constant-level stimulation controller.  相似文献   
75.
Trust for Ubiquitous,Transparent Collaboration   总被引:1,自引:0,他引:1  
Shand  Brian  Dimmock  Nathan  Bacon  Jean 《Wireless Networks》2004,10(6):711-721
In this paper, trust-based recommendations control the exchange of personal information between handheld computers. Combined with explicit risk analysis, this enables unobtrusive information exchange, while limiting access to confidential information. The same model can be applied to a wide range of mobile computing tasks, such as managing personal address books and electronic diaries, to automatically provide an appropriate level of security. Recommendations add structure to the information, by associating categories with data and with each other, with degrees of trust belief and disbelief. Since categories also in turn confer privileges and restrict actions, they are analogous to rôles in a Rôle-Based Access Control system, while principals represent their trust policies in recommendations. Participants first compute their trust in information, by combining their own trust assumptions with others' policies. Recommendations are thus linked together to compute a considered, local trust assessment. Actions are then moderated by a risk assessment, which weighs up costs and benefits, including the cost of the user's time, before deciding whether to allow or forbid the information exchange, or ask for help. By unifying trust assessments and access control, participants can take calculated risks to automatically yet safely share their personal information.  相似文献   
76.
嵌入式设备在很多应用场合正在和因特网相连接,比如蜂窝电话、机顶盒、无线接入点、医疗设备和公共信息电话亭。当这些能够上网的设备与因特网连接,但是没有足够的安全考虑时,他们将很容易受到攻击,这些攻击包括无意的访问和恶意攻击。如果没有一些相应安全措施,这些攻击可能会使设备的功能、操作以及包含的信息遭受破坏。  相似文献   
77.
An ultra-wideband (UWB) transmitted reference (TR) system transmits an un-modulated pulse and a delayed modulated pulse pair. Then, a correlation receiver uses the former to demodulate the latter. Because of the long spread of a typical UWB channel, time delay between the two pulses is preferable to be larger than the channel delay spread for reduced noise at the receiver. However, for bandwidth efficiency, that delay should be made small, resulting in inter-pulse interference at the receiver. In this paper, digital receivers are constructed for TR-UWB systems including inter-pulse interference. A typical mean matching technique, appropriate for both PPM and PAM schemes, is implemented digitally to obtain a good template for symbol detection. Joint estimation and detection performance of this family of digital receivers, using finite number of bits in analog-to-digital conversion and finite noisy observations, is analyzed. Closed form results are derived and verified by computer simulations. In addition, the effect of time offset between the reference pulse and information carrying pulse is studied. Overlap of the two pulses does not incur noticeable performance degradation. The proposed analytical framework can be applied to study detection performance of other related digital receivers not covered in this paper  相似文献   
78.
从过去来看,电视上出现字幕是再平常不过的事情的。当你换台时,字幕就会出现告诉你现在是哪一个频道。甚至当你调节音量时,很多电视机上也会出现字幕。  相似文献   
79.
In a mobile ad hoc network (MANET), the nodes act both as traffic sources and as relays that forward packets from other nodes along multi-hop routes to the destination. Such networks are suited to situations in which a wireless infrastructure is unavailable, infeasible, or prohibitively expensive. However, the lack of a secure, trusted infrastructure in such networks make secure and reliable packet delivery very challenging. A given node acting as a relay may exhibit Byzantine behavior with respect to packet forwarding, i.e., arbitrary, deviant behavior, which disrupts packet transmission in the network. For example, a Byzantine node may arbitrarily choose to drop or misroute a certain percentage of the packets that are passed to it for forwarding to the next hop. In earlier work, we proposed a trust establishment framework, called Hermes, which enables a given node to determine the “trustworthiness” of other nodes with respect to reliable packet delivery by combining first-hand trust information obtained independently of other nodes and second-hand trust information obtained via recommendations from other nodes. A deficiency of the Hermes scheme is that a node can fail to detect certain types of Byzantine behavior, such as packet misforwarding directed at a particular source node. In this paper, we propose new mechanisms to make Hermes robust to Byzantine behavior and introduce a punishment policy that discourages selfish node behavior. We present simulation results that demonstrate the effectiveness of the proposed scheme in a variety of scenarios involving Byzantine nodes that are malicious both with respect to packet forwarding and trust propagation.  相似文献   
80.
Semiconductor nanocrystals are promising materials for printed optoelectronic devices, but their high surface areas are susceptible to forming defects that hinder charge carrier transport. Furthermore, correlation of chalcogenide nanocrystal (NC) material properties with solar cell operation is not straightforward due to the disorder often induced into NC films during processing. Here, an improvement in long‐range ordering of PbSe NCs symmetry that results from halide surface passivation is described, and the effects on chemical, optical, and photovoltaic device properties are investigated. Notably, this passivation method leads to a nanometer‐scale rearrangement of PbSe NCs during ligand exchange, improving the long‐range ordering of nanocrystal symmetry entirely with inorganic surface chemistry. Solar cells constructed with a variety of architectures show varying improvement and suggest that triplet formation and ionization, rather than carrier transport, is the limiting factor in singlet fission solar cells. Compared to existing protocols, our synthesis leads to PbSe nanocrystals with surface‐bound chloride ions, reduced sub‐bandgap absorption and robust materials and devices that retain performance characteristics many hours longer than their unpassivated counterparts.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号