首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5467篇
  免费   438篇
  国内免费   57篇
电工技术   62篇
综合类   21篇
化学工业   1264篇
金属工艺   76篇
机械仪表   264篇
建筑科学   103篇
矿业工程   8篇
能源动力   347篇
轻工业   705篇
水利工程   65篇
石油天然气   34篇
武器工业   1篇
无线电   694篇
一般工业技术   1245篇
冶金工业   83篇
原子能技术   53篇
自动化技术   937篇
  2024年   36篇
  2023年   206篇
  2022年   478篇
  2021年   762篇
  2020年   459篇
  2019年   515篇
  2018年   478篇
  2017年   391篇
  2016年   390篇
  2015年   239篇
  2014年   297篇
  2013年   396篇
  2012年   231篇
  2011年   294篇
  2010年   162篇
  2009年   140篇
  2008年   90篇
  2007年   88篇
  2006年   36篇
  2005年   26篇
  2004年   34篇
  2003年   27篇
  2002年   16篇
  2001年   7篇
  2000年   12篇
  1999年   15篇
  1998年   17篇
  1997年   9篇
  1996年   12篇
  1995年   16篇
  1994年   7篇
  1993年   11篇
  1992年   8篇
  1991年   8篇
  1989年   5篇
  1988年   4篇
  1987年   5篇
  1985年   6篇
  1984年   3篇
  1983年   2篇
  1982年   4篇
  1981年   3篇
  1980年   1篇
  1979年   3篇
  1978年   2篇
  1977年   4篇
  1973年   1篇
  1968年   1篇
  1965年   2篇
  1961年   1篇
排序方式: 共有5962条查询结果,搜索用时 0 毫秒
51.
Large signal analysis of mixers excited by three tone signals is presented. The special case of two equal-amplitude sinusoids plus a difference-frequency injection is considered in detail and the results are compared, whenever possible, with previously published results. Contrary to previously published results, it is shown that even under large signal conditions and strong nonlinearity it is possible, at least in theory, to totally eliminate the third-order intermodulation when the amplitudes of the equal-amplitudes input sinusoids and the difference-frequency injection are equal.  相似文献   
52.
Throughout the 1990s, Software Defined Radio (SDR) technology was viewed almost exclusively as a solution for interoperability problems between various military standards, waveforms and devices. In the meantime, Cognitive Radio (CR) – a novel communication paradigm which embodies SDR with intelligence and self-reconfigurability properties – has emerged. Intelligence and on-the-fly self-reconfiguration abilities of CRs constitute an important next step in the Communications Electronic Warfare, as they may enable the jamming entities with the capabilities of devising and deploying advanced jamming tactics. Similarly, they may also aid the development of the advanced intelligent self-reconfigurable systems for jamming mitigation. This work outlines the development and implementation of the Spectrum Intelligence algorithm for Radio Frequency (RF) interference mitigation. The developed system is built upon the ideas of obtaining relevant spectrum-related data by using wideband energy detectors, performing narrowband waveform identification, extracting the waveforms’ parameters and properly classifying the waveforms. All relevant spectrum activities are continuously monitored and stored. Coupled with the self-reconfigurability of various transmission-related parameters, Spectrum Intelligence is the facilitator for the advanced interference mitigation strategies. The implementation is done on the Cognitive Radio test bed architecture which consists of two military Software Defined Radio terminals, each interconnected with the computationally powerful System-on-Module.  相似文献   
53.
Partial shading in photovoltaic modules is an important reliability and performance concern for all photovoltaic technologies. In this paper, we show how cell geometry can be used as a design variable for improved shade tolerance and performance in monolithic thin film photovoltaic modules (TFPV). We use circuit simulations to illustrate the geometrical aspects of partial shading in typical monolithic TFPV modules with rectangular cells, and formulate rules for shade tolerant design. We show that the problem of partial shading can be overcome by modifying the cell shape and orientation, while preserving the module shape and output characteristics. We discuss two geometrical designs with cells arranged in radial and spiral patterns, which (i) prevent the reverse breakdown of partially shaded cells, (ii) improve the overall power output under partial shading, and (iii) in case of spiral design, may additionally improve the module efficiency by reducing sheet resistance losses. We compare these designs quantitatively using realistic parameters and discuss the practical aspects for their implementation. Copyright © 2013 John Wiley & Sons, Ltd.  相似文献   
54.
Telecommunication Systems - A recent trend of peering at geo-diversified Internet exchange points (IXPs) has empowered decades-old proposal of inter-networking and opened up new avenues of business...  相似文献   
55.
Semiconductors - Thin films of AlN:Tm are deposited on a Si(111) and Si(100) substrates and optical fiber by rf magnetron sputtering method. 200–400 nm thick films are deposited at various...  相似文献   
56.
Wireless Personal Communications - Medical Body Area Networks or MBANs are gaining popularity in healthcare circles because of the convenience they provide to patients and caregivers and assist in...  相似文献   
57.
In present work, a hetero-junction of n-silicon (n-Si) with copper phthalocyanine (CuPc) has been fabricated. The current-voltage characteristics were investigated to explain the rectification and conduction mechanism. The effect of temperature and humidity on electrical properties of n-Si/CuPc hetero-junction has also been investigated. The characteristics of the junction have been observed to be temperature and humidity dependent so it is suggested that this junction can be used as temperature and humidity sensor.  相似文献   
58.
The mobile vehicle is gaining popularity nowadays using map services like Google Maps and other mapping services. However, map services users have to expose sensitive information like geographic locations (GPS coordinates) or address to personal privacy concerns as users share their locations and queries to obtain desired services. Existing mix zones location privacy protection methods are most general purposed and theoretical value while not applicable when applied to provide location privacy for map service users. In this paper, we present new (multiple mix zones location privacy protection) MMLPP method specially designed for map services on mobile vehicles over the road network. This method enables mobile vehicle users to query a route between 2 endpoints on the map, without revealing any confidential location and queries information. The basic idea is to strategically endpoints to nearby ones, such that (1) the semantic meanings encoded in these endpoints (eg, their GPS coordinates) change much, ie, location privacy is protected; (2) the routes returned by map services little change, ie, services usability are maintained. Specifically, a mobile client first privately retrieves point of interest close to the original endpoints, and then selects 2 points of interest as the shifted endpoints satisfying the property of geoindistinguishability. We evaluate our MMLPP approach road network application for GTMobiSim on different scales of map services and conduct experiments with real traces. Results show that MMLPP strikes a good balance between location privacy and service usability.  相似文献   
59.
Using a unified representation for a class of the two current-feedback operational amplifier (CFOA) sinusoidal oscillators, new circuits of this type can be systematically discovered. A catalogue of two circuit structures, each structure realizing 18 oscillator circuits, is presented. Moreover, using the RC:CR transformation, additional 18 oscillator circuits can be obtained from each structure. A third structure realizing additional two oscillator circuits is also presented. Some of the circuits enjoy one or more of the following attractive features: use of grounded capacitors, feasibility of absorbing the parasitic components of the CFOAs, availability of a buffered output voltage and orthogonal tuning of the frequency and the startup condition of oscillation. Moreover, it is shown that the use of the Barkhausen criterion for the determination of the startup condition of oscillation and the frequency of oscillation yields inaccurate results with relatively large errors depending on the selected component values. Furthermore, it is shown that using the roots of the characteristic equation of a specific oscillator structure will result in a startup condition that cannot be adjusted without disturbing the frequency of oscillation.  相似文献   
60.
In the past, security protocols including key transport protocols are designed with the assumption that there are two parties communication with each other and an adversary tries to intercept this communication. In Delay/Disruption Tolerant Networking (DTN), packet delivery relies on intermediate parties in the communication path to store and forward the packets. DTN security architecture requires that integrity and authentication should be verified at intermediate nodes as well as at end nodes and confidentiality should be maintained for end communicating parties. This requires new security protocols and key management to be defined for DTN as traditional end-to-end security protocols will not work with DTN. To contribute towards solving this problem, we propose a novel Efficient and Scalable Key Transport Scheme (ESKTS) to transport the symmetric key generated at a DTN node to other communicating body securely using public key cryptography and proxy signatures. It is unique effort to design a key transport protocol in compliance with DTN architecture. ESKTS ensures that integrity and authentication is achieved at hop-by-hop level as well as end-to-end level. It also ensures end-to-end confidentiality and freshness for end communicating parties. This scheme provides a secure symmetric key transport mechanism based on public key cryptography to exploit the unique bundle buffering characteristics of DTN to reduce communication and computation cost .  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号