首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5242篇
  免费   191篇
  国内免费   30篇
电工技术   81篇
综合类   8篇
化学工业   1044篇
金属工艺   159篇
机械仪表   118篇
建筑科学   52篇
矿业工程   16篇
能源动力   325篇
轻工业   241篇
水利工程   37篇
石油天然气   23篇
无线电   686篇
一般工业技术   1226篇
冶金工业   729篇
原子能技术   37篇
自动化技术   681篇
  2023年   80篇
  2022年   106篇
  2021年   185篇
  2020年   164篇
  2019年   139篇
  2018年   188篇
  2017年   173篇
  2016年   196篇
  2015年   117篇
  2014年   201篇
  2013年   444篇
  2012年   229篇
  2011年   248篇
  2010年   220篇
  2009年   278篇
  2008年   192篇
  2007年   137篇
  2006年   136篇
  2005年   119篇
  2004年   100篇
  2003年   104篇
  2002年   91篇
  2001年   73篇
  2000年   67篇
  1999年   73篇
  1998年   149篇
  1997年   108篇
  1996年   123篇
  1995年   83篇
  1994年   84篇
  1993年   81篇
  1992年   60篇
  1991年   70篇
  1990年   69篇
  1989年   47篇
  1988年   48篇
  1987年   45篇
  1986年   42篇
  1985年   47篇
  1984年   31篇
  1983年   25篇
  1982年   26篇
  1981年   36篇
  1980年   21篇
  1979年   30篇
  1978年   30篇
  1977年   27篇
  1976年   33篇
  1975年   15篇
  1973年   13篇
排序方式: 共有5463条查询结果,搜索用时 15 毫秒
41.
An integrated computer-aided design (CAD) framework for evaluating MOSFET and layout parasitic extraction (LPE) models and circuit simulators used in the timing and power analysis of CMOS products is presented. This unified CAD methodology builds a step-wise understanding of the underlying parameter values in the models and their impact on circuit performance. A number of circuit experiments are included to extract the contributions of key MOSFET parameters and physical layout sensitive parasitic elements from circuit simulation results. This CAD setup thus allows easy and detailed comparison of different technologies, device models, and LPE tools to prevent possible bugs in the software as well as inaccuracies in device and parasitic models and timing tools. The software code to carry out the circuit simulations, analysis, and display of the results in an automated fashion has been specifically developed to support this framework. Some of the experiments designed for this work are also placed on the product chip for model-to-hardware correlation. The comparison of the hardware data to the model predictions points to the sources of any discrepancies and aids in tuning the product design to reflect changes in the technology as part of an overall design for manufacturing (DFM) platform  相似文献   
42.
In this paper, we propose two information-theoretic techniques for efficiently trading off the location update and paging costs associated with mobility management in wireless cellular networks. Previous approaches always attempt to accurately convey a mobile's movement sequence and hence cannot reduce the signaling cost below the entropy bound. Our proposed techniques, however, exploit the rate distortion theory to arbitrarily reduce the update cost at the expense of an increase in the corresponding paging overhead. To this end, we describe two location tracking algorithms based on spatial quantization and temporal quantization, which first quantize the movement sequence into a smaller set of codewords and then report a compressed representation of the codeword sequence. Although the spatial quantization algorithm clusters individual cells into registration areas, the more powerful temporal quantization algorithm groups sets of consecutive movement patterns. The quantizers themselves are adaptive and periodically reconfigure to accommodate changes in the mobile's movement pattern. Simulation study with synthetic and real movement traces for both single-system and multisystem cellular networks demonstrate that the proposed algorithms can reduce the mobile's update frequency to 3-4 updates/day with reasonable paging cost, low computational complexity, storage overhead, and codebook updates.  相似文献   
43.
In this paper, the authors present second degree polynomial approximated phase-only synthesis of two different types of symmetric sector or flat-top beams of equally spaced linear antenna arrays of isotropic radiators with single pre-fixed cosine on a pedestal amplitude distributions using real-coded or real-valued genetic algorithm. This gives a regular shape to the phase distributions of the radiators. Regular shape phase distributions result in simpler feed network design compared to irregular shape phase distributions. A good agreement between desired and synthesized pattern using genetic algorithm (GA) is reported.  相似文献   
44.
The optical access networks (OANs) provide an attractive solution to the bandwidth bottleneck problem of the last mile. However, it has been proved (Baliga et al. in J Lightwave Technol 27(13):2391–2403, 2009; Baliga et al. in IEEE Commun Mag 49(6):70–77, 2011) that the OAN consumes a significant ratio of the total energy consumed in an optical networking scenario. This has provided incentive for inspection of energy-efficient schemes for OANs. It has been demonstrated in the literature that energy consumption figures of an OAN can be improved by either designing efficient hardware or employing better media access control (MAC) protocols. In this paper, we design a MAC protocol for OANs to ensure energy-efficiency in the presence of quality of service (QoS)-aware traffic. The proposed scheme incorporates traffic prediction-based selection of different sleep (energy-efficient) modes of operation, of the optical network units—ONUs (OAN end units). It also implements switching between different sleep modes to maintain high QoS with significant energy-efficiency figures. The discussed scheme requires processing at the ONU only and can work independent of the entire OAN (ONU assisted). Thus, our proposal is an attractive solution for the already deployed networks or even in green field deployment.  相似文献   
45.
In addition to unresponsive UDP traffic, aggressive TCP flows pose a serious challenge to congestion control and stability of the future Internet. This paper considers the problem of dealing with such unresponsive TCP sessions that can be considered to collectively constitute a Denial-of-Service (DoS) attack on conforming TCP sessions. The proposed policing scheme, called HaDQ (HaTCh-based Dynamic Quarantine), is based on a recently proposed HaTCh mechanism, which accurately estimates the number of active flows without maintenance of per-flow states in a router. We augment HaTCh with a small Content Addressable Memory (CAM), called quarantine memory, to dynamically quarantine and penalize the unresponsive TCP flows. We exploit the advantage of the smaller, first-level cache of HaTCh for isolating and detecting the aggressive flows. The aggressive flows from the smaller cache are then moved to the quarantine memory and are precisely monitored for taking appropriate punitive action. While the proposed HaDQ technique is quite generic in that it can work with or without any AQM scheme, in this paper we have integrated HaDQ and an AQM scheme to compare it against some of the existing techniques. For this, we extend the HaTCh scheme to develop a complete AQM mechanism, called HRED. Simulation-based performance analysis indicates that by using a proper configuration of the monitoring period and the detection threshold, the proposed HaDQ scheme can achieve a low false drop rate (false positives) of less than 0.1%. Comparison with two AQM schemes (CHOKe and FRED), which were proposed for handling unresponsive UDP flows, shows that HaDQ is more effective in penalizing the bandwidth attackers and enforcing fairness between conforming and aggressive TCP flows.  相似文献   
46.
Handovers may cause delays and packet losses that affect real-time communication performance. Mobility protocols at several layers are designed to support handover, but they need to be optimized to ensure high-quality application performance. Existing optimization techniques are not sufficient to take care of interdomain and intertechnology handovers involving different access technologies, such as Wi-Fi, GSM, CDMA, and WiMAX. We categorize several types of handover, describe handover delay components, and propose a handover optimization framework called media independent pre-authentication that can provide optimizations for interdomain and intertechnology handover in a manner that is transparent to mobility management protocols. In addition, we also present experimental results demonstrating that this framework can achieve a significant reduction in handover delays for both network-layer and application-layer mobility management protocols.  相似文献   
47.
Wireless Personal Communications - Privacy issue has become a crucial concern in internet of things (IoT) applications ranging from home appliances to vehicular networks. RFID system has found...  相似文献   
48.
The fluctuation of available link bandwidth in mobilecellular networks motivates the study of adaptive multimediaservices, where the bandwidth of an ongoing multimedia call can bedynamically adjusted. We analyze the diverse objectives of theadaptive multimedia framework and propose two bandwidth adaptationalgorithms (BAAs) that can satisfy these objectives. The firstalgorithm, BAA-RA, takes into consideration revenue and``anti-adaptation' where anti-adaptation means that a user feelsuncomfortable whenever the bandwidth of the user's call ischanged. This algorithm achieves near-optimal total revenue withmuch less complexity compared to an optimal BAA. The secondalgorithm, BAA-RF, considers revenue and fairness, and aims at themaximum revenue generation while satisfying the fairnessconstraint defined herein. Comprehensive simulation experimentsshow that the difference of the total revenue of BAA-RA and thatof an optimal BAA is negligible. Also, numerical results revealthat there is a conflicting relationship between anti-adaptationand fairness.  相似文献   
49.
Often, in synthetic aperture radar (SAR) images of polar ice, one encounters shadow-like features across the images. Such features make it difficult to classify pixels into ice and water. Accordingly, it becomes a challenge to determine the true size and boundaries of ice floes in an SAR image of polar ice. We develop a simple statistical procedure which classifies pixels of an image by eliminating the effects of shadow-like features. Methodology developed in this paper is illustrated using some noisy SAR images of ice floes in the Arctic sea.  相似文献   
50.
The capacitance of dielectric coated metallic cylinder and truncated cone are evaluated using the method of moments based on the pulse function and point matching. The analysis is based on the boundary condition for the potential on the conductor surface and the normal component of the displacement density at the dielectric-free space interface. The total free charge on the conductor surface is found from the inversion of a matrix partitioned into submatrices. Numerical data on the capacitance and charge distribution are presented  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号