首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   115235篇
  免费   4052篇
  国内免费   1913篇
电工技术   3061篇
技术理论   1篇
综合类   4282篇
化学工业   16762篇
金属工艺   6571篇
机械仪表   5009篇
建筑科学   4693篇
矿业工程   1545篇
能源动力   1979篇
轻工业   5972篇
水利工程   1853篇
石油天然气   2009篇
武器工业   271篇
无线电   13180篇
一般工业技术   20232篇
冶金工业   3959篇
原子能技术   665篇
自动化技术   29156篇
  2024年   186篇
  2023年   672篇
  2022年   1311篇
  2021年   1559篇
  2020年   1211篇
  2019年   985篇
  2018年   15400篇
  2017年   14477篇
  2016年   10872篇
  2015年   1977篇
  2014年   1960篇
  2013年   2091篇
  2012年   5187篇
  2011年   11484篇
  2010年   10053篇
  2009年   7317篇
  2008年   8506篇
  2007年   9301篇
  2006年   1748篇
  2005年   2524篇
  2004年   1986篇
  2003年   2051篇
  2002年   1363篇
  2001年   826篇
  2000年   916篇
  1999年   844篇
  1998年   689篇
  1997年   580篇
  1996年   520篇
  1995年   443篇
  1994年   334篇
  1993年   255篇
  1992年   240篇
  1991年   168篇
  1990年   126篇
  1989年   115篇
  1988年   92篇
  1987年   52篇
  1985年   35篇
  1968年   43篇
  1967年   33篇
  1966年   42篇
  1965年   45篇
  1960年   30篇
  1959年   35篇
  1958年   37篇
  1957年   36篇
  1956年   34篇
  1955年   63篇
  1954年   68篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
991.
The influence of crystal thickness of metal-coated <100>-cut GaAs (M-G-M) on Cherenkov-phase-matched terahertz (THz) pulse detection was studied. The M-G-M detectors were utilized in conjunction with a metallic tapered parallel-plate waveguide (TPPWG). Polarization-sensitive measurements were carried out to exemplify the efficacy of GaAs in detecting transverse magnetic (TM)- and transverse electric (TE)-polarized THz waves. The reduction of GaAs’ thickness increased the THz amplitude spectra of the detected TM-polarized THz electro-optic (EO) signal due to enhanced electric field associated with a more tightly-focused and well-concentrated THz radiation on the thinner M-G-M. The higher-fluence THz beam coupled to the thinner M-G-M improved the integrated intensity of the detected THz amplitude spectrum. This trend was not observed for TE-polarized THz waves, wherein the integrated intensities were almost comparable. Nevertheless, good agreement of spectral line shapes of the superposed TM- and TE-polarized THz-EO signals with that of elliptically polarized THz-EO signal demonstrates excellent polarization-resolved detection capabilities of M-G-M via Cherenkov-phase-matched EO sampling technique.  相似文献   
992.
This paper presents the optimization and characterization of broadband circular horn antennas with smooth walls. These antennas are simpler and easier to manufacture than corrugated horns. They work by converting the incoming fundamental mode to a mode mixture, whose total field corresponds to a Gaussian beam pattern at the aperture. The geometry of the horn is found by an optimization algorithm. While smooth-wall horn antennas have been designed for many years, they are inherently band limited because they rely on a correct multimode interference in the aperture to match the total field to a Gaussian distribution. The presented method achieves significantly larger bandwidths by allowing the Gaussian beam parameters, and thus the required mode spectrum in the aperture, to vary with the frequency. Together with an appropriate mirror optics, a receiver system with a bandwidth of more than 3 octaves could be realized.  相似文献   
993.
A novel approach is proposed to estimate the timeout period used in wireless ad hoc networks in order to detect misbehaving nodes that make black hole attacks. Timeout period is an acceptable time frame for a node to forward a packet and is used to judge if the node is behaving properly. To avoid misjudgment and false alarms, the accuracy of the estimate of the timeout period is very important. Our method is based on the IEEE 802.11 MAC protocol and Dynamic Source Routing protocol. The main contribution of this paper is proposing a queuing analysis to calculate the mean and maximum delay per hop implementing the 95-percentile of medium access waiting time. In addition, a new technique is introduced that can be applied to determine the mean number of hops in flooding-based ad hoc networks, taking into account edge effects. For each proposed model, analytical results are compared with results obtained from simulations and the validity of the models is confirmed by observing the close relationship between the results.  相似文献   
994.
The openness of a Mobile Adhoc network (MANET) makes it vulnerable to various attacks that can breach privacy, and this demands a privacy protection system. In this paper, we propose a privacy protection system with flexible and adaptable policies to protect privacy during data transfer based on application and context attributes. We also provide the performance analysis model to test the suitability of policies for maintaining privacy, which is essential for the real-time implementation of this system in a resource-limited MANET. Finally, the proposed privacy protection system is compared with previous works using simulations, and the results obtained show the effectiveness of the proposed privacy protection system.  相似文献   
995.
Aim at improving the energy saving and transmission efficiency of directional drilling rig, the load sensing technology and constant-pressure variable technique are adopted to enable the system to provide the required pressure and flow rate according to the load variation. In order to research the dynamic characteristics of hydraulic control systems, the background and working principle of the load sensing technology were introduced. The dynamic mathematical model of load sensing system is established based on the hydraulic principle. The directional drilling rig mainly consists of two basic circuits: rotary circuit and feed circuit. The dynamic characteristics of rotary circuit are mainly studied. In addition, the hydraulic system of kilometres directional rig is simulated with the software of AMESim. The simulation results show that the load sensing pump could output its required flow and outlet pressure adapted to the load pressure in real time, thus effectively improving the efficiency of the hydraulic system. Furthermore, to verify the validity of the mathematical model and the simulation analysis, an experimental platform of the load sensing hydraulic system was built. The dynamic performance test of load sensing hydraulic system was performed by using the platform. The experimental results demonstrated that the load sensing hydraulic system could output its required flow and pressure when the working condition changed. Finally, they also illustrate the validity of the proposed approach.  相似文献   
996.
Recently, there are some problems in the centralized management, such as centralized management, heavy burden, excessive number of virtual machine migration, lack of mutual cooperation mechanism between nodes, can’t adapt to the cluster of change. The existing distributed management methods exist between the nodes have less cooperation mechanism and only simple communication, quality of service is no obvious improvement, system can save energy consumption is not obvious. According to the behavior characteristics of the fish, this paper presents an artificial fish to achieve mutual cooperation of nodes in the distributed management method.  相似文献   
997.
Many solutions are proposed to identify or prevent the attacks in a Mobile Ad hoc Network. However, sometimes these systems detect false attacks. This could lead to loss of resources in a mobile ad hoc network and cause a downgrade in quality of service. Hence mobile ad hoc networks need a system to confirm the attack before taking further actions. In our work presented in this paper, we propose an attack confirm system for a malicious attacker, called the Black-hole attacker. We present our Black-hole attack Confirmation System, which identifies and confirms the black-hole attack in a mobile ad hoc network using honeypot. The honeypot intelligently identifies all the possible types of black-hole attack using the Black-hole Attack tree, and confirms the attack using the Attack History Database. Together, the Black-hole Attack tree, and Attack History Database aid the honeypot in reducing the false alarms in the mobile ad hoc network. We have simulated the proposed system in several mobile ad hoc network environments of varying sizes of nodes and applications. On several occasions the results have demonstrated that the proposed system is efficient in confirming the black-hole attack and saving the resources and minimizing the path re-establishment.  相似文献   
998.
999.
This paper concerns the parameter identification methods of multivariate pseudo-linear autoregressive systems. A multivariate recursive generalized least squares algorithm is presented as a comparison. By using the data filtering technique, a multivariate pseudo-linear autoregressive system is transformed into a filtered system model and a filtered noise model, and a filtering based multivariate recursive generalized least squares algorithm is developed for estimating the parameters of these two models. The proposed algorithm achieves a higher computational efficiency than the multivariate recursive generalized least squares algorithm, and the simulation results prove that the proposed method is effective.  相似文献   
1000.
Cognitive radio (CR) has been considered as a promising technology to enhance spectrum efficiency via opportunistic transmission at link level. Basic CR features allow secondary users (SUs) to transmit only when the licensed channel is not occupied by primary users (PUs). However, waiting for an idle time slot may lead to large packet delays and high energy consumption. We further consider that the SU may decide, at any moment, to use another dedicated way of communication (4G) in order to transmit his packets. Thus, we consider an Opportunistic Spectrum Access (OSA) mechanism that takes into account packet delay and energy consumption. We formulate the OSA problem as a Partially Observable Markov Decision Process (POMDP) by explicitly considering the energy consumption as well as packets’ delay, which are often ignored in existing OSA solutions. Specifically, we consider a POMDP with an average reward criterion. We derive structural properties of the value function and we show the existence of optimal strategies in the class of the threshold strategies. For implementation purposes, we propose online learning mechanisms that estimate the PU activity and determine the appropriate threshold strategy on the fly. In particular, numerical illustrations validate our theoretical findings.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号