首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6488篇
  免费   94篇
  国内免费   21篇
电工技术   101篇
综合类   20篇
化学工业   1489篇
金属工艺   147篇
机械仪表   175篇
建筑科学   213篇
矿业工程   4篇
能源动力   445篇
轻工业   712篇
水利工程   70篇
石油天然气   98篇
武器工业   1篇
无线电   715篇
一般工业技术   1210篇
冶金工业   177篇
原子能技术   34篇
自动化技术   992篇
  2024年   172篇
  2023年   213篇
  2022年   353篇
  2021年   477篇
  2020年   364篇
  2019年   373篇
  2018年   363篇
  2017年   307篇
  2016年   335篇
  2015年   232篇
  2014年   306篇
  2013年   511篇
  2012年   339篇
  2011年   411篇
  2010年   271篇
  2009年   242篇
  2008年   176篇
  2007年   130篇
  2006年   126篇
  2005年   92篇
  2004年   72篇
  2003年   64篇
  2002年   60篇
  2001年   52篇
  2000年   48篇
  1999年   46篇
  1998年   49篇
  1997年   36篇
  1996年   36篇
  1995年   21篇
  1994年   31篇
  1993年   31篇
  1992年   24篇
  1991年   14篇
  1990年   15篇
  1989年   21篇
  1988年   23篇
  1987年   10篇
  1986年   17篇
  1985年   19篇
  1984年   12篇
  1983年   13篇
  1982年   12篇
  1981年   13篇
  1980年   7篇
  1979年   7篇
  1978年   11篇
  1977年   10篇
  1976年   11篇
  1974年   8篇
排序方式: 共有6603条查询结果,搜索用时 15 毫秒
21.
As a network-based localized mobility management protocol, Proxy Mobile IPv6 (PMIPv6) enables a Mobile Host (MH) to roam within a localized domain without MH intervention in the mobility-related signalling. However, the PMIPv6 maintains MH mobility support in a restriction domain. Therefore, whenever the MH roams away from the PMIPv6 domain, its reachability status will be broken-down causing high handover latency and inevitable traffic loss for its communication session. This article proposes a proactive mechanism to mange the MH handover and maintain its data session continually across inter-PMIPv6-domains. The proposed mechanism introduces an intermediate global mobility anchor entity, called, which is responsible to coordinate MH handover as well as redirect its traffic across inter-PMIPv6-domains. Through various simulation evaluations, via ns-2, several experiments were conducted, revealing numerous results that verify the proposed mechanism superior performance over the conventional inter-PMIPv6-domain handover schemes in terms of handover latency, achieved throughput, protocol signalling cost and end-to-end traffic delivery latency.  相似文献   
22.
The wave concept iterative procedure (WCIP) is used to analyze a quasi‐square open metallic ring frequency selective surface (FSS). The quasi‐square open metallic ring FSS is dual‐polarized. When the incident plane wave is polarized in a direction parallel to the FSS’ coupled parallel strips, it shows two rejecting bands. Moreover, another rejecting band can be obtained if the source plane wave is perpendicularly polarized with respect to the FSS’ coupled parallel strips. The three resonant frequencies are inversely proportional to the length of the FSS’ coupled strips to provide an easy fine tuning of the FSS structure. The simulated results obtained using WCIP are compared to the measured results, and a good agreement is reported.  相似文献   
23.
This paper describes a study of the evolution of the AgCdO contact material surface microstructure as a function of the number of electrical arcs imposed on the switching surface. Five power switching devices were tested under different conditions. They were subjected to, respectively, 1, 2, 3, 10, and 100 electrical arcs under the same operating conditions: supply current of 400 A, circuit voltage of 28 V direct current (DC), and resistive load. For the analysis, a binocular microscope and a scanning electron microscope with an energy-dispersive x-ray spectrometer were used.  相似文献   
24.
Much work has focused on traffic grooming in SONET/WDM ring networks. Previous work has considered many aspects of traffic grooming, including minimizing the number of ADMs, minimizing the number of wavelengths, considering different traffic models, using different network architectures, incorporating switching capability and so on. In this work, we study traffic grooming in unidirectional ring networks with no switching capability under both uniform traffic and non-uniform traffic models to reduce electronic multiplexing costs. Based on the clustering notion, we derive a general and tighter lower bound for the number of ADMs required in traffic grooming under the uniform all-to-all traffic model. This bound reduces to special cases obtained in previous work. We also derive general, tighter, and closed form lower bounds for the number of ADMs required under two non-uniform traffic models: the distance-dependent traffic model and the non-uniform symmetric traffic model. Cost-effective multi-phase algorithms that exploit traffic characteristics are then designed and studied to efficiently groom traffic streams under different traffic models. Our numerical and simulation results show that the proposed multi-phase algorithms outperform existing traffic grooming algorithms by using a fewer number of ADMs. Our algorithms in several cases also achieve the lower bounds derived.  相似文献   
25.
This paper presents a performance study for two well known quantized based watermarking schemes Scalar Costa Scheme (SCS), and Trellis Coded Quantization scheme (TCQ) in an independent domain. For our study, the independent domain is obtained by the combination of the cited schemes with Independent Component Analysis (ICA). The Independent Component Analysis is used while inserting and extracting the message. Thus a performance compromise improvement of the original SCS and TCQ schemes in terms of robustness, capacity, and security is shown. Then the obtained schemes performances are compared to the Spread Transform (ST) based scheme well known for its proven good robustness properties. Our results show that, using watermarking with side information in independent domain permits to improve the global SCS and TCQ schemes performances. For example, in the case of SCS, by studying the Bit Error Rate (BER) in function of the watermark to noise ratio (WNR), the robustness has been improved by 20 dB (1 decade) when WNR is equal to 0 dB. Moreover, the capacity study shows for the same WNR=0 dB, the amount of information to be transmitted without error for a given noise level of the proposed SCS combined with ICA scheme (SCS-ICA) is much higher than that of the existing schemes. Finally, the study of the probability density functions (PDF) of the original and marked signals has shown that the Cachin-security level of the TCQ in an independent domain scheme (TCQ-ICA) is the best one compared to the other known schemes.  相似文献   
26.
World Radio Conference WRC-1992 has allocated the frequency band 21.4–22.0?GHz to regions 1 and 3 to be utilised to carry direct broadcasting satellite (DBS) services. This high-frequency band is more susceptible to rain attenuation, leading to degradation of the signal quality. Moreover, this frequency band is assigned to two different services, i.e. satellite broadcasting and fixed mobile services at the same regions; hence, the impact of intersystem interference in a depredated signal is a critical issue in the DBS receiver. In this study, the effects of rain attenuation on the DBS downlink signals as well as the impact of the potential interference on the reception quality will be estimated. An interference scenario will be introduced to investigate the system performance in both propagation mechanisms of clear-sky and rain conditions.  相似文献   
27.
This paper addresses the problem of localization in sensor networks where, initially, a certain number of sensors are aware of their positions (either by using GPS or by being hand‐placed) and are referred to as anchors. Our goal is to localize all sensors with high accuracy, while using a limited number of anchors. Sensors can be equipped with different technologies for signal and angle measurements. These measures can be altered by some errors because of the network environment that induces position inaccuracies. In this paper, we propose a family (AT‐Family) of three new distributed localization techniques in wireless sensor networks: free‐measurement (AT‐Free) where sensors have no capability of measure, signal‐measurement (AT‐Dist) where sensors can calculate distances, and angle‐measurement (AT‐Angle) where sensors can calculate angles. These methods determine the position of each sensor while indicating the accuracy of its position. They have two important properties: first, a sensor node can deduce if its estimated position is close to its real position and contribute to the positioning of others nodes; second, a sensor can eliminate wrong information received about its position. This last property allows to manage measure errors that are the main drawback of measure‐based methods such as AT‐Dist and AT‐Angle techniques. By varying the density and the error rate, simulations show that the three proposed techniques achieve good performances in term of high accuracy of localized nodes and less energy consuming while assuming presence of measure errors and considering low number of anchors. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   
28.
Wireless Personal Communications - In promising application field such as Vehicular Ad hoc Networks, the ability of the driver to exchange video streams smoothly over the network regardless of his...  相似文献   
29.
A millimeter‐wave (mm‐wave) high‐linear low‐noise amplifier (LNA) is presented using a 0.18 µm standard CMOS process. To improve the linearity of mm‐wave LNAs, we adopted the multiple‐gate transistor (MGTR) topology used in the low frequency range. By using an MGTR having a different gate‐source bias at the last stage of LNAs, third‐order input intercept point (IIP3) and 1‐dB gain compression point (P1dB) increase by 4.85 dBm and 4 dBm, respectively, without noise figure (NF) degradation. At 33 GHz, the proposed LNAs represent 9.5 dB gain, 7.13 dB NF, and 6.25 dBm IIP3.  相似文献   
30.
This paper introduces a multi-agent behavioral-based optimization algorithm for system level radio design. Making multi-standard wireless communication receivers that meet their specs while keeping the requirements of the individual blocks as relaxed as possible is the goal of this algorithm. In order to achieve this goal a “divide and conquer” approach is proposed. Different agents focus on different objectives that are pursued in parallel. Agents adopt different behaviors depending on the status of the environment and their interaction with other agents. Agents are cooperative by default as they try to meet their spec without making changes that affect other agents. However, more aggressive behaviors that lead to global changes can be adopted when needed. The interaction between these simple entities yields an emergent behavior able to deal smoothly with the complexity of the problem at hand.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号