首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2147篇
  免费   128篇
  国内免费   5篇
电工技术   28篇
综合类   1篇
化学工业   467篇
金属工艺   42篇
机械仪表   75篇
建筑科学   105篇
能源动力   164篇
轻工业   382篇
水利工程   15篇
石油天然气   9篇
无线电   127篇
一般工业技术   430篇
冶金工业   73篇
原子能技术   13篇
自动化技术   349篇
  2024年   8篇
  2023年   23篇
  2022年   53篇
  2021年   94篇
  2020年   87篇
  2019年   92篇
  2018年   103篇
  2017年   90篇
  2016年   121篇
  2015年   70篇
  2014年   102篇
  2013年   197篇
  2012年   127篇
  2011年   172篇
  2010年   118篇
  2009年   151篇
  2008年   133篇
  2007年   111篇
  2006年   78篇
  2005年   62篇
  2004年   55篇
  2003年   40篇
  2002年   40篇
  2001年   13篇
  2000年   13篇
  1999年   24篇
  1998年   23篇
  1997年   12篇
  1996年   17篇
  1995年   6篇
  1994年   2篇
  1993年   3篇
  1992年   5篇
  1991年   6篇
  1990年   3篇
  1989年   2篇
  1988年   4篇
  1987年   4篇
  1986年   4篇
  1985年   2篇
  1984年   4篇
  1982年   1篇
  1981年   1篇
  1976年   1篇
  1974年   1篇
  1972年   1篇
  1970年   1篇
排序方式: 共有2280条查询结果,搜索用时 15 毫秒
21.
A discrete coil EIT system is investigated for the general case of an eccentric circular inhomogeneity. The solution methodology of the forward problem of this system is explained. An optimization procedure using this forward problem solution is developed to find optimum currents that maximize the distinguishability. For an eccentric inhomogeneity problem, it is shown that the coil currents can be optimized to focus the current density in a region of interest. Optimum coil currents under limited peak coil currents constraint and limited total power constraint are obtained. Representative examples that demonstrate the performance of the system are presented.  相似文献   
22.
BorderSense: Border patrol through advanced wireless sensor networks   总被引:1,自引:0,他引:1  
The conventional border patrol systems suffer from intensive human involvement. Recently, unmanned border patrol systems employ high-tech devices, such as unmanned aerial vehicles, unattended ground sensors, and surveillance towers equipped with camera sensors. However, any single technique encounters inextricable problems, such as high false alarm rate and line-of-sight-constraints. There lacks a coherent system that coordinates various technologies to improve the system accuracy. In this paper, the concept of BorderSense, a hybrid wireless sensor network architecture for border patrol systems, is introduced. BorderSense utilizes the most advanced sensor network technologies, including the wireless multimedia sensor networks and the wireless underground sensor networks. The framework to deploy and operate BorderSense is developed. Based on the framework, research challenges and open research issues are discussed.  相似文献   
23.
The electronic properties of metal-organic semiconductor-inorganic semiconductor structure between GaAs and poly(3,4-ethylenedioxithiophene)-block-poly(ethylene glycol) organic film have been investigated via current-voltage and capacitance-voltage methods. The Au/PEDOT/n-GaAs contact exhibits a rectification behavior with the barrier height of 0.69 eV and ideality factor value of 3.94. The barrier height of the studied diode (0.67 eV) is lower than that of Ni/n-GaAs/In (0.85 eV) and Au/n-GaAs/In Schottky diodes. The decrease in barrier height of Au/n-GaAs/In Schottky diode is likely to be due to the variation in the space charge region in the GaAs. The obtained results indicate that control of the interfacial potential barrier for metal/n-GaAs diode was achieved using thin interlayer of the poly(3,4-ethylenedioxithiophene)-block-poly(ethylene glycol).  相似文献   
24.
This paper examines Vaudenay's privacy model, which is one of the first and most complete privacy models that featured the notion of different privacy classes. We enhance this model by introducing two new generic adversary classes, k‐strong and k‐forward adversaries where the adversary is allowed to corrupt a tag at most k times. Moreover, we introduce an extended privacy definition that also covers all privacy classes of Vaudenay's model. In order to achieve highest privacy level, we study low cost primitives such as physically unclonable functions (PUFs). The common assumption of PUFs is that their physical structure is destroyed once tampered. This is an ideal assumption because the tamper resistance depends on the ability of the attacker and the quality of the PUF circuits. In this paper, we have weakened this assumption by introducing a new definition k‐resistant PUFs. k‐PUFs are tamper resistant against at most k attacks; that is, their physical structure remains still functional and correct until at most kth physical attack. Furthermore, we prove that strong privacy can be achieved without public‐key cryptography using k PUF‐based authentication. We finally prove that our extended proposal achieves both reader authentication and k‐strong privacy. Copyright © 2014 John Wiley & Sons, Ltd.  相似文献   
25.
26.
Recent advances in hardware technology have led to the development of low cost, power efficient and more feature rich devices that are amongst the most critical parts of communication networks. These devices or sensors can now sense data with more accuracy, process it by themselves and send it to the neighboring node or the sink node. However, robust and reliable security mechanisms are not yet properly implemented on these sensors due to their limited energy and computation power. Sensors also play a very important role in eHealthcare systems where ubiquitous patient monitoring is performed. As data is generated from the sensor nodes, reliable, secure and attack-resistant data acquisition and transmission is important for an efficient eHealthcare systems. This survey focuses on security issues of sensors data acquisition and transmission protocols, describing their main security features and comparing them in the context of a secure eHealthcare system. A taxonomy of open issues and future challenges is also discussed with respect to specific security metrics described in the paper.  相似文献   
27.
Wireless hotspots, ie, infrastructures composed of several IEEE 802.11 access points (APs), are today the most common solution in providing Internet access to a wide and rapidly changing population of users. According to common device implementation, stations establish associations with APs based on the measured strongest Received Signal Strength Indicator level. This usually leads to an uneven distribution of users to APs, increasing the chances of local network congestion. Load balancing (LB) solutions aim at mitigating this problem controlling the distribution of users. The LB algorithms enforce stations to associate with APs that manage a low number of users and/or that have a low traffic load. Usually, LB solutions do not consider traffic priorities or they assume some a priori quality of service (QoS) configuration for users. In this study, we propose a QoS‐LB solution based on the cell breathing technique with the goal of balancing the load in IEEE 802.11e Enhanced Distributed Channel Access (EDCA) Hotspots. The proposed algorithm explores the space of possible power/EDCA configurations by using a branch and bound approach that reduces the number of analyzed configurations and, hence, the time required to find the global optimal solution. The algorithm has been analytically defined and its performance evaluated through simulations and tests in a real test bed. The results prove that the proposed solution is effective in solving the optimal QoS‐LB configuration problem in WiFi hotspots of average size.  相似文献   
28.
IEEE 802.11 wireless network standard has become one of the most used wireless networking technologies for smart devices as it offers mobility support and low cost deployment. However, these devices deeply rely on the energy provided by their batteries, which results in limited running time. IEEE 802.11 network standard provides stations with carrier sense multiple access with collision avoidance for the medium access. Yet it results in stations to consume an important amount of power. Therefore, minimizing WiFi‐based energy consumption in smart devices has been received substantial attention in both academia and industry. Accordingly, this paper * proposes a novel beacon‐based energy‐efficient collision‐free medium access control protocol for any type of IEEE 802.11 stations, regardless of being stationary or mobile, or having different amount of traffic flow, transmission rates, or traffic types. The proposed scheme is valid for all types of low or wide bandwidth, single or multiuser multiple‐input multiple‐output WLAN channels, such as IEEE 802.11a\b\g\n\ac. In the proposed scheme, energy saving is achieved, enabling stations to transmit on the right time and maintaining stations in the doze state during a predetermined sleep_time interval after each successful frame transmission, by making use of modified control and management frames of the standard IEEE 802.11 protocol. The proposed scheme reduces the probability of collisions and may allow stations to enter the collision‐free state, regardless of the number of stations on the channel and their traffic types. Widespread simulations have been executed to validate the efficiency of the proposed method. The results demonstrate that the proposed method significantly increases overall throughput and reduces power consumption of stations over IEEE 802.11 WLANs.  相似文献   
29.
Conductive polypyrrole (PPy)/kaolinite clay composites were prepared by in situ chemical polymerization of pyrrole in the presence of kaolinite using FeCl3 as oxidant. The PPy content and conductivity of the composites reached 32.8% and 8.3×10?2 S/cm at HCl concentrations of 1.5 M and 0.5 M, respectively. The microhardness of the composites containing different amounts of PPy was higher than that of the PPy and kaolinite components. The highest microhardness observed was 30.17 kg/mm2 for the composite containing 9.6% PPy. The electrical resistance of the composites was monitored during heating–cooling cycles over the range 5–120 °C. The change in resistance with temperature was more repeatable for the composite than for PPy. The composites were characterized by Fourier-transform infrared spectroscopy (FTIR), X-ray diffraction (XRD), thermogravimetric analysis (TGA) and scanning electron microscopy (SEM). The humidity-sensing properties were also examined.  相似文献   
30.
A new transform domain array signal processing technique is proposed for identification of multipath communication channels. The received array element outputs are transformed to delay-Doppler domain by using the cross-ambiguity function (CAF) for efficient exploitation of the delay-Doppler diversity of the multipath components. Clusters of multipath components can be identified by using a simple amplitude thresholding in the delay-Doppler domain. Particle swarm optimization (PSO) can be used to identify parameters of the multipath components in each cluster. The performance of the proposed PSO-CAF technique is compared with the space alternating generalized expectation maximization (SAGE) technique and with a recently proposed PSO based technique at various SNR levels. Simulation results clearly quantify the superior performance of the PSO-CAF technique over the alternative techniques at all practically significant SNR levels.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号