全文获取类型
收费全文 | 2147篇 |
免费 | 128篇 |
国内免费 | 5篇 |
专业分类
电工技术 | 28篇 |
综合类 | 1篇 |
化学工业 | 467篇 |
金属工艺 | 42篇 |
机械仪表 | 75篇 |
建筑科学 | 105篇 |
能源动力 | 164篇 |
轻工业 | 382篇 |
水利工程 | 15篇 |
石油天然气 | 9篇 |
无线电 | 127篇 |
一般工业技术 | 430篇 |
冶金工业 | 73篇 |
原子能技术 | 13篇 |
自动化技术 | 349篇 |
出版年
2024年 | 8篇 |
2023年 | 23篇 |
2022年 | 53篇 |
2021年 | 94篇 |
2020年 | 87篇 |
2019年 | 92篇 |
2018年 | 103篇 |
2017年 | 90篇 |
2016年 | 121篇 |
2015年 | 70篇 |
2014年 | 102篇 |
2013年 | 197篇 |
2012年 | 127篇 |
2011年 | 172篇 |
2010年 | 118篇 |
2009年 | 151篇 |
2008年 | 133篇 |
2007年 | 111篇 |
2006年 | 78篇 |
2005年 | 62篇 |
2004年 | 55篇 |
2003年 | 40篇 |
2002年 | 40篇 |
2001年 | 13篇 |
2000年 | 13篇 |
1999年 | 24篇 |
1998年 | 23篇 |
1997年 | 12篇 |
1996年 | 17篇 |
1995年 | 6篇 |
1994年 | 2篇 |
1993年 | 3篇 |
1992年 | 5篇 |
1991年 | 6篇 |
1990年 | 3篇 |
1989年 | 2篇 |
1988年 | 4篇 |
1987年 | 4篇 |
1986年 | 4篇 |
1985年 | 2篇 |
1984年 | 4篇 |
1982年 | 1篇 |
1981年 | 1篇 |
1976年 | 1篇 |
1974年 | 1篇 |
1972年 | 1篇 |
1970年 | 1篇 |
排序方式: 共有2280条查询结果,搜索用时 15 毫秒
21.
A discrete coil EIT system is investigated for the general case of an eccentric circular inhomogeneity. The solution methodology of the forward problem of this system is explained. An optimization procedure using this forward problem solution is developed to find optimum currents that maximize the distinguishability. For an eccentric inhomogeneity problem, it is shown that the coil currents can be optimized to focus the current density in a region of interest. Optimum coil currents under limited peak coil currents constraint and limited total power constraint are obtained. Representative examples that demonstrate the performance of the system are presented. 相似文献
22.
Zhi Sun Pu Wang Mehmet C. Vuran Mznah A. Al-Rodhaan Abdullah M. Al-Dhelaan Ian F. Akyildiz 《Ad hoc Networks》2011,9(3):468-477
The conventional border patrol systems suffer from intensive human involvement. Recently, unmanned border patrol systems employ high-tech devices, such as unmanned aerial vehicles, unattended ground sensors, and surveillance towers equipped with camera sensors. However, any single technique encounters inextricable problems, such as high false alarm rate and line-of-sight-constraints. There lacks a coherent system that coordinates various technologies to improve the system accuracy. In this paper, the concept of BorderSense, a hybrid wireless sensor network architecture for border patrol systems, is introduced. BorderSense utilizes the most advanced sensor network technologies, including the wireless multimedia sensor networks and the wireless underground sensor networks. The framework to deploy and operate BorderSense is developed. Based on the framework, research challenges and open research issues are discussed. 相似文献
23.
Mehmet Enver Ayd?nMurat Soylu Fahrettin Yakuphanoglu W.A. Farooq 《Microelectronic Engineering》2011,88(6):867-871
The electronic properties of metal-organic semiconductor-inorganic semiconductor structure between GaAs and poly(3,4-ethylenedioxithiophene)-block-poly(ethylene glycol) organic film have been investigated via current-voltage and capacitance-voltage methods. The Au/PEDOT/n-GaAs contact exhibits a rectification behavior with the barrier height of 0.69 eV and ideality factor value of 3.94. The barrier height of the studied diode (0.67 eV) is lower than that of Ni/n-GaAs/In (0.85 eV) and Au/n-GaAs/In Schottky diodes. The decrease in barrier height of Au/n-GaAs/In Schottky diode is likely to be due to the variation in the space charge region in the GaAs. The obtained results indicate that control of the interfacial potential barrier for metal/n-GaAs diode was achieved using thin interlayer of the poly(3,4-ethylenedioxithiophene)-block-poly(ethylene glycol). 相似文献
24.
Süleyman Karda Serkan elik Muhammed Ali Bingl Mehmet Sabir Kiraz Hüseyin Demirci Albert Levi 《Wireless Communications and Mobile Computing》2015,15(18):2150-2166
This paper examines Vaudenay's privacy model, which is one of the first and most complete privacy models that featured the notion of different privacy classes. We enhance this model by introducing two new generic adversary classes, k‐strong and k‐forward adversaries where the adversary is allowed to corrupt a tag at most k times. Moreover, we introduce an extended privacy definition that also covers all privacy classes of Vaudenay's model. In order to achieve highest privacy level, we study low cost primitives such as physically unclonable functions (PUFs). The common assumption of PUFs is that their physical structure is destroyed once tampered. This is an ideal assumption because the tamper resistance depends on the ability of the attacker and the quality of the PUF circuits. In this paper, we have weakened this assumption by introducing a new definition k‐resistant PUFs. k‐PUFs are tamper resistant against at most k attacks; that is, their physical structure remains still functional and correct until at most kth physical attack. Furthermore, we prove that strong privacy can be achieved without public‐key cryptography using k PUF‐based authentication. We finally prove that our extended proposal achieves both reader authentication and k‐strong privacy. Copyright © 2014 John Wiley & Sons, Ltd. 相似文献
25.
26.
Muhammad Yaseen Kashif Saleem Mehmet A. Orgun Abdelouahid Derhab Haider Abbas Jalal Al-Muhtadi Waseem Iqbal Imran Rashid 《Telematics and Informatics》2018,35(4):702-726
Recent advances in hardware technology have led to the development of low cost, power efficient and more feature rich devices that are amongst the most critical parts of communication networks. These devices or sensors can now sense data with more accuracy, process it by themselves and send it to the neighboring node or the sink node. However, robust and reliable security mechanisms are not yet properly implemented on these sensors due to their limited energy and computation power. Sensors also play a very important role in eHealthcare systems where ubiquitous patient monitoring is performed. As data is generated from the sensor nodes, reliable, secure and attack-resistant data acquisition and transmission is important for an efficient eHealthcare systems. This survey focuses on security issues of sensors data acquisition and transmission protocols, describing their main security features and comparing them in the context of a secure eHealthcare system. A taxonomy of open issues and future challenges is also discussed with respect to specific security metrics described in the paper. 相似文献
27.
Mehmet Ali Erturk Luca Vollero Muhammed Ali Aydin 《International Journal of Communication Systems》2018,31(2)
Wireless hotspots, ie, infrastructures composed of several IEEE 802.11 access points (APs), are today the most common solution in providing Internet access to a wide and rapidly changing population of users. According to common device implementation, stations establish associations with APs based on the measured strongest Received Signal Strength Indicator level. This usually leads to an uneven distribution of users to APs, increasing the chances of local network congestion. Load balancing (LB) solutions aim at mitigating this problem controlling the distribution of users. The LB algorithms enforce stations to associate with APs that manage a low number of users and/or that have a low traffic load. Usually, LB solutions do not consider traffic priorities or they assume some a priori quality of service (QoS) configuration for users. In this study, we propose a QoS‐LB solution based on the cell breathing technique with the goal of balancing the load in IEEE 802.11e Enhanced Distributed Channel Access (EDCA) Hotspots. The proposed algorithm explores the space of possible power/EDCA configurations by using a branch and bound approach that reduces the number of analyzed configurations and, hence, the time required to find the global optimal solution. The algorithm has been analytically defined and its performance evaluated through simulations and tests in a real test bed. The results prove that the proposed solution is effective in solving the optimal QoS‐LB configuration problem in WiFi hotspots of average size. 相似文献
28.
IEEE 802.11 wireless network standard has become one of the most used wireless networking technologies for smart devices as it offers mobility support and low cost deployment. However, these devices deeply rely on the energy provided by their batteries, which results in limited running time. IEEE 802.11 network standard provides stations with carrier sense multiple access with collision avoidance for the medium access. Yet it results in stations to consume an important amount of power. Therefore, minimizing WiFi‐based energy consumption in smart devices has been received substantial attention in both academia and industry. Accordingly, this paper * proposes a novel beacon‐based energy‐efficient collision‐free medium access control protocol for any type of IEEE 802.11 stations, regardless of being stationary or mobile, or having different amount of traffic flow, transmission rates, or traffic types. The proposed scheme is valid for all types of low or wide bandwidth, single or multiuser multiple‐input multiple‐output WLAN channels, such as IEEE 802.11a\b\g\n\ac. In the proposed scheme, energy saving is achieved, enabling stations to transmit on the right time and maintaining stations in the doze state during a predetermined sleep_time interval after each successful frame transmission, by making use of modified control and management frames of the standard IEEE 802.11 protocol. The proposed scheme reduces the probability of collisions and may allow stations to enter the collision‐free state, regardless of the number of stations on the channel and their traffic types. Widespread simulations have been executed to validate the efficiency of the proposed method. The results demonstrate that the proposed method significantly increases overall throughput and reduces power consumption of stations over IEEE 802.11 WLANs. 相似文献
29.
Handan Acar Meral Karakışla Mehmet Saçak 《Materials Science in Semiconductor Processing》2013,16(3):845-850
Conductive polypyrrole (PPy)/kaolinite clay composites were prepared by in situ chemical polymerization of pyrrole in the presence of kaolinite using FeCl3 as oxidant. The PPy content and conductivity of the composites reached 32.8% and 8.3×10?2 S/cm at HCl concentrations of 1.5 M and 0.5 M, respectively. The microhardness of the composites containing different amounts of PPy was higher than that of the PPy and kaolinite components. The highest microhardness observed was 30.17 kg/mm2 for the composite containing 9.6% PPy. The electrical resistance of the composites was monitored during heating–cooling cycles over the range 5–120 °C. The change in resistance with temperature was more repeatable for the composite than for PPy. The composites were characterized by Fourier-transform infrared spectroscopy (FTIR), X-ray diffraction (XRD), thermogravimetric analysis (TGA) and scanning electron microscopy (SEM). The humidity-sensing properties were also examined. 相似文献
30.
A new transform domain array signal processing technique is proposed for identification of multipath communication channels. The received array element outputs are transformed to delay-Doppler domain by using the cross-ambiguity function (CAF) for efficient exploitation of the delay-Doppler diversity of the multipath components. Clusters of multipath components can be identified by using a simple amplitude thresholding in the delay-Doppler domain. Particle swarm optimization (PSO) can be used to identify parameters of the multipath components in each cluster. The performance of the proposed PSO-CAF technique is compared with the space alternating generalized expectation maximization (SAGE) technique and with a recently proposed PSO based technique at various SNR levels. Simulation results clearly quantify the superior performance of the PSO-CAF technique over the alternative techniques at all practically significant SNR levels. 相似文献