全文获取类型
收费全文 | 1351篇 |
免费 | 72篇 |
国内免费 | 5篇 |
专业分类
电工技术 | 18篇 |
综合类 | 5篇 |
化学工业 | 291篇 |
金属工艺 | 37篇 |
机械仪表 | 51篇 |
建筑科学 | 37篇 |
矿业工程 | 1篇 |
能源动力 | 52篇 |
轻工业 | 81篇 |
水利工程 | 10篇 |
石油天然气 | 2篇 |
无线电 | 211篇 |
一般工业技术 | 245篇 |
冶金工业 | 84篇 |
原子能技术 | 10篇 |
自动化技术 | 293篇 |
出版年
2023年 | 19篇 |
2022年 | 49篇 |
2021年 | 73篇 |
2020年 | 48篇 |
2019年 | 56篇 |
2018年 | 51篇 |
2017年 | 45篇 |
2016年 | 52篇 |
2015年 | 48篇 |
2014年 | 63篇 |
2013年 | 112篇 |
2012年 | 90篇 |
2011年 | 93篇 |
2010年 | 56篇 |
2009年 | 61篇 |
2008年 | 48篇 |
2007年 | 30篇 |
2006年 | 41篇 |
2005年 | 35篇 |
2004年 | 30篇 |
2003年 | 23篇 |
2002年 | 20篇 |
2001年 | 22篇 |
2000年 | 30篇 |
1999年 | 24篇 |
1998年 | 31篇 |
1997年 | 21篇 |
1996年 | 28篇 |
1995年 | 14篇 |
1994年 | 15篇 |
1993年 | 11篇 |
1992年 | 19篇 |
1991年 | 5篇 |
1990年 | 8篇 |
1989年 | 6篇 |
1988年 | 10篇 |
1987年 | 4篇 |
1986年 | 5篇 |
1985年 | 4篇 |
1984年 | 3篇 |
1983年 | 3篇 |
1982年 | 4篇 |
1981年 | 3篇 |
1980年 | 1篇 |
1979年 | 3篇 |
1977年 | 2篇 |
1976年 | 2篇 |
1975年 | 1篇 |
1973年 | 3篇 |
1971年 | 2篇 |
排序方式: 共有1428条查询结果,搜索用时 0 毫秒
11.
Sivalingam Krishna M. Chen Jyh‐Cheng Agrawal Prathima Srivastava Mani B. 《Wireless Networks》2000,6(1):73-87
This paper describes the design and analysis of a low‐power medium access control (MAC) protocol for wireless/mobile ATM networks.
The protocol – denoted EC‐MAC (energy conserving medium access control) – is designed to support different traffic types with
quality‐of‐service (QoS) provisions. The network is based on the infrastructure model where a base station (BS) serves all
the mobiles currently in its cell. A reservation‐based approach is proposed, with appropriate scheduling of the requests from
the mobiles. This strategy is utilized to accomplish the dual goals of reduced energy consumption and quality of service provision
over wireless links. A priority round robin with dynamic reservation update and error compensation scheduling algorithm is
used to schedule the transmission requests of the mobiles. Discrete‐event simulation has been used to study the performance
of the protocol. A comparison of energy consumption of the EC‐MAC to a number of other protocols is provided. This comparison
indicates the EC‐MAC has, in general, better energy consumption characteristics. Performance analysis of the proposed protocol
with respect to different quality‐of‐service parameters using video, audio and data traffic models is provided.
This revised version was published online in August 2006 with corrections to the Cover Date. 相似文献
12.
Chuan-Jane Chao Shyh-Chyi Wong Chi-Hung Kao Ming-Jer Chen Len-Yi Leu Kuang-Yi Chiu 《Semiconductor Manufacturing, IEEE Transactions on》2002,15(1):19-29
The paper presents a complete characterization of on-chip inductors fabricated in BiCMOS technology. First, a study of the scaling effect of inductance on geometry and structure parameters is presented to provide a clear guideline on inductor scaling with suitable quality factors. The substrate noise analysis and noise reduction techniques are then investigated. It is shown that floating well can improve both quality factor and noise elimination by itself under 3 GHz and together with a guard ring above 3 GHz. Finally, for accurate circuit simulations, a new inductor model is developed for predicting the skin effect and eddy effect and associated quality factor and inductance. 相似文献
13.
Jyh‐Horng Wen Kuo‐Gen Hsu Jet‐Chau Wen Yi‐Show Chen 《International Journal of Communication Systems》2001,14(5):497-511
Power assignment schemes are man‐made methods to enhance the capture effect of radio communications. In a previous study, Wen and Yang investigated the combined capture effect of the fixed power assignment scheme, Rayleigh fading, and near–far effect on the performance of packet radios. The performance analysis was limited to an infinite population environment. This assumption is reasonable for a conventional packet radio system with a vast service area. However, for a cellular mobile system, a finite population model should be used. In this paper, we analyse the combined natural and man‐made capture effect on the performance of a cellular system with finite population in each cell. A random power assignment scheme is adopted to produce the man‐made capture. The system throughput and delay are carried out by a Markov model. Some numerical calculations are used to demonstrate the degree of performance improvement. Copyright © 2001 John Wiley & Sons, Ltd. 相似文献
14.
In some environments the components might not fail fully, but can lead to degradation and the efficiency of the system may decreases. However, the degraded components can be restored back through a proper repair mechanism. In this paper, we present a model to perform reliability analysis of k-out-of-n systems assuming that components are subjected to three states such as good, degraded, and catastrophic failure. We also present expressions for reliability and mean time to failure (MTTF) of k-out-of-n systems. Simple reliability and MTTF expressions for the triple-modular redundant (TMR) system, and numerical examples are also presented in this study. 相似文献
15.
A discrete replacement model for a repairable system which is subject to shocks and minimal repairs is discussed. Such shocks can be classified, depending on its effect to the system, into two types: Type I and Type II shocks. Whenever a type II shock occurs causes the system to go into failure, such a failure is called type II failure and can be corrected by a minimal repair. A type I shock does damage to the system in the sense that it increases the failure rate by a certain amount and the failure rate also increases with age due to aging process without external shocks; furthermore, the failure occurred in this condition is called type I failure. The system is replaced at the time of the first type I failure or the n-th type Il failure, whichever occurs first. Introducing costs due to replacement and mininal repairs, the long-run expected cost per unit time is derived as a criterion of optimality and the optimal number n∗ found by minimizing that cost. It is shown that, under certain conditions, there exists a finite and unique optimal number n∗. 相似文献
16.
Jyh‐Horng Wen Wen‐Jiang Chen Shang‐Yo Lin Kuo‐Ting Huang 《International Journal of Communication Systems》2001,14(6):575-591
This paper studies the performance of radio assignment algorithms for portable access in cellular systems. Several channel access procedures are proposed and simulated using block oriented network simulator (BONeS) simulation of a model 36‐port system. Simulation results exhibit that load‐sharing system with LIBTA algorithm is better than directed retry system with the same algorithm by around 0.9 erlangs while better than quasi‐fixed channel assignment (QFCA) system by around 2 erlangs if the grade of service (GOS) is constrained to less than 10 per cent. Plus, a hybrid time‐slot selection procedure is proposed to enhance the system performance. It is observed that systems with hybrid time‐slot selection perform better than those with LIBTA algorithm in GOS under heavy load. It is also observed that load sharing system with hybrid time‐slot selection algorithm is better than directed retry system with the same algorithm by around 0.7 erlangs and better than QFCA system by around 2 erlangs. Copyright © 2001 John Wiley & Sons, Ltd. 相似文献
17.
R. H. Horng D. S. Wuu C. C. Leu S. H. Chan T. Y. Huang S. M. Sze 《Microelectronics Reliability》2000,40(4-5)
The effects of F-ion implantation on the leakage and dielectric properties of the Ba0.7Sr0.3TiO3 (BST) films were investigated. The BST film implanted with 1×1015 cm–2 shows the optimum leakage performance. The leakage current density can be decreased by one order of magnitude as compared to that of the non-implanted sample at an applied voltage of 2 V. On increasing the implanted dose from 5×1014 to 5×1015 cm–2, the dielectric constant first increases and then decreases due to the deteriorated crystallinity. It is found that the suitable F-ion dose can reduce the –OH contaminants and improve the dielectric and leakage properties. 相似文献
18.
Ha Hoang Kha Hoang Duong Tuan Ba-Ngu Vo Nguyen T.Q. 《Signal Processing, IEEE Transactions on》2007,55(9):4405-4414
A new design method for complex-valued two-channel finite impulse response (FIR) filter banks with both orthogonality and symmetry properties is developed. Based on a novel linear matrix inequality (LMI) characterization of trigonometric curves, the optimal design of perfect-reconstruction filter banks is cast into a semidefinite programming (SDP) problem. The dimension of the resulting SDP problem is further reduced by exploiting convex duality. Consequently, the globally optimal solution can be found for any practical filter length and desired regularity order. 相似文献
19.
Yeow Meng Chee Son Hoang Dau Ling A.C.H. San Ling 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2010,56(1):140-151
An optimal constant-composition or constant-weight code of weight w has linear size if and only if its distance d is at least 2w-1. When d ? 2w, the determination of the exact size of such a constant-composition or constant-weight code is trivial, but the case of d=2w-1 has been solved previously only for binary and ternary constant-composition and constant-weight codes, and for some sporadic instances. This paper provides a construction for quasicyclic optimal constant-composition and constant-weight codes of weight w and distance 2w-1 based on a new generalization of difference triangle sets. As a result, the sizes of optimal constant-composition codes and optimal constant-weight codes of weight w and distance 2w-1 are determined for all such codes of sufficiently large lengths. This solves an open problem of Etzion. The sizes of optimal constant-composition codes of weight w and distance 2w-1 are also determined for all w ? 6, except in two cases. 相似文献
20.
New families of protocol, based on communication over human-based side channels, permit secure pairing or group formation in ways such that no party has to prove its name. Rather, individuals are able to hook up devices in their possession to others that they can identify by context. We examine a model in which, to prove his or her identity to a party, the user first uses one of these “human-interactive security protocols” or HISPs to connect to it. Thus, when authenticating A to B, A first authenticates a channel she has to B: the reverse direction. This can be characterised as bootstrapping a secure connection using human trust. This provides new challenges to the formal modelling of trust and authentication. 相似文献