首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1351篇
  免费   72篇
  国内免费   5篇
电工技术   18篇
综合类   5篇
化学工业   291篇
金属工艺   37篇
机械仪表   51篇
建筑科学   37篇
矿业工程   1篇
能源动力   52篇
轻工业   81篇
水利工程   10篇
石油天然气   2篇
无线电   211篇
一般工业技术   245篇
冶金工业   84篇
原子能技术   10篇
自动化技术   293篇
  2023年   19篇
  2022年   49篇
  2021年   73篇
  2020年   48篇
  2019年   56篇
  2018年   51篇
  2017年   45篇
  2016年   52篇
  2015年   48篇
  2014年   63篇
  2013年   112篇
  2012年   90篇
  2011年   93篇
  2010年   56篇
  2009年   61篇
  2008年   48篇
  2007年   30篇
  2006年   41篇
  2005年   35篇
  2004年   30篇
  2003年   23篇
  2002年   20篇
  2001年   22篇
  2000年   30篇
  1999年   24篇
  1998年   31篇
  1997年   21篇
  1996年   28篇
  1995年   14篇
  1994年   15篇
  1993年   11篇
  1992年   19篇
  1991年   5篇
  1990年   8篇
  1989年   6篇
  1988年   10篇
  1987年   4篇
  1986年   5篇
  1985年   4篇
  1984年   3篇
  1983年   3篇
  1982年   4篇
  1981年   3篇
  1980年   1篇
  1979年   3篇
  1977年   2篇
  1976年   2篇
  1975年   1篇
  1973年   3篇
  1971年   2篇
排序方式: 共有1428条查询结果,搜索用时 0 毫秒
11.
This paper describes the design and analysis of a low‐power medium access control (MAC) protocol for wireless/mobile ATM networks. The protocol – denoted EC‐MAC (energy conserving medium access control) – is designed to support different traffic types with quality‐of‐service (QoS) provisions. The network is based on the infrastructure model where a base station (BS) serves all the mobiles currently in its cell. A reservation‐based approach is proposed, with appropriate scheduling of the requests from the mobiles. This strategy is utilized to accomplish the dual goals of reduced energy consumption and quality of service provision over wireless links. A priority round robin with dynamic reservation update and error compensation scheduling algorithm is used to schedule the transmission requests of the mobiles. Discrete‐event simulation has been used to study the performance of the protocol. A comparison of energy consumption of the EC‐MAC to a number of other protocols is provided. This comparison indicates the EC‐MAC has, in general, better energy consumption characteristics. Performance analysis of the proposed protocol with respect to different quality‐of‐service parameters using video, audio and data traffic models is provided. This revised version was published online in August 2006 with corrections to the Cover Date.  相似文献   
12.
Characterization and modeling of on-chip spiral inductors for Si RFICs   总被引:4,自引:0,他引:4  
The paper presents a complete characterization of on-chip inductors fabricated in BiCMOS technology. First, a study of the scaling effect of inductance on geometry and structure parameters is presented to provide a clear guideline on inductor scaling with suitable quality factors. The substrate noise analysis and noise reduction techniques are then investigated. It is shown that floating well can improve both quality factor and noise elimination by itself under 3 GHz and together with a guard ring above 3 GHz. Finally, for accurate circuit simulations, a new inductor model is developed for predicting the skin effect and eddy effect and associated quality factor and inductance.  相似文献   
13.
Power assignment schemes are man‐made methods to enhance the capture effect of radio communications. In a previous study, Wen and Yang investigated the combined capture effect of the fixed power assignment scheme, Rayleigh fading, and near–far effect on the performance of packet radios. The performance analysis was limited to an infinite population environment. This assumption is reasonable for a conventional packet radio system with a vast service area. However, for a cellular mobile system, a finite population model should be used. In this paper, we analyse the combined natural and man‐made capture effect on the performance of a cellular system with finite population in each cell. A random power assignment scheme is adopted to produce the man‐made capture. The system throughput and delay are carried out by a Markov model. Some numerical calculations are used to demonstrate the degree of performance improvement. Copyright © 2001 John Wiley & Sons, Ltd.  相似文献   
14.
In some environments the components might not fail fully, but can lead to degradation and the efficiency of the system may decreases. However, the degraded components can be restored back through a proper repair mechanism. In this paper, we present a model to perform reliability analysis of k-out-of-n systems assuming that components are subjected to three states such as good, degraded, and catastrophic failure. We also present expressions for reliability and mean time to failure (MTTF) of k-out-of-n systems. Simple reliability and MTTF expressions for the triple-modular redundant (TMR) system, and numerical examples are also presented in this study.  相似文献   
15.
A discrete replacement model for a repairable system which is subject to shocks and minimal repairs is discussed. Such shocks can be classified, depending on its effect to the system, into two types: Type I and Type II shocks. Whenever a type II shock occurs causes the system to go into failure, such a failure is called type II failure and can be corrected by a minimal repair. A type I shock does damage to the system in the sense that it increases the failure rate by a certain amount and the failure rate also increases with age due to aging process without external shocks; furthermore, the failure occurred in this condition is called type I failure. The system is replaced at the time of the first type I failure or the n-th type Il failure, whichever occurs first. Introducing costs due to replacement and mininal repairs, the long-run expected cost per unit time is derived as a criterion of optimality and the optimal number n∗ found by minimizing that cost. It is shown that, under certain conditions, there exists a finite and unique optimal number n∗.  相似文献   
16.
This paper studies the performance of radio assignment algorithms for portable access in cellular systems. Several channel access procedures are proposed and simulated using block oriented network simulator (BONeS) simulation of a model 36‐port system. Simulation results exhibit that load‐sharing system with LIBTA algorithm is better than directed retry system with the same algorithm by around 0.9 erlangs while better than quasi‐fixed channel assignment (QFCA) system by around 2 erlangs if the grade of service (GOS) is constrained to less than 10 per cent. Plus, a hybrid time‐slot selection procedure is proposed to enhance the system performance. It is observed that systems with hybrid time‐slot selection perform better than those with LIBTA algorithm in GOS under heavy load. It is also observed that load sharing system with hybrid time‐slot selection algorithm is better than directed retry system with the same algorithm by around 0.7 erlangs and better than QFCA system by around 2 erlangs. Copyright © 2001 John Wiley & Sons, Ltd.  相似文献   
17.
The effects of F-ion implantation on the leakage and dielectric properties of the Ba0.7Sr0.3TiO3 (BST) films were investigated. The BST film implanted with 1×1015 cm–2 shows the optimum leakage performance. The leakage current density can be decreased by one order of magnitude as compared to that of the non-implanted sample at an applied voltage of 2 V. On increasing the implanted dose from 5×1014 to 5×1015 cm–2, the dielectric constant first increases and then decreases due to the deteriorated crystallinity. It is found that the suitable F-ion dose can reduce the –OH contaminants and improve the dielectric and leakage properties.  相似文献   
18.
A new design method for complex-valued two-channel finite impulse response (FIR) filter banks with both orthogonality and symmetry properties is developed. Based on a novel linear matrix inequality (LMI) characterization of trigonometric curves, the optimal design of perfect-reconstruction filter banks is cast into a semidefinite programming (SDP) problem. The dimension of the resulting SDP problem is further reduced by exploiting convex duality. Consequently, the globally optimal solution can be found for any practical filter length and desired regularity order.  相似文献   
19.
An optimal constant-composition or constant-weight code of weight w has linear size if and only if its distance d is at least 2w-1. When d ? 2w, the determination of the exact size of such a constant-composition or constant-weight code is trivial, but the case of d=2w-1 has been solved previously only for binary and ternary constant-composition and constant-weight codes, and for some sporadic instances. This paper provides a construction for quasicyclic optimal constant-composition and constant-weight codes of weight w and distance 2w-1 based on a new generalization of difference triangle sets. As a result, the sizes of optimal constant-composition codes and optimal constant-weight codes of weight w and distance 2w-1 are determined for all such codes of sufficiently large lengths. This solves an open problem of Etzion. The sizes of optimal constant-composition codes of weight w and distance 2w-1 are also determined for all w ? 6, except in two cases.  相似文献   
20.
New families of protocol, based on communication over human-based side channels, permit secure pairing or group formation in ways such that no party has to prove its name. Rather, individuals are able to hook up devices in their possession to others that they can identify by context. We examine a model in which, to prove his or her identity to a party, the user first uses one of these “human-interactive security protocols” or HISPs to connect to it. Thus, when authenticating A to B, A first authenticates a channel she has to B: the reverse direction. This can be characterised as bootstrapping a secure connection using human trust. This provides new challenges to the formal modelling of trust and authentication.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号