首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2623篇
  免费   150篇
  国内免费   24篇
电工技术   43篇
综合类   7篇
化学工业   756篇
金属工艺   74篇
机械仪表   107篇
建筑科学   109篇
矿业工程   10篇
能源动力   169篇
轻工业   172篇
水利工程   47篇
石油天然气   23篇
无线电   254篇
一般工业技术   419篇
冶金工业   79篇
原子能技术   19篇
自动化技术   509篇
  2024年   4篇
  2023年   48篇
  2022年   77篇
  2021年   177篇
  2020年   131篇
  2019年   181篇
  2018年   213篇
  2017年   192篇
  2016年   179篇
  2015年   116篇
  2014年   212篇
  2013年   282篇
  2012年   183篇
  2011年   197篇
  2010年   153篇
  2009年   109篇
  2008年   71篇
  2007年   39篇
  2006年   41篇
  2005年   30篇
  2004年   21篇
  2003年   12篇
  2002年   9篇
  2001年   5篇
  2000年   14篇
  1999年   3篇
  1998年   12篇
  1997年   3篇
  1996年   7篇
  1995年   10篇
  1994年   3篇
  1993年   7篇
  1992年   4篇
  1991年   3篇
  1990年   4篇
  1989年   5篇
  1988年   3篇
  1987年   5篇
  1986年   3篇
  1985年   3篇
  1984年   3篇
  1983年   6篇
  1982年   2篇
  1981年   2篇
  1980年   2篇
  1979年   3篇
  1978年   2篇
  1976年   3篇
  1974年   2篇
  1973年   1篇
排序方式: 共有2797条查询结果,搜索用时 15 毫秒
11.
Analog Integrated Circuits and Signal Processing - The power amplifiers (PAs) are generally the most power-consuming building blocks in Radio Frequency (RF) transceivers. This paper presents a high...  相似文献   
12.
In radio frequency identification (RFID) systems, search protocols are used to find a specific item in a large number of tagged products. These protocols should be secure against RFID attacks such as traceability, impersonation, DoS and eavesdropping. Sundaresan et al. (IEEE Trans Dependable Secure Comput, 2015) presented a server-less search protocol based on 128-bits PRNG function and claimed that their method can address all vulnerabilities of previous protocols. In this paper, we prove that Sundaresan et al.’s protocol is vulnerable to traceability attack with the high probability. In addition, we present an improved protocol to solve the proposed problem and analyze its security level informally and formally based on AVISPA tool and BAN logic.  相似文献   
13.
14.
15.
Cluster-based routing protocols are one of the most favorable approaches for energy management in wireless sensor networks. The selection of the best cluster heads (CHs), as well as the formation of optimal clusters, is an NP-hard problem. The present study proposes an optimal solution for CHs selection to generate a network topology with optimized network performance. The problem is formulated as facility location problem and a linear programming model is used to solve the optimization problem. Results of analysis o the network simulator (NS2) indicate that applying this method in cluster-based routing protocols prolongs 16 % of the network lifetime, increases 15.5 % of data transmission and improves 5.5 % of throughput, as compared to the results of current heuristic methods such as LEACH, DEEC and EDFCM protocols.  相似文献   
16.
Network on chip (NoC) has been proposed as an appropriate solution for today’s on-chip communication challenges. Power dissipation has become a key factor in the NoCs because of their shrinking sizes. In this paper, we propose a new encoding approach aimed at power reduction by decreasing the number of switching activities on the buses. This approach assigns the symbols to data word in such a way that the more frequent words are sent by less power consumption. This algorithm dedicates the symbols with less ones to high probability data and uses transition signaling to transmit data. The proposed method, unlike the existing low power encoding, does not rely on spatial redundancy and keeps the width of the bus constant. Experimental evaluations show that our approach reduces the power dissipation up to 46 % with 2.70, 0.51, and 15.43 % power, critical path and area overhead in the NoCs, respectively.  相似文献   
17.
18.
Cloud solutions are emerging as a new suitable way of transforming traditional IT data centers to highly available and reliable computing resources for hosting critical applications and data. However, software and hardware failures are a common problem in cloud datacenters that can lead to harmful damages. In this paper, we analyze the physical server failures in the Google cloud datacenter. We study the Google cluster properties to investigate the relationship among physical servers' failure rate and jobs failure events. The failure rate of Google cluster executed jobs and servers is taken into consideration during a 29‐day period. We present a reliability model for Google cluster physical machines using the continuous time Markov chains according to this observation. We attempt to analyze the obtained model through SHARPE software packages to improve the understanding of failure events in the Google cloud cluster. We also explore the cluster availability based on parameters like steady‐state availability, steady‐state unavailability, mean time to failure, and mean time to repair in the Google cluster.  相似文献   
19.
Rezaei  A.  Noori  L.  Mohammadi  H. 《Wireless Networks》2019,25(6):2989-2996
Wireless Networks - In this paper, a compact four-channel diplexer is designed using a microstrip structure to separate input signals at 2.07/3.94 GHz and 2.37/4.49 GHz and load...  相似文献   
20.
We report on the design and performance of a fix-tuned /spl times/2/spl times/3/spl times/3 frequency multiplier chain that covers 1.55-1.75THz. The chain is nominally pumped with 100mW at W-band. At 120K the measured output power is larger than 4/spl mu/W across the band with a peak power of 100/spl mu/W at 1.665THz. A similar chain operated at room temperature produced a peak power of 21/spl mu/W. These power levels now make it possible to deploy multipixel heterodyne imaging arrays in this frequency range.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号