首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1810篇
  免费   92篇
  国内免费   19篇
电工技术   31篇
综合类   12篇
化学工业   505篇
金属工艺   68篇
机械仪表   70篇
建筑科学   65篇
矿业工程   15篇
能源动力   129篇
轻工业   134篇
水利工程   10篇
石油天然气   43篇
无线电   156篇
一般工业技术   331篇
冶金工业   64篇
原子能技术   5篇
自动化技术   283篇
  2024年   4篇
  2023年   34篇
  2022年   80篇
  2021年   114篇
  2020年   90篇
  2019年   119篇
  2018年   166篇
  2017年   118篇
  2016年   112篇
  2015年   71篇
  2014年   103篇
  2013年   207篇
  2012年   109篇
  2011年   118篇
  2010年   85篇
  2009年   89篇
  2008年   47篇
  2007年   37篇
  2006年   29篇
  2005年   19篇
  2004年   16篇
  2003年   16篇
  2002年   12篇
  2001年   10篇
  2000年   3篇
  1999年   6篇
  1998年   12篇
  1997年   5篇
  1996年   2篇
  1995年   12篇
  1994年   3篇
  1993年   5篇
  1992年   8篇
  1991年   9篇
  1990年   4篇
  1989年   2篇
  1988年   4篇
  1987年   3篇
  1986年   2篇
  1985年   6篇
  1984年   2篇
  1983年   2篇
  1981年   4篇
  1980年   1篇
  1979年   2篇
  1978年   1篇
  1976年   5篇
  1975年   4篇
  1974年   6篇
  1973年   2篇
排序方式: 共有1921条查询结果,搜索用时 15 毫秒
21.
Opportunistic unlicensed access to the (temporarily) unused frequency bands across the licensed radio spectrum is currently being investigated as a means to increase the efficiency of spectrum usage. Such opportunistic access calls for implementation of safeguards so that ongoing licensed operations are not compromised. Among different candidates, sensing-based access, where the unlicensed users transmit if they sense the licensed band to be free, is particularly appealing due to its low deployment cost and its compatibility with the legacy licensed systems. The ability to reliably and autonomously identify unused frequency bands is envisaged as one of the main functionalities of cognitive radios. In this article we provide an overview of the regulatory requirements and major challenges associated with the practical implementation of spectrum sensing functionality in cognitive radio systems. Furthermore, we outline different design trade-offs that have to be made in order to enhance various aspects of the system's performance.  相似文献   
22.
Closed‐loop transmit diversity is considered an important technique for improving the link budget in the third generation and future wireless communication standards. This paper proposes several transmit diversity algorithms suitable for small wireless terminals and presents performance assessment in terms of average signal‐to‐noise ratio (SNR) and outage improvement, convergence, and complexity of operations. The algorithms presented herein are verified using data from measured indoor channels with variable antenna spacing and the results explained using measured radiation patterns for a two‐element array. It is shown that for a two‐element array, the best among the proposed techniques provides SNR improvement of about 3 dB in a tightly spaced array (inter‐element spacing of 0.1 wavelength at 2 GHz) typical of small wireless devices. Additionally, these techniques are shown to perform significantly better than a single antenna device in an indoor channel considering realistic values of latency and propagation errors.  相似文献   
23.
This work describes the radiation performance of a novel concept for direction and location finding, using stationary satellite beacons. The received signals are processed with a monopulse four-element array. The monopulse mode is generated using the phase excitation of the radiating elements. For accurate processing the radiation phase should correspond with the bearing angle around the boresight direction. Phase deviations, however, occur in this phase pattern owing to the discrete excitation of the elements. Therefore, detailed analyses are presented for this phase pattern, its attainable gain and the depolarization effects, in order to select the kind of array elements, and their spacings, which minimize the phase pattern deviations. The dipoles and the slots, as array elements, yield better phase performance, smaller size and simpler structures than horn radiators, at the expense of worse depolarization.  相似文献   
24.
This paper presents a high efficiency, high switching frequency DC–DC buck converter in AlGaAs/GaAs technology, targeting integrated power amplifier modules for wireless communications. The switch mode, inductor load DC–DC converter adopts an interleaved structure with negatively coupled inductors. Analysis of the effect of negative coupling on the steady state and transient response of the converter is given. The coupling factor is selected to achieve a maximum power efficiency under a given duty cycle with a minimum penalty on the current ripple performance. The DC–DC converter is implemented in 0.5 μm GaAs p-HEMT process and occupies 2 × 2.1 mm2 without the output network. An 8.7 nH filter inductor is implemented in 65 μm thick top copper metal layer, and flip chip bonded to the DC–DC converter board. The integrated inductor achieves a quality factor of 26 at 150 MHz. The proposed converter converts 4.5 V input to 3.3 V output for 1 A load current under 150 MHz switching frequency with a measured power efficiency of 84%, which is one of the highest efficiencies reported to date for similar current/voltage ratings.  相似文献   
25.
This paper investigates a new channel gain map tracking by Space-Time Extended Kalman Filtering (STEKF) for a flat channel, and a novel spectrum sensing via Time Spatial Weighted Non-negative Lasso (TSWNL) algorithm. STEKF enables CRs to estimate and interpolate channel gain map for the entire geographical area of interest with a limited number of CRs measurements. In order to sense primary users (PU) activities, include the transmission power by each PU, location and number of active PUs, TSWNL algorithm is proposed. Numerical results illustrate that the proposed STEKF channel estimation and TSWNL sensing algorithms outperforms linear methods.  相似文献   
26.
A multisecret sharing (MSS) is a method for sharing a set of secrets among some participants. They can recover each of these secrets without endangering the other secrets. Two kinds of security models have been proposed for MSS schemes. These models are categorized into 2 types. The first security model is unconditional security. This approach decreases the efficiency of MSS schemes. Therefore, the second type of security, which is more relaxed, appeared. This approach is called computational security. In this paper, with 2 examples, we will show that the current definition of computational security does not satisfy all of our expectations from a secure MSS scheme. In fact, in these examples, recovering a secret leaks information to the other secrets while these schemes are considered secure in view of the computational security. After determining the shortcomings of the current security definition, we propose a new definition for computational security and present an MSS scheme that enjoys rigorous proof of security in terms of the new definition. In addition, a complete comparison in terms of share size, number of public values, and required operations for recovering a secret between our scheme and previous schemes indicates that the presented scheme is efficient.  相似文献   
27.
The ever-increasing demand for network bandwidth makes network survivability an issue of great concern. Lightpath restoration is a valuable approach to guaranteeing an acceptable level of survivability in WDM optical networks with better resource utilization than that of its protection counterpart. Active restoration (AR) is a newly proposed lightpath restoration scheme [M. Mostafa et al. OSA Journal of Optical Networking, vol. 3, no. 4, pp. 247–260] that combines the best of protection and reactive restoration while avoiding their shortcomings. In this paper, we conduct detailed performance analysis on the restoration probability of AR-based WDM networks. In particular, analytical models of restoration probability are developed respectively for networks with full-wavelength conversion capability and for networks without wavelength conversion capability under different backup path searching schemes. Based on the new models, we investigate the effects of wavelength availability, wavelength conversion capability, path length as well as backup path seeking methods on the restoration probability.  相似文献   
28.
Cobalt ferrite nanoparticles were synthesized by a reverse micelle process. The optimum processing conditions required to fabricate nanocrystalline cobalt ferrite using a reverse micelle technique, especially the effect of water-to-surfactant molar ratios including w = 8, 10, 12, and 14, pH values in the range of 8 to 11, and annealing temperatures in the range of 400°C to 800°C, were evaluated. x-Ray diffraction (XRD), field-emission scanning electron microscopy (FE-SEM), vibrating-sample magnetometry, and superconducting quantum interference device analysis were employed to evaluate the structural and magnetic properties of synthesized nanoparticles. XRD analysis confirms that the nanoparticles have a single-phase cubic spinel structure. The average particle size increases with increasing pH value and annealing temperature. Magnetization study reveals that the cobalt ferrite nanoparticles exhibit a superparamagnetic trend. The zero-field-cooled magnetization curves of cobalt ferrite nanoparticles indicated that, with an increase in pH value, the blocking temperature increases. Based on the obtained optimum parameters, terbium-substituted cobalt ferrite nanoparticles with composition CoFe2?x Tb x O4 (x = 0.1 to 0.5) were prepared by a reverse micelle process. XRD and field-emission scanning electron microscopy evaluation demonstrated that single-phase spinel ferrites with narrow size distribution were obtained. Mössbauer spectroscopy was used to determine the site preference of terbium cation. The results confirm that terbium cations were distributed at tetrahedral and octahedral sites, but with a preference for the former. It was observed that, with an increase in terbium content, the saturation magnetization increases.  相似文献   
29.
In this paper, some conventional filtering windows are modified and applied to uniform concentric circular antenna arrays (UCCA) for spatial smoothing and sidelobe reduction. The modified windows are applied to individual rings of the array that will taper the corresponding current amplitudes. The resulted sidelobe level, beamwidth and stability for amplitude errors are discussed for the different proposed tapering windows where it shows a sidelobe reduction to about 49 dB as in the case of Binomial UCCA while the Hamming window shows the most immunity to tapered amplitude errors.  相似文献   
30.

In this paper, a novel full-duplex overlay cognitive wireless powered communication network (FD-OCWPCN) is proposed where a full-duplex (FD) hybrid-access point (H-AP) supports the full access of all battery-free secondary users (SUs). The H-AP broadcasts wireless power to empower the nearby SUs in the downlink (DL) phase while decoding the information transmitted uplink (UL) phase by the SUs, simultaneously. To overcome the self-interference (SI) phenomenon in FD-OCWPCN, the problem of maximizing the system sum-throughput with optimal UL-DL transmission/reception time and H-AP’s transmit power allocation is considered. This problem is non-convex under perfect/imperfect SI cancelation (SIC), so we employ the active interference temperature control and the gradient projection techniques to effectively reduce it into a convex problem. Closed-form expressions for the perfect/imperfect SIC cases are also derived. To assess the performance of the FD-OCWPCN, a comparison with a half-duplex OCWPCN (HD-OCWPCN) is provided. The achievable average sum-throughput for different FD/HD-OCWPCN is compared in the context of the average and peak transmit power at the H-AP, the number of SUs, path loss exponent and fairness metric. The simulation results depict the superiority of the FD-OCWPCN over the HD-OCWPCN for the perfect SIC and the effective imperfect SIC.

  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号