首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4750篇
  免费   499篇
  国内免费   183篇
电工技术   461篇
技术理论   1篇
综合类   267篇
化学工业   682篇
金属工艺   330篇
机械仪表   256篇
建筑科学   198篇
矿业工程   132篇
能源动力   197篇
轻工业   254篇
水利工程   60篇
石油天然气   115篇
武器工业   53篇
无线电   813篇
一般工业技术   561篇
冶金工业   280篇
原子能技术   42篇
自动化技术   730篇
  2025年   45篇
  2024年   142篇
  2023年   147篇
  2022年   227篇
  2021年   296篇
  2020年   192篇
  2019年   161篇
  2018年   150篇
  2017年   160篇
  2016年   143篇
  2015年   179篇
  2014年   215篇
  2013年   309篇
  2012年   332篇
  2011年   307篇
  2010年   218篇
  2009年   269篇
  2008年   280篇
  2007年   246篇
  2006年   184篇
  2005年   143篇
  2004年   124篇
  2003年   112篇
  2002年   124篇
  2001年   95篇
  2000年   72篇
  1999年   54篇
  1998年   93篇
  1997年   65篇
  1996年   45篇
  1995年   40篇
  1994年   31篇
  1993年   25篇
  1992年   22篇
  1991年   30篇
  1990年   16篇
  1989年   11篇
  1988年   12篇
  1987年   16篇
  1986年   12篇
  1985年   13篇
  1984年   8篇
  1983年   12篇
  1982年   7篇
  1980年   6篇
  1979年   4篇
  1976年   3篇
  1975年   7篇
  1973年   5篇
  1972年   3篇
排序方式: 共有5432条查询结果,搜索用时 15 毫秒
11.
We present a hierarchical test methodology for testing a SOC with heterogeneous cores, including the 1149.1-wrapped, P1500-wrapped, and BIST memory cores. We propose an 1149.1-based hierarchical test manager that also provides P1500 test control signals. This scheme includes a memory BIST interface, providing both serial and parallel access ports for BIST circuits. Our approach offers low area and pin overhead, and high flexibility  相似文献   
12.
讨论分析双重分离全自动控制空气分离器的工作过程及影响因素。  相似文献   
13.
The multilayer thin-film systems of Cu/Ti/Si and Au/Cu/Al2O3 were diffusion-soldered at temperatures between 250°C and 400°C by inserting a Sn thin-film interlayer. Experimental results showed that a double layer of intermetallic compounds (IMCs) η-(Cu0.99Au0.01)6Sn5/δ-(Au0.87Cu0.13)Sn was formed at the interface. Kinetics analyses revealed that the growth of intermetallics was diffusion-controlled. The activation energies as calculated from Arrhenius plots of the growth rate constants for (Cu0.99Au0.01)6Sn5 and (Au0.87Cu0.13)Sn are 16.9 kJ/mol and 53.7 kJ/mol, respectively. Finally, a satisfactory tensile strength of 132 kg/cm2 could be attained under the bonding condition of 300°C for 20 min.  相似文献   
14.
Active queue management (AQM) is proposed to enhance end-to-end congestion control through purposefully dropping packets in the intermediate nodes. In this letter, a novel packet dropping mechanism is developed through designing a binary controller applying the robust control theory. The new mechanism can simplify the manipulation on the AQM router so as to be helpful for implementing the high performance router. The numerical simulation results show that the binary controller can satisfy with the technical requirements for AQM  相似文献   
15.
The tensile strengths of bulk solders and joint couples of Sn-3.5Ag-0.5Cu, Sn-3.5Ag-0.07Ni, and Sn-3.5Ag-0.5Cu-0.07Ni-0.01Ge solders and the shear strengths of ball grid array (BGA) specimens, solder-ball-attached Cu/Ni/Au metallized substrates were investigated. The tensile strength of the bulk is degraded by thermal aging. The Ni-containing solder exhibits lower tensile strength than Sn-3.5Ag-0.5Cu after thermal aging. However, the Ni-containing solder joints show greater tensile strength than the Cu/Sn-3.5Ag-0.5Cu/Cu joint. Fracture of the solder joint occurs between the intermetallic compound (IMC) and the solder. The shear strength and fracture mechanism of BGA specimens are the same regardless of solder composition.  相似文献   
16.
Hiding data in multitone images for data communications   总被引:3,自引:0,他引:3  
Two novel data-hiding schemes for secure data communications are presented. These two schemes perform on the pixel differences between the original (host) image and the decompressed image, which is inspired from Wu's and Chao's methods. The first scheme, referred to as 'scheme-1', utilises the differences between two similar images and then embeds the secret data into the different parts. In the embedding process, two auxiliary techniques, zero-replacement and complement-bit, will also be incorporated. In addition, to enhance the hiding efficiency of scheme-1, the authors have followed the bit-plane hiding strategy and created scheme-2. The proposed schemes have two advantages. First, the error distortion can be measured before the hiding process begins. Second, there is no complex computation, which means the hiding process can be executed very efficiently. The experimental results show that the two proposed schemes can achieve better image quality than other data-hiding schemes. At the same time, the new schemes can also satisfy the three basic requirements a data hiding scheme should live up to: invisibility, capacity and data security.  相似文献   
17.
Packetized access has some potential advantages over conventional circuit-switched-based access methods because several signal sources can share the same radio channel using statistical multiplexing. We consider radio resource assignment algorithms for packetized access based on the packet-reservation multiple-access (PRMA) protocol in the presence of cochannel interference. The statistical multiplexing gain of packet access is limited by frequency reuse, especially when the reuse factor is low or duality requirement is high. We propose a fuzzy logic-based adaptive medium-access control (MAC) algorithm to improve packet-access efficiency. Computer simulations based on the example of packetized voice have confirmed that the proposed packet-access protocol can support a higher number of active users per radio port than that supported by random slot assignment  相似文献   
18.
Hardware variance can significantly degrade the positional accuracy of RSS-based WiFi localization systems. Although manual adjustment can reduce positional error, this solution is not scalable as the number of new WiFi devices increases. We propose an unsupervised learning method to automatically solve the hardware variance problem in WiFi localization. This method was designed and implemented in a working WiFi positioning system and evaluated using different WiFi devices with diverse RSS signal patterns. Experimental results demonstrate that the proposed learning method improves positional accuracy within 100 s of learning time.  相似文献   
19.
In All-IP networks, each computer or communication equipment needs an IP address. To supply enough IP addresses, the new Internet protocol IPv6 will be used in next generation mobile communication. Although IPv6 improves the existing Internet protocol (IPv4), Duplicate Address Detection (DAD) mechanism may consume resources and suffer from long delay. DAD is used to make sure whether the IP address is unique or not. When a mobile node performs an inter-domain handoff, it will first generate a new IP and perform a DAD procedure. The DAD procedure not only wastes time but also increases the signaling load on Internet. In this paper, we propose a new DAD mechanism to speed up the DAD procedure. We create a DAD table in access or mobility routers in All-IP networks and record all IP addresses of the area. When a new IP address needs to perform DAD, it can just search in the DAD table to confirm the uniqueness of the address. Furthermore, we propose a new method, Fast Duplicate Address Detection (Fast DAD), to reduce data search time. Simulation results show that our method outperforms the existing DAD methods.  相似文献   
20.
This paper presents an equalization structure in which antennadiversity, adaptive decision feedback equalization (DFE), interleavingand trellis-coded modulation (TCM) can be effectively combined to combatboth ISI and cochannel interference in cellular mobile radioenvironments. The feedback filter of the DFE can use either tentative orfinal decision symbols of the TCM Viterbi decoding to cancel tail ISIwith the square root Kalman algorithm. A performance bound on theaverage pairwise error probability for TCM under perfect interleavingand equalization is obtained by analysis. Some simulation results whichillustrate the potential of the proposed system will also be given. Inparticular, a performance comparison between the proposed method anduncoded QPSK modulation will be undertaken.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号