首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3614篇
  免费   219篇
  国内免费   2篇
电工技术   90篇
综合类   4篇
化学工业   1136篇
金属工艺   69篇
机械仪表   102篇
建筑科学   120篇
矿业工程   9篇
能源动力   134篇
轻工业   570篇
水利工程   15篇
石油天然气   13篇
无线电   218篇
一般工业技术   815篇
冶金工业   50篇
原子能技术   9篇
自动化技术   481篇
  2023年   39篇
  2022年   148篇
  2021年   187篇
  2020年   91篇
  2019年   93篇
  2018年   139篇
  2017年   134篇
  2016年   172篇
  2015年   122篇
  2014年   168篇
  2013年   365篇
  2012年   238篇
  2011年   256篇
  2010年   205篇
  2009年   144篇
  2008年   153篇
  2007年   137篇
  2006年   108篇
  2005年   60篇
  2004年   39篇
  2003年   55篇
  2002年   45篇
  2001年   33篇
  2000年   37篇
  1999年   32篇
  1998年   22篇
  1997年   15篇
  1996年   26篇
  1995年   21篇
  1994年   31篇
  1993年   23篇
  1992年   23篇
  1991年   21篇
  1990年   21篇
  1989年   17篇
  1988年   14篇
  1985年   33篇
  1984年   35篇
  1983年   28篇
  1982年   25篇
  1981年   37篇
  1980年   32篇
  1979年   25篇
  1978年   24篇
  1977年   18篇
  1976年   21篇
  1975年   13篇
  1974年   11篇
  1973年   14篇
  1972年   14篇
排序方式: 共有3835条查询结果,搜索用时 15 毫秒
41.
A method for calculation the impulse response of a depletion layer of a semiconductor device based on Ramo's theorem is described. Using this method the impulse response of a reach-through avalanche photodiode is derived.  相似文献   
42.
This paper presents a multimodal biometrie verification system based on the following hand features: palmprint, four digitprints and four fingerprints. The features are obtained using the Karhunen-Loève transform based approach, and information fusion at the matching-score level was applied. We experimented with different resolutions of the regions of interest, different numbers of features and several normalization and fusion techniques at the matching-score level. To increase the reliability of the system to spoof attacks we included an aliveness-detection module based on thermal images of the hand dor sa. The verification performance when using a system configuration with optimum parameters, i.e., resolution, number of features, normalization and fusion technique, showed an equal error rate (EER) of 0.0020%, which makes the system appropriate for the implementation of high-security biometric systems.  相似文献   
43.
This paper presents linear pulse response of a Resonant Cavity Enhanced (RCE) P-i-N fotodiode. The RCE P-i-N photodiode designed for high-speed aplication is analysed for various submicron thicknesses of absorption layer, bias voltages, active areas and incident pulse optical excitations. The results are obtained by numerical simulation of the complete phenomenological model for two valley semiconductor. Great enhancement of the quantum efficiency and the product bandwidth-quantum efficiency, is obvious from obtained results for this photodiode type.  相似文献   
44.
In this letter, a wireless communication system with microdiversity and macrodiversity reception in gamma‐shadowed Rician fading channels is considered. Exact and rapidly converging infinite‐series expressions for the average level crossing rate and average fade duration at the output of the system are provided. Numerical results are presented graphically to illustrate the proposed mathematical analysis and to examine the effects of the system's parameters on the quantities considered.  相似文献   
45.
In this article, the all-pole low-pass filter function with mini-max for the summed sensitivity function in the pass-band is considered. With the application of Chebyshev polynomials of the first kind, the proposed filter function is obtained in an explicit form with a maximum number of oscillations of the summed sensitivity function in the pass-band. The calculation of the filter function is derived by using the summed sensitivity function as a starting point. New original approximation function is derived in order to achieve a mini-max summed sensitivity function in the filter pass-band. Sensitivity analysis is carried out and a comparison of the summed sensitivity and the group delay of the proposed and classical all-pole filters is given. Minimisation of the summed sensitivity function is important for reduction of the deviation of the magnitude response caused by temperature changes of the continuous-time active filters implemented into the analogue front end or as programmable chips.  相似文献   
46.
Nowadays many leading companies understand that creating outstanding customer value is necessary to achieving sustainable market success. The main problem discussed in this article is the examination of factors affecting perceived value, emphasizing the relationship between perceived price and perceived value. Based on literature and their own findings, the authors designed a model of relationships between researched factors. This model was tested using structural equation modeling. The results reflected that statistically significant relationships exists and that perceived price has direct as well as indirect efects on perceived product value.  相似文献   
47.
In modern wireless ad hoc networks, with a high speed PHY, every collision means a significant loss of useful bandwidth. In the last few years different binary contention protocols have been introduced to address this problem. In this work we propose a novel binary contention protocol called binary priority countdown (BPC) protocol, whose goal is to reduce collisions as well as contention time. BPC uses a new priority countdown mechanism which exploits the efficiency of binary countdown, but the priority countdown process is not constrained to a single binary countdown round. This way, the priority space is not defined by the length of binary countdown round, like in other binary countdown protocols proposed in the literature, and arbitrary medium access priorities can be decremented through multiple binary countdown rounds if necessary. The ability of a new priority countdown mechanism to count down any priority number without changing the length of a binary countdown round, allows independent management of priority space. This “independence” of priority space introduces new optimization and adaptation possibilities. Collision memory effect is recognized and described. BPC protocol reveals connection between unary, binary and digit contention protocols. All three groups of protocols can now be seen as members of the same class of contention algorithms. Preliminary simulation results are shown.  相似文献   
48.
The outage performance of the amplify‐and‐forward relaying strategies over mutually uncorrelated extended generalized‐K fading channels is addressed in this paper. The attention is dedicated to the analyses of the noise‐limited and also interference‐limited environment. The new analytical expression for outage probability of observed relaying system in the presence of thermal noise is derived using the method for approximating equivalent signal‐to‐noise ratio. In addition, the outage performance is studied for the dual‐hop system when only the single dominant co‐channel interference is inherent at the relay and destination node. The correctness of the proposed mathematical derivations is verified by simulations. Copyright © 2014 John Wiley & Sons, Ltd.  相似文献   
49.
Adaptive perceptual color-texture image segmentation.   总被引:2,自引:0,他引:2  
We propose a new approach for image segmentation that is based on low-level features for color and texture. It is aimed at segmentation of natural scenes, in which the color and texture of each segment does not typically exhibit uniform statistical characteristics. The proposed approach combines knowledge of human perception with an understanding of signal characteristics in order to segment natural scenes into perceptually/semantically uniform regions. The proposed approach is based on two types of spatially adaptive low-level features. The first describes the local color composition in terms of spatially adaptive dominant colors, and the second describes the spatial characteristics of the grayscale component of the texture. Together, they provide a simple and effective characterization of texture that the proposed algorithm uses to obtain robust and, at the same time, accurate and precise segmentations. The resulting segmentations convey semantic information that can be used for content-based retrieval. The performance of the proposed algorithms is demonstrated in the domain of photographic images, including low-resolution, degraded, and compressed images.  相似文献   
50.
In this article, we study the blocking probability in a wavelength division multiplexing (WDM) based asynchronous bufferless optical burst switched (OBS) network, equipped with a bank of wavelength converters. Our analysis encloses two wavelength reservation schemes JIT (just-in-time) and JET (just-enough-time), and two-class data rate. The contribution of our work includes: (i) derivation of an accurate model for blocking probability of lower priority bursts in case of a non-preempted model; (ii) provision of the analytical model for blocking probability calculation in the OBS network, which includes these variables: two signaling schemes, partial wavelength conversion, two-class data, traffic intensity, cross-connect speed, number of wavelengths in WDM fiber, number of fibers in the node, number of wavelength converters, and number of nodes in the path; (iii) simulation results, which show that partial wavelength conversion provide quite satisfactory quality of service. We compare performance in a single OBS node, under various sets of parameter values. The OBS network shows great flexibility in terms of used multiclass data, and there is no dependence on the used higher layer protocol.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号