首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9055篇
  免费   582篇
  国内免费   45篇
电工技术   178篇
综合类   67篇
化学工业   2275篇
金属工艺   249篇
机械仪表   303篇
建筑科学   267篇
矿业工程   39篇
能源动力   390篇
轻工业   1753篇
水利工程   97篇
石油天然气   69篇
无线电   586篇
一般工业技术   1412篇
冶金工业   854篇
原子能技术   64篇
自动化技术   1079篇
  2024年   35篇
  2023年   106篇
  2022年   279篇
  2021年   453篇
  2020年   308篇
  2019年   370篇
  2018年   395篇
  2017年   410篇
  2016年   386篇
  2015年   276篇
  2014年   384篇
  2013年   691篇
  2012年   543篇
  2011年   632篇
  2010年   436篇
  2009年   474篇
  2008年   391篇
  2007年   341篇
  2006年   290篇
  2005年   194篇
  2004年   201篇
  2003年   246篇
  2002年   250篇
  2001年   194篇
  2000年   136篇
  1999年   117篇
  1998年   250篇
  1997年   187篇
  1996年   144篇
  1995年   89篇
  1994年   68篇
  1993年   72篇
  1992年   38篇
  1991年   30篇
  1990年   37篇
  1989年   21篇
  1988年   35篇
  1987年   16篇
  1986年   21篇
  1985年   17篇
  1984年   9篇
  1982年   8篇
  1981年   8篇
  1980年   8篇
  1979年   8篇
  1978年   7篇
  1977年   9篇
  1976年   26篇
  1975年   8篇
  1974年   7篇
排序方式: 共有9682条查询结果,搜索用时 0 毫秒
91.
Security is one of the major issues in MANETs. Their natural characteristics make them vulnerable to numerous severe attacks. It is widely acknowledged that cryptography provides a set of strong techniques against most vulnerabilities. Several cryptographic mechanisms for MANETs can be found in the literature. Among them, identity-based cryptographic mechanisms and key management schemes are proposed to simplify key management and to reduce the memory storage cost. This article presents the most important ID-based key management schemes, discussing their approaches, strengths, and weaknesses, and comparing their main features. It also presents the main IDbased key management application fields on MANETs. In this way it can be useful for users and researchers as a starting point on ID-based key management and its possible uses in MANETs.  相似文献   
92.
In this paper, we present the design of a fully digital binary phase shift keying demodulator for application in satellite high‐rate suppressed carrier telecommand system. The proposed system digitalizes the received signal in the intermediate frequency stage using bandpass sampling technique, and the resulting baseband signal is used to synchronization of symbol and phase and to bit detection. The design of all functional modules is presented in details. Another innovation presented in this work is the inclusion of a non‐linearity in the phase synchronizer module to permit its operation independent from the signal amplitude. Moreover, aiming the characterization and performance evaluation of the system, we do some original mathematical analyses. Finally, test results show that the demodulator complies all the project requirements, and the prototype implementation loss, in terms of bit energy to noise power density ratio, is less than 0.3 dB. Copyright © 2016 John Wiley & Sons, Ltd.  相似文献   
93.
The nonsubsampled contourlet transform: theory, design, and applications.   总被引:126,自引:0,他引:126  
In this paper, we develop the nonsubsampled contourlet transform (NSCT) and study its applications. The construction proposed in this paper is based on a nonsubsampled pyramid structure and nonsubsampled directional filter banks. The result is a flexible multiscale, multidirection, and shift-invariant image decomposition that can be efficiently implemented via the à trous algorithm. At the core of the proposed scheme is the nonseparable two-channel nonsubsampled filter bank (NSFB). We exploit the less stringent design condition of the NSFB to design filters that lead to a NSCT with better frequency selectivity and regularity when compared to the contourlet transform. We propose a design framework based on the mapping approach, that allows for a fast implementation based on a lifting or ladder structure, and only uses one-dimensional filtering in some cases. In addition, our design ensures that the corresponding frame elements are regular, symmetric, and the frame is close to a tight one. We assess the performance of the NSCT in image denoising and enhancement applications. In both applications the NSCT compares favorably to other existing methods in the literature.  相似文献   
94.
95.
The significant improvement in processing power, communication, energy consumption, and the size of computational devices has led to the emergence of the Internet of Things (IoT). IoT projects raise many challenges, such as the interoperability between IoT applications because of the high number of sensors, actuators, services, protocols, and data associated with these systems. Semantics solves this problem by using annotations that define the role of each IoT element and reduces the ambiguity of information exchanged between the devices. This work presents SWoTPAD, a semantic framework that helps in the development of IoT projects. The framework is designer oriented and provides a semantic language that is more user‐friendly than OWL‐S and WSML and allows the IoT designer to specify devices, services, environment, and requests. Following this, it makes use of these specifications and maps them for RESTful services. Additionally, it generates an automatic service composition engine that is able to combine services needed to handle complex user requests. We validated this approach with two case studies. The former concerns a residential security system and the latter, the cloud application deployment. The average time required for service discovery and automatic service composition corresponds to 72.9% of the service execution time in the case study 1 and 64.4% in the case study 2.  相似文献   
96.
There is a growing trend in developing the wireless machine-to-machine (M2M) communication for factory automation. Currently, most wireless protocols for infrastructureless mobile ad-hoc networks focus on the mobility issue and are mainly suitable for narrowband radio devices. The mechanisms for route update and discovery that work well for wireless mobile ad-hoc networks prove to be redundant and instead add to processing overheads in a static wireless factory setting. This paper presents the development and implementation of a new wireless routing protocol, Bluewave, that caters specifically to wireless communication between machines in a factory setting. Bluewave utilizes features of Bluetooth technology when performing the route setup. The merits of the proposed protocol, in terms of shorter initialization time and route setup time, are duly discussed. A case study illustrating the application of Bluewave to an online condition-based maintenance scenario is presented. Experimental results obtained are furnished to show the viability of Bluewave in industrial automation  相似文献   
97.
Germanene, a 2D honeycomb germanium crystal, is grown at graphene/Ag(111) and hexagonal boron nitride (h-BN)/Ag(111) interfaces by segregating germanium atoms. A simple annealing process in N2 or H2/Ar at ambient pressure leads to the formation of germanene, indicating that an ultrahigh-vacuum condition is not necessary. The grown germanene is stable in air and uniform over the entire area covered with a van der Waals (vdW) material. As an important finding, it is necessary to use a vdW material as a cap layer for the present germanene growth method since the use of an Al2O3 cap layer results in no germanene formation. The present study also proves that Raman spectroscopy in air is a powerful tool for characterizing germanene at the interfaces, which is concluded by multiple analyses including first-principles density functional theory calculations. The direct growth of h-BN-capped germanene on Ag(111), which is demonstrated in the present study, is considered to be a promising technique for the fabrication of future germanene-based electronic devices.  相似文献   
98.
As the microelectronics technology continuously advances to deep submicron scales, the occurrence of Multiple Cell Upset (MCU) induced by radiation in memory devices becomes more likely to happen. The implementation of a robust Error Correction Code (ECC) is a suitable solution. However, the more complex an ECC, the more delay, area usage and energy consumption. An ECC with an appropriate balance between error coverage and computational cost is essential for applications where fault tolerance is heavily needed, and the energy resources are scarce. This paper describes the conception, implementation, and evaluation of Column-Line-Code (CLC), a novel algorithm for the detection and correction of MCU in memory devices, which combines extended Hamming code and parity bits. Besides, this paper evaluates the variation of the 2D CLC schemes and proposes an additional operation to correct more MCU patterns called extended mode. We compared the implementation cost, reliability level, detection/correction rate and the mean time to failure among the CLC versions and other correction codes, proving the CLCs have high MCU correction efficacy with reduced area, power and delay costs.  相似文献   
99.
Electron scattering by a single barrier is predicted to reveal singularities as the magnetic field is changed, because the number of electron collisions with the barrier dramatically increases as chaotic orbits around the barrier are changed into periodic orbits. To test this experimentally we have measured the magnetoresistance of AlGaAs/GaAs heterostructures with a two-dimensional electron gas and a lateral lattice containing a macroscopic number of oval-shaped antidots fabricated using electron lithography. Reproducible fluctuations in the magnetoresistance are observed at low field, which are due to the oscillations of the number of electron collisions with the antidots. The number of collisions N before the electron escapes from the antidot has been calculated as a function of B in an electric field. The position of the maxima in N(B) obtained from calculations and experiment are in reasonable agreement.  相似文献   
100.
Recently there has been much effort, in both academia and industry, to integrate a plethora of wireless technologies in order to provide ubiquitous broadband access to mobile users. Handover management is still one of the most challenging issues to be solved for seamless integration of wireless networks. This article addresses the integration of IEEE 802.11 WLANs and IEEE 802.16 WMANs, focusing mainly on the handover management aspects. First, we describe architectures, futuristic application scenarios such as the envisioned heterogeneous multihop wireless networks (HMWNs) and moving networks, as well as the related research issues. Second, we present IEEE 802.21, a new emerging standard aimed at providing a framework for media-independent handover (MIH) among heterogeneous networks. Finally, we discuss how the MIH framework can help handover management for the integrated network.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号