首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2171篇
  免费   130篇
  国内免费   5篇
电工技术   28篇
综合类   1篇
化学工业   483篇
金属工艺   47篇
机械仪表   77篇
建筑科学   104篇
能源动力   166篇
轻工业   380篇
水利工程   14篇
石油天然气   9篇
无线电   128篇
一般工业技术   435篇
冶金工业   71篇
原子能技术   13篇
自动化技术   350篇
  2024年   8篇
  2023年   25篇
  2022年   53篇
  2021年   95篇
  2020年   88篇
  2019年   92篇
  2018年   103篇
  2017年   94篇
  2016年   122篇
  2015年   71篇
  2014年   103篇
  2013年   198篇
  2012年   127篇
  2011年   179篇
  2010年   119篇
  2009年   152篇
  2008年   137篇
  2007年   111篇
  2006年   76篇
  2005年   62篇
  2004年   55篇
  2003年   41篇
  2002年   40篇
  2001年   12篇
  2000年   13篇
  1999年   25篇
  1998年   24篇
  1997年   12篇
  1996年   17篇
  1995年   6篇
  1994年   2篇
  1993年   2篇
  1992年   5篇
  1991年   6篇
  1990年   3篇
  1989年   2篇
  1988年   4篇
  1987年   4篇
  1986年   4篇
  1985年   2篇
  1984年   4篇
  1982年   2篇
  1981年   1篇
  1979年   1篇
  1976年   1篇
  1974年   1篇
  1972年   1篇
  1970年   1篇
排序方式: 共有2306条查询结果,搜索用时 10 毫秒
51.
This paper examines Vaudenay's privacy model, which is one of the first and most complete privacy models that featured the notion of different privacy classes. We enhance this model by introducing two new generic adversary classes, k‐strong and k‐forward adversaries where the adversary is allowed to corrupt a tag at most k times. Moreover, we introduce an extended privacy definition that also covers all privacy classes of Vaudenay's model. In order to achieve highest privacy level, we study low cost primitives such as physically unclonable functions (PUFs). The common assumption of PUFs is that their physical structure is destroyed once tampered. This is an ideal assumption because the tamper resistance depends on the ability of the attacker and the quality of the PUF circuits. In this paper, we have weakened this assumption by introducing a new definition k‐resistant PUFs. k‐PUFs are tamper resistant against at most k attacks; that is, their physical structure remains still functional and correct until at most kth physical attack. Furthermore, we prove that strong privacy can be achieved without public‐key cryptography using k PUF‐based authentication. We finally prove that our extended proposal achieves both reader authentication and k‐strong privacy. Copyright © 2014 John Wiley & Sons, Ltd.  相似文献   
52.
A novel application on the recently emerging wireless Personal Communications Systems (PCS) is the multimedia communication. In this paper, we evaluate multimedia communications capability and quality of service characteristics of one of the PCS standards, Personal Access Communications System's (PACS) packet channel (PPC) using simulation modeling. The performance of PPC's slot aggregation and data-sense multiple access techniques are studied by considering the downlink and uplink in a single cell and combined uplink/downlink in two cells and changing various parameters such as the number of users and certain protocol parameters. Interconnection of PPC with the Internet is discussed next. Frame rates of MPEG-1 coded images transmitted in a PACS cell as IP datagrams are determined. Handover characteristics of PPC downlink are studied by changing different parameters such as the cell size, the speed of the mobile host and time between handovers. The results clearly establish that multimedia communication on PPC is only feasible at lower bandwidths and frame rates and only a few users per cell can be supported. Careful tuning of PPC protocol parameters is required. There is one parameter whose variation gives opposite results on the downlink and uplink.  相似文献   
53.
The antifungal and antiaflatoxigenic activity of anethole and eugenol which are active components of commonly used spices was studied against two strains of Aspergillus parasiticus. Anethole, up to concentration of 400 μg/ml where complete inhibition was observed, delayed growth and reduced mycelial weight but it showed a stimulative effect on the toxin production of both strains. At a concentration of 300 μg/ml, eugenol inhibited the growth of both strains; levels of eugenol below 200 μg/ml enhanced production of aflatoxin particularly by A. parasiticus NRRL 299.  相似文献   
54.
Journal of Communications Technology and Electronics - This paper implements mathematically rigorous extended trial function algorithm to address cubic–quartic optical solitons in...  相似文献   
55.
56.
57.
Journal of Signal Processing Systems - Segmentation of thigh tissues (muscle, fat, inter-muscular adipose tissue (IMAT), bone, and bone marrow) from magnetic resonance imaging (MRI) scans is useful...  相似文献   
58.
Various silicon surface cleaning processes for rapid thermal in-situ polysilicon/ oxide/silicon stacked gate structures have been evaluated. Metal-oxide-semiconductor capacitors were fabricated to assess the effects of cleaning on the quality of gate oxide structures produced by both rapid thermal oxidation (RTO) and rapid thermal chemical vapor deposition (RTCVD). Excellent electrical properties have been achieved for both RTO and RTCVD gate oxides formed on silicon wafers using either an ultraviole/zone (UV/O3) treatment or a modified RCA clean. On the contrary, poor electrical properties have been observed for RTO and RTCVD gate oxides formed on silicon wafers using a high temperature bake in Ar, H2, or high vacuum ambient. It has also been found that the electrical properties of the RTCVD gate oxides exhibit less dependence upon cleaning conditions than those of RTO gate oxides. This work demonstrates that initial surface condition prior to gate oxide formation plays an important role in determining the quality of RTO and RTCVD gate oxides.  相似文献   
59.
The objective of this study is to investigate experimentally and theoretically whether sodium carbonate (Na2CO3) salt is suitable for establishing a salinity gradient in a salt-gradient solar-pond (SGSP). For this purpose, a small-scale prismatic solar-pond was constructed. Experiments were conducted in the laboratory under the incident radiation from two halogen-lamps acting as a solar simulator. Furthermore, a one-dimensional transient mathematical model that describes the heat and mass transfer behaviour of the SGSP was developed. The differential equations obtained were solved numerically using a finite-difference method. It was found from the experiments that the density gradient, achieved using sodium carbonate salt, can suppress convection from the bottom to the surface of the pond.  相似文献   
60.
In the speech synthesis model presented in this paper, voiced speech is synthesized as the sum of sinusoidally modulated two FM sinusoids corresponding to the first and second formants. Each FM signal is generated such that its amplitude is equal to the formant amplitude, its carrier frequency to the formant frequency or its linear combination, its modulation frequency to the pitch, and its modulation index to one fifth of the carrier to modulation frequency ratio. Unvoiced speech is generated by shifting the center frequency of a low-pass noise with a bandwidth of 1 KHz, to the frequency where the energy of the unvoiced speech is concentrated. The drawbacks of this scheme are that the pitch and the formant frequencies of the FM signals may deviate up to 40% and 9%, respectively, and spurious formants may occur. A hardware implementation can be accomplished by driving a linear analog circuitry which can simply be integrated on a single chip, by a digital computer which supplies voltages at every T = 5 ms corresponding to seven parameter values. Examples of the signals and spectrograms of synthesized speech obtained by both synthesis by analysis and synthesis by rule are given along with a set of rules for text-to-speech synthesis of Turkish. It is observed that the speech synthesized by analysis loses the speaker's identity but it is highly intelligible, while understanding the speech synthesized by rules requires a training period.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号