首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   84666篇
  免费   1015篇
  国内免费   411篇
电工技术   787篇
综合类   2322篇
化学工业   11704篇
金属工艺   4810篇
机械仪表   3030篇
建筑科学   2209篇
矿业工程   563篇
能源动力   1199篇
轻工业   3681篇
水利工程   1286篇
石油天然气   353篇
无线电   9312篇
一般工业技术   16436篇
冶金工业   2669篇
原子能技术   263篇
自动化技术   25468篇
  2024年   13篇
  2023年   17篇
  2022年   58篇
  2021年   77篇
  2020年   63篇
  2019年   78篇
  2018年   14497篇
  2017年   13411篇
  2016年   10010篇
  2015年   668篇
  2014年   302篇
  2013年   326篇
  2012年   3211篇
  2011年   9463篇
  2010年   8333篇
  2009年   5591篇
  2008年   6786篇
  2007年   7794篇
  2006年   128篇
  2005年   1228篇
  2004年   1136篇
  2003年   1181篇
  2002年   541篇
  2001年   99篇
  2000年   177篇
  1999年   60篇
  1998年   58篇
  1997年   31篇
  1996年   49篇
  1995年   15篇
  1994年   16篇
  1993年   15篇
  1992年   14篇
  1991年   25篇
  1969年   24篇
  1968年   43篇
  1967年   33篇
  1966年   42篇
  1965年   44篇
  1964年   11篇
  1963年   28篇
  1962年   22篇
  1961年   18篇
  1960年   31篇
  1959年   35篇
  1958年   37篇
  1957年   36篇
  1956年   34篇
  1955年   63篇
  1954年   68篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
It is challenging to design high speed Delta-Sigma modulator using sub-micron process with low supply voltage. Compared with multi-stage or multi-bit design, the single loop, single bit Delta-Sigma modulator has relaxed requirement for the building blocks under low-voltage operation, which make it possible to get high conversion rate by increasing sampling frequency. In this study, a low voltage, high speed 4th-order Delta-Sigma modulator using input feed-forward is presented. Implemented with 0.13-μm CMOS technology and 1.0-V supply voltage, the discrete-time Delta-Sigma modulator achieves 2.5-MS/s conversion rate and 82-dB dynamic range, with the sampling frequency of 160-MHz and OSR of 64.  相似文献   
992.
In this paper a low-voltage low-power threshold voltage monitor for CMOS process sensing is presented. This circuit works in weak inversion and it can be used as an elementary circuit block for on-chip compensation of the intra-die or inter-die threshold voltage variations in low-power analog and mixed-signal SoC, since it is robust to temperature and power supply voltage variations (similar to the bandgap voltage reference). The proposed threshold voltage monitor has been successfully verified in a standard 0.35-μm n-well CMOS TSMC process. Experimental results have confirmed that the circuit generates an average reference voltage of 758 mV (very close to the typical threshold voltage when extrapolated to absolute zero) for a 950 mV power supply voltage, with a variation of 39 ppm/°C for the −20 to 80°C temperature range.  相似文献   
993.
In recent years, with the development of mobile communication technologies and the increase of available wireless transmission bandwidth, deploying multimedia services in next generation mobile IPv6 networks has become an inevitable trend. RSVP (resource reservation protocol) proposed by the IETF is designed for hardwired and fixed networks and can not be used in mobile environments. This paper proposes a protocol, called Fast RSVP, to reserve resources for mobile IPv6. The protocol adopts a cross-layer design approach where two modules (RSVP module and Mobile IPv6 module) at different layers cooperate with each other. Fast RSVP divides a handover process with QoS guarantees into two stages: (1) setup of the resource reservation neighbor tunnel and (2) resource reservation on the optimized route. It can help a mobile node realize fast handover with QoS guarantees as well as avoid resource wasting by triangular routes, advanced reservations and duplicate reservations. In addition, fast RSVP reserves “guard channels” for handover sessions, thus greatly reducing the handover session forced termination rate while maintaining high performance of the network. Based on extensive performance analysis and simulations, Fast RSVP, compared with existing methods of resource reservation in mobile environments, performs better in terms of packet delay and throughput during handover, QoS recovery time after handover, resource reservation cost, handover session forced termination rate and overall session completion rate.  相似文献   
994.
Cu6Sn5 and Cu3Sn are easily formed at the interface between Sn and Cu during reflow and aging processes. Thick Cu-Sn compounds at the interface become brittle, reducing the mechanical strength of solder joints and increasing the consumption of under bump metallization (UBM). It is noted that intermetallic compound (IMC) growth and substrate consumption are affected by factors such as substrate fabrication, substrate orientation, and substrate microstructure. In this study, to determine the effects of substrate grain size on IMC growth and substrate consumption, pure Sn solder was reflowed on annealed Cu substrates with different grain sizes at 250°C for 30 s to 600 s. It was revealed that Cu substrates with smaller grain sizes exhibited reduced IMC growth. In addition, the interdiffusion coefficients of Cu6Sn5 and Cu3Sn were decreased for the Cu substrate with the smaller grain size. The influence of the Cu substrate grain size on IMC growth and substrate consumption is discussed.  相似文献   
995.
Tools for designing signal processing systems with their semantic foundation in dataflow modeling often use high-level graphical user interfaces (GUIs) or text based languages that allow specifying applications as directed graphs. Such graphical representations serve as an initial reference point for further analysis and optimizations that lead to platform-specific implementations. For large-scale applications, the underlying graphs often consist of smaller substructures that repeat multiple times. To enable more concise representation and direct analysis of such substructures in the context of high level DSP specification languages and design tools, we develop the modeling concept of topological patterns, and propose ways for supporting this concept in a high-level language. We augment the dataflow interchange format (DIF) language—a language for specifying DSP-oriented dataflow graphs—with constructs for supporting topological patterns, and we show how topological patterns can be effective in various aspects of embedded signal processing design flows using specific application examples.  相似文献   
996.
The golden code is a full-rate full-diversity space–time code for the two-input two-output channel with good performance but high decoding complexity. The overlaid Alamouti codes were recently proposed as an alternative; in exchange for a slight performance penalty, they have lower decoding complexity on quasistatic channels with QAM alphabets. However, the complexity advantage of the overlaid codes vanishes for time-varying channels. This paper proposes the asymmetric golden code, a novel full-rate and full-diversity space–time code for the two-input two-output channel that offers reduced-complexity decoding on both quasistatic and time-varying channels.  相似文献   
997.
Over the last few years, graph partitioning has been recognized as a suitable technique for optimizing cellular network structure. For example, in a recent paper, the authors proposed a classical graph partitioning algorithm to optimize the assignment of cells to Packet Control Units (PCUs) in GSM-EDGE Radio Access Network. Based on this approach, the quality of packet data services in a live environment was increased by reducing the number of cell re-selections between different PCUs. To learn more about the potential of graph partitioning in cellular networks, in this paper, a more sophisticated, yet computationally efficient, partitioning algorithm is proposed for the same problem. The new method combines multi-level refinement and adaptive multi-start techniques with algorithms to ensure the connectivity between cells under the same PCU. Performance assessment is based on an extensive set of graphs constructed with data taken from a live network. During the tests, the new method is compared with classical graph partitioning approaches. Results show that the proposed method outperforms classical approaches in terms of solution quality at the expense of a slight increase in computing time, while providing solutions that are easier to check by the network operator.  相似文献   
998.
Recently, the Dynamic Spectrum Access (DSA) techniques are proposed to solve the problem of spectrum scarcity and help to use the limited spectrum resource as effectively as possible. The current ongoing spectrum reform opens up the possibilities to exploit the DSA techniques. This paper aims to provide a critical review on the various ongoing efforts towards the use of DSA concept for the frequency management of future wireless communications systems, especially from the Cognitive Radio (CR) perspective. The CR aims for an efficient and dynamic access to the spectrum, and provides a new method of spectrum management. This paper also highlights the various challenges associated with CR in order to realize the concept of DSA.  相似文献   
999.
This paper presents a generalized relevance model for automatic image annotation through learning the correlations between images and annotation keywords. Different from previous relevance models that can only propagate keywords from the training images to the test ones, the proposed model can perform extra keyword propagation among the test images. We also give a convergence analysis of the iterative algorithm inspired by the proposed model. Moreover, to estimate the joint probability of observing an image with possible annotation keywords, we define the inter-image relations through proposing a new spatial Markov kernel based on 2D Markov models. The main advantage of our spatial Markov kernel is that the intra-image context can be exploited for automatic image annotation, which is different from the traditional bag-of-words methods. Experiments on two standard image databases demonstrate that the proposed model outperforms the state-of-the-art annotation models.  相似文献   
1000.
Bit faults induced by single-event upsets in instruction may not cause a system to experience an error. The instruction vulnerability factor (IVF) is first defined to quantify the effect of non-effective upsets on program reliability in this paper; and the mean time to failure (MTTF) model of program memory is then derived based on IVF. Further analysis of MTTF model concludes that the MTTF of program memory using error correcting code (ECC) and scrubbing is not always better than unhardened program memory. The constraints that should be met upon utilizing ECC and scrubbing in program memory are presented for the first time, to the best of authors’ knowledge. Additionally, the proposed models and conclusions are validated by Monte Carlo simulations in MATLAB. These results show that the proposed models have a good accuracy and their margin of error is less than 3 % compared with MATLAB simulation results. It should be highlighted that our conclusions may be used to contribute to selecting the optimal fault-tolerant technique to harden the program memory.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号