首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   83540篇
  免费   948篇
  国内免费   406篇
电工技术   770篇
综合类   2316篇
化学工业   11366篇
金属工艺   4779篇
机械仪表   3014篇
建筑科学   2152篇
矿业工程   562篇
能源动力   1099篇
轻工业   3572篇
水利工程   1267篇
石油天然气   341篇
无线电   9224篇
一般工业技术   16253篇
冶金工业   2628篇
原子能技术   253篇
自动化技术   25298篇
  2019年   5篇
  2018年   14448篇
  2017年   13376篇
  2016年   9958篇
  2015年   597篇
  2014年   223篇
  2013年   181篇
  2012年   3127篇
  2011年   9388篇
  2010年   8270篇
  2009年   5531篇
  2008年   6760篇
  2007年   7766篇
  2006年   109篇
  2005年   1203篇
  2004年   1121篇
  2003年   1165篇
  2002年   531篇
  2001年   93篇
  2000年   176篇
  1999年   55篇
  1998年   52篇
  1997年   28篇
  1996年   45篇
  1995年   8篇
  1994年   12篇
  1993年   9篇
  1992年   11篇
  1991年   23篇
  1988年   10篇
  1969年   25篇
  1968年   43篇
  1967年   33篇
  1966年   42篇
  1965年   44篇
  1964年   11篇
  1963年   28篇
  1962年   22篇
  1961年   18篇
  1960年   30篇
  1959年   35篇
  1958年   37篇
  1957年   36篇
  1956年   34篇
  1955年   63篇
  1954年   68篇
  1953年   5篇
  1952年   6篇
  1950年   6篇
  1949年   6篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
981.
In realization of recursive digital filters with fixed point arithmetic, an error caused by roundoff arises. It is known that the level of the roundoff noise of an IIR filter tends to be high when the poles are close to the unit circle. Error feedback (EF) is an effective method to reduce the roundoff noise. It is desirable to design an EF network using as few parameters as possible in order to keep computational costs low. In this paper, we propose a method for designing a 2D EF network with identical coefficient sets. That is, the EF coefficients are divided into several subsets such that all the elements within each set have the same absolute value. In order to optimize the coefficient sets, we propose an algorithm by using the genetic algorithm. In the numerical example, we demonstrate the effectiveness of the proposed method.  相似文献   
982.
This paper presents a middleware platform for managing devices that operate in heterogeneous environments. The proposed management framework supports terminal-controlled, preference-based access network selection. Two separate problems are identified in this domain: one involving the computation of optimal allocations of services to access networks and quality levels (service configuration), and one concerning the dynamic inference of the user’s preferences, according to the usage context (user profiling). This paper includes an approach to the definition, mathematical formulation and solution of both these problems. Indicative results of the proposed solution methods are presented in the context of a real-life scenario simulating a day in the life of an ordinary user.  相似文献   
983.
In this paper we propose two iterative algorithms of joint channel estimation and symbol detection for Orthogonal Frequency Division Multiplexing (OFDM) systems. In which, superimposed pilot scheme is adopted and an initial Channel State Information (CSI) is obtained by employing a first-order statistic. In each subsequent iteration, we propose two algorithms to update the CSI. The Mean Square Error (MSE) of channel estimation and Bit Error Rate (BER) performance are given and simulation results demonstrate that the iterative algorithm using method B has good performance approaching the ideal condition.  相似文献   
984.
In this study, a photonic crystal ring resonator with a triangular lattice is used to design an optical filter. The proposed structure is able to filter the central wavelength of 1548 nm with a transmission coefficient of over 95%. Moreover, this structure has an ultra-high-quality factor (Q) of about 1290. With altering the features of the structure including the refractive index, the lattice constant and the radius of the rods in the resonator core, their effects on the central wavelength of the filter, transmission coefficient, quality factor and bandwidth are investigated. The plane wave expansion and finite-difference time-domain methods are used to extract photonic band gap and investigate the photonic behavior of the proposed structure, respectively.  相似文献   
985.
Electroporation (electropermeabilization) increases the electrical conductivity of biological cell membranes and lowers transport barriers for normally impermeant materials. Molecular simulations suggest that electroporation begins with the reorganization of water and lipid head group dipoles in the phospholipid bilayer interface, driven by an externally applied electric field, and the evolution of the resulting defects into water-filled, lipid pores. The interior of the electroporated membrane thus contains water, which should provide a signature for detection of the electropermeabilized state. In this feasibility study, we use THz time-domain spectroscopy, a powerful tool for investigating biomolecular systems and their interactions with water, to detect electroporation in human cells subjected to permeabilizing pulsed electric fields (PEFs). The time-domain response of electroporated human monocytes was acquired with a commercial THz, time-domain spectrometer. For each sample, frequency spectra were calculated, and the absorption coefficient and refractive index were extracted in the frequency range between 0.2 and 1.5 THz. This analysis reveals a higher absorption of THz radiation by PEF-exposed cells, with respect to sham-exposed ones, consistent with the intrusion of water into the cell through the permeabilized membrane that is presumed to be associated with electroporation.  相似文献   
986.
In mobile Ad Hoc network, nodes move freely, this can lead to frequent changes of network topology. Routing protocol algorithm is the strategy to establish communication links for network nodes, and its performance influences the availability of Ad Hoc network directly. By using wireless channel to transmit data in Ad Hoc network, the invaded malicious nodes will cause various attacks, aim to steal the transmission data or destroy the network. Based on the traditional proactive routing protocol for Ad Hoc network, an improved safe routing strategy SDSDV is put forward to resist attacks against routing protocols. The safe proactive routing protocol includes route request and route response two stages. When the network initialization is complete, after successful identity authentication by each other, secure communication paths are established between nodes and the encrypted data will be transmission through the path. The protocol integrates distributed authentication, encryption algorithm, hash check, and other security policy together. SDSDV protocol reduces the risk of malicious manipulation of routing information and ensures the safe and reliable routing between the source and destination nodes.  相似文献   
987.
Harmonic cancellation strategies have been recently presented as a promising solution for the efficient on-chip implementation of accurate sinusoidal signal generators. Classical harmonic cancellation techniques consist in combining a set of time-shifted and scaled versions of a periodical signal in such a way that some of the harmonic components of the resulting signal are cancelled. This signal manipulation strategy can be easily implemented using digital resources to provide a set of phase-shifted digital square-wave signals and a summing network for scaling and combining the phase-shifted square-waves. A critical aspect in the practical implementation of the harmonic cancellation technique is the stringent accuracy required for the scaling weight ratios between the different phase-shifted signals. Small variations between these weights due to mismatch and process variations will reduce the effectiveness of the technique and increase the magnitude of undesired harmonic components. In this work, different harmonic cancellation strategies are presented and analyzed with the goal of simplifying the practical on-chip implementation of the scaling weights. Statistical behavioral simulations are provided in order to demonstrate the feasibility of the proposed approach.  相似文献   
988.
989.
Error correction code (ECC) and built-in self-repair (BISR) techniques have been widely used for improving the yield and reliability of embedded memories. The targets of these two schemes are transient faults and hard faults, respectively. Recently, ECC is also considered as a promising solution for correcting hard error to further enhance the fabrication yield of memories. However, if the number of faulty bits within a codeword is greater than the protection capability of the adopted ECC scheme, the protection will become void. In order to cure this drawback, efficient logical to physical address remapping techniques are proposed in this paper. The goal is to reconstruct the constituent cells of codewords such that faulty cells can be evenly distributed into different codewords. A heuristic algorithm suitable for built-in implementation is presented for address remapping analysis. The corresponding built-in remapping analysis circuit is then derived. It can be easily integrated into the conventional built-in self-repair (BISR) module. A simulator is developed to evaluate the hardware overhead and repair rate. According to experimental results, the repair rate can be improved significantly with negligible hardware overhead.  相似文献   
990.
Time-frequency distributions (TFDs) allow direction of arrival (DOA) estimation algorithms to be used in scenarios when the total number of sources are more than the number of sensors. The performance of such time–frequency (t–f) based DOA estimation algorithms depends on the resolution of the underlying TFD as a higher resolution TFD leads to better separation of sources in the t–f domain. This paper presents a novel DOA estimation algorithm that uses the adaptive directional t–f distribution (ADTFD) for the analysis of close signal components. The ADTFD optimizes the direction of kernel at each point in the t–f domain to obtain a clear t–f representation, which is then exploited for DOA estimation. Moreover, the proposed methodology can also be applied for DOA estimation of sparse signals. Experimental results indicate that the proposed DOA algorithm based on the ADTFD outperforms other fixed and adaptive kernel based DOA algorithms.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号