首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   10588篇
  免费   549篇
  国内免费   43篇
电工技术   178篇
综合类   67篇
化学工业   2140篇
金属工艺   247篇
机械仪表   286篇
建筑科学   254篇
矿业工程   36篇
能源动力   378篇
轻工业   1617篇
水利工程   95篇
石油天然气   65篇
无线电   578篇
一般工业技术   1372篇
冶金工业   2748篇
原子能技术   65篇
自动化技术   1054篇
  2024年   32篇
  2023年   98篇
  2022年   249篇
  2021年   422篇
  2020年   289篇
  2019年   339篇
  2018年   375篇
  2017年   393篇
  2016年   364篇
  2015年   255篇
  2014年   363篇
  2013年   657篇
  2012年   518篇
  2011年   591篇
  2010年   410篇
  2009年   450篇
  2008年   382篇
  2007年   327篇
  2006年   285篇
  2005年   188篇
  2004年   201篇
  2003年   245篇
  2002年   248篇
  2001年   193篇
  2000年   133篇
  1999年   164篇
  1998年   826篇
  1997年   492篇
  1996年   387篇
  1995年   237篇
  1994年   171篇
  1993年   177篇
  1992年   56篇
  1991年   69篇
  1990年   70篇
  1989年   39篇
  1988年   60篇
  1987年   46篇
  1986年   48篇
  1985年   51篇
  1984年   9篇
  1982年   11篇
  1981年   15篇
  1980年   18篇
  1979年   8篇
  1978年   11篇
  1977年   36篇
  1976年   130篇
  1975年   14篇
  1974年   7篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
101.
In digital CMOS circuits, parametric yield improvement may be achieved by reducing the variability of performance and power consumption of individual cell instances. Such improvement of variation robustness can be attained by evaluating parameter variation impact at gate level. Statistical characterization of logic gates are usually obtained by computationally expensive electrical simulations. An efficient gate delay variability estimation method is proposed for variability-aware design. The proposed method has been applied to different topologies (transistor network arrangements) and CMOS gates, and it has been compared to Monte Carlo simulations for data validation, resulting in computation time savings.  相似文献   
102.
Security is one of the major issues in MANETs. Their natural characteristics make them vulnerable to numerous severe attacks. It is widely acknowledged that cryptography provides a set of strong techniques against most vulnerabilities. Several cryptographic mechanisms for MANETs can be found in the literature. Among them, identity-based cryptographic mechanisms and key management schemes are proposed to simplify key management and to reduce the memory storage cost. This article presents the most important ID-based key management schemes, discussing their approaches, strengths, and weaknesses, and comparing their main features. It also presents the main IDbased key management application fields on MANETs. In this way it can be useful for users and researchers as a starting point on ID-based key management and its possible uses in MANETs.  相似文献   
103.
In this paper, we present the design of a fully digital binary phase shift keying demodulator for application in satellite high‐rate suppressed carrier telecommand system. The proposed system digitalizes the received signal in the intermediate frequency stage using bandpass sampling technique, and the resulting baseband signal is used to synchronization of symbol and phase and to bit detection. The design of all functional modules is presented in details. Another innovation presented in this work is the inclusion of a non‐linearity in the phase synchronizer module to permit its operation independent from the signal amplitude. Moreover, aiming the characterization and performance evaluation of the system, we do some original mathematical analyses. Finally, test results show that the demodulator complies all the project requirements, and the prototype implementation loss, in terms of bit energy to noise power density ratio, is less than 0.3 dB. Copyright © 2016 John Wiley & Sons, Ltd.  相似文献   
104.
The nonsubsampled contourlet transform: theory, design, and applications.   总被引:126,自引:0,他引:126  
In this paper, we develop the nonsubsampled contourlet transform (NSCT) and study its applications. The construction proposed in this paper is based on a nonsubsampled pyramid structure and nonsubsampled directional filter banks. The result is a flexible multiscale, multidirection, and shift-invariant image decomposition that can be efficiently implemented via the à trous algorithm. At the core of the proposed scheme is the nonseparable two-channel nonsubsampled filter bank (NSFB). We exploit the less stringent design condition of the NSFB to design filters that lead to a NSCT with better frequency selectivity and regularity when compared to the contourlet transform. We propose a design framework based on the mapping approach, that allows for a fast implementation based on a lifting or ladder structure, and only uses one-dimensional filtering in some cases. In addition, our design ensures that the corresponding frame elements are regular, symmetric, and the frame is close to a tight one. We assess the performance of the NSCT in image denoising and enhancement applications. In both applications the NSCT compares favorably to other existing methods in the literature.  相似文献   
105.
106.
The significant improvement in processing power, communication, energy consumption, and the size of computational devices has led to the emergence of the Internet of Things (IoT). IoT projects raise many challenges, such as the interoperability between IoT applications because of the high number of sensors, actuators, services, protocols, and data associated with these systems. Semantics solves this problem by using annotations that define the role of each IoT element and reduces the ambiguity of information exchanged between the devices. This work presents SWoTPAD, a semantic framework that helps in the development of IoT projects. The framework is designer oriented and provides a semantic language that is more user‐friendly than OWL‐S and WSML and allows the IoT designer to specify devices, services, environment, and requests. Following this, it makes use of these specifications and maps them for RESTful services. Additionally, it generates an automatic service composition engine that is able to combine services needed to handle complex user requests. We validated this approach with two case studies. The former concerns a residential security system and the latter, the cloud application deployment. The average time required for service discovery and automatic service composition corresponds to 72.9% of the service execution time in the case study 1 and 64.4% in the case study 2.  相似文献   
107.
There is a growing trend in developing the wireless machine-to-machine (M2M) communication for factory automation. Currently, most wireless protocols for infrastructureless mobile ad-hoc networks focus on the mobility issue and are mainly suitable for narrowband radio devices. The mechanisms for route update and discovery that work well for wireless mobile ad-hoc networks prove to be redundant and instead add to processing overheads in a static wireless factory setting. This paper presents the development and implementation of a new wireless routing protocol, Bluewave, that caters specifically to wireless communication between machines in a factory setting. Bluewave utilizes features of Bluetooth technology when performing the route setup. The merits of the proposed protocol, in terms of shorter initialization time and route setup time, are duly discussed. A case study illustrating the application of Bluewave to an online condition-based maintenance scenario is presented. Experimental results obtained are furnished to show the viability of Bluewave in industrial automation  相似文献   
108.
Germanene, a 2D honeycomb germanium crystal, is grown at graphene/Ag(111) and hexagonal boron nitride (h-BN)/Ag(111) interfaces by segregating germanium atoms. A simple annealing process in N2 or H2/Ar at ambient pressure leads to the formation of germanene, indicating that an ultrahigh-vacuum condition is not necessary. The grown germanene is stable in air and uniform over the entire area covered with a van der Waals (vdW) material. As an important finding, it is necessary to use a vdW material as a cap layer for the present germanene growth method since the use of an Al2O3 cap layer results in no germanene formation. The present study also proves that Raman spectroscopy in air is a powerful tool for characterizing germanene at the interfaces, which is concluded by multiple analyses including first-principles density functional theory calculations. The direct growth of h-BN-capped germanene on Ag(111), which is demonstrated in the present study, is considered to be a promising technique for the fabrication of future germanene-based electronic devices.  相似文献   
109.
As the microelectronics technology continuously advances to deep submicron scales, the occurrence of Multiple Cell Upset (MCU) induced by radiation in memory devices becomes more likely to happen. The implementation of a robust Error Correction Code (ECC) is a suitable solution. However, the more complex an ECC, the more delay, area usage and energy consumption. An ECC with an appropriate balance between error coverage and computational cost is essential for applications where fault tolerance is heavily needed, and the energy resources are scarce. This paper describes the conception, implementation, and evaluation of Column-Line-Code (CLC), a novel algorithm for the detection and correction of MCU in memory devices, which combines extended Hamming code and parity bits. Besides, this paper evaluates the variation of the 2D CLC schemes and proposes an additional operation to correct more MCU patterns called extended mode. We compared the implementation cost, reliability level, detection/correction rate and the mean time to failure among the CLC versions and other correction codes, proving the CLCs have high MCU correction efficacy with reduced area, power and delay costs.  相似文献   
110.
Rheological properties of low-moisture part-skim Mozarella cheese were evaluated as a function of storage time, test temperature, and deformation rate by uniaxial extension in a horizontal plane. Proteolysis of Mozzarella cheese caused marked decreases in the tensile strength and the deformability modulus, but not in the fracture strain. As the temperature increased from 10 to 40C, the fracture strain increased more than five-fold. The strength and the deformability modulus decreased about 60 and 85%, respectively, as the cheese temperature increased from 10 to 30C. The fracture strain of the cheese did not exhibit a clear trend with the deformation rate in the range of 50–500 mm/min. However, its strength and deformability modulus increased with the increasing deformation rate.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号