全文获取类型
收费全文 | 2138篇 |
免费 | 133篇 |
国内免费 | 5篇 |
专业分类
电工技术 | 28篇 |
综合类 | 1篇 |
化学工业 | 469篇 |
金属工艺 | 42篇 |
机械仪表 | 75篇 |
建筑科学 | 104篇 |
能源动力 | 164篇 |
轻工业 | 384篇 |
水利工程 | 14篇 |
石油天然气 | 9篇 |
无线电 | 125篇 |
一般工业技术 | 429篇 |
冶金工业 | 71篇 |
原子能技术 | 13篇 |
自动化技术 | 348篇 |
出版年
2024年 | 8篇 |
2023年 | 23篇 |
2022年 | 53篇 |
2021年 | 94篇 |
2020年 | 88篇 |
2019年 | 92篇 |
2018年 | 103篇 |
2017年 | 91篇 |
2016年 | 122篇 |
2015年 | 74篇 |
2014年 | 101篇 |
2013年 | 195篇 |
2012年 | 127篇 |
2011年 | 172篇 |
2010年 | 117篇 |
2009年 | 151篇 |
2008年 | 132篇 |
2007年 | 110篇 |
2006年 | 76篇 |
2005年 | 61篇 |
2004年 | 55篇 |
2003年 | 40篇 |
2002年 | 40篇 |
2001年 | 12篇 |
2000年 | 13篇 |
1999年 | 24篇 |
1998年 | 23篇 |
1997年 | 11篇 |
1996年 | 17篇 |
1995年 | 6篇 |
1994年 | 2篇 |
1993年 | 2篇 |
1992年 | 5篇 |
1991年 | 6篇 |
1990年 | 3篇 |
1989年 | 2篇 |
1988年 | 4篇 |
1987年 | 4篇 |
1986年 | 4篇 |
1985年 | 2篇 |
1984年 | 4篇 |
1982年 | 1篇 |
1981年 | 2篇 |
1976年 | 1篇 |
1974年 | 1篇 |
1972年 | 1篇 |
1970年 | 1篇 |
排序方式: 共有2276条查询结果,搜索用时 0 毫秒
21.
A general synthesis procedure is given for a versatile signal flow graph realization of a general transfer function by using current differencing buffered amplifier (CDBA). The proposed configuration uses n+1 CDBAs, n capacitors and at most 2n+4 resistors. This number of resistors can be reduced to n+1 for special cases. The circuit is eligible to obtain a variety of transfer characteristics with the same common denominator polynomial, and it is easily converted to different modes of operations. It is straightforward to find the values of the passive elements from the coefficients of the transfer function to be realized. Simulations results are obtained by using commercially available active component AD844 and CMOS technology as well. All of these make the proposed circuit attractive. 相似文献
22.
高亮度LED的高效率电流驱动电路 总被引:5,自引:0,他引:5
Mehmet Nalbant 《电子产品世界》2005,(9):101-103
本文介绍调整高亮度LED电流的简单电路.它包括一个流行的高集成降压开关稳压器,此开关稳压器能精确地控制LED电流.MAX5035是工作在125KHz固定频率的DC/DC转换器,其宽范围的输入电压(7.5V~76V)特别适合于汽车应用.对于亮度控制,它能实现模拟(线性调光)或低频占空比调制(PWM调光). 相似文献
23.
Mehmet Sagbas Umut E. Ayten Herman Sedef Muhammed Koksal 《AEUE-International Journal of Electronics and Communications》2009,63(5):423-427
In this letter, a new floating inductance simulator circuit is presented. The proposed structure consists of only one grounded capacitor without any external resistors and two different active elements. The active elements are dual-output current-controlled current conveyor (DO-CCCII) and operational transconductance amplifier (OTA). The proposed inductance simulator can be tuned electronically by changing the biasing current of the DO-CCCIIs or by changing the current of the OTA. Moreover, the circuit does not require any conditions of component matching. It has a good sensitivity performance with respect to tracking errors. As an application, the proposed inductance simulator is used to construct a fourth-order resistively terminated LC band-pass filter. The theoretical analysis is verified by the SPICE simulation results. 相似文献
24.
A discrete coil EIT system is investigated for the general case of an eccentric circular inhomogeneity. The solution methodology of the forward problem of this system is explained. An optimization procedure using this forward problem solution is developed to find optimum currents that maximize the distinguishability. For an eccentric inhomogeneity problem, it is shown that the coil currents can be optimized to focus the current density in a region of interest. Optimum coil currents under limited peak coil currents constraint and limited total power constraint are obtained. Representative examples that demonstrate the performance of the system are presented. 相似文献
25.
Zhi Sun Pu Wang Mehmet C. Vuran Mznah A. Al-Rodhaan Abdullah M. Al-Dhelaan Ian F. Akyildiz 《Ad hoc Networks》2011,9(3):468-477
The conventional border patrol systems suffer from intensive human involvement. Recently, unmanned border patrol systems employ high-tech devices, such as unmanned aerial vehicles, unattended ground sensors, and surveillance towers equipped with camera sensors. However, any single technique encounters inextricable problems, such as high false alarm rate and line-of-sight-constraints. There lacks a coherent system that coordinates various technologies to improve the system accuracy. In this paper, the concept of BorderSense, a hybrid wireless sensor network architecture for border patrol systems, is introduced. BorderSense utilizes the most advanced sensor network technologies, including the wireless multimedia sensor networks and the wireless underground sensor networks. The framework to deploy and operate BorderSense is developed. Based on the framework, research challenges and open research issues are discussed. 相似文献
26.
Mehmet Enver Ayd?nMurat Soylu Fahrettin Yakuphanoglu W.A. Farooq 《Microelectronic Engineering》2011,88(6):867-871
The electronic properties of metal-organic semiconductor-inorganic semiconductor structure between GaAs and poly(3,4-ethylenedioxithiophene)-block-poly(ethylene glycol) organic film have been investigated via current-voltage and capacitance-voltage methods. The Au/PEDOT/n-GaAs contact exhibits a rectification behavior with the barrier height of 0.69 eV and ideality factor value of 3.94. The barrier height of the studied diode (0.67 eV) is lower than that of Ni/n-GaAs/In (0.85 eV) and Au/n-GaAs/In Schottky diodes. The decrease in barrier height of Au/n-GaAs/In Schottky diode is likely to be due to the variation in the space charge region in the GaAs. The obtained results indicate that control of the interfacial potential barrier for metal/n-GaAs diode was achieved using thin interlayer of the poly(3,4-ethylenedioxithiophene)-block-poly(ethylene glycol). 相似文献
27.
Süleyman Karda Serkan elik Muhammed Ali Bingl Mehmet Sabir Kiraz Hüseyin Demirci Albert Levi 《Wireless Communications and Mobile Computing》2015,15(18):2150-2166
This paper examines Vaudenay's privacy model, which is one of the first and most complete privacy models that featured the notion of different privacy classes. We enhance this model by introducing two new generic adversary classes, k‐strong and k‐forward adversaries where the adversary is allowed to corrupt a tag at most k times. Moreover, we introduce an extended privacy definition that also covers all privacy classes of Vaudenay's model. In order to achieve highest privacy level, we study low cost primitives such as physically unclonable functions (PUFs). The common assumption of PUFs is that their physical structure is destroyed once tampered. This is an ideal assumption because the tamper resistance depends on the ability of the attacker and the quality of the PUF circuits. In this paper, we have weakened this assumption by introducing a new definition k‐resistant PUFs. k‐PUFs are tamper resistant against at most k attacks; that is, their physical structure remains still functional and correct until at most kth physical attack. Furthermore, we prove that strong privacy can be achieved without public‐key cryptography using k PUF‐based authentication. We finally prove that our extended proposal achieves both reader authentication and k‐strong privacy. Copyright © 2014 John Wiley & Sons, Ltd. 相似文献
28.
29.
Muhammad Yaseen Kashif Saleem Mehmet A. Orgun Abdelouahid Derhab Haider Abbas Jalal Al-Muhtadi Waseem Iqbal Imran Rashid 《Telematics and Informatics》2018,35(4):702-726
Recent advances in hardware technology have led to the development of low cost, power efficient and more feature rich devices that are amongst the most critical parts of communication networks. These devices or sensors can now sense data with more accuracy, process it by themselves and send it to the neighboring node or the sink node. However, robust and reliable security mechanisms are not yet properly implemented on these sensors due to their limited energy and computation power. Sensors also play a very important role in eHealthcare systems where ubiquitous patient monitoring is performed. As data is generated from the sensor nodes, reliable, secure and attack-resistant data acquisition and transmission is important for an efficient eHealthcare systems. This survey focuses on security issues of sensors data acquisition and transmission protocols, describing their main security features and comparing them in the context of a secure eHealthcare system. A taxonomy of open issues and future challenges is also discussed with respect to specific security metrics described in the paper. 相似文献
30.
Mehmet Ali Erturk Luca Vollero Muhammed Ali Aydin 《International Journal of Communication Systems》2018,31(2)
Wireless hotspots, ie, infrastructures composed of several IEEE 802.11 access points (APs), are today the most common solution in providing Internet access to a wide and rapidly changing population of users. According to common device implementation, stations establish associations with APs based on the measured strongest Received Signal Strength Indicator level. This usually leads to an uneven distribution of users to APs, increasing the chances of local network congestion. Load balancing (LB) solutions aim at mitigating this problem controlling the distribution of users. The LB algorithms enforce stations to associate with APs that manage a low number of users and/or that have a low traffic load. Usually, LB solutions do not consider traffic priorities or they assume some a priori quality of service (QoS) configuration for users. In this study, we propose a QoS‐LB solution based on the cell breathing technique with the goal of balancing the load in IEEE 802.11e Enhanced Distributed Channel Access (EDCA) Hotspots. The proposed algorithm explores the space of possible power/EDCA configurations by using a branch and bound approach that reduces the number of analyzed configurations and, hence, the time required to find the global optimal solution. The algorithm has been analytically defined and its performance evaluated through simulations and tests in a real test bed. The results prove that the proposed solution is effective in solving the optimal QoS‐LB configuration problem in WiFi hotspots of average size. 相似文献