首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2138篇
  免费   133篇
  国内免费   5篇
电工技术   28篇
综合类   1篇
化学工业   469篇
金属工艺   42篇
机械仪表   75篇
建筑科学   104篇
能源动力   164篇
轻工业   384篇
水利工程   14篇
石油天然气   9篇
无线电   125篇
一般工业技术   429篇
冶金工业   71篇
原子能技术   13篇
自动化技术   348篇
  2024年   8篇
  2023年   23篇
  2022年   53篇
  2021年   94篇
  2020年   88篇
  2019年   92篇
  2018年   103篇
  2017年   91篇
  2016年   122篇
  2015年   74篇
  2014年   101篇
  2013年   195篇
  2012年   127篇
  2011年   172篇
  2010年   117篇
  2009年   151篇
  2008年   132篇
  2007年   110篇
  2006年   76篇
  2005年   61篇
  2004年   55篇
  2003年   40篇
  2002年   40篇
  2001年   12篇
  2000年   13篇
  1999年   24篇
  1998年   23篇
  1997年   11篇
  1996年   17篇
  1995年   6篇
  1994年   2篇
  1993年   2篇
  1992年   5篇
  1991年   6篇
  1990年   3篇
  1989年   2篇
  1988年   4篇
  1987年   4篇
  1986年   4篇
  1985年   2篇
  1984年   4篇
  1982年   1篇
  1981年   2篇
  1976年   1篇
  1974年   1篇
  1972年   1篇
  1970年   1篇
排序方式: 共有2276条查询结果,搜索用时 0 毫秒
21.
A general synthesis procedure is given for a versatile signal flow graph realization of a general transfer function by using current differencing buffered amplifier (CDBA). The proposed configuration uses n+1 CDBAs, n capacitors and at most 2n+4 resistors. This number of resistors can be reduced to n+1 for special cases. The circuit is eligible to obtain a variety of transfer characteristics with the same common denominator polynomial, and it is easily converted to different modes of operations. It is straightforward to find the values of the passive elements from the coefficients of the transfer function to be realized. Simulations results are obtained by using commercially available active component AD844 and CMOS technology as well. All of these make the proposed circuit attractive.  相似文献   
22.
高亮度LED的高效率电流驱动电路   总被引:5,自引:0,他引:5  
本文介绍调整高亮度LED电流的简单电路.它包括一个流行的高集成降压开关稳压器,此开关稳压器能精确地控制LED电流.MAX5035是工作在125KHz固定频率的DC/DC转换器,其宽范围的输入电压(7.5V~76V)特别适合于汽车应用.对于亮度控制,它能实现模拟(线性调光)或低频占空比调制(PWM调光).  相似文献   
23.
In this letter, a new floating inductance simulator circuit is presented. The proposed structure consists of only one grounded capacitor without any external resistors and two different active elements. The active elements are dual-output current-controlled current conveyor (DO-CCCII) and operational transconductance amplifier (OTA). The proposed inductance simulator can be tuned electronically by changing the biasing current of the DO-CCCIIs or by changing the current of the OTA. Moreover, the circuit does not require any conditions of component matching. It has a good sensitivity performance with respect to tracking errors. As an application, the proposed inductance simulator is used to construct a fourth-order resistively terminated LC band-pass filter. The theoretical analysis is verified by the SPICE simulation results.  相似文献   
24.
A discrete coil EIT system is investigated for the general case of an eccentric circular inhomogeneity. The solution methodology of the forward problem of this system is explained. An optimization procedure using this forward problem solution is developed to find optimum currents that maximize the distinguishability. For an eccentric inhomogeneity problem, it is shown that the coil currents can be optimized to focus the current density in a region of interest. Optimum coil currents under limited peak coil currents constraint and limited total power constraint are obtained. Representative examples that demonstrate the performance of the system are presented.  相似文献   
25.
BorderSense: Border patrol through advanced wireless sensor networks   总被引:1,自引:0,他引:1  
The conventional border patrol systems suffer from intensive human involvement. Recently, unmanned border patrol systems employ high-tech devices, such as unmanned aerial vehicles, unattended ground sensors, and surveillance towers equipped with camera sensors. However, any single technique encounters inextricable problems, such as high false alarm rate and line-of-sight-constraints. There lacks a coherent system that coordinates various technologies to improve the system accuracy. In this paper, the concept of BorderSense, a hybrid wireless sensor network architecture for border patrol systems, is introduced. BorderSense utilizes the most advanced sensor network technologies, including the wireless multimedia sensor networks and the wireless underground sensor networks. The framework to deploy and operate BorderSense is developed. Based on the framework, research challenges and open research issues are discussed.  相似文献   
26.
The electronic properties of metal-organic semiconductor-inorganic semiconductor structure between GaAs and poly(3,4-ethylenedioxithiophene)-block-poly(ethylene glycol) organic film have been investigated via current-voltage and capacitance-voltage methods. The Au/PEDOT/n-GaAs contact exhibits a rectification behavior with the barrier height of 0.69 eV and ideality factor value of 3.94. The barrier height of the studied diode (0.67 eV) is lower than that of Ni/n-GaAs/In (0.85 eV) and Au/n-GaAs/In Schottky diodes. The decrease in barrier height of Au/n-GaAs/In Schottky diode is likely to be due to the variation in the space charge region in the GaAs. The obtained results indicate that control of the interfacial potential barrier for metal/n-GaAs diode was achieved using thin interlayer of the poly(3,4-ethylenedioxithiophene)-block-poly(ethylene glycol).  相似文献   
27.
This paper examines Vaudenay's privacy model, which is one of the first and most complete privacy models that featured the notion of different privacy classes. We enhance this model by introducing two new generic adversary classes, k‐strong and k‐forward adversaries where the adversary is allowed to corrupt a tag at most k times. Moreover, we introduce an extended privacy definition that also covers all privacy classes of Vaudenay's model. In order to achieve highest privacy level, we study low cost primitives such as physically unclonable functions (PUFs). The common assumption of PUFs is that their physical structure is destroyed once tampered. This is an ideal assumption because the tamper resistance depends on the ability of the attacker and the quality of the PUF circuits. In this paper, we have weakened this assumption by introducing a new definition k‐resistant PUFs. k‐PUFs are tamper resistant against at most k attacks; that is, their physical structure remains still functional and correct until at most kth physical attack. Furthermore, we prove that strong privacy can be achieved without public‐key cryptography using k PUF‐based authentication. We finally prove that our extended proposal achieves both reader authentication and k‐strong privacy. Copyright © 2014 John Wiley & Sons, Ltd.  相似文献   
28.
29.
Recent advances in hardware technology have led to the development of low cost, power efficient and more feature rich devices that are amongst the most critical parts of communication networks. These devices or sensors can now sense data with more accuracy, process it by themselves and send it to the neighboring node or the sink node. However, robust and reliable security mechanisms are not yet properly implemented on these sensors due to their limited energy and computation power. Sensors also play a very important role in eHealthcare systems where ubiquitous patient monitoring is performed. As data is generated from the sensor nodes, reliable, secure and attack-resistant data acquisition and transmission is important for an efficient eHealthcare systems. This survey focuses on security issues of sensors data acquisition and transmission protocols, describing their main security features and comparing them in the context of a secure eHealthcare system. A taxonomy of open issues and future challenges is also discussed with respect to specific security metrics described in the paper.  相似文献   
30.
Wireless hotspots, ie, infrastructures composed of several IEEE 802.11 access points (APs), are today the most common solution in providing Internet access to a wide and rapidly changing population of users. According to common device implementation, stations establish associations with APs based on the measured strongest Received Signal Strength Indicator level. This usually leads to an uneven distribution of users to APs, increasing the chances of local network congestion. Load balancing (LB) solutions aim at mitigating this problem controlling the distribution of users. The LB algorithms enforce stations to associate with APs that manage a low number of users and/or that have a low traffic load. Usually, LB solutions do not consider traffic priorities or they assume some a priori quality of service (QoS) configuration for users. In this study, we propose a QoS‐LB solution based on the cell breathing technique with the goal of balancing the load in IEEE 802.11e Enhanced Distributed Channel Access (EDCA) Hotspots. The proposed algorithm explores the space of possible power/EDCA configurations by using a branch and bound approach that reduces the number of analyzed configurations and, hence, the time required to find the global optimal solution. The algorithm has been analytically defined and its performance evaluated through simulations and tests in a real test bed. The results prove that the proposed solution is effective in solving the optimal QoS‐LB configuration problem in WiFi hotspots of average size.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号