首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   14269篇
  免费   355篇
  国内免费   43篇
电工技术   208篇
综合类   19篇
化学工业   2261篇
金属工艺   293篇
机械仪表   338篇
建筑科学   527篇
矿业工程   28篇
能源动力   297篇
轻工业   1744篇
水利工程   118篇
石油天然气   39篇
无线电   1593篇
一般工业技术   2038篇
冶金工业   3204篇
原子能技术   174篇
自动化技术   1786篇
  2023年   72篇
  2022年   167篇
  2021年   296篇
  2020年   171篇
  2019年   217篇
  2018年   267篇
  2017年   258篇
  2016年   336篇
  2015年   185篇
  2014年   328篇
  2013年   685篇
  2012年   523篇
  2011年   652篇
  2010年   514篇
  2009年   499篇
  2008年   550篇
  2007年   544篇
  2006年   427篇
  2005年   436篇
  2004年   335篇
  2003年   334篇
  2002年   304篇
  2001年   315篇
  2000年   288篇
  1999年   332篇
  1998年   1040篇
  1997年   645篇
  1996年   484篇
  1995年   361篇
  1994年   290篇
  1993年   299篇
  1992年   165篇
  1991年   148篇
  1990年   158篇
  1989年   151篇
  1988年   141篇
  1987年   110篇
  1986年   122篇
  1985年   159篇
  1984年   113篇
  1983年   100篇
  1982年   76篇
  1981年   102篇
  1980年   100篇
  1979年   94篇
  1978年   49篇
  1977年   115篇
  1976年   162篇
  1975年   58篇
  1973年   64篇
排序方式: 共有10000条查询结果,搜索用时 11 毫秒
121.
122.
Recently, content‐centric networking (CCN) has become one of the important technologies for enabling the future networks. Along with its recognized potentialities as a content retrieval and dissemination solution, CCN has been also recently considered as a promising architecture for the Internet of things (IoT), because of 2 main features such as named‐based routing and in‐network caching. However, IoT is characterized by challenging features: small storage capacity of resource‐constrained devices due to cost and limitation of energy and especially transient data that impose stringent requirements on the information freshness. As a consequence, the intrinsic caching mechanisms existing in CCN approach do not well suit IoT domains; hence, providing a specific caching policy at intermediate nodes is a very challenging task. This paper proposes an effective multiattribute in‐network caching decision algorithm that performs a caching strategy in CCN‐IoT network by considering a set of crucial attributes including the content store size, hop count, particularly key temporal properties like data freshness, and the node energy level. Simulation results proved that our proposed approach outperforms 2 cache management schemes (probabilistic least recently used and AlwaysCache–first in first out in terms of improving total hit rate, reducing data retrieval delay, and enhancing content reusability in IoT environment).  相似文献   
123.
Wireless Personal Communications - In the formulating of power control for wireless networks, the radio channel is commonly formulated using static models of optimization or game theory. In these...  相似文献   
124.
In this paper, we analyze the tradeoff between outage probability (OP) and intercept probability (IP) for a multi‐hop relaying scheme in cognitive radio (CR) networks. In the proposed protocol, a multi‐antenna primary transmitter (PT) communicates with a multi‐antenna primary receiver (PR), using transmit antenna selection (TAS) / selection combining (SC) technique, while a secondary source attempts to transmit its data to a secondary destination via a multi‐hop approach in presence of a secondary eavesdropper. The secondary transmitters such as source and relays have to adjust their transmit power to satisfy total interference constraint given by PR. We consider an asymmetric fading channel model, where the secondary channels are Rician fading, while the remaining ones experience the Rayleigh fading. Moreover, an optimal interference allocation method is proposed to minimize OP of the primary network. For the secondary network, we derive exact expressions of end‐to‐end OP and IP which are verified by Monte Carlo simulations.  相似文献   
125.
Neurally adjusted ventilatory assist (NAVA) delivers airway pressure (P(aw)) in proportion to the electrical activity of the diaphragm (EAdi) using an adjustable proportionality constant (NAVA level, cm·H(2)O/μV). During systematic increases in the NAVA level, feedback-controlled down-regulation of the EAdi results in a characteristic two-phased response in P(aw) and tidal volume (Vt). The transition from the 1st to the 2nd response phase allows identification of adequate unloading of the respiratory muscles with NAVA (NAVA(AL)). We aimed to develop and validate a mathematical algorithm to identify NAVA(AL). P(aw), Vt, and EAdi were recorded while systematically increasing the NAVA level in 19 adult patients. In a multistep approach, inspiratory P(aw) peaks were first identified by dividing the EAdi into inspiratory portions using Gaussian mixture modeling. Two polynomials were then fitted onto the curves of both P(aw) peaks and Vt. The beginning of the P(aw) and Vt plateaus, and thus NAVA(AL), was identified at the minimum of squared polynomial derivative and polynomial fitting errors. A graphical user interface was developed in the Matlab computing environment. Median NAVA(AL) visually estimated by 18 independent physicians was 2.7 (range 0.4 to 5.8) cm·H(2)O/μV and identified by our model was 2.6 (range 0.6 to 5.0) cm·H(2)O/μV. NAVA(AL) identified by our model was below the range of visually estimated NAVA(AL) in two instances and was above in one instance. We conclude that our model identifies NAVA(AL) in most instances with acceptable accuracy for application in clinical routine and research.  相似文献   
126.
In this work, charge trapping in SiO2/Al2O3 dielectric stacks is characterized by means of pulsed capacitance–voltage measurements. The proposed technique strongly reduces the measurement time and, as a consequence, the impact of charge trapping on the measurement results. Flat band voltage shift and fast current transient during short stress pulses are systematically monitored and the centroid and the amount of the trapped charge are extracted using a first-order model.  相似文献   
127.
We provide teletraffic models for loss probability evaluation of optical burst switching (OBS). We show that the popular Engset formula is not exact for OBS modeling and demonstrate that in certain cases it is not appropriate. A new exact model is provided. The various models are compared using numerical results for various OBS alternatives with and without burst segmentation.  相似文献   
128.
We propose a trellis-coded modulation system using continuous-phase frequency-shift keying (CPFSK) and ring convolutional codes for transmitting the bits generated by an embedded zerotree wavelet encoder. Improved performance is achieved by using maximum a posteriori decoding of the zerotree symbols, and ring convolutional trellis codes are determined for this decoding method. The CPFSK transmitter is decomposed into a memoryless modulator and a continuous phase encoder over the ring of integers modulo 4; the latter is combined with a polynomial convolutional encoder over the same ring. In the code design process, a search is made of the combined trellis, where the branch metrics are modified to include the source transition matrix. Simulation results of image transmission are provided using the optimized system, including mismatched channel cases.  相似文献   
129.
Very high-order microring resonator filters for WDM applications   总被引:6,自引:0,他引:6  
High-order microring resonators having from 1 to 11 coupled cavities are demonstrated. These filters exhibit low loss, flat tops, and out-of-band rejection ratios that can exceed 80 dB. They achieve performance that is suitable for commercial applications.  相似文献   
130.
The Internet is a set of interconnected domains in which different QoS technologies can be deployed. The dynamic provision of end-to-end QoS over heterogeneousip networks assumes the negotiation of mutually acceptablesla. This paper presents the concept of intra-, inter- and multiple-domain service level negotiation using thecops-sls protocol. The negotiation process gives different parties in the negotiation the ability to agree upon the service level that a data stream can obtain, along with the permissible pricing of the service.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号