首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2055篇
  免费   63篇
  国内免费   10篇
电工技术   22篇
化学工业   354篇
金属工艺   57篇
机械仪表   99篇
建筑科学   55篇
矿业工程   4篇
能源动力   95篇
轻工业   100篇
水利工程   6篇
石油天然气   12篇
无线电   250篇
一般工业技术   470篇
冶金工业   270篇
原子能技术   61篇
自动化技术   273篇
  2023年   32篇
  2022年   44篇
  2021年   58篇
  2020年   49篇
  2019年   42篇
  2018年   46篇
  2017年   50篇
  2016年   50篇
  2015年   30篇
  2014年   72篇
  2013年   141篇
  2012年   86篇
  2011年   110篇
  2010年   102篇
  2009年   83篇
  2008年   86篇
  2007年   72篇
  2006年   66篇
  2005年   36篇
  2004年   39篇
  2003年   43篇
  2002年   39篇
  2001年   29篇
  2000年   33篇
  1999年   22篇
  1998年   43篇
  1997年   44篇
  1996年   34篇
  1995年   40篇
  1994年   34篇
  1993年   31篇
  1992年   28篇
  1991年   31篇
  1990年   34篇
  1989年   20篇
  1988年   23篇
  1987年   22篇
  1986年   17篇
  1985年   21篇
  1984年   27篇
  1983年   21篇
  1982年   28篇
  1981年   23篇
  1980年   15篇
  1979年   20篇
  1978年   13篇
  1977年   19篇
  1976年   31篇
  1975年   10篇
  1973年   10篇
排序方式: 共有2128条查询结果,搜索用时 15 毫秒
21.
Delay tolerant networks (DTNs) are characterized by delay and intermittent connectivity. Satisfactory network functioning in a DTN relies heavily on co-ordination among participating nodes. However, in practice, such co-ordination cannot be taken for granted due to possible misbehaviour by relay nodes. Routing in a DTN is, therefore, vulnerable to various attacks, which adversely affect network performance. Several strategies have been proposed in the literature to alleviate such vulnerabilities—they vary widely in terms of throughput, detection time, overhead etc. One key challenge is to arrive at a tradeoff between detection time and overhead. We observe that the existing table-based reactive strategies to combat Denial-of-service (DoS) attacks in DTN suffer from two major drawbacks: high overhead and slow detection. In this paper, we propose three secure, light-weight and time-efficient routing algorithms for detecting DoS attacks (Blackhole and Grey-hole attacks) in the Spray & Focus routing protocol. The proposed algorithms are based on use of a small fraction of privileged (trusted) nodes. The first strategy, called TN, outperforms the existing table-based strategy with 20–30 % lesser detection time, 20–25 % higher malicious node detection and negligible overhead. The other two strategies, CTN_MI and CTN_RF explore the novel idea that trusted nodes are able to utilize each others’ information/experience using their long range connectivity as and when available. Simulations performed using an enhanced ONE simulator reveals that investing in enabling connectivity among trusted nodes (as in CTN_RF) can have significant performance benefits.  相似文献   
22.
Analytic expressions are derived for the input admittance and the current distribution along the multiply fed and loaded insulated antenna in air which is excited across feed gaps of nonzero widths. The Wiener-Hopf type analysis for a center fed insulated antenna is combined with the axial field discontinuity (AFD) method to develop the current and admittance expression. This AFD method considers the metallic surface of the linear antenna as a series combination of longitudinal, electric-field surface functions that exist due to feeding and/or loading. The analysis, which does not employ superposition of even and odd distributions of sources and loads, yields final expressions in terms of the excitation location, its aperture electric field within the feed gaps, impedance locations, and their values. The current distribution for cases of unity dielectric constant shows an excellent agreement with data based on the moment method. The input admittances and current distributions are reported for different multiple excitations and loads and dielectric constants of the insulator  相似文献   
23.
This paper presents an automated procedure for generation of high-level topologies for continuous-time ΣΔ modulator system. A functional topology of the system is generated from the given transfer function model of the modulator. Mathematical transformation technique is applied iteratively over the initial topology to generate a functional topology which is optimized for modulator sensitivity, hardware complexity and relative power consumption. This is then implemented using behavioral models of operational transconductance amplifiers and capacitors. The generated high-level topology is ensured to work with reasonable accuracy under non-ideal conditions. The entire procedure has been implemented in Matlab/Simulink environment. Numerical results have been provided to demonstrate the procedure.  相似文献   
24.
25.
Telecommunication Systems - Internet of Things (IoT) has changed the way people live by transforming everything into smart systems. Wireless Sensor Network (WSN) forms an important part of IoT....  相似文献   
26.
The study examines the dynamics of carbon emissions baselines of electricity generation in Indian states and Chinese provinces in the backdrop of ongoing electricity sector reforms in these countries. Two Indian states—Gujarat and Andhra Pradesh, and three Chinese provinces–Guangdong, Liaoning and Hubei have been chosen for detailed analysis to bring out regional variations that are not captured in aggregate country studies. The study finds that fuel mix is the main driver behind the trends exhibited by the carbon baselines in these five cases. The cases confirm that opportunities exist in the Indian and Chinese electricity sectors to lower carbon intensity mainly in the substitution of other fuels for coal and, to a lesser extent, adoption of more efficient and advanced coal-fired generation technology. Overall, the findings suggest that the electricity sectors in India and China are becoming friendlier to the global environment. Disaggregated analysis, detailed and careful industry analysis is essential to establishing a power sector carbon emissions baseline as a reference for CDM crediting. However, considering all the difficulties associated with the baseline issue, our case studies demonstrate that there is merit in examining alternate approaches that rely on more aggregated baselines.  相似文献   
27.
Use of the singular value decomposition is suggested for problems of linear least-squares system identification rather than the usual method involving the normal equations.  相似文献   
28.
This paper presents a combined optimization/reliability technique to evaluate the reliability of large power systems. It uses Monte Carlo simulation for the individual operation/failure random performance of elements of a power network. This simulation overcomes the difficulty in constructing the many possible states for large power systems of complex topology. A simplified power-flow representation of the power network is used and a network reduction is implemented to reduce the size of the power-flow problem, such that only the effective part of the network (for a given contingency) is retained. The control parameters are optimized in order to simulate practical contingency situations in which suitable controls are invoked to preserve, as much as possible, the continuity of supply. The optimization problem is solved by linear programming in which the generator powers are manipulated as optimization variables to maximize the load power supplied and subject to the power flow equations as well as upper and lower bounds on the optimization variables. The outputs of the performance simulation and the optimization problem are subsequently used to compute the system reliability indices. The paper describes the computerized algorithm as well as numerical results for the IEEE 118-bus power system to demonstrate the applicability of the algorithm to actual systems.  相似文献   
29.
A set of physical constants for In0.53Ga0.47As as required for transport calculations is obtained by reviewing the literature. Velocities for fields up to 100 kV/cm, calculated by the Monte Carlo method using these constants, are presented for the temperatures of 95 and 300 K. The calculated values are found to be in good agreement with the available experimental results.  相似文献   
30.
Spheroidal dipole antenna systems consisting of two thin center-fed parallel prolate spheroids in various configurations (side-by-side and collinear) are considered, The resultant EM fields are represented as modal expansions in terms of spheroidal vector eigenfunctions. The translational addition theorems for spheroidal functions developed by the authors in a previous paper play the central role in the formulation of a system matrix [G] which transforms the primary. EM excitations of the fed dipoles into their scattered responses. From the knowledge of the [G] matrix, the mutual admittances of the dipole system are obtained and plotted against center-to-center separation of the dipoles for side-by-side and collinear dipole configurations. The major to minor axial ratios of 10:1 and 100:1 of the prolate spheroidal dipoles are considered for presenting various curves. However, for the side-by-side configuration, due to a radius of convergence of the translational relation for outgoing wave to incoming wave transformation, the separationdof the spheroids is restricted tod > {a_{1}, a_{2}}_{max}, whosea_{1}anda_{2}are the semimajor axial lengths of the two spheroids.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号