首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2472篇
  免费   105篇
  国内免费   16篇
电工技术   38篇
综合类   25篇
化学工业   526篇
金属工艺   69篇
机械仪表   85篇
建筑科学   51篇
能源动力   153篇
轻工业   273篇
水利工程   28篇
石油天然气   24篇
无线电   251篇
一般工业技术   538篇
冶金工业   134篇
原子能技术   35篇
自动化技术   363篇
  2024年   37篇
  2023年   85篇
  2022年   131篇
  2021年   208篇
  2020年   131篇
  2019年   139篇
  2018年   159篇
  2017年   135篇
  2016年   125篇
  2015年   87篇
  2014年   115篇
  2013年   206篇
  2012年   130篇
  2011年   125篇
  2010年   86篇
  2009年   90篇
  2008年   55篇
  2007年   48篇
  2006年   47篇
  2005年   25篇
  2004年   41篇
  2003年   18篇
  2002年   33篇
  2001年   25篇
  2000年   13篇
  1999年   22篇
  1998年   43篇
  1997年   34篇
  1996年   23篇
  1995年   16篇
  1994年   16篇
  1993年   17篇
  1992年   14篇
  1991年   14篇
  1990年   4篇
  1989年   15篇
  1988年   18篇
  1987年   9篇
  1986年   9篇
  1985年   8篇
  1983年   2篇
  1982年   4篇
  1981年   5篇
  1979年   3篇
  1978年   4篇
  1977年   2篇
  1976年   2篇
  1975年   2篇
  1974年   4篇
  1973年   2篇
排序方式: 共有2593条查询结果,搜索用时 0 毫秒
21.
We investigate an automated design validation scheme for gate-level combinational and sequential circuits that borrows methods from simulation and test generation for physical faults, and verifies a circuit with respect to a modeled set of design errors. The error models used in prior research are examined and reduced to five types: gate substitution errors (GSEs), gate count errors (GCEs), input count errors (ICEs), wrong input errors (WIEs), and latch count errors (LCEs). Conditions are derived for a gate to be testable for GSEs, which lead to small, complete test sets for GSEs; near-minimal test sets are also derived for GCEs. We analyze undetectability in design errors and relate it to single stuck-line (SSL) redundancy. We show how to map all the foregoing error types into SSL faults, and describe an extensive set of experiments to evaluate the proposed method. These experiments demonstrate that high coverage of the modeled errors can be achieved with small test sets obtained with standard test generation and simulation tools for physical faults.  相似文献   
22.
Wireless Personal Communications - Matched filtering has found its way in many diverse applications such as communication, signal processing and more. The emphasis of this paper is on the design...  相似文献   
23.
Efficient utilization of network resources is a key goal for emerging broadband wireless access systems (BWAS). This is a complex goal to achieve due to the heterogeneous service nature and diverse quality of service (QoS) requirements of various applications that BWAS support. Packet scheduling is an important activity that affects BWAS QoS outcomes. This paper proposes a novel packet scheduling mechanism that improves QoS in mobile wireless networks which exploit IP as a transport technology for data transfer between BWAS base stations and mobile users at the radio transmission layer. In order to improve BWAS QoS the new packet algorithm makes changes at both the IP and the radio layers. The new packet scheduling algorithm exploits handoff priority scheduling principles and takes into account buffer occupancy and channel conditions. The packet scheduling mechanism also incorporates the concept of fairness. Performance results were obtained by computer simulation and compared to the well known algorithms. Results show that by exploiting the new packet scheduling algorithm, the transport system is able to provide a low handoff packet drop rate, low packet forwarding rate, low packet delay and ensure fairness amongst the users of different services.  相似文献   
24.
In this paper, we investigate feature extraction and feature selection methods as well as classification methods for automatic facial expression recognition (FER) system. The FER system is fully automatic and consists of the following modules: face detection, facial detection, feature extraction, selection of optimal features, and classification. Face detection is based on AdaBoost algorithm and is followed by the extraction of frame with the maximum intensity of emotion using the inter-frame mutual information criterion. The selected frames are then processed to generate characteristic features using different methods including: Gabor filters, log Gabor filter, local binary pattern (LBP) operator, higher-order local autocorrelation (HLAC) and a recent proposed method called HLAC-like features (HLACLF). The most informative features are selected based on both wrapper and filter feature selection methods. Experiments on several facial expression databases show comparisons of different methods.  相似文献   
25.
Illiteracy is a major hurdle in socio-economic development of Pakistan. Research in the Information and Communication Technology (ICT) can help in tackling this issue by developing solutions tailored for illiterate population. The work presented within this paper proposes a job search website for illiterate population of KPK province of Pakistan. The designed website does not require any human assistance while searching a job. Moreover, the website uses culturally relevant graphical and audio content. The usability of the website is tested according to the ISO-9241-11 specification. Furthermore, we have studied the effect of the participants’ characteristics, i.e., their age, computer and mobile usage experience on the usability of the website. The results show that the participants found the website usable. Specifically, they could search suitable jobs with a minimal number of clicks and in less time as compared to the usual task completion rates reported throughout the literature. None of the participants’ characteristics were found to be affecting the usability of the website. These results suggest a promising potential of ICT solutions for providing services to illiterate population of Pakistan.  相似文献   
26.
Mobile Health (mHealth) applications are readily accessible to the average user of mobile devices, and despite the potential of mHealth applications to improve the availability, affordability and effectiveness of delivering healthcare services, they handle sensitive medical data, and as such, have also the potential to carry substantial risks to the security and privacy of their users. Developers of applications are usually unknown, and users are unaware of how their data are being managed and used. This is combined with the emergence of new threats due to the deficiency in mobile applications development or the design ambiguities of the current mobile operating systems. A number of mobile operating systems are available in the market, but the Android platform has gained the topmost popularity. However, Android security model is short of completely ensuring the privacy and security of users’ data, including the data of mHealth applications. Despite the security mechanisms provided by Android such as permissions and sandboxing, mHealth applications are still plagued by serious privacy and security issues. These security issues need to be addressed in order to improve the acceptance of mHealth applications among users and the efficacy of mHealth applications in the healthcare systems. Thus, this paper presents a conceptual framework to improve the security of medical data associated with Android mHealth applications, as well as to protect the privacy of their users. Based on the literature review that suggested the need for the intended security framework, three-distinct and successive phases are presented, each of which is described in a separate section. First, discussed the design process of the first phase to develop a security framework for mHealth apps to ensure the security and privacy of sensitive medical data. The second phase is discussed who to achieve the implementation of a prototypic proof-of-concept version of the framework. Finally, the third phase ending discussed the evaluation process in terms of effectiveness and efficiency for the proposed framework.  相似文献   
27.
28.
Efficient utilization of network resources is a key goal for emerging BWAS. This is a complex goal to achieve due to the heterogeneous service nature and diverse QoS requirements of various applications that BWAS support. Packet scheduling is an important activity that affects BWAS QoS outcomes. This paper proposes a new packet scheduling mechanism that improves QoS in mobile wireless networks which exploit IP as a transport technology for data transfer between BWAS base stations and mobile users at the radio transmission layer. In order to improve BWAS QoS the new packet algorithm makes changes at both the IP and the radio layers. The new algorithm exploits handoff priority scheduling principles and takes into account buffer occupancy and channel conditions. The packet scheduling mechanism also incorporates the concept of fairness. The algorithm offers an opportunity to maximize the carriers’ revenue at various traffic situations. Simulation results were compared to well-known algorithms which demonstrated the new packet scheduling algorithm is able to provide a low handoff packet drop rate, low packet forwarding rate, low packet delay, ensure fairness amongst the users of different services and generates higher revenue. Furthermore this research proposes a new and novel measure named “Satisfaction Factor” to measure the efficacy of various scheduling schemes and finally proposes four performance metrics for NodeB’s of in Next Generation Wireless Networks.  相似文献   
29.
An octave-bandwidth microwave photonic link with a third-order limited spurious-free dynamic range of 121 dB in a 1-Hz bandwidth has been demonstrated. The link noise figure of 9 dB at a modulation frequency of 2 GHz was achieved by using a bias-shifted Mach-Zehnder modulator with an optical input power of 500 mW. This level of performance was realized without electronic or optical linearization  相似文献   
30.
This paper presents novel and highly effective junction isolation structures for power integrated circuits. The negative feedback-activated junction isolation is presented and it is proven to be very effective in blocking substrate current from reaching the logic circuitry (orders of magnitude more effective than standard junction isolation techniques). Additionally, in an attempt to further improve the blocking capabilities of junction isolations the use of multiple or combined structures is investigated whilst keeping the surface area used for isolation device in the same range as for the single structures. All isolation structures presented here are based on a 0.6-/spl mu/m CMOS technology.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号