首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6207篇
  免费   310篇
  国内免费   59篇
电工技术   88篇
综合类   14篇
化学工业   1292篇
金属工艺   146篇
机械仪表   185篇
建筑科学   129篇
矿业工程   29篇
能源动力   326篇
轻工业   557篇
水利工程   64篇
石油天然气   48篇
无线电   730篇
一般工业技术   1390篇
冶金工业   577篇
原子能技术   69篇
自动化技术   932篇
  2024年   30篇
  2023年   133篇
  2022年   324篇
  2021年   491篇
  2020年   306篇
  2019年   342篇
  2018年   361篇
  2017年   314篇
  2016年   289篇
  2015年   202篇
  2014年   253篇
  2013年   484篇
  2012年   283篇
  2011年   332篇
  2010年   219篇
  2009年   174篇
  2008年   161篇
  2007年   158篇
  2006年   125篇
  2005年   90篇
  2004年   69篇
  2003年   86篇
  2002年   66篇
  2001年   55篇
  2000年   52篇
  1999年   67篇
  1998年   163篇
  1997年   139篇
  1996年   110篇
  1995年   77篇
  1994年   67篇
  1993年   65篇
  1992年   38篇
  1991年   43篇
  1990年   36篇
  1989年   31篇
  1988年   25篇
  1987年   29篇
  1986年   36篇
  1985年   34篇
  1984年   27篇
  1983年   29篇
  1982年   13篇
  1981年   13篇
  1980年   11篇
  1979年   9篇
  1978年   16篇
  1977年   19篇
  1976年   23篇
  1972年   8篇
排序方式: 共有6576条查询结果,搜索用时 0 毫秒
51.
Wireless Personal Communications - This paper presents a Multilayer Partially Homomorphic Encryption Text Steganography, an invisible approach for covert communication. Existing text-based schemes...  相似文献   
52.
移动代理技术已经成为设计、实现分布式应用的一种极具前景的技术,现有许多移动代理系统已经在研究及商业领域得以实现.但是移动代理系统至今仍然没有得到很广泛的应用,其原因除了使用移动代理系统所涉及的安全性问题之外,另一个主要因素就是缺少一个对移动代理系统性能进行量化评价的基准.本文对于现有的能够对各种不同移动代理系统进行量化评测的基准进行综述,并且讨论哪些因素会对移动代理架构性能产生根本的影响.  相似文献   
53.
Low-loss high power RF switching using multifinger AlGaN/GaN MOSHFETs   总被引:1,自引:0,他引:1  
We demonstrate a novel RF switch based on a multifinger AlGaN/GaN MOSHFET. Record high saturation current and breakdown voltage, extremely low gate leakage current and low gate capacitance of the III-N MOSHFETs make them excellent active elements for RF switching. Using a single element test circuit with 1-mm wide multifinger MOSHFET we achieved 0.27 dB insertion loss and more than 40 dB isolation. These parameters can be further improved by impedance matching and by using submicron gate devices. The maximum switching power extrapolated from the results for 1A/mm 100 /spl mu/m wide device exceeds 40 W for a 1-mm wide 2-A/mm MOSHFET.  相似文献   
54.
The union of residual vector quantization (RVQ) and trellis-coded vector quantization (TCVQ) was considered by various authors where the emphasis was on the sequential design. We consider a new jointly optimized combination of RVQ and TCVQ with advantages in all categories. Necessary conditions for optimality of the jointly optimized trellis-coded residual vector quantizers (TCRVQ) are derived. A constrained direct sum tree structure is introduced that facilitates RVQ codebook partitioning. Simulation results for jointly optimized TCRVQ are presented for memoryless Gaussian, Laplacian, and uniform sources. The rate-distortion performance is shown to be better than RVQ and sequentially designed TCRVQ  相似文献   
55.

SDN enables a new networking paradigm probable to improve system efficiency where complex networks are easily managed and controlled. SDN allows network virtualization and advance programmability for customizing the behaviour of networking devices with user defined features even at run time. SDN separates network control and data planes. Intelligently controlled network management and operation, such that routing is eliminated from forwarding elements (switches) while shifting the routing logic in a centralized module named SDN Controller. Mininet is Linux based network emulator which is cost effective for implementing SDN having in built support of OpenFlow switches. This paper presents practical implementation of Mininet with ns-3 using Wi-Fi. Previous results reported in literature were limited upto 512 nodes in Mininet. Tests are conducted in Mininet by varying number of nodes in two distinct scenarios based on scalability and resource capabilities of the host system. We presented a low cost and reliable method allowing scalability with authenticity of results in real time environment. Simulation results show a marked improvement in time required for creating a topology designed for 3 nodes with powerful resources i.e. only 0.077 sec and 4.512 sec with limited resources, however with 2047 nodes required time is 1623.547 sec for powerful resources and 4615.115 sec with less capable resources respectively.

  相似文献   
56.

The Internet of Things (IoT) has emerged as a modern wave of Internet technologies that promises great transformation of life in areas such as smart health, smart cities, smart homes, intelligent transport, amongst others. However, security often serves as a critical reason for the widespread adoption of any innovation. While the IoT has increased business productivity and enriched diverse areas of life over the years, the world is yet to see a methodical revolution of its humongous application and transformation given its ubiquity and highly interconnected global network structure. The main culprit for such lapses is principally attributed to security and privacy issues which have been widely discussed in research articles and reviews but remain largely unaddressed in the literature. Hence, this paper provides a state-of-the-art review of IoT security and its challenges. It overviews technical and legal solutions that are useful to private, organizational, and governmental enterprises. The study encompasses the review and security analysis of IoT’s evolution and revolution, IoT security assessments, requirements, current research challenges in security and much more. Consequently, it offers potential solutions to address the security challenges discussed and further present open research issues, research gaps, opportunities, future development, and recommendations. This overview is intended to serve as a knowledgebase that will proffer novel foresight to guide users and administrators in positioning themselves and their organizations in a manner that is consistent with their overall objectives, mission, and vision for remarkable outcomes. Likewise, interested scholars and researchers can explore topics and directions from the study in providing better solutions to the numerous problems in IoT security.

  相似文献   
57.
This paper presents the results of a preliminary study in which the effect of the initial rusting on the corrosion behavior of rebars embedded in concrete has been investigated. Concrete specimens were made with pre-rusted and rust free rebars of different compositions. Two concrete mixes, one with a sodium chloride content of 2 kg/m3 of concrete and the other without any sodium chloride were used. The reinforced concrete specimens, immersed in potable water and then transferred to 5% NaCl solution, were subjected to corrosion monitoring for a period of 10 months. The test results indicate that the initial rusting does not have an adverse effect on the corrosion resistance of rebars embedded in concrete.  相似文献   
58.
This paper describes the shear imposed interfacial segregation of release systems for the facilitated attenuation of polyurethane (PU) adhesion to metal coun-terfaces using a RI-RIM system. It is shown that the migration rate of the dispersed release additives due to a shear imposed stress in the resin fluid is much greater than that arising from Fickian diffusion, thereby removing a vital constraint from conventional practice. The novel rotary injection RIM system is presented to simulate the on-line injection and shear induced interfacial segregation in model PU/abherent systems. A wide range of recipes comprising single (liquids or solids) and multicomponent (liquid-liquid and solid-liquid) release materials were injected into the polymerizing resin mixture to provide cohesively weak and friable “particle” boundary layer assemblies at the PU/metal interface. An instrumented Blister Test was employed to evaluate the quality of the molded interfaces in terms of adhesion and the concentration distribution of the injected species in the final cured moldings was determined through high pressure liquid chromatography (HPLC). A comparison of the results on the shear modified and the compounded interfaces confirm an accentuated lateral migration of the additives to the interface resulting in an appreciable diminution in the adhesion of the system. Finally, transport models are suggested to account for the observed augmented transport.  相似文献   
59.
In this paper we propose high throughput collision free, mobility adaptive and energy efficient medium access protocol (MAC) called Collision Free Mobility Adaptive (CFMA) for wireless sensor networks. CFMA ensures that transmissions incur no collisions, and allows nodes to undergo sleep mode whenever they are not transmitting or receiving. It uses delay allocation scheme based on traffic priority at each node and avoids allocating same backoff delay for more than one node unless they are in separate clusters. It also allows nodes to determine when they can switch to sleep mode during operation. CFMA for mobile nodes provides fast association between the mobile node and the cluster coordinator. The proposed MAC performs well in both static and mobile scenarios, which shows its significance over existing MAC protocols proposed for mobile applications. The performance of CFMA is evaluated through extensive simulation, analysis and comparison with other mobility aware MAC protocols. The results show that CFMA outperforms significantly the existing CSMA/CA, Sensor Mac (S-MAC), Mobile MAC (MOB-MAC), Adaptive Mobility MAC (AM-MAC), Mobility Sensor MAC (MS-MAC), Mobility aware Delay sensitive MAC (MD-MAC) and Dynamic Sensor MAC (DS-MAC) protocols including throughput, latency and energy consumption.  相似文献   
60.
Networks of phased array radars are generally able to provide better counter stealth target detection and classification. Each radar sensor (or node) generates information which requires transmission to a central authority that is able to evaluate the information. This requires a communications network to be established to allow transmission of information to and from any node. Each radar node is limited by range and degree and relies on the formation of a multi-hop network to facilitate these transmissions.This paper presents a model whereby the radar beam itself is used in the formation of a multi-hop network. The phased array’s multi-functional nature allows rapid switching between communications and radar function. A model of how the communication system could operate is presented, and an evolutionary optimisation algorithm based upon the concept of Pareto optimality is used for the topological design of the network. Finally, a simulation environment is presented to show the simulated performance of the communication model and designed networks.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号