首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6138篇
  免费   195篇
  国内免费   58篇
电工技术   105篇
综合类   51篇
化学工业   1091篇
金属工艺   193篇
机械仪表   155篇
建筑科学   120篇
矿业工程   19篇
能源动力   314篇
轻工业   289篇
水利工程   51篇
石油天然气   35篇
武器工业   2篇
无线电   685篇
一般工业技术   1177篇
冶金工业   1412篇
原子能技术   35篇
自动化技术   657篇
  2023年   72篇
  2022年   102篇
  2021年   178篇
  2020年   147篇
  2019年   129篇
  2018年   175篇
  2017年   164篇
  2016年   186篇
  2015年   129篇
  2014年   253篇
  2013年   460篇
  2012年   246篇
  2011年   325篇
  2010年   223篇
  2009年   320篇
  2008年   208篇
  2007年   166篇
  2006年   156篇
  2005年   122篇
  2004年   112篇
  2003年   111篇
  2002年   94篇
  2001年   77篇
  2000年   70篇
  1999年   87篇
  1998年   342篇
  1997年   226篇
  1996年   201篇
  1995年   140篇
  1994年   117篇
  1993年   123篇
  1992年   70篇
  1991年   76篇
  1990年   82篇
  1989年   62篇
  1988年   53篇
  1987年   54篇
  1986年   43篇
  1985年   52篇
  1984年   32篇
  1983年   27篇
  1982年   28篇
  1981年   38篇
  1980年   26篇
  1979年   30篇
  1978年   36篇
  1977年   51篇
  1976年   74篇
  1975年   19篇
  1973年   13篇
排序方式: 共有6391条查询结果,搜索用时 15 毫秒
61.
A method of scanning a one-dimensional shaped pattern generated by a circular aperture is presented. It is shown that the desired beam shape can be retained in the desired scan plane by superposing on the nonlinear phase distribution applied along and parallel to the meridian plane, a linear phase progression along the perpendicular direction. Analysis carried out using the stationary phase method of evaluating the integral reveals that the gradient of the linear phase progression is a function of position along the meridian plane of the aperture. Expressions for the phase functions are derived. Computed results on the phase distribution and the radiation pattern are presented.  相似文献   
62.
Sensory data gathered from sensor nodes in physical proximity tend to exhibit strong correlation. To minimize such redundancy and hence curtail the load in wireless sensor networks with a goal to conserve energy, effective in-network fusion schemes have been extensively proposed in the literature. To this end, routing schemes supporting data fusion are extremely important as they dictate where and when sensory data streams shall intersect with each other and thus fusion will be performed. In this article we briefly articulate this problem and classify recently proposed routing schemes supporting data fusion in wireless sensor networks into three categories: routing-driven, coding-driven, and fusion-driven. We also give an overview of various algorithms in each category by summarizing their design approaches, benefits, and drawbacks.  相似文献   
63.
A realistic model of a front-illuminated n+-p-p+ silicon solar cell is developed by solving the current continuity equations for minority carriers in the quasi-neutral regions in steady state, assuming the light in the cell is trapped as a result of multiple reflections at the front and the back of the cell. This model is used to study the effects of the front emitter thickness and doping level and the light trapping on the J-V characteristic and thereby on the open-circuit voltage, short-circuit current density, curve factor, and the efficiency of the cell. A textured cell with an emitter thickness in the range of 0.3-1.0 μm with its doping ≈5×1018 cm-3 and the recombination velocities of minority carriers as large as 200 cm/s at the n+ front surface and 10 cm/s at the back of the p base can exhibit an efficiency in excess of 26% (under AM 1.5 sunlight of 100 mW/cm2 intensity) at 25°C if the light reflection losses at the front surface can be made small  相似文献   
64.
Although multi-domain survivability is a major concern for operators, few studies have considered the design of post-fault restoration schemes. This paper proposes two such strategies, based upon hierarchical routing and signaling crankback, to handle single and multi-link failure events in multi-domain IP/MPLS networks (also extendible to optical DWDM networks). Specifically, the hierarchical routing strategy relies upon abstracted domain information to compute inter-domain loose routes, whereas the crankback scheme applies signaling re-tries to restore paths in a domain-by-domain manner. The performance of these proposed solutions is then analyzed and compared via simulation.  相似文献   
65.
Next-generation wireless mobile communications will be driven by converged networks that integrate disparate technologies and services. The wireless mesh network is envisaged to be one of the key components in the converged networks of the future, providing flexible high- bandwidth wireless backhaul over large geographical areas. While single radio mesh nodes operating on a single channel suffer from capacity constraints, equipping mesh routers with multiple radios using multiple nonoverlap- ping channels can significantly alleviate the capacity problem and increase the aggregate bandwidth available to the network. However, the assignment of channels to the radio interfaces poses significant challenges. The goal of channel assignment algorithms in multiradio mesh networks is to minimize interference while improving the aggregate network capacity and maintaining the connectivity of the network. In this article we examine the unique constraints of channel assignment in wireless mesh networks and identify the key factors governing assignment schemes, with particular reference to interference, traffic patterns, and multipath connectivity. After presenting a taxonomy of existing channel assignment algorithms for WMNs, we describe a new channel assignment scheme called MesTiC, which incorporates the mesh traffic pattern together with connectivity issues in order to minimize interference in multi- radio mesh networks.  相似文献   
66.
For building an optical access network, we propose some new hybrid WDM/TDM passive optical network (PON) architectures that use wavelength selective switches (WSSs) at the remote node to improve flexibility, data security and power budget. Through simulations we demonstrate that the switching capabilities of a WSS can provide additional gains in terms of wavelength usage by a better statistical multiplexing. Several WSS-based hybrid WDM/TDM PON variants are proposed and assessed. These architectures are also compared with the more commonly used hybrid WDM/TDM PONs consisting of power splitters and/or arrayed wavelength gratings (AWGs), in terms of cost and power budget.  相似文献   
67.
In this paper, we address the problem of user-class based service differentiation in CDMA networks. Users are categorized into three classes who get differentiated services based on their expected quality of service (QoS) from the service provider and the price they are willing to pay. We adopt a game theoretic approach for allocating resources through a two-step process. During a service admission, resource distribution is determined for each class. Then, the resource allocated to each class is distributed among the active users in that class. We devise a utility function for the providers which considers the expected revenue and the probability of users leaving their service provider if they are not satisfied with the service. Our model demonstrates how power can be controlled in a CDMA network to differentiate the service quality. Also, we show the impact of admitting high paying users on other users. Mainak Chatterjee received his Ph.D. from the department of Computer Science and Engineering at The University of Texas at Arlington in 2002. Prior to that, he completed his B.Sc. with Physics (Hons) from the University of Calcutta in 1994 and M.E. in Electrical Communication Engineering from the Indian Institute of Science, Bangalore, in 1998. He is currently an Assistant Professor in the department of Electrical and Computer Engineering at the University of Central Florida. His research interests include economic issues in wireless networks, applied game theory, resource management and quality-of-service provisioning, ad hoc and sensor networks, CDMA data networking, and link layer protocols. He serves on the executive and technical program committee of several international conferences. Haitao Lin received the BE degree in radio engineering from Southeast University, Nanjing, China, in 1996, the MS degree in computer applications from the Beijing University of Posts and Telecommunications, Beijing, China, in 2000, and Ph.D. in Computer Science and Engineering from The University of Texas at Arlington in 2004. He is currently with Converged Multimedia Services System Engineering at Nortel, Richardson, Texas. His research interests include wireless network performance evaluation and enhancement, wireless link adaptation, wireless network resource management, and applied game theory. Sajal K. Das received B.S. degree in 1983 from Calcutta University, M.S. degree in 1984 from Indian Institute of Science, Bangalore, and Ph.D. degree in 1988 from University of Central Florida, Orlando, all in Computer Science. He is currently a Professor of Computer Science and Engineering and also the Founding Director of the Center for Research in Wireless Mobility and Networking (CReWMaN) at the University of Texas at Arlington (UTA). Prior to 1999, he was a professor of Computer Science at the University of North Texas (UNT), Denton where he founded the Center for Research in Wireless Computing (CReW) in 1997, and also served as the Director of the Center for Research in Parallel and Distributed Computing (CRPDC) during 1995–97. Dr. Das is a recipient of the UNT Student Association's Honor Professor Award in 1991 and 1997 for best teaching and scholarly research; UNT's Developing Scholars Award in 1996 for outstanding research; UTA's Outstanding Faculty Research Award in Computer Science in 2001 and 2003; and the UTA College of Engineering Research Excellence Award in 2003. He is also frequently invited as a keynote speaker at international conferences and symposia. Dr. Das' current research interests include mobile wireless communications, resource and mobility management in wireless networks, mobile and pervasive computing, wireless multimedia, ad hoc and sensor networks, mobile internet architectures and protocols, distributed and grid computing, performance modeling and simulation. He has published over 350 research papers in these areas in international journals and conferences, directed numerous industry and government funded projects, and holds five US patents in wireless mobile networks. He received four Best Paper Awards in the ACM MobiCom'99, ICOIN'01, ACM MSWiM'00, and ACM/IEEE PADS'97. He as the Editor in Chief of the Pervasive and Mobile Computing (PMC) journal and also as an Associate Editor of IEEE Transactions on Mobile Computing, ACM/Kluwer Wireless Networks, Parallel Processing Letters, Journal of Parallel, Distributed and Emerging Systems. He served as General Chair of IEEE WoWMoM'05, PerCom'04, IWDC'04, MASCOTS'02, ACM WoWMoM'00-02; General Vice Chair of IEEE PerCom'03, ACM MobiCom'00 and IEEE HiPC'00-01; Program Chair of IWDC'02, WoWMoM'98-99; TPC Vice Chair of ICPADS'02; and as TPC member of numerous IEEE and ACM conferences. He is Vice Chair of the IEEE Computer Society's TCPP and TCCC Executive Committees.  相似文献   
68.

Authentication schemes are widely used mechanisms to thwart unauthorized access of resources over insecure networks. Several smart card based password authentication schemes have been proposed in the literature. In this paper, we demonstrate the security limitations of a recently proposed password based authentication scheme, and show that their scheme is still vulnerable to forgery and offline password guessing attacks and it is also unable to provide user anonymity, forward secrecy and mutual authentication. With the intention of fixing the weaknesses of that scheme, we present a secure authentication scheme. We show that the proposed scheme is invulnerable to various attacks together with attacks observed in the analyzed scheme through both rigorous formal and informal security analysis. Furthermore, the security analysis using the widely-accepted Real-Or-Random (ROR) model ensures that the proposed scheme provides the session key (SK) security. Finally, we carry out the performance evaluation of the proposed scheme and other related schemes, and the result favors that the proposed scheme provides better trade-off among security and performance as compared to other existing related schemes.

  相似文献   
69.
Delay/disruption tolerant networks (DTNs) are potentially applicable in the challenged scenarios like post‐disaster environments. In such networks, data forwarding generally relies on the mutual cooperation of the nodes. However, in reality, despite the availability of necessary resources for data forwarding, a node could misbehave by dropping messages received from other nodes with whom it has no strong social ties. Such a node is called a socially selfish node, which would cause a poor delivery ratio in the network. In this paper, we aim to address the problem of multicast data forwarding in the presence of such selfish nodes, by means of efficient relay selection in DTNs. First, we define a realistic reputation model, in contrast to existing models, to define the socially selfish/misbehaving nodes in the network. Further, a game‐theoretic analysis is carried out that implies data forwarding cost is also an influential parameter in handling selfishness/misbehavior. Subsequently, the problem is formulated as a constrained optimization problem, which is NP hard. Therefore, a heuristic is proposed by combining the reputation of a node and the cost of message forwarding to appropriately identify relay nodes, thus improve the performance of the multicast message delivery in the network. We utilize a social metric, centrality to minimize the message forwarding cost in terms of the number of relay nodes. Finally, the comparative performance evaluation in ONE simulator with practical scenarios shows the superiority of the proposed scheme over the other prominent schemes.  相似文献   
70.
下一代通信技术的发展会给广播电视业务的发展带来新的契机和挑战.广播电视业务的发展应充分考虑"多播"这一特征,开展多种信息服务,良好的质量和内容将成为广播电视在竞争中的"杀手锏".开发"多功能一体"的智能终端是开展数字广播电视业务的必然趋势和要求.借鉴通信的业务模式,构筑下一代广播网络,主动联合通信网和互联网开展新业务,是广播电视业进一步发展的关键.本文将结合下一代通信技术和广播电视业务的关系,从业务、传输和接入等角度分别进行讨论.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号