首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2834篇
  免费   184篇
  国内免费   1篇
电工技术   38篇
化学工业   790篇
金属工艺   50篇
机械仪表   128篇
建筑科学   131篇
矿业工程   8篇
能源动力   116篇
轻工业   453篇
水利工程   18篇
石油天然气   12篇
无线电   191篇
一般工业技术   375篇
冶金工业   95篇
原子能技术   12篇
自动化技术   602篇
  2024年   27篇
  2023年   48篇
  2022年   75篇
  2021年   158篇
  2020年   125篇
  2019年   132篇
  2018年   110篇
  2017年   115篇
  2016年   125篇
  2015年   98篇
  2014年   142篇
  2013年   244篇
  2012年   179篇
  2011年   216篇
  2010年   174篇
  2009年   160篇
  2008年   120篇
  2007年   124篇
  2006年   109篇
  2005年   79篇
  2004年   63篇
  2003年   53篇
  2002年   54篇
  2001年   32篇
  2000年   33篇
  1999年   23篇
  1998年   19篇
  1997年   22篇
  1996年   20篇
  1995年   16篇
  1994年   14篇
  1993年   16篇
  1992年   5篇
  1991年   6篇
  1990年   5篇
  1989年   5篇
  1988年   6篇
  1987年   4篇
  1986年   8篇
  1985年   7篇
  1984年   9篇
  1983年   13篇
  1982年   5篇
  1981年   3篇
  1978年   5篇
  1977年   3篇
  1976年   2篇
  1975年   3篇
  1970年   2篇
  1968年   1篇
排序方式: 共有3019条查询结果,搜索用时 15 毫秒
21.
Recently, preemption techniques have attracted considerable attention as a means to provide differentiated quality of service in optical burst switching (OBS) networks. This paper is focused on the analysis of preemption probabilities for bursts within the same priority class. As proposed by Vokkarane and Jue ((2003)* IEEE J Select Areas Commun 21(7): 1198–1209) an incoming burst will preempt the burst in service, within the same priority class, if the residual length of the burst in service is smaller than the incoming burst length. For a general case with wavelength conversion, the preemption probability of contending bursts with a generic service distribution, not necessarily exponential, is analyzed. First, we show that the size distribution for the preempting bursts is shifted to larger values, in comparison to the original burst size distribution. Second, we obtain an upper and lower bound for the preemption probability. Finally, the asymptotic behavior of the OBS switch is analyzed showing that preemption will always occur for a very large number of wavelengths.  相似文献   
22.
The degradation of end-to-end quality of service (QoS) on mobile users is becoming a common issue for IEEE 802.11 infrastructure-based networks in crowded areas. This research tackles the issue by employing an SDN framework on an integrated wireless/wired environment. Thereby, we present the development and implementation of a system that performs user management by analyzing the network load from the OpenFlow statistics, as well as the wireless information collected from the associated users. In order to analyse the behaviour of the proposed user migration algorithm, we evaluate the system under scenarios with different traffic load and user session duration. From the experiments, we observed that in several cases wireless users get a considerable QoS improvement at the application layer (up to 30% improvement in throughput and up to 20% in delay in our simulations) once the system is activated. Based on the results, we present an analysis on how and when user migration in multi-access point IEEE 802.11 networks can be most effective.  相似文献   
23.
This paper presents a test platform for the scale modeling of electromagnetic pulse effects. The different elements of the installation, i.e. a vertical conical antenna placed on a metallic reference plane, a fast rise time supply generator and a data acquisition and processing facility are described. The field of the antenna has also been studied using a Numerical Electromagnetic Code (Nec)based on the moments method and a comparison with the measurements has been performed. Conclusions resulting from this first stage in the construction of the scale modeling installation are presented.  相似文献   
24.
This work presents an admission control mechanism for multi-hop wireless mesh networks based on the IEEE 802.11 standard and the OLSR routing protocol. This mechanism, called CAC-OLSR, aims at ensuring that traffic flows with quality of service (QoS) requirements, especially voice and video, are only admitted in the mesh network if it has available resources in order to provide flow requirements. In addition, QoS requirements of previously admitted traffic flows cannot be violated. The proposal was evaluated with NS-2 and Evalvid simulations.  相似文献   
25.
26.
Over the last few years, embedded software synthesis has drawn much attention. However, few works deal with software synthesis for hard real-time systems considering arbitrary inter-tasks precedence and exclusion relations. Code generation for meeting all timing and resource constraints is not a trivial task. Thus, this research area has several open issues, mainly related to generation of predictable-guaranteed scheduled code. The method proposed in this paper starts from a high-level specification, and automatically translates such specification into a time Petri net model; this model is adopted for finding a feasible static schedule meeting all constraints. If found, the approach generates a scheduled code, based on the found feasible schedule. Therefore, the user just enter the specification and receives, as result, the scheduled code. Thus, all intermediary phases are hidden from the users.  相似文献   
27.
This paper assesses the impact of active queue management schemes on the quality of service of voice over Internet protocol applications. A new analytical method based on a fixed point approach to estimate the end-user satisfaction is proposed. The results obtained were validated using discrete event simulation techniques. In all the studied cases, it was observed a great deal of agreement between the analytical results and the results obtained through simulation. The theoretical predictions, as well as the presented empirical evidences confirm, as demonstrated in previous works, that the use of active queue management offers better quality of service than the traditional queue control mechanisms used in Internet. From these results, we may reasonably conclude that the presented method can be used for network design in the presence of voice traffic.  相似文献   
28.
An accurate mapping of Internet traffic to applications can be important for a broad range of network management and measurement tasks, including traffic engineering, service differentiation, performance/failure monitoring and security. Traditional mapping approaches have become increasingly inaccurate because many applications use non-default or ephemeral port numbers, use well-known port numbers associated with other applications, change application signatures or use traffic encryption. In this paper we will demonstrate that multiscale traffic analysis based on multi-order wavelet spectrum can be used as a discriminator of Internet applications traffic profiles. By performing clustering analysis over the multiscale wavelet spectrum coefficients that are inferred from the measured traffic, the proposed methodology is able to efficiently differentiate different IP applications without using any payload information. This characteristic will allow the differentiation of traffic flows in unencrypted and encrypted scenarios. In order to compare the differentiating potential of different traffic application data, upload, download and joint upload and download flow statistics are considered to evaluate the identification approach for each selected protocol. Moreover, we also evaluate which timescales and spectrum orders are more relevant for the traffic differentiation. From the analysis of the obtained results we can conclude that the proposed methodology is able to achieve good identification results using a small set of timescales of a single order wavelet spectrum of a general raw traffic statistic.  相似文献   
29.
Amorphous and polycrystalline Sn‐doped IrO2 thin films, Ir1‐xSnxO2, are grown for the first time. Their electrical response and strength of the spin–orbit coupling are studied in order to better understand and tailor its performance as spin current detector material. These experiments prove that the resistivity of IrO2 can be tuned over several orders of magnitude by controlling the doping content in both the amorphous and the polycrystalline state. In addition, growing amorphous samples increase the resistivity, thus improving the spin current to charge current conversion. As far as the spin–orbit coupling is concerned, the system not only remains in a strong spin–orbit coupling regime but it seems to undergo a slight enhancement in the amorphous state as well as in the Sn‐doped samples.  相似文献   
30.
In this paper, a Takenaka–Malmquist–Volterra (TMV) model structure is employed to improve the approximations in the low-pass equivalent behavioral modeling of radio frequency (RF) power amplifiers (PAs). The Takenaka–Malmquist basis generalizes the orthonormal basis functions previously used in this context. In addition, it allows each nonlinearity order in the expanded Volterra model to be parameterized by multiple complex poles (dynamics). The state-space realizations for the TMV models are introduced. The pole sets for the TMV model and also for the previous Laguerre–Volterra (LV) and Kautz–Volterra (KV) models are obtained using a constrained nonlinear optimization approach. Based on experimental data measured on a GaN HEMT class AB RF PA excited by a WCDMA signal, it is observed that the TMV model reduces the normalized mean-square error and the adjacent channel error power ratio for the upper adjacent channel (upper ACEPR) by 1.6 dB when it is compared to the previous LV and KV models under the same computational complexity.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号