首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1525829篇
  免费   26152篇
  国内免费   6987篇
电工技术   34256篇
综合类   6485篇
化学工业   271620篇
金属工艺   64118篇
机械仪表   42749篇
建筑科学   47097篇
矿业工程   11383篇
能源动力   50217篇
轻工业   117967篇
水利工程   15497篇
石油天然气   37289篇
武器工业   136篇
无线电   196405篇
一般工业技术   288011篇
冶金工业   170989篇
原子能技术   33793篇
自动化技术   170956篇
  2021年   15585篇
  2020年   11848篇
  2019年   14626篇
  2018年   14848篇
  2017年   14042篇
  2016年   21059篇
  2015年   17373篇
  2014年   28772篇
  2013年   87899篇
  2012年   36194篇
  2011年   48480篇
  2010年   42215篇
  2009年   50377篇
  2008年   45385篇
  2007年   42620篇
  2006年   45620篇
  2005年   39897篇
  2004年   42450篇
  2003年   42300篇
  2002年   41354篇
  2001年   38384篇
  2000年   36650篇
  1999年   35642篇
  1998年   47131篇
  1997年   40684篇
  1996年   36400篇
  1995年   31540篇
  1994年   29591篇
  1993年   29132篇
  1992年   26543篇
  1991年   23639篇
  1990年   23880篇
  1989年   22963篇
  1988年   21458篇
  1987年   19732篇
  1986年   19192篇
  1985年   22583篇
  1984年   22695篇
  1983年   20577篇
  1982年   19431篇
  1981年   19500篇
  1980年   18101篇
  1979年   18747篇
  1978年   17925篇
  1977年   18002篇
  1976年   19574篇
  1975年   16113篇
  1974年   15647篇
  1973年   15720篇
  1972年   13211篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
951.
Most embedded systems have limited amount of memory. In contrast, the memory requirements of the digital signal processing (DSP) and video processing codes (in nested loops, in particular) running on embedded systems is significant. This paper addresses the problem of estimating and reducing the amount of memory needed for transfers of data in embedded systems. First, the problem of estimating the region associated with a statement or the set of elements referenced by a statement during the execution of nested loops is analyzed. For a fixed execution ordering, a quantitative analysis of the number of elements referenced is presented; exact expressions for uniformly generated references and a close upper and lower bound for nonuniformly generated references are derived. Second, in addition to presenting an algorithm that computes the total memory required, this paper also discusses the effect of transformations (that change the execution ordering) on the lifetimes of array variables, i.e., the time between the first and last accesses to a given array location. The term maximum window size is introduced, and quantitative expressions are derived to compute the maximum window size. A detailed analysis of the effect of unimodular transformations on data locality, including the calculation of the maximum window size, is presented.  相似文献   
952.
The effect of spin splitting caused by structural asymmetry (Rashba’s contribution) and bulk asymmetry (Dresselhaus’s contribution) on the magnetoconductance of two-dimensional structures with high mobility of charge carriers is studied. The theory of weak localization with regard to both of the contributions is developed. The theory is valid in the entire region of classically low magnetic fields for arbitrary relations between the frequencies of spin precession and elastic collisions. The suppression of the correction for antilocalization is demonstrated in the case of equal contributions of structural anisotropy and bulk anisotropy to the spin splitting. The effect of the contribution, cubic in the wave vector, to the spin splitting on the quantum magnetoresistance is studied.  相似文献   
953.
It is well-known that noncoherent equal-gain combining (NC-EGC) is the simplest combining technique for noncoherent and differentially coherent communication systems. However, for nonidentical Nakagami-m channels (channels having nonuniform multipath intensity profile (MIP) and/or arbitrary non-integer fading parameters), the use of NC-EGC has three main disadvantages. First, its performance serves as a lossy upper bound to that of the optimum diversity combiner. Second, it results in complicated expressions for the system average error performance. Third, it incurs noncoherent combining loss (does not aid the use of diversity) at relatively low average signal-to-noise ratio (SNR). In this letter, we propose a modified version of the NC-EGC, which is a noncoherent combiner with weighting coefficients, to overcome the disadvantages of the conventional one. We show that this alternative combiner does provide improvements over the conventional N.C-EGC for all values of average SNRs, it does not incur any noncoherent combining loss, and it leads to a design of the receiver whose average error performance can be evaluated easily.  相似文献   
954.
In this letter, bandpass filters with one or two tunable transmission zeros are proposed. The reconfigurable transmission zeros are implemented through varactors in combination with tapped quarter-wavelength stubs. Based on mixed mode simulations including EM simulation and circuit simulation, the proposed filters were designed and fabricated on low-cost FR4 board. The measurement results verified the design concepts.  相似文献   
955.
Nash equilibria of packet forwarding strategies in wireless ad hoc networks   总被引:8,自引:0,他引:8  
In self-organizing ad hoc networks, all the networking functions rely on the contribution of the participants. As a basic example, nodes have to forward packets for each other in order to enable multihop communication. In recent years, incentive mechanisms have been proposed to give nodes incentive to cooperate, especially in packet forwarding. However, the need for these mechanisms was not formally justified. In this paper, we address the problem of whether cooperation can exist without incentive mechanisms. We propose a model,based on game theory and graph theory to investigate equilibrium conditions of packet forwarding strategies. We prove theorems about the equilibrium conditions for both cooperative and noncooperative strategies. We perform simulations to estimate the probability that the conditions for a cooperative equilibrium hold in randomly generated network scenarios.. As the problem is involved, we deliberately restrict ourselves to a static configuration. We conclude that in static ad hoc networks where the relationships between the nodes are likely to be stab le-cooperation needs to be encouraged.  相似文献   
956.
规整填料和新型塔板设计参数选取的质疑及分析   总被引:1,自引:0,他引:1  
笔者指出了目前规整填料和新型塔板设计计算中若干尚未完全解决的、有争议或值得进一步完善的设计参数。如:规整填料的每米理论板数、最小液体喷淋密度、最小气体空塔动能因子、新型塔板开孔率等,并提出了具体的设计方案供与同行切磋。  相似文献   
957.
This brief presents and compares several recursive and nonrecursive techniques for the efficient computation of the running average of discrete signals. First of all, the standard recursive algorithm is considered and its long-term accuracy is assessed when the floating-point arithmetic is employed. A cheap refreshing strategy is proposed as a means of keeping the computed value close enough to the exact one. Then, two alternative nonrecursive algorithms, requiring only log2N additions, are developed, which are as reliable and accurate as the direct implementation  相似文献   
958.
The supply voltage to threshold voltage ratio is reduced with each new technology generation. The gate overdrive variation with temperature plays an increasingly important role in determining the speed characteristics of CMOS integrated circuits. The temperature-dependent propagation delay characteristics, as shown in this brief, will experience a complete reversal in the near future. Contrary to the older technology generations, the speed of circuits in a 45-nm CMOS technology is enhanced when the temperature is increased at the nominal supply voltage. Operating an integrated circuit at the prescribed nominal supply voltage is not preferable for reliable operation under temperature fluctuations. A design methodology based on optimizing the supply voltage for temperature-variation-insensitive circuit performance is proposed in this brief. The optimum supply voltage is 45% to 53% lower than the nominal supply voltage in a 180-nm CMOS technology. Alternatively, the optimum supply voltage is 15% to 35% higher than the nominal supply voltage in a 45-nm CMOS technology. The speed and energy tradeoffs in the supply voltage optimization technique are also presented  相似文献   
959.
A new scheme is introduced for obtaining higher stability performance for the symplectic finite-difference time-domain (FDTD) method. Both the stability limit and the numerical dispersion of the symplectic FDTD are determined by a function zeta. It is shown that when the zeta function is a Chebyshev polynomial the stability limit is linearly proportional to the number of the exponential operators. Thus, the stability limit can be increased as much as possible at the cost of increased number of operators. For example, the stability limit of the four-exponential operator scheme is 0.989 and of the eight-exponential operator scheme it is 1.979 for fourth-order space discretization in three dimensions, which is almost three times the stability limit of previously published symplectic FDTD schemes with a similar number of operators. This study also shows that the numerical dispersion errors for this new scheme are less than those of the previously reported symplectic FDTD schemes  相似文献   
960.
Security is becoming an everyday concern for a wide range of electronic systems that manipulate, communicate, and store sensitive data. An important and emerging category of such electronic systems are battery-powered mobile appliances, such as personal digital assistants (PDAs) and cell phones, which are severely constrained in the resources they possess, namely, processor, battery, and memory. This work focuses on one important constraint of such devices-battery life-and examines how it is impacted by the use of various security mechanisms. In this paper, we first present a comprehensive analysis of the energy requirements of a wide range of cryptographic algorithms that form the building blocks of security mechanisms such as security protocols. We then study the energy consumption requirements of the most popular transport-layer security protocol: Secure Sockets Layer (SSL). We investigate the impact of various parameters at the protocol level (such as cipher suites, authentication mechanisms, and transaction sizes, etc.) and the cryptographic algorithm level (cipher modes, strength) on the overall energy consumption for secure data transactions. To our knowledge, this is the first comprehensive analysis of the energy requirements of SSL. For our studies, we have developed a measurement-based experimental testbed that consists of an iPAQ PDA connected to a wireless local area network (LAN) and running Linux, a PC-based data acquisition system for real-time current measurement, the OpenSSL implementation of the SSL protocol, and parameterizable SSL client and server test programs. Based on our results, we also discuss various opportunities for realizing energy-efficient implementations of security protocols. We believe such investigations to be an important first step toward addressing the challenges of energy-efficient security for battery-constrained systems.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号