首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   117679篇
  免费   1515篇
  国内免费   259篇
电工技术   1155篇
综合类   2384篇
化学工业   18380篇
金属工艺   5375篇
机械仪表   3582篇
建筑科学   4169篇
矿业工程   658篇
能源动力   2037篇
轻工业   6979篇
水利工程   1602篇
石油天然气   521篇
武器工业   3篇
无线电   11578篇
一般工业技术   22333篇
冶金工业   7800篇
原子能技术   469篇
自动化技术   30428篇
  2024年   242篇
  2023年   364篇
  2022年   463篇
  2021年   825篇
  2020年   680篇
  2019年   767篇
  2018年   15013篇
  2017年   13913篇
  2016年   10798篇
  2015年   1450篇
  2014年   1311篇
  2013年   2173篇
  2012年   4788篇
  2011年   11371篇
  2010年   9699篇
  2009年   6968篇
  2008年   8434篇
  2007年   9294篇
  2006年   1574篇
  2005年   2422篇
  2004年   2201篇
  2003年   2101篇
  2002年   1449篇
  2001年   659篇
  2000年   717篇
  1999年   612篇
  1998年   567篇
  1997年   491篇
  1996年   511篇
  1995年   464篇
  1994年   456篇
  1993年   453篇
  1992年   406篇
  1991年   266篇
  1990年   334篇
  1989年   334篇
  1988年   290篇
  1987年   306篇
  1986年   294篇
  1985年   314篇
  1984年   274篇
  1983年   260篇
  1982年   245篇
  1981年   215篇
  1980年   181篇
  1979年   187篇
  1978年   168篇
  1977年   140篇
  1976年   130篇
  1975年   141篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
In Next-Generation (NG) hybrid wireless networks, Mobile-Controlled Handover (MCHO) is expected to be employed as the handover control mechanism, in contrast to Network-Controlled Handover (NCHO) used in homogeneous wireless networks. As more independent network operators get involved in providing Internet access, roaming mobile users would have to deal with complex trust relationships between heterogeneous network domains. The state-of-the-art handover approaches just take into account Quality of Service (QoS), but ignore the complexities arising from the coexistence of multiple network operators in the NG networks. The existence of a complex trust relationship between networks may lead to unnecessary handover attempts in service roaming. In this regard, this paper introduces a novel approach of dynamically retrieving network trust information, and using it in MCHO. We show how network trust information can be utilised to obtain a 35% reduction in handover delay, meanwhile retain QoS in a handover. The proposed scheme does not need bulk storage in mobile handsets, and can react to changes to network topology and trust relationships dynamically. Analytical results are provided to demonstrate how roaming mobile users make more intelligent and reliable handover if implementing the proposed handover approach in a multi-operator and multi-technology environment.  相似文献   
992.
The throughput degradation of Transport Control Protocol (TCP)/Internet Protocol (IP) networks over lossy links due to the coexistence of congestion losses and link corruption losses is very similar to the degradation of processor performance (i.e., cycle per instruction) due to control hazards in computer design. First, two types of loss events in networks with lossy links are analogous to two possibilities of a branching result in computers (taken vs. not taken). Secondly, both problems result in performance degradations in their applications, i.e., penalties (in clock cycles) in a processor, and throughput degradation (in bits per second) in a TCP/IP network. This has motivated us to apply speculative techniques (i.e., speculating on the outcome of branch predictions), used to overcome control dependencies in a processor, for throughput improvements when lossy links are involved in TCP/IP connections. The objective of this paper is to propose a cross-layer network architecture to improve the network throughput over lossy links. The system consists of protocol-level speculation based algorithms at transport layer, and protocol enhancements at middleware and network layers that provide control and performance parameters to transport layer functions. Simulation results show that, compared with prior research, our proposed system is effective in improving network throughput over lossy links, capable of handling incorrect speculations, fair for other competing flows, backward compatible with legacy networks, and relatively easy to implement.  相似文献   
993.
This is a position paper on our views on security aspects of Wireless Multimedia Sensor Networks (Secure WMSNs). It is meant to serve as a brief survey. But, more importantly, it gives a perspective on how we foresee the future of this research area, its main challenges, and its future trends. We believe that this paper will spur new discussions and research ideas among the researchers from both the industry and the academic world.  相似文献   
994.
Video Streaming with Network Coding   总被引:2,自引:0,他引:2  
Recent years have witnessed an explosive growth in multimedia streaming applications over the Internet. Notably, Content Delivery Networks (CDN) and Peer-to-Peer (P2P) networks have emerged as two effective paradigms for delivering multimedia contents over the Internet. One salient feature shared between these two networks is the inherent support for path diversity streaming where a receiver receives multiple streams simultaneously on different network paths as a result of having multiple senders. In this paper, we propose a network coding framework for efficient video streaming in CDNs and P2P networks in which, multiple servers/peers are employed to simultaneously stream a video to a single receiver. We show that network coding techniques can (a) eliminate the need for tight synchronization between the senders, (b) be integrated easily with TCP, and (c) reduce server’s storage in CDN settings. Importantly, we propose the Hierarchical Network Coding (HNC) technique to be used with scalable video bit stream to combat bandwidth fluctuation on the Internet. Simulations demonstrate that under certain scenarios, our proposed network coding techniques can result in bandwidth saving up to 60% over the traditional schemes.  相似文献   
995.
In wavelength routed optical networks, the number of wavelength channels is limited due to several constraints and each wavelength as well as each lightpath support traffic in the Gbps range. On the other hand, the traffic requested by an individual connection is still in the Mbps range. Therefore, to utilize the network resources (such as bandwidth and transceivers) effectively, several low-speed traffic streams have to be efficiently groomed or multiplexed into one or more high-speed lightpaths. The grooming problem of a static demand is considered as an optimization problem. In this work, we have investigated the traffic grooming problem with the objective of maximizing the network throughput for wavelength-routed mesh networks and map this problem to the clique partitioning problem. We have proposed an algorithm to handle general multi-hop static traffic grooming based on the clique partitioning concept. The efficiency of our approach has been established through extensive simulation on different sets of traffic demands with different bandwidth granularities for different network topologies and compared the approach with existing algorithms.  相似文献   
996.
In this paper a 35 GHz pulsed extended interaction oscillator (EIO) was studied, with high current density electron gun based cylindrical and parallel shaped diode. The folded waveguide was employed as the slow wave structure (SWS) of the EIO. The transferring waveguide, electron gun and the EIO tube were designed and the corresponding testes have been finished, including the transmission characteristic of the SWS, the emitting ability of the electron gun and the performance of the EIO tube. Preliminary experiment results show that the pulsed power and the exciting frequency are about 150 W and 35 GHz, respectively, under conditions of the Bz 0.4 T, the high voltage 17 kV and the high current density 26 A/cm2.  相似文献   
997.
In this paper, we have collected the requirements for Digital Rights Management from various sources, and presented them as a set of 11 requirements, associated with five categories. We discuss each requirement, provide the motivation for each entry, and illustrate how each one could be achieved. Four example commercial DRM systems are briefly explained, and the requirements that they meet are presented in tabular format. None of the example systems meet all the requirements that we have listed. The security threats that are faced by DRM systems are briefly discussed. All of the example systems are based on unicast data distribution. The use of multicast data distribution can help the source of the data and the underlying network to reduce their resource requirements when distributing high-quality content at minimum cost and delay. Up to now, there has been little motivation to use standard Internet Protocol multicast because it does not support any protection mechanisms for the delivered data. Given that significant progress has been made by other researchers in providing “secure” multicast data distribution, we explore how the use of secure multicast as a distribution technology can bring significant improvement for some requirements, while making the achievement of others more difficult. We review how the architecture of the distribution must change to permit capturing the advantages of multicast distribution while retaining as much as possible the features of unicast systems. Some open problems are identified.  相似文献   
998.
In this paper a 12-bit current-steering hybrid DAC is implemented using AMS 0.35 μm CMOS process technology. The architecture and design methodology used for the implementation of the DAC offer advantages like design speed up, easiness in design and a small active area. The proposed hybrid DAC consists of four 3-bit parallel matched current-steering subDACs and resistive networks that properly weight the current output of each subDAC to obtain the overall voltage-mode output of the 12-bit hybrid DAC. The performance of the hybrid DAC is validated through static and dynamic performance metrics. Simulations indicate that the DAC has an accuracy of 12-bit and a SFDR higher than 66 dB in whole Nyquist frequency band. The simulated INL is better than 1 LSB, while simulated DNL is better than 0.25 LSB. At an update rate of 250 MS/s the SFDR for signals up to 10 MHz is higher than 66 dB. The Figure of Merit (FoM) of the implemented hybrid DAC is better than recently presented DACs with 12-bit resolutions and implemented using various process technologies. The proposed hybrid DAC supporting high update rates with good dynamic performance can be used as an alternative in various applications in industry including video, digital TV, cable modems etc.  相似文献   
999.
Temperature characteristics of an InGaP/InGaAs/Ge triple-junction solar cell were analyzed in detail using an equivalent circuit calculation. The current–voltage (IV) characteristics of single-junction solar cells (InGaP, InGaAs, Ge solar cells) were measured at various temperatures. Fitting of IV curves between measured and calculated data was carried out, and the diode parameters and temperature exponents of the single-junction solar cells were extracted. The parameters for each single-junction solar cell were used in the equivalent circuit model for the triple-junction solar cell, and calculations of solar cell performance were carried out. Measured and calculated results of the IV characteristics at various temperatures agreed well.  相似文献   
1000.
Well-crystallized Ca9ZnLi(PO4)7 ceramics were prepared by reactive pressureless sintering at atmospheric pressure. The single-phase Ca9ZnLi(PO4)7 ceramics were confirmed by x-ray diffraction (XRD). The dielectric and electrical properties were investigated over a wide frequency range (1 Hz to 1 MHz) by complex impedance spectroscopy at different temperatures between 25°C and 600°C. A dielectric anomaly was observed at 440°C, which might be related to the phase transition. The impedance Cole–Cole plot was used to analyze the results of complex impedance measurements, revealing that the electrical properties depend strongly on frequency and temperature. Two relaxation dispersions of the electrical parameters were found and analyzed in terms of bulk and grain-boundary ionic transfer processes. The slope of the alternating-current (AC) conductivity over a wide range of temperatures provides activation energies from 0.48 eV to 1.69 eV. These results suggest that the conduction process is of the mixed type.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号