首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9786篇
  免费   723篇
  国内免费   100篇
电工技术   128篇
综合类   30篇
化学工业   2134篇
金属工艺   189篇
机械仪表   368篇
建筑科学   209篇
矿业工程   36篇
能源动力   572篇
轻工业   1029篇
水利工程   107篇
石油天然气   72篇
武器工业   1篇
无线电   1210篇
一般工业技术   2222篇
冶金工业   619篇
原子能技术   111篇
自动化技术   1572篇
  2024年   47篇
  2023年   267篇
  2022年   606篇
  2021年   1009篇
  2020年   614篇
  2019年   685篇
  2018年   687篇
  2017年   577篇
  2016年   570篇
  2015年   378篇
  2014年   464篇
  2013年   762篇
  2012年   453篇
  2011年   533篇
  2010年   331篇
  2009年   284篇
  2008年   236篇
  2007年   214篇
  2006年   147篇
  2005年   105篇
  2004年   97篇
  2003年   104篇
  2002年   77篇
  2001年   60篇
  2000年   58篇
  1999年   75篇
  1998年   171篇
  1997年   137篇
  1996年   110篇
  1995年   89篇
  1994年   67篇
  1993年   66篇
  1992年   44篇
  1991年   49篇
  1990年   36篇
  1989年   36篇
  1988年   28篇
  1987年   34篇
  1986年   34篇
  1985年   36篇
  1984年   29篇
  1983年   31篇
  1982年   16篇
  1981年   16篇
  1980年   12篇
  1979年   11篇
  1978年   18篇
  1977年   20篇
  1976年   23篇
  1972年   8篇
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
991.
在许多不同的民用和军用领域,调制样式自动分类都是一个非常有趣的问题。本文提出了一种基于K个最近邻点(K-Nearest Neighbor,KNN)的遗传程序(Genetic Programming,GP)算法。该算法采用了基于K个最近邻点的遗传程序,用来识别BPSK、QPSK、16QAM和64QAM调制信号。该算法用高阶累积量作为输入特征,并使用一种分两个阶段的分类方法来改善分类精度。计算机仿真将所提出算法与已有的算法进行了比较,从而证明了该算法的优异性能。  相似文献   
992.
In this paper, several simple and efficient sign based normalized adaptive filters, which are computationally superior having multiplier free weight update loops are used for cancelation of noise in electrocardiographic (ECG) signals. The proposed implementation is suitable for applications such as biotelemetry, where large signal to noise ratios with less computational complexity are required. These schemes mostly employ simple addition, shift operations and achieve considerable speed up over the other least mean square (LMS) based realizations. Simulation studies shows that the proposed realization gives better performance compared to existing realizations in terms of signal to noise ratio and computational complexity.  相似文献   
993.
In a wide area campus, a university provides Wireless Local Area Network (WLAN) for users to connect to the Internet. Most users take advantage of this WLAN benefit by using their laptops. However, the number of smart phone users is growing fast. Since a smart phone is able to get an Internet connection using WLAN, users can use their smart phones without having to pay for a cellular operator. Users tend to use their smart phones more, due to their higher mobility compared to a laptop. This capability enables new services in the market, such as Fixed-Mobile Convergence (FMC), which integrates a fixed network (traditional telephony, WLAN) and a mobile network (cellular) to provide seamless voice communications anytime, anywhere. These new applications require a WLAN connection availability nearly everywhere. However, due to limited budgets, a university can only install APs in places with a high connection demand. We propose a novel WLAN AP placement technique that takes user mobility into consideration. This new approach is more complete than previous approaches, which mainly focus on coverage area and throughput data. Our technique has been implemented in our university. The results show the suitability of the WLAN access point locations in our university campus based on user mobility and activities.  相似文献   
994.
The effects of doping of MgAl2O4 by a binary mixture of Co and Zn ions on the absorbance, electrical resistivity, capacitance, thermal conductivity, heat capacity and thermal diffusivity are reported in this paper. The materials with the nominal composition Mg1−2x(Co,Zn)xAl2O4 (x = 0.0-0.5) are synthesized by solution combustion synthesis assisted by microwave irradiation. The substituted spinels are produced with a Scherrer crystallite size of 18-23 nm, as opposed to 45 nm for undoped samples, indicated by X-ray diffraction and confirmed by transmission electron microscopy. These materials also show better thermal stability in the temperature range of 298-1773 K. Three strong absorption bands at 536, 577 and 630 nm are observed for the doped samples which are attributed to the three spin allowed (4A2 (F) → 4T1 (P)) electronic transitions of Co2+ at tetrahedral lattice sites while pure magnesium aluminate remains transparent in the whole spectral range. The semiconducting behavior of the materials is evident from the temperature dependence of the electrical resistivity. Resistivity and activation energy are higher for the substituted samples. Fitting of the resistivity data is achieved according to the hopping polaron model of solids. Both dielectric constant and loss increase on account of doping. The dielectric data are explained on the basis of space charge polarization. The thermal conductivity and diffusivity are lowered and the heat capacity is increased in the doped materials. Wiedemann-Franz's law is used to compute the electronic and lattice contributions towards the total thermal conductivity.  相似文献   
995.
Diabetic macular edema(DME)is a retinal thickening involving the center of the macula.It is one of the serious eye diseases which affects the central vision and can lead to partial or even complete visual loss.The only cure is timely diagnosis,prevention,and treatment of the disease.This paper presents an automated system for the diagnosis and classification of DME using color fundus image.In the proposed technique,first the optic disc is removed by applying some preprocessing steps.The preprocessed image is then passed through a classifier for segmentation of the image to detect exudates.The classifier uses dynamic thresholding technique by using some input parameters of the image.The stage classification is done on the basis of an early treatment diabetic retinopathy study(ETDRS)given criteria to assess the severity of disease.The proposed technique gives a sensitivity,specificity,and accuracy of 98.27%,96.58%,and 96.54%,respectively on publically available database.  相似文献   
996.
997.
998.
Mobile WiMAX is a 3rd generation broadband wireless technology that enables the convergence of mobile and fixed broadband networks through a wide area radio-access. Since January 2007, the IEEE 802.16 working group has been developing a new amendment the IEEE 802.16 standard i.e. IEEE 802.16 m as an advanced air interface to meet the requirements of ITU-R/IMT-Advanced for 4G systems. The mobile WiMAX air interface adopts orthogonal frequency division multiple access (OFDMA) as multiple access technique for its uplink and downlink to improve signal performance affected by multipath distortion. All OFDMA based networks, including mobile WiMAX, experience the problem of high peak-to-average power ratio (PAPR). This paper presents a discrete-sine-transform precoding technique based random-interleaved OFDMA (RI-OFDMA) uplink system for PAPR reduction in mobile WiMAX. The PAPR of proposed system is analyzed with root-raised-cosine pulse shaping filter to keep out of band radiation low and to fulfill the spectrum mask requirements. Simulation results show that, the proposed system has low PAPR compared to the Hadamard transform precoded RI-OFDMA uplink systems and the conventional RI-OFDMA uplink systems.  相似文献   
999.
In the past, security protocols including key transport protocols are designed with the assumption that there are two parties communication with each other and an adversary tries to intercept this communication. In Delay/Disruption Tolerant Networking (DTN), packet delivery relies on intermediate parties in the communication path to store and forward the packets. DTN security architecture requires that integrity and authentication should be verified at intermediate nodes as well as at end nodes and confidentiality should be maintained for end communicating parties. This requires new security protocols and key management to be defined for DTN as traditional end-to-end security protocols will not work with DTN. To contribute towards solving this problem, we propose a novel Efficient and Scalable Key Transport Scheme (ESKTS) to transport the symmetric key generated at a DTN node to other communicating body securely using public key cryptography and proxy signatures. It is unique effort to design a key transport protocol in compliance with DTN architecture. ESKTS ensures that integrity and authentication is achieved at hop-by-hop level as well as end-to-end level. It also ensures end-to-end confidentiality and freshness for end communicating parties. This scheme provides a secure symmetric key transport mechanism based on public key cryptography to exploit the unique bundle buffering characteristics of DTN to reduce communication and computation cost .  相似文献   
1000.
With the use of smart card in user authentication mechanisms, the concept of two‐factor authentication came into existence. This was a forward move towards more secure and reliable user authentication systems. It elevated the security level by requiring a user to possess something in addition to know something. In 2010, Sood et al. and Song independently examined a smart‐card‐based authentication scheme proposed by Xu et al. They showed that in the scheme of Xu et al., an internal user of the system can turn hostile to impersonate other users of the system. Both of them also proposed schemes to improve the scheme of Xu et al. Recently, Chen et al. identified some security problems in the improved schemes proposed by Sood et al. and Song. To fix these problems, Chen et al. presented another scheme, which they claimed to provide mutual authentication and withstand lost smart card attack. Undoubtedly, in their scheme, a user can also verify the legitimacy of server, but we find that the scheme fails to resist impersonation attacks and privileged insider attack. We also show that the scheme does not provide important features such as user anonymity, confidentiality to air messages, and revocation of lost/stolen smart card. Besides, the scheme defies the very purpose of two‐factor security. Furthermore, an attacker can guess a user's password from his or her lost/stolen smart card. To meet these challenges, we propose a user authentication method with user anonymity. We show through analysis and comparison that the proposed scheme exhibits enhanced efficiency in contrast to related schemes, including the scheme of Chen et al. Copyright © 2013 John Wiley & Sons, Ltd.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号