首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5746篇
  免费   449篇
  国内免费   58篇
电工技术   64篇
综合类   23篇
化学工业   1311篇
金属工艺   84篇
机械仪表   273篇
建筑科学   122篇
矿业工程   9篇
能源动力   352篇
轻工业   736篇
水利工程   67篇
石油天然气   31篇
武器工业   1篇
无线电   725篇
一般工业技术   1303篇
冶金工业   96篇
原子能技术   57篇
自动化技术   999篇
  2024年   38篇
  2023年   209篇
  2022年   499篇
  2021年   783篇
  2020年   475篇
  2019年   530篇
  2018年   481篇
  2017年   402篇
  2016年   405篇
  2015年   249篇
  2014年   299篇
  2013年   432篇
  2012年   250篇
  2011年   306篇
  2010年   178篇
  2009年   149篇
  2008年   108篇
  2007年   95篇
  2006年   38篇
  2005年   29篇
  2004年   39篇
  2003年   31篇
  2002年   25篇
  2001年   22篇
  2000年   10篇
  1999年   14篇
  1998年   19篇
  1997年   15篇
  1996年   13篇
  1995年   19篇
  1994年   9篇
  1993年   12篇
  1992年   9篇
  1991年   7篇
  1990年   3篇
  1989年   5篇
  1988年   4篇
  1987年   6篇
  1986年   3篇
  1985年   6篇
  1984年   4篇
  1983年   4篇
  1982年   5篇
  1981年   3篇
  1980年   1篇
  1979年   3篇
  1978年   2篇
  1977年   3篇
  1974年   1篇
  1961年   1篇
排序方式: 共有6253条查询结果,搜索用时 15 毫秒
131.
Last decade belongs to business intelligence (BI) because it is one of the few concepts that have actually lived to the expectations. Not only the businesses have adopted it but also have reaped the fruits out of it. But the cost of BI solutions is very high and has restricted small and medium enterprises to use BI solutions. The human resource is also limited and resultantly expensive in this field. This research proposes a web support system for business intelligence which provides automated data mapping and loading from user application to BI framework and also validates it. The system also assists users in getting the outputs in terms of reports and dashboards. The implementation of the proposed framework demonstrates convenience of use and effective cost saving as it does not require any technical expertise. The beauty of this web support system is that all the steps are menu driven and any non-technical user can get hold of it easily.  相似文献   
132.
The aim of this paper is to introduce a novel frequency reuse concept especially for macro cellular networks to substantially increase the mobile network capacity, and simultaneously to avoid the implementation of low efficient small cells. Single path multiple access (SPMA) utilizes the characteristics of independent propagation paths for particular geographical location in the coverage area of mobile network. The proposed concept is based on the assumption that new approach will be adopted by the antenna manufacturers for producing advanced antennas by utilizing materials like metamaterials including carbon based nanotechnology, and graphene. In SPMA concept, communication between base station and mobile station happens through only single independent propagation path, and frequency resources can be reused in 5 m  \(\times \)  5 m areas or even more often in 1 m  \(\times \)  1 m areas, but limited by a base station/mobile station antenna requirement. Thus, the capacity of the network will be increased dramatically, and it can be managed in centralized manner at certain macro site locations. In already deployed cellular networks, these macro sites are mostly easily available, and that would help to implement SPMA to enhance the network capacity. Simulation results provided in this paper show the applicability of SPMA technique, by limiting the radiation of signal as single path propagation between base station and mobile station.  相似文献   
133.
Rechargeable sodium-ion batteries (SIBs) are emerging as a viable alternative to lithium-ion battery (LIB) technology, as their raw materials are economical, geographically abundant (unlike lithium), and less toxic. The matured LIB technology contributes significantly to digital civilization, from mobile electronic devices to zero electric-vehicle emissions. However, with the increasing reliance on renewable energy sources and the anticipated integration of high-energy-density batteries into the grid, concerns have arisen regarding the sustainability of lithium due to its limited availability and consequent price escalations. In this context, SIBs have gained attention as a potential energy storage alternative, benefiting from the abundance of sodium and sharing electrochemical characteristics similar to LIBs. Furthermore, high-entropy chemistry has emerged as a new paradigm, promising to enhance energy density and accelerate advancements in battery technology to meet the growing energy demands. This review uncovers the fundamentals, current progress, and the views on the future of SIB technologies, with a discussion focused on the design of novel materials. The crucial factors, such as morphology, crystal defects, and doping, that can tune electrochemistry, which should inspire young researchers in battery technology to identify and work on challenging research problems, are also reviewed.  相似文献   
134.
Finite impulse response (FIR) filtering can be expressed as multiplications of vectors by scalars. We present high-speed designs for FIR filters based on a computation sharing multiplier which specifically targets computation re-use in vector-scalar products. The performance of the proposed implementation is compared with implementations based on carry-save and Wallace tree multipliers in 0.35-/spl mu/m technology. We show that sharing multiplier scheme improves speed by approximately 52 and 33% with respect to the FIR filter implementations based on the carry-save multiplier and Wallace tree multiplier, respectively. In addition, sharing multiplier scheme has a relatively small power delay product than other multiplier schemes. Using voltage scaling, power consumption of the FIR filter based on computation sharing multiplier can be reduced to 41% of the FIR filter based on the Wallace tree multiplier for the same frequency of operation.  相似文献   
135.
The paper discusses a sequence detector based on univariate marginal distribution algorithm (UMDA) that jointly estimates the symbols transmitted in a multiple input multiple output (MIMO) communication system. While an optimal maximum likelihood detection using an exhaustive search method is prohibitively complex, it has been shown that sphere decoder (SD) achieves the optimal bit error rate (BER) performance with polynomial time complexity for smaller array sizes. However, the worst‐case complexity of SD is exponential in the problem dimensions, this brings in question its practical implementation for larger number of spatial layers and for higher‐order signal constellation. The proposed detector shows promising results for this overly difficult and complicated operating environment, confirmed through simulation results. A performance comparison of the UMDA detector with SD is presented for higher‐order complex MIMO architectures with limited average transmit power. The proposed detector achieves substantial performance gain for higher‐order systems attaining a near optimal BER performance with reduced computational complexity as compared with SD. Copyright © 2009 John Wiley & Sons, Ltd.  相似文献   
136.
This paper proposes and describes a new software and application programming interface view of an RF transceiver. It demonstrates benefits of using highly programmable digital control logic in an RF wireless system realized in a digital nanoscale CMOS process technology. It also describes a microprocessor architecture design in Digital RF Processor (DRP™) and how it controls calibration and compensation for process, temperature and voltage variations of the analog and RF circuits to meet the required RF performance. A few calibration examples to reduce a DCO bias current and improve device reliability, as well as to optimize transmit modulation and receive performance, are given. The presented circuits and techniques have enabled successful implementation of a commercial single-chip GSM radio in 90 nm CMOS.   相似文献   
137.
Recently, Jiang et al. and He et al. independently found security problems in Chen et al.'s remote user authentication scheme for non‐tamper‐proof storage devices like Universal Serial Bus stick and proposed improvements. Nonetheless, we detect that the schemes proposed by Jiang et al. and He et al. overlook a user's privacy. We also observe that Jiang et al.'s scheme is vulnerable to insider attack and denial of service attacks and lacks forward secrecy. We point out that the password changing facility in He et al.'s scheme is equivalent to undergoing registration, whereas in Jiang et al.'s scheme, it is unsuitable. Moreover, the login phase of both the schemes is incapable to prevent the use of wrong password leading to the computation of an unworkable login request. Therefore, we design a new scheme with user anonymity to surmount the identified weaknesses. Without adding much in communication/computational cost, our scheme provides more security characteristics and keeps the merits of the original schemes. As compared with its predecessor schemes, the proposed scheme stands out as a more apt user authentication method for common storage devices. We have also presented a formal proof of security of the proposed scheme based on the logic proposed by Burrows, Abadi and Needham (BAN logic). Copyright © 2014 John Wiley & Sons, Ltd.  相似文献   
138.
Scientometrics - In general peer review is accredited as the vital and utmost cornerstone of the scientific publishing and research developments. Undeniably, the reviewers play a decisive role in...  相似文献   
139.
The demand for cloud computing has increased manifold in the recent past. More specifically, on-demand computing has seen a rapid rise as organizations rely mostly on cloud service providers for their day-to-day computing needs. The cloud service provider fulfills different user requirements using virtualization - where a single physical machine can host multiple Virtual Machines. Each virtual machine potentially represents a different user environment such as operating system, programming environment, and applications. However, these cloud services use a large amount of electrical energy and produce greenhouse gases. To reduce the electricity cost and greenhouse gases, energy efficient algorithms must be designed. One specific area where energy efficient algorithms are required is virtual machine consolidation. With virtual machine consolidation, the objective is to utilize the minimum possible number of hosts to accommodate the required virtual machines, keeping in mind the service level agreement requirements. This research work formulates the virtual machine migration as an online problem and develops optimal offline and online algorithms for the single host virtual machine migration problem under a service level agreement constraint for an over-utilized host. The online algorithm is analyzed using a competitive analysis approach. In addition, an experimental analysis of the proposed algorithm on real-world data is conducted to showcase the improved performance of the proposed algorithm against the benchmark algorithms. Our proposed online algorithm consumed 25% less energy and performed 43% fewer migrations than the benchmark algorithms.  相似文献   
140.
Cloud computing is one of the most attractive and cost-saving models, which provides online services to end-users. Cloud computing allows the user to access data directly from any node. But nowadays, cloud security is one of the biggest issues that arise. Different types of malware are wreaking havoc on the clouds. Attacks on the cloud server are happening from both internal and external sides. This paper has developed a tool to prevent the cloud server from spamming attacks. When an attacker attempts to use different spamming techniques on a cloud server, the attacker will be intercepted through two effective techniques: Cloudflare and K-nearest neighbors (KNN) classification. Cloudflare will block those IP addresses that the attacker will use and prevent spamming attacks. However, the KNN classifiers will determine which area the spammer belongs to. At the end of the article, various prevention techniques for securing cloud servers will be discussed, a comparison will be made with different papers, a conclusion will be drawn based on different results.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号