首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1872篇
  免费   109篇
  国内免费   12篇
电工技术   28篇
综合类   5篇
化学工业   488篇
金属工艺   26篇
机械仪表   76篇
建筑科学   49篇
矿业工程   2篇
能源动力   167篇
轻工业   182篇
水利工程   13篇
石油天然气   31篇
无线电   180篇
一般工业技术   380篇
冶金工业   46篇
原子能技术   17篇
自动化技术   303篇
  2024年   10篇
  2023年   71篇
  2022年   135篇
  2021年   148篇
  2020年   105篇
  2019年   109篇
  2018年   124篇
  2017年   98篇
  2016年   132篇
  2015年   74篇
  2014年   128篇
  2013年   172篇
  2012年   106篇
  2011年   102篇
  2010年   81篇
  2009年   74篇
  2008年   50篇
  2007年   40篇
  2006年   39篇
  2005年   22篇
  2004年   19篇
  2003年   15篇
  2002年   15篇
  2001年   14篇
  2000年   6篇
  1999年   12篇
  1998年   17篇
  1997年   6篇
  1996年   13篇
  1995年   5篇
  1994年   8篇
  1993年   6篇
  1992年   6篇
  1991年   4篇
  1990年   4篇
  1989年   1篇
  1988年   2篇
  1987年   2篇
  1986年   4篇
  1985年   3篇
  1984年   3篇
  1983年   2篇
  1981年   1篇
  1979年   1篇
  1978年   1篇
  1977年   2篇
  1976年   1篇
排序方式: 共有1993条查询结果,搜索用时 0 毫秒
31.
BorderSense: Border patrol through advanced wireless sensor networks   总被引:1,自引:0,他引:1  
The conventional border patrol systems suffer from intensive human involvement. Recently, unmanned border patrol systems employ high-tech devices, such as unmanned aerial vehicles, unattended ground sensors, and surveillance towers equipped with camera sensors. However, any single technique encounters inextricable problems, such as high false alarm rate and line-of-sight-constraints. There lacks a coherent system that coordinates various technologies to improve the system accuracy. In this paper, the concept of BorderSense, a hybrid wireless sensor network architecture for border patrol systems, is introduced. BorderSense utilizes the most advanced sensor network technologies, including the wireless multimedia sensor networks and the wireless underground sensor networks. The framework to deploy and operate BorderSense is developed. Based on the framework, research challenges and open research issues are discussed.  相似文献   
32.
A quantum‐tunneling metal‐insulator‐metal (MIM) diode is fabricated by atmospheric pressure chemical vapor deposition (AP‐CVD) for the first time. This scalable method is used to produce MIM diodes with high‐quality, pinhole‐free Al2O3 films more rapidly than by conventional vacuum‐based approaches. This work demonstrates that clean room fabrication is not a prerequisite for quantum‐enabled devices. In fact, the MIM diodes fabricated by AP‐CVD show a lower effective barrier height (2.20 eV) at the electrode–insulator interface than those fabricated by conventional plasma‐enhanced atomic layer deposition (2.80 eV), resulting in a lower turn on voltage of 1.4 V, lower zero‐bias resistance, and better asymmetry of 107.  相似文献   
33.
Wireless Networks - In traditional Mobile Adhoc Networks routing algorithms, the existence of a sustainable path between the source and destination is a crucial issue. These algorithms are shown to...  相似文献   
34.
A novel technique for designing analog CMOS integrated filters is proposed. The technique uses digitally controlled current amplifiers (DCCAs) to provide precise frequency and/or gain characteristics that can be digitally tuned over a wide range. This paper provides an overview of the possibilities of using the DCCA as the core element in programmable filters. In mixed analog/digital systems, the digital tuning feature of the proposed approach allows direct interfacing with the digital signal processing (DSP) part. Basic building blocks such as digitally programmable amplifiers, integrators, and simulated active inductors are given. Systematic designs of second-order filters are presented. Fully differential architectures of the proposed circuits are developed. Experimental results obtained from 0.5 μm standard CMOS chips are provided.  相似文献   
35.

In this paper, we propose an interference aware expanding region search algorithm to locate a destination in mobile ad hoc networks. In the proposed approach, signal to interference plus noise ration (SINR) is used in place of TTL field of a route request packet. The source node initializes the search query with a threshold value of SINR. Each relay node forwards the packet if its SINR satisfies the threshold criteria provided by the source node in RREQ packet. As a result, the low SINR nodes are removed in route discovery phase prior to the establishment of routes. The simulation results show that proposed algorithm provides significant improvement in performance of reactive routing protocol in terms of reduced routing overhead, reduced energy consumption, and increased network throughput.

  相似文献   
36.
Intrusion detection is an important technique in computer and network security. A variety of intrusion detection approaches be present to resolve this severe issue but the main problem is performance. It is important to increase the detection rates and reduce false alarm rates in the area of intrusion detection. Therefore, in this research, an optimized intrusion detection mechanism using soft computing techniques is proposed to overcome performance issues. The KDD-cup dataset is used that is a benchmark for evaluating the security detection mechanisms. The Principal Component Analysis (PCA) is applied to transform the input samples into a new feature space. The selecting of an appropriate number of principal components is a critical problem. So, Genetic Algorithm (GA) is used in the optimum selection of principal components instead of using traditional method. The Support Vector Machine (SVM) is used for classification purpose. The performance of this approach is addresses. Further, a comparative analysis is made with existing approaches. Consequently, this method provides optimal intrusion detection mechanism which is capable to minimize amount of features and maximize the detection rates.  相似文献   
37.
38.
Moments have been used in all sorts of object classification systems based on image. There are lots of moments studied by many researchers in the area of object classification and one of the most preference moments is the Zernike moment. In this paper, the performance of object classification using the Zernike moment has been explored. The classifier based on neural networks has been used in this study. The results indicate the best performance in identifying the aggregate is at 91.4% with a ten orders of the Zernike moment. This encouraging result has shown that the Zernike moment is a suitable moment to be used as a feature of object classification systems.  相似文献   
39.
In a wide area campus, a university provides Wireless Local Area Network (WLAN) for users to connect to the Internet. Most users take advantage of this WLAN benefit by using their laptops. However, the number of smart phone users is growing fast. Since a smart phone is able to get an Internet connection using WLAN, users can use their smart phones without having to pay for a cellular operator. Users tend to use their smart phones more, due to their higher mobility compared to a laptop. This capability enables new services in the market, such as Fixed-Mobile Convergence (FMC), which integrates a fixed network (traditional telephony, WLAN) and a mobile network (cellular) to provide seamless voice communications anytime, anywhere. These new applications require a WLAN connection availability nearly everywhere. However, due to limited budgets, a university can only install APs in places with a high connection demand. We propose a novel WLAN AP placement technique that takes user mobility into consideration. This new approach is more complete than previous approaches, which mainly focus on coverage area and throughput data. Our technique has been implemented in our university. The results show the suitability of the WLAN access point locations in our university campus based on user mobility and activities.  相似文献   
40.
In the present study, experiment and simulation studies were conducted on the fluid/structure interaction (FSI) analysis of integrated circuit (IC) packaging. The visualisation of FSI phenomenon in the actual package is difficult due to limitations of package size, available equipment, and the high cost of the experimental setup. However, the experimental data are necessary to validate the simulation results in the FSI analysis of IC packaging. Scaled-up package size was fabricated to emulate the encapsulation of IC packaging and to study the effects of FSI phenomenon in the moulded package. The interaction between the fluid and the structure was observed. The deformation of the imitated chip was studied experimentally. The air-trap mechanism that occurred during the experiment is also presented in this paper. Simulation technique was utilised to validate the experimental result and to describe the physics of FSI. The predicted flow front was validated well by the experiment. Hence, the virtual modelling technique was proven to be excellent in handling this problem. The study also extends FSI modelling in actual-size packaging.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号