首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3378篇
  免费   55篇
  国内免费   21篇
电工技术   20篇
综合类   4篇
化学工业   274篇
金属工艺   43篇
机械仪表   58篇
建筑科学   80篇
矿业工程   6篇
能源动力   37篇
轻工业   122篇
水利工程   15篇
石油天然气   13篇
无线电   124篇
一般工业技术   291篇
冶金工业   2066篇
原子能技术   15篇
自动化技术   286篇
  2024年   5篇
  2023年   8篇
  2022年   41篇
  2021年   48篇
  2020年   43篇
  2019年   44篇
  2018年   37篇
  2017年   23篇
  2016年   35篇
  2015年   47篇
  2014年   52篇
  2013年   121篇
  2012年   82篇
  2011年   95篇
  2010年   78篇
  2009年   63篇
  2008年   76篇
  2007年   64篇
  2006年   75篇
  2005年   62篇
  2004年   40篇
  2003年   60篇
  2002年   29篇
  2001年   27篇
  2000年   16篇
  1999年   70篇
  1998年   602篇
  1997年   326篇
  1996年   258篇
  1995年   168篇
  1994年   113篇
  1993年   113篇
  1992年   26篇
  1991年   46篇
  1990年   47篇
  1989年   28篇
  1988年   34篇
  1987年   37篇
  1986年   35篇
  1985年   44篇
  1984年   5篇
  1983年   6篇
  1982年   11篇
  1981年   14篇
  1980年   12篇
  1978年   6篇
  1977年   29篇
  1976年   108篇
  1975年   9篇
  1973年   6篇
排序方式: 共有3454条查询结果,搜索用时 0 毫秒
21.
Designing a trusted and secure routing solution in an untrustworthy scenario is always a challenging problem. Lack of physical security and low trust levels among nodes in an ad hoc network demands a secure end-to-end route free of any malicious entity. This is particularly challenging when malicious nodes collude with one another to disrupt the network operation. In this paper we have designed a secure routing solution to find an end-to-end route free of malicious nodes with collaborative effort from the neighbors. We have also extended the solution to secure the network against colluding malicious nodes, which, to the best of our knowledge, is the first such solution proposed. We have also proposed a framework for computing and distributing trusts that can be used with out trusted routing protocol. Our proposed framework is unique and different from the other schemes in that it tries to analyze the psychology of the attacker and quantifies the behavior in the computational model. Extensive simulation has been carried out to evaluate the design of our protocol. Partially funded by Department of Defense Award No. H98230-04-C-0460, Department of Transportation Project No. FL-26-7102-00 and National Science Foundation Grant Nos. ANI-0123950 and CCR-0196557. Tirthankar Ghosh is a PhD candidate in the Telecommunications and Information Technology Institute at Florida International University. His area of research is routing security and trust computation in wireless ad hoc and sensor networks. He received his Bachelor of Electrical Engineering from Jadavpur University, India and Masters in Computer Engineering from Florida International University. Dr. Niki Pissinou received her Ph.D. in Computer Science from the University of Southern California, her M.S. in Computer Science from the University of California at Riverside, and her B.S.I.S.E. in Industrial and Systems Engineering from The Ohio State University. She is currently a tenured professor and the director of the Telecommunication & Information Technology Institute at FIU. Previously Dr. Pissinou was a tenured faculty at the Center for Advanced Computer Studies at the University of Louisiana at Lafayette where she was also the director of the Telecommunication & Information & Technology Laboratory partially funded by NASA, and the co-director of the NOMAD: A Wireless and Nomadic Laboratory partially funded by NSF, and the Advanced Network Laboratory. Dr. Pissinou is active in the fields computer networks, information technology and distributed systems. Dr. Kami (Sam) Makki has earned his Ph.D. in Computer Science from the University of Queensland in Brisbane Australia, his Masters degree in Computer Science and Engineering from the University of New South Wales in Sydney Australia, and his Bachelor and Masters Degrees in Civil Engineering from the University of Tehran Iran. Before joining the department of Electrical Engineering and Computer Science at the University of Toledo he has held a number of academic positions and research appointments at the Queensland University of Technology in Brisbane, Royal Melbourne Institution of Technology in Melbourne and at The University of Queensland in Brisbane Australia. He is an active researcher in the fields of distributed systems, databases, mobile and wireless communications, and has more than 30 publications in peerreviewed journals and international proceedings. He has served as a chair and technical program committee member and reviewer for a number of IEEE and ACM sponsored technical conferences and has received a number of achievement awards.  相似文献   
22.
Automotive scenery often contains objects that can be classified by object speed and movement direction. These features can be extracted from video data by linear n-D filters, which have already been analyzed in the past. While soundness of results was convincing, interest in those systems declined due to the reduced computational abilities of contemporary computers. Modern hardware allows realization of velocity filters, if the n-D system is carefully adapted to the analysis problem. The present paper analyzes the premises for application of velocity filters in the domain of automotive driver assistance systems, i.e. with respect to detectability of objects and implementability in a cost effective way. Especially the influence of the frame rate and the temporal violation of the sampling theorem are analyzed. Transfer functions for n-D filters working in a vision-based blind spot collision avoidance system are presented and discussed, and promising approaches for future application fields are proposed.  相似文献   
23.
虽然无线通信技术一直都在不断发展,但当前却处于一个前所未有的变革期,新兴的4G空中接口如WiMAX、LTE、UMB、802.20、WiBRo以及下一代PHS等等都有一个共同的特点:即都是基于正交频分多址接入(OFDMA)、都采用MIMo(多入多出)技术、都具有“扁平化架构”且均基于IP(互联网协议)。  相似文献   
24.
Much evidence has accumulated that implicates the oxidative modification of low‐density lipoprotein (LDL) in the early stages of atherogenesis. The antioxidant nutrients alpha‐tocopherol, ascorbic acid, and beta‐carotene have been shown to inhibit in vitro LDL oxidation. In addition, they have been shown to increase the resistance of LDL to oxidation when given to animals and humans. Because plasma levels of these nutrients can be increased by dietary supplementation with minimal side effects, they may show promise in the prevention of coronary artery disease.  相似文献   
25.
私有云适合对连续性和安全性要求高的应用,公有云则适合有波动需求和需要多址协同的应用,云端视频制作还受到商业模式和应用需求的影响  相似文献   
26.
To enable robust video transmission over heterogeneous networks, the hierarchical B-picture prediction structure is employed in the state-of-the-art video coding standard H.264/SVC, aiming to produce scalable bitstreams with various frame rates. However, the exhaustive mode decision process with the hierarchical B-picture structure increases the computational complexity of H.264/SVC encoding dramatically. In this paper, a fast mode decision algorithm is proposed to speed up H.264/SVC encoding with the hierarchical B-picture structure, which is achieved by utilizing macroblock (MB) features, correlation of temporal–spatial neighboring MBs, and the discrepant characteristics of hierarchical layers. Extensive experimental results demonstrate that the proposed algorithm is able to reduce the encoding time of H.264/SVC significantly for video sequences with a wide range of resolutions, and meanwhile the video quality and compression ratio are well preserved.  相似文献   
27.
引言当存储器OEM和集成厂商在引进并采用基于SAS的系统时,都会希望能够提供流量管理和安全领域所需的光纤通道及企业级特性。为满足这些需求,在即将推出的SAS 2.0规范中引入了端对端分区的概念。根据定义,SAS协议在指定的域中支持最多16384个设备(启动器、目标器、扩展器和/或虚拟设备),然而,在实际应用中,  相似文献   
28.
Fast mode decision algorithms have been widely used in the video encoder implementation to reduce encoding complexity yet without much sacrifice in the coding performance. Optimal stopping theory, which addresses early termination for a generic class of decision problems, is adopted in this paper to achieve fast mode decision for the H.264/Scalable Video Coding standard. A constrained model is developed with optimal stopping, and the solutions to this model are employed to initialize the candidate mode list and predict the early termination. Comprehensive simulation results are conducted to demonstrate that the proposed method strikes a good balance between low encoding complexity and high coding efficiency.  相似文献   
29.
汽车信息娱乐系统(见图1)时代的到来标志着汽车采甩简单车载收音机(如图2中Mercedes汽车所配备的仪表板)的日子一去不复返了。历史悠久的AM/FM收音机在信息娱乐控制板上仍然保有一席之地,但它与数字音频广播(DAB)、数字和高清晰度电视(HDTV)、卫星无线电、集成蜂窝电话、CD/DVD/MP3播放器、全球定位系统(GPS)导航及视频游戏系统组合在一起。  相似文献   
30.
Adaptive quantization-parameter clip scheme for smooth quality in H.264/AVC   总被引:1,自引:0,他引:1  
In this paper, we investigate the issues over the smooth quality and the smooth bit rate during rate control (RC) in H.264/AVC. An adaptive quantization-parameter (Q(p)) clip scheme is proposed to optimize the quality smoothness while keeping the bit-rate fluctuation at an acceptable level. First, the frame complexity variation is studied by defining a complexity ratio between two nearby frames. Second, the range of the generated bits is analyzed to prevent the encoder buffer from overflow and underflow. Third, based on the safe range of the generated bits, an optimal Q(p) clip range is developed to reduce the quality fluctuation. Experimental results demonstrate that the proposed Q(p) clip scheme can achieve excellent performance in quality smoothness and buffer regulation.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号