首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5480篇
  免费   15篇
电工技术   23篇
综合类   1篇
化学工业   153篇
金属工艺   14篇
机械仪表   19篇
建筑科学   53篇
矿业工程   2篇
能源动力   15篇
轻工业   96篇
水利工程   4篇
石油天然气   1篇
无线电   199篇
一般工业技术   212篇
冶金工业   4550篇
原子能技术   14篇
自动化技术   139篇
  2021年   12篇
  2020年   16篇
  2019年   8篇
  2018年   14篇
  2017年   10篇
  2016年   16篇
  2015年   8篇
  2014年   24篇
  2013年   38篇
  2012年   28篇
  2011年   38篇
  2010年   37篇
  2009年   47篇
  2008年   39篇
  2007年   39篇
  2006年   40篇
  2005年   28篇
  2004年   29篇
  2003年   43篇
  2002年   27篇
  2001年   28篇
  2000年   21篇
  1999年   183篇
  1998年   1523篇
  1997年   814篇
  1996年   486篇
  1995年   311篇
  1994年   255篇
  1993年   307篇
  1992年   58篇
  1991年   67篇
  1990年   61篇
  1989年   59篇
  1988年   44篇
  1987年   71篇
  1986年   53篇
  1985年   56篇
  1984年   22篇
  1983年   25篇
  1982年   29篇
  1981年   39篇
  1980年   32篇
  1979年   21篇
  1978年   13篇
  1977年   89篇
  1976年   173篇
  1975年   17篇
  1974年   12篇
  1973年   10篇
  1971年   11篇
排序方式: 共有5495条查询结果,搜索用时 15 毫秒
31.
Identification of faulty links in dynamic-routed networks   总被引:5,自引:0,他引:5  
The authors present a maximum a posteriori method to identify faulty links in a communication network. A designated network node with management responsibilities determines a fault has occurred due to its inability to communicate with certain other nodes. Given this information as well as the information that it can communicate with another specified set of nodes, one would like to identify as quickly as possible a ranked list of the most probable failed network links. The authors also indicate how the method might be extended to the identification of most probable faulty network resources in a more abstract (higher level) model of a network, including, for example, an object-oriented model  相似文献   
32.
This work provides a framework for approaching the problem of fault detection in communication processes. Communication processes are modeled as finite state machines (FSMs), and the authors' model consists of two FSMs, one observing part of the behavior of the other. The authors prove that specific classes of faults are detectable, and give a procedure for constructing detectors, but the design of the minimum alphabet detector is NP-complete. An example applicable to the 802.2 protocol is provided  相似文献   
33.
The use of passive 118-GHz O2 observations of rain cells for precipitation cell-top altitude estimation is demonstrated by using a multilayer feedforward neural network retrieval system. Rain cell observations at 118 GHz were compared with estimates of the cell-top altitude obtained by optical stereoscopy. The observations were made with 2-4-km horizontal spatial resolution by using the millimeter-wave temperature sounder (MTS) scanning spectrometer aboard the NASA ER-2 research aircraft during the Genesis of Atlantic Lows Experiment (GALE) and the Cooperative Huntsville Meteorological Experiment (COHMEX) in 1986. The neural network estimator applied to MTS spectral differences between clouds, and nearby clear air yielded an rms discrepancy of 1.76 km for a combined cumulus, mature, and dissipating cell set and 1.44 km for the cumulus-only set. An improvement in rms discrepancy to 1.36 km was achieved by including additional MTS information on the absolute atmospheric temperature profile. An incremental method for training neural networks was developed that yielded robust results, despite the use of as few as 56 training spectra. Comparison of these results with a nonlinear statistical estimator shows that superior results can be obtained with a neural network retrieval system. Imagery of estimated cell-top altitudes was created from 118-GHz spectral imagery gathered from CAMEX, September through October 1993, and from cyclone Oliver, February 7, 1993  相似文献   
34.
This paper presents a study of models for audiovisual (AV) fusion in a noisy-vowel recognition task. We progressively elaborate audiovisual models in order to respect the major principle demonstrated by human subjects in speech perception experiments (the synergy principle): audiovisual identification should always be more efficient than auditory-alone or visual-alone identification. We first recall that the efficiency of audiovisual speech recognition systems depends on the level at which they fuse sound and image: four AV architectures are presented, and two are selected for the following of the study. Secondly, we show the importance of providing a contextual input linked to the Signal-to-Noise Ratio (SNR) in the fusion process. Then we propose an original approach using an efficient nonlinear dimension reduction algorithm (curvilinear components analysis) in order to increase the performances of the two AV architectures. Furthermore, we show that this approach allows an easy and efficient estimation of the reliability of the audio sensor in relation to SNR, that this estimation can be used to control the AV fusion process, and that it significantly improves the AV performances. Hence, altogether, nonlinear dimension reduction, context estimation and control of the fusion process enable us to respect the synergy criterion for the two most used architectures.  相似文献   
35.
We analyze different retransmission (ARQ) schemes for error control in multicast protocols geared toward real-time, multimedia applications. We discuss why retransmission schemes are not inappropriate for such applications, but in fact can be quite effective. We present a quantitative analysis of such schemes, as well as simulation results, taking into account four different parameters (and not just the source throughput): (1) the probability of dropping a packet due to limited time for retransmissions; (2) the average time required to deliver a packet correctly to end receivers; (3) the number of times a packet will be retransmitted; and (4) the cost to the network, in terms of packet duplications, of retransmitting a packet. We reach the counter-intuitive conclusion that the optimum scheme, in terms of all four of the above parameters, in the most general scenarios (where several hosts with widely varying propagation delays and `quality of connections' are participating in the session) is to immediately retransmit packets-preferably multicast-upon reception of a NACK from any receiver. We also demonstrate, again through quantitative analysis, the circumstances under which it would be beneficial (as well as those under which it would be counter-productive) to multicast control messages in the hope of suppressing duplicates and preventing the source from being overwhelmed by control messages  相似文献   
36.
Overcoming consumer confusion and doubt regarding nutrition recommendations is key to communicating the message to increase whole‐grain foods in the diet. Nutrition communicators may do that more successfully by using four tactics to fashion messages about whole grains: (1) present a positive message; (2) keep it short and simple; (3) keep the message practical and flexible; (4) speak with a united voice. The quantitative recommendation to eat at least three servings of whole‐grain foods daily also must be integrated into national nutrition documents, such as Healthy People 2000, Dietary Guidelines for Americans, the Food Guide Pyramid, Nutrition Recommendations for Canadians, and Canada's Food Guide to Healthy Eating, if we are to be truly successful in communicating the need to increase whole‐grain consumption.  相似文献   
37.
We investigate linear and nonlinear space-time minimum mean-square-error (MMSE) multiuser detectors for high data rate wireless code-division multiple-access (CDMA) networks. The centralized reverse-link detectors comprise a space-time feedforward filter and a multiuser feedback filter which processes the previously detected symbols of all in-sector users. The feedforward filter processes chip-rate samples from a bank of chip-matched filters which operate on the baseband outputs from an array of antennas. We present an adaptive multiuser recursive least squares (RLS) algorithm which determines the MMSE adjusted filter coefficients with less complexity than individual adaptation for each user. We calculate the outage probabilities and isolate the effects of antenna, diversity, and interference suppression gains for linear and nonlinear filtering and for CDMA systems with varying levels of system control (e.g., timing control, code assignment, cell layout). For eight users transmitting uncoded 2-Mb/s quadrature phase-shift keying with a spreading gain of eight chips per symbol over a fading channel with a multipath delay spread of 1.25 μs, the performance of a three-antenna feedforward/feedback detector was within 1 dB (in signal-to-noise ratio per antenna) of ideal detection in the absence of interference. By training for 10% of a 5-ms frame, RLS adaptation enabled the same detector to suffer less than a 0.5-dB penalty due to the combined effects of imperfect coefficients and error propagation. The advantage of nonlinear feedforward/feedback detection over linear feedforward detection was shown to be significantly larger for a CDMA system with enhanced system control  相似文献   
38.
A new type of all-silicon surface-normal optical intensity modulator at 1.3 mu m is reported. It can be easily butt-coupled with a cleaved single-mode fiber. The device utilizes free-carrier effects in silicon to achieve phase modulation and a built-in Fabry-Perot cavity to convert the phase modulation into intensity modulation. A 10% modulation depth with a driving current density as low as 6*10/sup 3/ A/cm/sup 2/ was demonstrated. Because it can be easily coupled with single-mode fiber, and at the same time it is compatible with silicon technology, this device can provide an interface between silicon electronic circuitry and fiber optics in applications such as the fiber-to-home return link where system cost is a deciding figure.<>  相似文献   
39.
The reliability of local area networks with bus and ring topologies with a simple transfer medium are critically analysed. A double transfer medium is used to increase reliability. The efficiencies of these approaches are compared.  相似文献   
40.
This paper attempts to lend perspective to several different methods that have been employed for specifying computer communication protocols by comparing a spectrum of specification techniques. The paper characterizes specification languages such as state transition diagrams, variants of temporal logic approaches, and sequence expressions by the extent to Which information is encoded as properties of a single state versus properties of a history of the entire computation state sequence. Taking the prototypical alternating bit protocol as an example, each method is used to specify the requirements for the send process of the distributed system.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号