首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   83616篇
  免费   949篇
  国内免费   406篇
电工技术   779篇
综合类   2316篇
化学工业   11399篇
金属工艺   4780篇
机械仪表   3014篇
建筑科学   2157篇
矿业工程   562篇
能源动力   1104篇
轻工业   3577篇
水利工程   1267篇
石油天然气   341篇
无线电   9234篇
一般工业技术   16263篇
冶金工业   2626篇
原子能技术   260篇
自动化技术   25292篇
  2021年   11篇
  2018年   14451篇
  2017年   13376篇
  2016年   9954篇
  2015年   604篇
  2014年   224篇
  2013年   190篇
  2012年   3133篇
  2011年   9397篇
  2010年   8269篇
  2009年   5537篇
  2008年   6766篇
  2007年   7772篇
  2006年   108篇
  2005年   1205篇
  2004年   1120篇
  2003年   1168篇
  2002年   536篇
  2001年   94篇
  2000年   174篇
  1999年   54篇
  1998年   52篇
  1997年   32篇
  1996年   44篇
  1995年   8篇
  1994年   15篇
  1993年   9篇
  1992年   12篇
  1991年   22篇
  1988年   10篇
  1969年   24篇
  1968年   44篇
  1967年   34篇
  1966年   42篇
  1965年   44篇
  1964年   11篇
  1963年   28篇
  1962年   22篇
  1961年   18篇
  1960年   30篇
  1959年   35篇
  1958年   37篇
  1957年   36篇
  1956年   34篇
  1955年   63篇
  1954年   68篇
  1953年   5篇
  1952年   6篇
  1950年   6篇
  1949年   6篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
941.
The N-Queens Puzzle is a fascinating combinatorial problem. Up to now, the number of distinct valid placements of N non-attacking queens on a generalized N × N chessboard cannot be computed by a formula. The computation of these numbers is instead based on an exhaustive search whose complexity grows dramatically with the problem size N. Solutions counts are currently known for all N up to 26. The parallelization of the search for solutions is embarrassingly simple. It is achieved by pre-placing the queens within a certain board region. These pre-placements partition the search space. The chosen extent of the pre-placement allows for a wide range of the partitioning granularity. This ease of partitioning makes the N-Queens Puzzle a great show-off case for tremendously parallel computation approaches and a flexible benchmark for parallel compute resources. This article presents the Q27 Project, an open-source effort targeting the computation of the solution count of the 27-Queens Puzzle. It is the first undertaking pushing the frontier of the N-Queens Puzzle that exploits the complete symmetry group D 4 of the square. This reduces the overall computational complexity already to an eighth in comparison to a naive exploration of the whole search space. This article details the coronal pre-placement that enables the partitioning of the overall search under this approach. With respect to the physical implementation of the computation, it describes the hardware structure that explores the resulting subproblems efficiently by exploiting bit-level operations and their mapping to FPGA devices as well as the infrastructure that organizes the contributing devices in a distributed computation. The performance of several FPGA platforms is evaluated using the Q27 computation as a benchmark, and some intriguing observations obtained from the available partial solutions are presented. Finally, an estimate on the remaining run time and on the expected magnitude of the final result is dared.  相似文献   
942.
LTE networks’ main challenge is to efficiently use the available spectrum, and to provide satisfying quality of service for mobile users. However, using the same bandwidth among adjacent cells leads to occurrence of Inter-cell Interference especially at the cell-edge. Basic interference mitigation approaches consider bandwidth partitioning techniques between adjacent cells, such as frequency reuse of factor m schemes, to minimize cell-edge interference. Although SINR values are improved, such techniques lead to significant reduction in the maximum achievable data rate. Several improvements have been proposed to enhance the performance of frequency reuse schemes, where restrictions are made on resource blocks usage, power allocation, or both. Nevertheless, bandwidth partitioning methods still affect the maximum achievable throughput. In this proposal, we intend to perform a comprehensive survey on Inter-Cell Interference Coordination (ICIC) techniques, and we study their performance while putting into consideration various design parameters. This study is implemented throughout intensive system level simulations under several parameters such as different network loads, radio conditions, and user distributions. Simulation results show the advantages and the limitations of each technique compared to frequency reuse-1 model. Thus, we are able to identify the most suitable ICIC technique for each network scenario.  相似文献   
943.
Modern vehicles are proficient in establishing a spontaneous connection over a wireless radio channel, synchronizing actions and information. Security infrastructure is most important in such a sensitive scope of vehicle communication for coordinating actions and avoiding accidents on the road. One of the first security issues that need to be established is authentication via IEEE 1609.2 security infrastructure. According to our preliminary work, vehicle owners are bound to preprocess a certificate from the certificate authority. The certificate carries vehicle static attributes (e.g., licence number, brand and color) certified together with the vehicle public key in a monolithic manner. Nevertheless, a malicious vehicle might clone the static attributes to impersonate a specific vehicle. Therefore, in this paper we consider a resource expensive attack scenario involving multiple malicious vehicles with identical visual static attributes. Apparently, dynamic attributes (e.g., location and direction) can uniquely define a vehicle and can be utilized to resolve the true identity of the vehicle. However, unlike static attributes, dynamic attributes cannot be signed by a trusted authority beforehand. We propose an approach to verify the coupling between non-certified dynamic attributes and certified static attributes on an auxiliary communication channel, for example, a modulated laser beam. Furthermore, we illustrate that the proposed approach can be used to facilitate the usage of existing authentication protocols such as NAXOS, in the new scope of ad-hoc vehicle networks. We use BAN logic to verify the security claims of the protocol against the passive and active interception.  相似文献   
944.
In this paper, we consider simultaneous wireless information and energy transfer in an orthogonal-frequency-division-multiple-access decode-and-forward relay network, in which an energy-constrained relay node harvests energy from a source node and uses the harvested energy to forward information to multiple destination nodes. Our objective is to maximize the end-to-end sum rate by resource allocation, subject to transmit power constraint at the source and energy-harvesting (EH) constraint at the relay. A non-convex and mixed-integer programming (MIP) problem is formulated to optimize time-switching (TS) ratios of EH and information decoding at the relay, TS ratio of information transmission from relay to destinations, subcarrier allocation as well as power allocation (PA) over all subcarriers at source and relay. We propose to decouple this problem into a convex problem and an MIP problem in fractional form. To solve the MIP problem, we transform it into an equivalent optimization problem in subtractive form which has a tractable solution. As a result, we propose a novel scheme to achieve jointly optimal TS ratios, subcarrier allocation and PA. Simulation results verify the optimality of our proposed resource allocation scheme.  相似文献   
945.
The main objective of this research is to conduct a performance analysis of various multipath routing protocols in wireless multimedia sensor networks for the efficient transmission of the image, audio and video data. To provide efficient routing for the large sized multimedia content, various multipath routing protocols such as energy-aware routing, QoS based routing and geographical routing methods are analyzed. In this analysis, the efficient routing techniques including geographical routing techniques such as GPSR, DGR, PW-DGR presented for wireless multimedia sensor networks are studied and the performance of each technique is evaluated to determine the efficient multipath routing technique. Comparisons are made for evaluated protocols and it is proved that the PW-DGR provides better routing performance for the multimedia data. The findings of the research also show that the PW-DGR method efficiently overcomes the routing problems such as energy bottleneck problem, energy-hole, reduced network lifetime and high delay in packet transmission.  相似文献   
946.
The localization of nodes plays a fundamental role in Wireless Sensor and Actors Networks (WSAN) identifying geographically where an event occurred, which facilitates timely response to this action. This article presents a performance evaluation of multi-hop localization range-free algorithms used in WSAN, such as Distance Vector Hop (DV-Hop), Improved DV-Hop (IDV-Hop), and the Weighted DV-Hop (WDV-Hop). In addition, we propose a new localization algorithm, merging WDV-Hop, with the weighted hyperbolic localization algorithm (WH), which includes weights to the correlation matrix of the estimated distances between the node of interest (NOI) and the reference nodes (RN) in order to improve accuracy and precision. As performance metrics, the accuracy, precision, and computational complexity are evaluated. The algorithms are evaluated in three scenarios where all nodes are randomly distributed in a given area, varying the number of RNs, the density of nodes in the network, and radio coverage of the nodes. The results show that in networks with 100 nodes, WDV-Hop outperforms the DV-Hop and IDV-Hop even if the number of RNs is reduced to 10. Moreover, our proposal shows an improvement in terms of accuracy and precision at the cost of increased computational complexity, specifically in the algorithm execution time, but without affecting the hardware cost or power consumption.  相似文献   
947.
Virtual network (VN) mapping which deals with the allocation of network resources from the shared physical substrate to individual VNs is one of the key challenges for the application of realizing network virtualization. While a variety of state-of-the-art algorithms have attempted to address this issue from different aspects, the challenge still remains for mapping virtual link with hop count constraint. This paper presents a fast approximation path mapping algorithm to address this issue by formulating such virtual link mapping problem as a path-flow mathematical programming model, which aims to minimize the maximum link load factor. Through the use of the primal–dual method, a fully polynomial time approximation algorithm is proposed to solve this model. The experimental results show that the proposed algorithm can effectively solve the problem of path mapping with hop limit.  相似文献   
948.
This study established the Kriging model to simplify the mathematical model for calculations and to improve the operational efficiency of global optimization in seismic exploration engineering. Accordingly, wireless seismic sensor network (WSSN) was used as an example in this research, and the generated seismic data flow rate and the flow rate of seismic data transmission are the simulation sample points. Thereafter, the Kriging model was constructed and the function was fitted. An improved particle swarm optimization (PSO) was also utilized for the global optimization of the Kriging model of WSSN to determine the optimized network lifetime. Results show that the Kriging model and the improved PSO algorithm significantly enhanced the lift performance and computer operational efficiency of WSSN.  相似文献   
949.
The structural and electrical characteristics of Ag/Ni bilayer metallization on polycrystalline thermoelectric SnSe were investigated. Two difficulties with thermoelectric SnSe metallization were identified for Ag and Ni single layers: Sn diffusion into the Ag metallization layer and unexpected cracks in the Ni metallization layer. The proposed Ag/Ni bilayer was prepared by hot-pressing, demonstrating successful metallization on the SnSe surface without interfacial cracks or elemental penetration into the metallization layer. Structural analysis revealed that the Ni layer reacts with SnSe, forming several crystalline phases during metallization that are beneficial for reducing contact resistance. Detailed investigation of the Ni/SnSe interface layer confirms columnar Ni-Sn intermetallic phases [(Ni3Sn and Ni3Sn2) and Ni5.63SnSe2] that suppress Sn diffusion into the Ag layer. Electrical specific-contact resistivity (5.32 × 10?4 Ω cm2) of the Ag/Ni bilayer requires further modification for development of high-efficiency polycrystalline SnSe thermoelectric modules.  相似文献   
950.
The potential of transient liquid-phase (TLP) bonding for chip packaging applications has been evaluated, focusing on three interlayer arrangements (Ag-Sn-Ag, Ni-Sn-Ni, and Ag-Sn-Ni). Shear tests on TLP-bonded components provided the interlayer-dependent mechanical strength as well as failure mode and position. Critical local stresses, i.e., failure criteria, within the intermetallic compound (IMC) layer were derived by replicating the shear test conditions with finite-element methods. The missing coefficient of thermal expansion for Ag3Sn IMC was obtained by producing small IMC bulk samples and subjecting them to dilatometric measurements. The experimental results were implemented into a finite-element model of a representative power module architecture to provide first predictions on thermally induced residual stresses that could be classified into fail/safe, as successfully validated by TLP chip bonding experiments. A numerical parameter study then assessed thermal stresses, including failure prediction and design optimization for TLP-bonded Si chips, considering the influence of process temperature, service conditions, TLP interlayer system, and metallization layers within the TLP joint. The presented procedure serves as a guideline to choose an appropriate TLP interlayer system for predefined boundary conditions, or vice versa.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号