首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5210篇
  免费   313篇
  国内免费   42篇
电工技术   73篇
综合类   15篇
化学工业   980篇
金属工艺   103篇
机械仪表   162篇
建筑科学   211篇
矿业工程   6篇
能源动力   193篇
轻工业   364篇
水利工程   30篇
石油天然气   21篇
无线电   851篇
一般工业技术   1051篇
冶金工业   465篇
原子能技术   25篇
自动化技术   1015篇
  2024年   7篇
  2023年   32篇
  2022年   106篇
  2021年   142篇
  2020年   110篇
  2019年   129篇
  2018年   143篇
  2017年   119篇
  2016年   144篇
  2015年   147篇
  2014年   212篇
  2013年   437篇
  2012年   299篇
  2011年   302篇
  2010年   270篇
  2009年   284篇
  2008年   282篇
  2007年   258篇
  2006年   222篇
  2005年   183篇
  2004年   149篇
  2003年   170篇
  2002年   140篇
  2001年   115篇
  2000年   101篇
  1999年   112篇
  1998年   166篇
  1997年   117篇
  1996年   80篇
  1995年   72篇
  1994年   52篇
  1993年   55篇
  1992年   42篇
  1991年   28篇
  1990年   36篇
  1989年   34篇
  1988年   20篇
  1987年   22篇
  1986年   19篇
  1985年   25篇
  1984年   19篇
  1983年   22篇
  1982年   22篇
  1981年   16篇
  1980年   10篇
  1979年   12篇
  1978年   6篇
  1977年   13篇
  1976年   14篇
  1973年   8篇
排序方式: 共有5565条查询结果,搜索用时 15 毫秒
61.
Designing a trusted and secure routing solution in an untrustworthy scenario is always a challenging problem. Lack of physical security and low trust levels among nodes in an ad hoc network demands a secure end-to-end route free of any malicious entity. This is particularly challenging when malicious nodes collude with one another to disrupt the network operation. In this paper we have designed a secure routing solution to find an end-to-end route free of malicious nodes with collaborative effort from the neighbors. We have also extended the solution to secure the network against colluding malicious nodes, which, to the best of our knowledge, is the first such solution proposed. We have also proposed a framework for computing and distributing trusts that can be used with out trusted routing protocol. Our proposed framework is unique and different from the other schemes in that it tries to analyze the psychology of the attacker and quantifies the behavior in the computational model. Extensive simulation has been carried out to evaluate the design of our protocol. Partially funded by Department of Defense Award No. H98230-04-C-0460, Department of Transportation Project No. FL-26-7102-00 and National Science Foundation Grant Nos. ANI-0123950 and CCR-0196557. Tirthankar Ghosh is a PhD candidate in the Telecommunications and Information Technology Institute at Florida International University. His area of research is routing security and trust computation in wireless ad hoc and sensor networks. He received his Bachelor of Electrical Engineering from Jadavpur University, India and Masters in Computer Engineering from Florida International University. Dr. Niki Pissinou received her Ph.D. in Computer Science from the University of Southern California, her M.S. in Computer Science from the University of California at Riverside, and her B.S.I.S.E. in Industrial and Systems Engineering from The Ohio State University. She is currently a tenured professor and the director of the Telecommunication & Information Technology Institute at FIU. Previously Dr. Pissinou was a tenured faculty at the Center for Advanced Computer Studies at the University of Louisiana at Lafayette where she was also the director of the Telecommunication & Information & Technology Laboratory partially funded by NASA, and the co-director of the NOMAD: A Wireless and Nomadic Laboratory partially funded by NSF, and the Advanced Network Laboratory. Dr. Pissinou is active in the fields computer networks, information technology and distributed systems. Dr. Kami (Sam) Makki has earned his Ph.D. in Computer Science from the University of Queensland in Brisbane Australia, his Masters degree in Computer Science and Engineering from the University of New South Wales in Sydney Australia, and his Bachelor and Masters Degrees in Civil Engineering from the University of Tehran Iran. Before joining the department of Electrical Engineering and Computer Science at the University of Toledo he has held a number of academic positions and research appointments at the Queensland University of Technology in Brisbane, Royal Melbourne Institution of Technology in Melbourne and at The University of Queensland in Brisbane Australia. He is an active researcher in the fields of distributed systems, databases, mobile and wireless communications, and has more than 30 publications in peerreviewed journals and international proceedings. He has served as a chair and technical program committee member and reviewer for a number of IEEE and ACM sponsored technical conferences and has received a number of achievement awards.  相似文献   
62.
Because of rapid development in network technology,Internet usage has become widespread.It allows users with sensing devices to obtain medical data for healthcare,such as physiological signals,voice,and video streams from telemedicine systems,and to send the healthcare data to back-end database systems,creating a ubiquitous healthcare environment.However,this environment requires a widespread and suitable network.IPv6(Internet protocol version 6) is the next-generation Internet protocol that will be the protocol of future networks;it improves many shortcomings of IPv4.In this paper,we propose an IPv6/IPv4 U-home-care test system and analyze the network’s parameters though a series of tests by adjusting network parameters to find the optimal design for applications in the IPv6/IPv4 U-home-care service so as to assure good performance and high quality.  相似文献   
63.
Numerous directional medium access control (DMAC) protocols have been developed to enhance the capacity of ad hoc networks using the underlying advanced physical layer techniques, such as beam-forming, multiuser detection (MUD), and multiple-input–multiple-output (MIMO). In this paper, we propose an innovative fully distributed DMAC protocol that cooperatively makes use of polarization diversity in low-mobility urban/suburban outdoor wireless ad hoc network environment. In the proposed cooperative polarization DMAC protocol (CPDMAC), each node directionally senses on both vertical and horizontal polarizations and dynamically adapts polarization that minimizes overall interference in the ad hoc network. Analysis is performed to establish relationship between vertically and horizontally polarized nodes in the network. Further, a theoretical lower bound is derived for probability of successful transmission to show capacity improvement as a function of cross polarization ratio (CPR). Simulation results confirm from 2% up to 400% improvement in average node throughput at data rate of 1.95 Mbps when compared to the traditional DMAC protocol. Moreover, our study clearly shows that the average throughput difference increases with increasing node density when compared to the traditional DMAC protocol.  相似文献   
64.
Automotive scenery often contains objects that can be classified by object speed and movement direction. These features can be extracted from video data by linear n-D filters, which have already been analyzed in the past. While soundness of results was convincing, interest in those systems declined due to the reduced computational abilities of contemporary computers. Modern hardware allows realization of velocity filters, if the n-D system is carefully adapted to the analysis problem. The present paper analyzes the premises for application of velocity filters in the domain of automotive driver assistance systems, i.e. with respect to detectability of objects and implementability in a cost effective way. Especially the influence of the frame rate and the temporal violation of the sampling theorem are analyzed. Transfer functions for n-D filters working in a vision-based blind spot collision avoidance system are presented and discussed, and promising approaches for future application fields are proposed.  相似文献   
65.
虽然无线通信技术一直都在不断发展,但当前却处于一个前所未有的变革期,新兴的4G空中接口如WiMAX、LTE、UMB、802.20、WiBRo以及下一代PHS等等都有一个共同的特点:即都是基于正交频分多址接入(OFDMA)、都采用MIMo(多入多出)技术、都具有“扁平化架构”且均基于IP(互联网协议)。  相似文献   
66.
Much evidence has accumulated that implicates the oxidative modification of low‐density lipoprotein (LDL) in the early stages of atherogenesis. The antioxidant nutrients alpha‐tocopherol, ascorbic acid, and beta‐carotene have been shown to inhibit in vitro LDL oxidation. In addition, they have been shown to increase the resistance of LDL to oxidation when given to animals and humans. Because plasma levels of these nutrients can be increased by dietary supplementation with minimal side effects, they may show promise in the prevention of coronary artery disease.  相似文献   
67.
Two efficient time slot assignment algorithms, called the two-phase algorithm for the nonhierarchical and the three-phase algorithm for the hierarchical time-division multiplex (TDM) switching systems, are proposed. The simple idea behind these two algorithms is to schedule the traffic on the critical lines/trunks of a traffic matrix first. The time complexities of these two algorithms are found to be O(LN2) and O(LM2), where L is the frame length, N is the switch size, and M is the number of input/output users connected to a hierarchical TDM switch. Unlike conventional algorithms, they are fast, iterative and simple for hardware implementation. Since no backtracking is used, pipelined packet transmission and packet scheduling can be performed for reducing the scheduling complexity of a transmission matrix to O(N2) and O(M2), respectively. Extensive simulations reveal that the two proposed algorithms give close-to-optimal performance under various traffic conditions  相似文献   
68.
Image-based rendering has been successfully used to display 3-D objects for many applications. A well-known example is the object movie, which is an image-based 3-D object composed of a collection of 2-D images taken from many different viewpoints of a 3-D object. In order to integrate image-based 3-D objects into a chosen scene (e.g., a panorama), one has to meet a hard challenge--to efficiently and effectively remove the background from the foreground object. This problem is referred to as multiview images (MVIs) segmentation. Another task requires MVI segmentation is image-based 3-D reconstruction using multiview images. In this paper, we propose a new method for segmenting MVI, which integrates some useful algorithms, including the well-known graph-cut image segmentation and volumetric graph-cut. The main idea is to incorporate the shape prior into the image segmentation process. The shape prior introduced into every image of the MVI is extracted from the 3-D model reconstructed by using the volumetric graph cuts algorithm. Here, the constraint obtained from the discrete medial axis is adopted to improve the reconstruction algorithm. The proposed MVI segmentation process requires only a small amount of user intervention, which is to select a subset of acceptable segmentations of the MVI after the initial segmentation process. According to our experiments, the proposed method can provide not only good MVI segmentation, but also provide acceptable 3-D reconstructed models for certain less-demanding applications.  相似文献   
69.
With the adoption of long‐term evolution standard for 4G mobile communications, the deployment of femtocell base stations (FBSs) to cope with the surging traffic in mobile wireless communication is becoming increasingly popular. However, with the random installation of FBSs, the problem of interference among FBSs is still a challenge. In this paper, assuming the presence of a femtocell management system that can control and coordinate the densely deployed FBSs, a novel power backoff scheme is proposed that determines the appropriate transmit power of each FBS so that the interference is reduced. Simulation results for randomly deployed FBSs in an environment with shadowing using MATLAB are provided, showing that our proposed methods can effectively mitigate the co‐tier downlink interference while improving the system capacity in a densely deployed femtocell network with shared spectrum use. Quantitatively, the average interference is reduced by roughly 90% to 100% of dBm, and the average capacity is increased by more than 80%. These results attest to the effectiveness of the proposed scheme.  相似文献   
70.
私有云适合对连续性和安全性要求高的应用,公有云则适合有波动需求和需要多址协同的应用,云端视频制作还受到商业模式和应用需求的影响  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号