首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7894篇
  免费   344篇
  国内免费   48篇
电工技术   243篇
综合类   24篇
化学工业   1696篇
金属工艺   162篇
机械仪表   185篇
建筑科学   250篇
矿业工程   8篇
能源动力   522篇
轻工业   776篇
水利工程   94篇
石油天然气   155篇
武器工业   4篇
无线电   981篇
一般工业技术   1376篇
冶金工业   469篇
原子能技术   78篇
自动化技术   1263篇
  2023年   179篇
  2022年   426篇
  2021年   526篇
  2020年   373篇
  2019年   374篇
  2018年   486篇
  2017年   337篇
  2016年   380篇
  2015年   237篇
  2014年   361篇
  2013年   623篇
  2012年   398篇
  2011年   446篇
  2010年   287篇
  2009年   250篇
  2008年   235篇
  2007年   214篇
  2006年   182篇
  2005年   156篇
  2004年   128篇
  2003年   105篇
  2002年   120篇
  2001年   65篇
  2000年   69篇
  1999年   83篇
  1998年   132篇
  1997年   116篇
  1996年   73篇
  1995年   85篇
  1994年   59篇
  1993年   55篇
  1992年   41篇
  1991年   27篇
  1990年   30篇
  1989年   45篇
  1988年   47篇
  1987年   29篇
  1986年   29篇
  1985年   43篇
  1984年   51篇
  1983年   45篇
  1982年   33篇
  1981年   26篇
  1980年   35篇
  1979年   27篇
  1978年   20篇
  1977年   28篇
  1976年   33篇
  1975年   21篇
  1974年   19篇
排序方式: 共有8286条查询结果,搜索用时 15 毫秒
101.
In this paper, we are interested in the problem of Blind Source Separation using a Second-order Statistics (SOS) method in order to separate autocorrelated and mutually independent sources mixed according to a bilinear (BL) model. In this context, we propose a new approach called Bilinear Second-order Blind Source Separation, which is an extension of linear SOS methods, devoted to separate sources present in BL mixtures. These sources, called extended sources, include the actual sources and their products. We first study the statistical properties of the different extended sources, in order to verify the assumption of identifiability when the actual sources are zero-mean and when they are not. Then, we present the different steps performed in order to estimate these actual centred sources and to extract the actual mixing parameters. The obtained results using artificial mixtures of synthetic and real sources confirm the effectiveness of the new proposed approach.  相似文献   
102.
A new type of receiving array which adaptively minimizes ouput noise power while simultaneously satisfying certain robustness and/or bandwidth criteria is considered. The resulting array gains are shown to be robust against direction uncertainty in the assumed look direction, against wavefront distortions and against array geometry errors. The robustness property is incorporated directly into the adaption algorithm via constraints. Extensive simulation has established very satisfactory performance of this new algorithm, both as a limited broad-band processor and as a robust narrow-band processor.  相似文献   
103.
Abdalrazik  Ahmad  Gomaa  Ahmed  Kishk  Ahmed A. 《Wireless Networks》2022,28(8):3779-3786
Wireless Networks - This paper proposes a quadruple band stacked oval patch antenna with sunlight-shaped slots supporting L1/L2/L5 GNSS bands and the 2.3 Ghz WiMAX band. The antenna produces...  相似文献   
104.
In multiprocessor system-on-chip, tasks and communications should be scheduled carefully since their execution order affects the performance of the entire system. When we implement an MPSoC according to the scheduling result, we may find that the scheduling result is not correct or timing constraints are not met unless it takes into account the delays of MPSoC architecture. The unexpected scheduling results are mainly caused from inaccurate communication delays and or runtime scheduler’s overhead. Due to the big complexity of scheduling problem, most previous work neglects the inter-processor communication, or just assumes a fixed delay proportional to the communication volume, without taking into consideration subtle effects like the communication congestion and synchronization delay, which may change dynamically throughout tasks execution. In this paper, we propose an accurate scheduling model of hardware/software communication architecture to improve timing accuracy by taking into account the effects of dynamic software synchronization and detailed hardware resource constraints such as communication congestion and buffer sharing. We also propose a method for runtime scheduler implementation and consider its performance overhead in scheduling. In particular, we introduce efficient hardware and software scheduler architectures. Furthermore, we address the issue of centralized implementation versus distributed implementation of the schedulers. We investigate the pros and cons of the two different scheduler implementations. Through experiments with significant demonstration examples, we show the effectiveness of the proposed approach.  相似文献   
105.
In recent years, the usage and applications of Internet of Things (IoT) have increased exponentially. IoT connects multiple heterogeneous devices like sensors, micro controllers, actuators, smart devices like mobiles, watches, etc. IoT contributes the data produced in the context of data collection, including the domains like military, agriculture, healthcare, etc. The diversity of possible applications at the intersection of the IoT and the web semantics has prompted many research teams to work at the interface between these two disciplines. This makes it possible to collect data and control various objects in transparent way. The challenge lies in the use of this data. Ontologies address this challenge to meet specific data needs in the IoT field. This paper presents the implementation of a dynamic agriculture ontology-building tool that parses the ontology files to extract full data and update it based on the user needs. The technology is used to create the angular library for parsing the OWL files. The proposed ontology framework would accept user-defined ontologies and provide an interface for an online updating of the owl files to ensure the interoperability in the agriculture IoT.  相似文献   
106.
Sn-9Zn solder joints containing Ag nano particles were prepared by mechanically mixing Ag nano particles (0.3, 0.5 and 1 wt%) with Sn-9Zn solder paste. In the monolithic Sn-Zn solder joints, scallop-shaped AuZn3 intermetallic compound layers were found at their interfaces. However, after the addition of Ag nano particles, an additional uniform AgZn3 intermetallic compound layer well adhered to the top surface of the AuZn3 intermetallic compound layer was found. In addition, in the solder ball region, fine spherical-shaped AgZn3 intermetallic compound particles were observed as well as Zn-rich and β-Sn phases. With the addition of Ag nano particles, the shear strengths consistently increased with an increase in the Ag nano particle content due to the uniform distribution of fine AgZn3 intermetallic compound particles. The shear strength of monolithic Sn-Zn and 1 wt% Ag nano particle content Sn-Zn solder joints after one reflow cycle were about 42.1 MPa and 48.9 MPa, respectively, while their shear strengths after eight reflow cycles were about 39.0 MPa and 48.4 MPa, respectively. The AgZn3 IMCs were found to be uniformly distributed in the β-Sn phase for Ag particle doped Sn-9Zn composite solder joints, which result in an increase in the tensile strength, due to a second phase dispersion strengthening mechanism. The fracture surface of monolithic Sn-Zn solder exhibited a brittle fracture mode with a smooth surface while Sn-Zn solder joints containing Ag nano particles showed a typical ductile failure with very rough dimpled surfaces.  相似文献   
107.
Most trust and reputation solutions in wireless mesh networks (WMNs) rely on the intrusion detection system (IDS) Watchdog. Nevertheless, Watchdog does not consider packet loss on wireless links and may generate false positives. Consequently, a node that suffers from packet loss on one of its links may be accused wrongly, by Watchdog, of misbehaving. To deal with this issue, we propose in this paper a novel trust system which considers packet loss of links. Our trust system is based on a statistical detection method (SDM) implemented on each node of the network. Firstly, the SDM, via CUSUM test, analyzes the behavior of the packets loss in order to detect a dropping attack. Secondly, the SDM, through the Kolmogorov-Smirnov test, compares the behavior of the total packets loss with that of the control packets in order to identify the attack type. Our system allows every WMN’s node to assign to each of its neighbors, a trust value which reflects its real behavior. We have validated the proposed SDM method via extensive simulations on ns2 and have compared our trust system with an existing solution. The results display that our SDM solution offers better performance.  相似文献   
108.
109.
Hisham  Mohamed  Elmogy  Ahmed  Sarhan  Amany  Sallam  Alsayed 《Wireless Networks》2020,26(1):685-698
Wireless Networks - In Wireless Local Area Networks (WLAN), portable devices such as notebooks, tabs, and smart phones are powered by batteries with limited energy. With the great increase of using...  相似文献   
110.
Wireless Networks - This paper discusses a framework for algorithm-architecture synergy for (1) performance evaluation and (2) FPGA implementation complexity analysis of linear massive MIMO...  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号