首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3596篇
  免费   197篇
  国内免费   22篇
电工技术   60篇
综合类   8篇
化学工业   1009篇
金属工艺   84篇
机械仪表   101篇
建筑科学   85篇
矿业工程   8篇
能源动力   262篇
轻工业   299篇
水利工程   39篇
石油天然气   51篇
无线电   373篇
一般工业技术   628篇
冶金工业   189篇
原子能技术   39篇
自动化技术   580篇
  2024年   7篇
  2023年   57篇
  2022年   167篇
  2021年   190篇
  2020年   154篇
  2019年   180篇
  2018年   229篇
  2017年   176篇
  2016年   205篇
  2015年   133篇
  2014年   179篇
  2013年   365篇
  2012年   197篇
  2011年   228篇
  2010年   170篇
  2009年   153篇
  2008年   121篇
  2007年   79篇
  2006年   95篇
  2005年   58篇
  2004年   56篇
  2003年   46篇
  2002年   52篇
  2001年   28篇
  2000年   27篇
  1999年   17篇
  1998年   64篇
  1997年   38篇
  1996年   41篇
  1995年   28篇
  1994年   27篇
  1993年   26篇
  1992年   24篇
  1991年   18篇
  1990年   14篇
  1989年   18篇
  1988年   13篇
  1987年   13篇
  1986年   6篇
  1985年   12篇
  1984年   10篇
  1983年   9篇
  1982年   8篇
  1981年   10篇
  1980年   10篇
  1979年   8篇
  1978年   9篇
  1977年   8篇
  1976年   13篇
  1971年   4篇
排序方式: 共有3815条查询结果,搜索用时 0 毫秒
81.
In cooperative wireless networks, relay nodes are employed to improve the performance of the network in terms of throughput and reliability. However, the presence of malicious relay nodes in the network may severely degrade the performance of the system. When a relay node behaves maliciously, there exists a possibility that such a node refuses to cooperate when it is selected for cooperation or deliberately drops the received packets. Trust establishment is a mechanism to detect misbehaving nodes in a network. In this paper, we propose a trust establishment method for cooperative wireless networks by using Bayesian framework. In contrast with the previous schemes proposed in wireless networks, this approach takes the channel state information and the relay selection decisions into account to derive a pure trust value for each relay node. The proposed method can be applied to any cooperative system with a general relay selection policy whose decisions in each cooperative transmission are independent of the previous ones. Moreover, it does not impose additional communication overhead on the system as it uses the available information in relay selection procedure. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   
82.
In this paper, a hybrid method is proposed for multi-channel electroencephalograms (EEG) signal compression. This new method takes advantage of two different compression techniques: fractal and wavelet-based coding. First, an effective decorrelation is performed through the principal component analysis of different channels to efficiently compress the multi-channel EEG data. Then, the decorrelated EEG signal is decomposed using wavelet packet transform (WPT). Finally, fractal encoding is applied to the low frequency coefficients of WPT, and a modified wavelet-based coding is used for coding the remaining high frequency coefficients. This new method provides improved compression results as compared to the wavelet and fractal compression methods.  相似文献   
83.
One great challenge in wireless communication systems is to ensure reliable communications. Turbo codes are known by their interesting capabilities to deal with transmission errors. In this paper, we present a novel turbo decoding scheme based on soft combining principle. Our method improves decoding performance using soft combining technique inside the turbo decoder. Working on Max-Log-Maximum a Posteriori (Max-Log-MAP) turbo decoding algorithm and using an Additive White Gaussian Noise (AWGN) channel model and 16 Quadrature Amplitude Modulation (16QAM), simulation results show that the suggested solution is efficient and outperforms the conventional Max-Log-MAP algorithm in terms of Bit Error Rate (BER). The performance analysis is carried out in terms of BER by varying parameters such as the Energy per bit to Noise power spectral density ratio ( \(\text {E}_{\text {b}}/\text {N}_{\text {o}}\) ), and decoding iterations number. We call our proposed solution Soft Combined Turbo Codes.  相似文献   
84.
Hershey  J.E. Molnar  K. Hassan  A. 《Electronics letters》1992,28(18):1721-1722
The authors suggest that effective algorithms for spectrum search, such as those used for detecting spread spectrum signals, may be derived by selecting suboptimal algorithms and then recovering some of the lost efficacy through parallelisation methods. This thesis is motivated by considering a simple yet meaningful example of a spectrum search technique that exhibits what at first may seem to be counterintuitive behaviour.<>  相似文献   
85.
This paper presents a faulty node detection approach for wireless sensor networks that aggregate measurement data on their way toward the sink (base station). The approach is based on the idea of commanding sensor nodes on the aggregation paths to temporarily stop including their readings in the received aggregated readings from their upstream neighbors. The scheme is dependent on the ability of the sink to detect faulty nodes through changes in the received aggregated readings at the sink using a Markov Chain Controller (MCC). The algorithm that is run in the sink uses the MCC to assign a state to each sensor node based on transitions that are triggered by receiving aggregated path readings, and accordingly deduces the nodes that may be faulty. The experimental results show at least 98% detection rate at the cost of reasonable detection delays and generated wireless network traffic. Copyright © 2016 John Wiley & Sons, Ltd.  相似文献   
86.
A cluster-based trust-aware routing protocol for mobile ad hoc networks   总被引:2,自引:0,他引:2  
Routing protocols are the binding force in mobile ad hoc network (MANETs) since they facilitate communication beyond the wireless transmission range of the nodes. However, the infrastructure-less, pervasive, and distributed nature of MANETs renders them vulnerable to security threats. In this paper, we propose a novel cluster-based trust-aware routing protocol (CBTRP) for MANETs to protect forwarded packets from intermediary malicious nodes. The proposed protocol organizes the network into one-hop disjoint clusters then elects the most qualified and trustworthy nodes to play the role of cluster-heads that are responsible for handling all the routing activities. The proposed CBTRP continuously ensures the trustworthiness of cluster-heads by replacing them as soon as they become malicious and can dynamically update the packet path to avoid malicious routes. We have implemented and simulated the proposed protocol then evaluated its performance compared to the clustered based routing protocol (CBRP) as well as the 2ACK approach. Comparisons and analysis have shown the effectiveness of our proposed scheme.  相似文献   
87.
The orthogonal frequency-division multiplexing (OFDM) systems are highly sensitive to the nonlinear distortions introduced by the high-power amplifier at the transmitter and to the in-phase and quadrature (IQ) imbalance of the down converter at the receiver. In this paper, the joint effects of these impairments on the performance of the OFDM systems with M signal points quadrature amplitude modulation (M-QAM) are investigated. Moreover, the analytical formulations for the error vector magnitude, the bit error rate, and the total degradation performances of the M-QAM-OFDM systems in additive white Gaussian noise channels as a function of the output back off and IQ imbalance parameters are derived. The computer simulation results confirm the accuracy and validity of our proposed analytical approach.  相似文献   
88.
Favorable properties of aqueous solutions are improved with the addition of different materials for separation of hydrogen sulfide (H2S). Also, equilibrium data and available equations for solubility estimation of this gas are only valid for specific solutions and limited ranges of temperature and pressure. In this regard, a machine learning model based on Support vector machine (SVM) algorithm is proposed and developed with mixtures containing different amines and ionic liquids to predict H2S solubility over wide ranges of temperature (298–434.5 K), pressure (13–9319 kPa), overall mass concentration (3.82–100%) and mixture's apparent molecular weight (18.39–556.17 g/mol). The accuracy of the performance of this network was evaluated by regression analysis on calculated and experimental data, which had not been used in network training.  相似文献   
89.
This paper is a brief review of the method for analyzing the space and time dependent exergy and irreversibility fields in processes. It presents the basic equations, the method for their use, major literature sources, and three examples from the authors' work: flow desiccation, combustion of oil droplets, and combustion of pulverized coal. Conclusions from this Second Law analysis are used to attempt process improvement suggestions.  相似文献   
90.
A detailed review of the archival reveals that the heat transfer and fluid flow characteristics of circular cavities have not been investigated so far and of course their physical features are not understood. A prominent application of these cavities arises in the miniaturized packaging of electronic components that are subject to strict constraints. This paper addresses primarily steady-state laminar natural convection of air in a circular cavity of diameter H inscribed in a square cavity of side H where the corresponding sides are in contact at four points. A third cavity, an arc–square cavity whose shape lies between the square and circular cavity shapes is included in the analysis. The finite volume method is used to perform the numerical simulations. The methodology takes into account the second-order-accurate QUICK scheme for the discretization of the convective term, whereas the pressure–velocity coupling is handled with the SIMPLE scheme. Since the air is not assumed a Boussinesq gas, it was decided to take all thermophysical properties as temperature-dependent. In the end, it has been demonstrated that the circular cavity possesses a superior balance between heat transfer enhancement and size in cross-section area in comparison with the standard square cavity. The side of the square cavity is similar to the diameter of the circular cavity.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号