首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2649篇
  免费   96篇
  国内免费   68篇
电工技术   66篇
综合类   140篇
化学工业   154篇
金属工艺   59篇
机械仪表   57篇
建筑科学   50篇
矿业工程   15篇
能源动力   44篇
轻工业   129篇
水利工程   29篇
石油天然气   10篇
武器工业   4篇
无线电   115篇
一般工业技术   124篇
冶金工业   1631篇
原子能技术   8篇
自动化技术   178篇
  2024年   6篇
  2023年   20篇
  2022年   44篇
  2021年   46篇
  2020年   39篇
  2019年   26篇
  2018年   24篇
  2017年   31篇
  2016年   34篇
  2015年   33篇
  2014年   44篇
  2013年   62篇
  2012年   76篇
  2011年   85篇
  2010年   80篇
  2009年   84篇
  2008年   80篇
  2007年   85篇
  2006年   77篇
  2005年   51篇
  2004年   47篇
  2003年   34篇
  2002年   26篇
  2001年   38篇
  2000年   19篇
  1999年   56篇
  1998年   476篇
  1997年   305篇
  1996年   170篇
  1995年   104篇
  1994年   72篇
  1993年   94篇
  1992年   18篇
  1991年   14篇
  1990年   19篇
  1989年   11篇
  1988年   14篇
  1987年   7篇
  1986年   4篇
  1985年   6篇
  1983年   5篇
  1982年   8篇
  1981年   16篇
  1980年   16篇
  1978年   9篇
  1977年   49篇
  1976年   133篇
  1975年   6篇
  1967年   3篇
  1955年   2篇
排序方式: 共有2813条查询结果,搜索用时 0 毫秒
21.
基于集对分析的敌空袭目标排序   总被引:2,自引:1,他引:2  
鹿磊  纳学柱  孔健  杨文军  高伟 《兵工自动化》2009,28(7):31-32,57
基于集对分析理论,提出敌空袭目标排序的判断模型.通过建立待评估方案决策矩阵,构造理想方案;运用层次分析法确定评价指标权重,形成待评估方案和理想方案联系矩阵;对各项指标值与其相应权重系数线性叠加合成,以同一度大小对备选方案排序选优.该方法为敌空袭目标排序判断提供了简单、实用的评价方法.实例分析验证说明该方法准确可行.  相似文献   
22.
在充分利用呼伦贝尔市广电网络分公司原有HFC网络设备的基础上增加回传功能模块,实现HFC网络双向传输功能。在HFC网上建立基于DOCSIS2.0的CM数据传输系统,实现HFC网络中视频、语音、数据等业务的融合。重点阐述CM系统中数据和语音业务的实现过程,包括物理链路的建立、媒质访问控制子层(MAC)的建立及传输汇聚子层(TC)的建立。  相似文献   
23.
网络在实验教学中的应用研究   总被引:1,自引:0,他引:1  
本文分析了高校实验教学的现状以及实验课的课堂指导局限性,提出以网络辅助课堂指导,使其成为实验教学的一种补充,并分析了网络作为实验教学补充形式的优势和可能存在的问题。根据通信电路实验室的实验内容和发展规划,提出建设电子技术制作、开发和应用网站的实施方案。确定网站的发展分两个阶段,规划了每个阶段的任务。网站的系统平台充分利用了新技术的优势采用了Linux+Apache+PHP+MySQL。为了搞好网络教学这种现代化的教学模式,笔者从教师、学生及网站等几个方面提出一些建议。  相似文献   
24.
Wireless sensor networks (WSN) consist of hundreds of miniature sensor nodes to sense various events in the surrounding environment and report back to the base station. Sensor networks are at the base of internet of things (IoT) and smart computing applications where a function is performed as a result of sensed event or information. However, in resource‐limited WSN authenticating a remote user is a vital security concern. Recently, researchers put forth various authentication protocols to address different security issues. Gope et al presented a protocol claiming resistance against known attacks. A thorough analysis of their protocol shows that it is vulnerable to user traceability, stolen verifier, and denial of service (DoS) attacks. In this article, an enhanced symmetric key‐based authentication protocol for IoT‐based WSN has been presented. The proposed protocol has the ability to counter user traceability, stolen verifier, and DoS attacks. Furthermore, the proposed protocol has been simulated and verified using Proverif and BAN logic. The proposed protocol has the same communication cost as the baseline protocol; however, in computation cost, it has 52.63% efficiency as compared with the baseline protocol.  相似文献   
25.
采用固相反应法制备了Pb0.96La0.06(Zr1-xTix)O3陶瓷,研究了Ti含量对所制陶瓷的电性能和储能特性的影响。结果表明,PbLa(ZrTi)O3陶瓷介电常数与电场强度呈非线性变化关系。当Ti含量x为0.08时,所测电滞回线细长狭窄,并呈下凹趋势,此时极化强度为22.18×10–6 C/cm2,储能密度为1.06 J/cm3。通过流延法制备的脉冲功率电容器击穿电压可大幅度提升,储能密度达1.95 J/cm3,具有高能量转换效率。  相似文献   
26.
This paper describes an analytical model for bulk electron mobility in strained-Si layers as a function of strain.Phonon scattering,columbic scattering and surface roughness scattering are included to analyze the full mobility model.Analytical explicit calculations of all of the parameters to accurately estimate the electron mobility have been made.The results predict an increase in the electron mobility with the application of biaxial strain as also predicted from the basic theory of strain physics of metal oxide semiconductor(MOS) devices.The results have also been compared with numerically reported results and show good agreement.  相似文献   
27.
Proposes a new wrap-around type switch structure based on omega networks. Their uniform interconnection pattern and symmetrical structure helps design a so-called wrap-around switch, The new switch deploys a self-routing mechanism between the input and the output ports. Another characteristic of the switch is the packet filters which are located right in front of the switch elements (SEs). This filtering operation greatly reduces the traffic in the switch fabric by allowing the incoming cells to reach their destination ports without going further in the network  相似文献   
28.

Authentication schemes are widely used mechanisms to thwart unauthorized access of resources over insecure networks. Several smart card based password authentication schemes have been proposed in the literature. In this paper, we demonstrate the security limitations of a recently proposed password based authentication scheme, and show that their scheme is still vulnerable to forgery and offline password guessing attacks and it is also unable to provide user anonymity, forward secrecy and mutual authentication. With the intention of fixing the weaknesses of that scheme, we present a secure authentication scheme. We show that the proposed scheme is invulnerable to various attacks together with attacks observed in the analyzed scheme through both rigorous formal and informal security analysis. Furthermore, the security analysis using the widely-accepted Real-Or-Random (ROR) model ensures that the proposed scheme provides the session key (SK) security. Finally, we carry out the performance evaluation of the proposed scheme and other related schemes, and the result favors that the proposed scheme provides better trade-off among security and performance as compared to other existing related schemes.

  相似文献   
29.
A two-dimensional (2-D) analytical model for the surface potential variation along the channel in fully depleted dual-material gate silicon-on-insulator MOSFETs is developed to investigate the short-channel effects (SCEs). Our model includes the effects of the source/drain and body doping concentrations, the lengths of the gate metals and their work functions, applied drain and substrate biases, the thickness of the gate and buried oxide and also the silicon thin film. We demonstrate that the surface potential in the channel region exhibits a step function that ensures the screening of the drain potential variation by the gate near the drain resulting in suppressed SCEs like the hot-carrier effect and drain-induced barrier-lowering (DIBL). The model is extended to find an expression for the threshold voltage in the submicrometer regime, which predicts a desirable "rollup" in the threshold voltage with decreasing channel lengths. The accuracy of the results obtained using our analytical model is verified using 2-D numerical simulations.  相似文献   
30.
基于Mamdani型直觉模糊推理的图像融合算法   总被引:1,自引:0,他引:1  
孙祺  那彦  刘波 《电子科技》2014,27(5):193-196
提出了一种基于Mamdani型直觉模糊推理的图像融合算法,该算法首先根据融合目标设定推理规则,并根据推理规则建立直觉模糊推理系统,并将待融合图像的每个像素点直觉模糊化并输入系统,经过推理得到输出图像每个像素点的隶属、非隶属程度,最后通过解模糊计算输出图像的灰度值得到融合图像。实验结果证明,该算法的有效性,且由于直觉模糊集更加精确地描述了客观事物的不确定性,其融合结果优于基于模糊推理系统图像融合算法得到的结果。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号