首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1589篇
  免费   71篇
  国内免费   12篇
电工技术   17篇
综合类   4篇
化学工业   548篇
金属工艺   97篇
机械仪表   24篇
建筑科学   35篇
矿业工程   2篇
能源动力   63篇
轻工业   211篇
水利工程   6篇
石油天然气   35篇
无线电   139篇
一般工业技术   286篇
冶金工业   33篇
原子能技术   11篇
自动化技术   161篇
  2023年   21篇
  2022年   67篇
  2021年   87篇
  2020年   65篇
  2019年   76篇
  2018年   101篇
  2017年   65篇
  2016年   67篇
  2015年   53篇
  2014年   79篇
  2013年   135篇
  2012年   76篇
  2011年   103篇
  2010年   71篇
  2009年   61篇
  2008年   45篇
  2007年   29篇
  2006年   33篇
  2005年   20篇
  2004年   33篇
  2003年   27篇
  2002年   25篇
  2001年   11篇
  2000年   16篇
  1999年   21篇
  1998年   24篇
  1997年   21篇
  1996年   12篇
  1995年   18篇
  1994年   15篇
  1993年   12篇
  1992年   14篇
  1991年   13篇
  1990年   8篇
  1989年   9篇
  1988年   9篇
  1987年   15篇
  1986年   14篇
  1985年   13篇
  1984年   9篇
  1983年   7篇
  1982年   5篇
  1981年   5篇
  1980年   5篇
  1978年   7篇
  1977年   6篇
  1976年   12篇
  1975年   5篇
  1974年   8篇
  1973年   6篇
排序方式: 共有1672条查询结果,搜索用时 17 毫秒
51.
A semi-analytical model for impact ionization coefficient of graphene nanoribbon (GNR) is presented. The model is derived by calculating probability of electrons reaching ionization threshold energy Et and the distance travelled by electron gaining Et. In addition, ionization threshold energy is semi-analytically modelled for GNR. During modelling, we justify our assumptions using analytical modelling and comparison with simulation. Furthermore, it is shown that conventional silicon models are not valid for calculation of ionization coefficient of GNR. Finally, the profile of ionization is presented using the proposed models and the results are compared with that of silicon.  相似文献   
52.
This paper presents an adaptive block-by-block least squares (LS) algorithm for the interpolation of infrared (IR) images. The suggested algorithm is based on the segmentation of the low resolution (LR) image into overlapping blocks and the interpolation of each block, separately. The purpose of the overlapping is to avoid edge effects between blocks. An iterative implementation of the proposed algorithm, which considers the image acquisition model, is used for the minimization of the estimation error in each block. A weight matrix of moderate dimensions is estimated in a small number of iterations to interpolate each block. This proposed algorithm avoids the large computational complexity resulting from the matrices of large dimensions required to interpolate the image as a whole. The performance of the proposed algorithm is compared with the standard as well as the warped distance optimal interpolation of maximal order with minimal support (O-MOMS) algorithm from the peak signal-to-noise ratio (PSNR) point of view. Numerical results reveal the superiority of the proposed LS algorithm to the cubic O-MOMS algorithm.  相似文献   
53.

We perceive big data with massive datasets of complex and variegated structures in the modern era. Such attributes formulate hindrances while analyzing and storing the data to generate apt aftermaths. Privacy and security are the colossal perturb in the domain space of extensive data analysis. In this paper, our foremost priority is the computing technologies that focus on big data, IoT (Internet of Things), Cloud Computing, Blockchain, and fog computing. Among these, Cloud Computing follows the role of providing on-demand services to their customers by optimizing the cost factor. AWS, Azure, Google Cloud are the major cloud providers today. Fog computing offers new insights into the extension of cloud computing systems by procuring services to the edges of the network. In collaboration with multiple technologies, the Internet of Things takes this into effect, which solves the labyrinth of dealing with advanced services considering its significance in varied application domains. The Blockchain is a dataset that entertains many applications ranging from the fields of crypto-currency to smart contracts. The prospect of this research paper is to present the critical analysis and review it under the umbrella of existing extensive data systems. In this paper, we attend to critics' reviews and address the existing threats to the security of extensive data systems. Moreover, we scrutinize the security attacks on computing systems based upon Cloud, Blockchain, IoT, and fog. This paper lucidly illustrates the different threat behaviour and their impacts on complementary computational technologies. The authors have mooted a precise analysis of cloud-based technologies and discussed their defense mechanism and the security issues of mobile healthcare.

  相似文献   
54.
A key performance indicator of mobile wireless networks is failure probability of handover calls. In this paper, we propose a Call Admission Control policy which prioritizes handover calls over new calls in WCDMA systems. The OVSF code occupancy of the system is modeled by a Markov chain and the differentiation between handover and new calls is performed at the code level by introducing a “guard code” scheme. The scheme belongs to the well-known family of guard channel schemes and reserves some code capacity to favor the continuation of handover calls over the new calls. As the management of the general case is intractable, we solve certain numerical instances of the problem and manage to calculate several performance metrics like new call blocking and handover failure probabilities and code utilization. We complete our study with simulation results in the case of higher OVSF code tree capacity.
Angelos N. RouskasEmail:
  相似文献   
55.
In this paper, frequency domain pre-equalization (Pre-FDE) is developed for broadband cyclic prefix-code division multiple access (CP-CDMA) as a single carrier transmission scheme, and for multi carrier-CDMA (MC-CDMA) and orthogonal frequency division multiplexing (OFDM) as multi carrier transmission schemes. A comparison study is held between these schemes and the traditional equalization schemes. Experimental results show that pre-equalization improves significantly the performance of the single and multi carrier communication systems with a very low complexity at the receiver. The comparative study between MIMO pre-equalization for single carrier systems and for multi carrier systems shows that MIMO pre-equalization for single carrier systems outperforms that for multi carrier systems in terms of bit error rate (BER) performance since single carrier transmission has more frequency diversity than multi carrier transmission in the uncoded case.  相似文献   
56.
In this work polyacrylamide (PACM) was prepared by radical polymerization technique using ammonium persulfate (APS) as initiator under nitrogen atmosphere. The viscosity average molecular weight of the prepared PACM was found to be 177858. The free amino groups of PACM, poly(2-methoxyaniline) was grafted by the oxidation of 2-methoxyaniline using APS in acidic medium under nitrogen atmosphere. The grafting percent is found to be 96%. The morphology of the obtained PACM and PACM-g-P2-MeOANI was studied by X-ray diffraction and scanning electron microscope. The grafting process enhances the morphology of both PACM and poly(2-methoxyaniline). The inhibiting effect of the three polymers on the mild steel corrosion in the 1.0?M HCl as aggressive environments have been measured gravimetrically at three different temperatures 25, 40 and 55?°C and electrically at 25?°C. The inhibition efficiencies of the three tested polymers were found to increase with temperature. The poly(2-methoxyaniline) is the most effective one as a corrosion inhibitor at all tested temperatures. The adsorption behavior of the polymers was found to follow Villamil isotherm and the values of the change in free energy refer to a mixed chemical and physical adsorption on the steel surface. Tafel curves indicate that the tested polymers act as mixed anodic and cathodic inhibitor. The double layer capacitance was found to decrease with increasing the inhibitor concentration.  相似文献   
57.
The effect of block, convolutional and Turbo coding on the probability of error and the capacity are investigated for CDMA Low Earth Orbit (LEO) Satellite systems. The model employed assumes a contaminated Gaussian traffic model to be more compatible with different population areas. The conventional Gaussian distribution can be considered as a special case.  相似文献   
58.

2D and 3D beam synthesis from different antenna array arrangements are investigated in this paper. Planar sunflower, conformal cylinderical and spherical helical array arrangements are studied. The particle swarm optimization (PSO) technique is used to predict the phase distribution on the array elements. The beam synthesis is achieved by comparing the array factor with a predetermined mask with both upper and lower limits according to the intented application requirements. Different 2D and 3D masks are used in beam synthesis as pencil, flat-top, and cosecant single beam are predicted. The planar sunflower antenna array is investigated due to its high gain, low side-lobe level (SLL) below ??20 dB and its compact size. The phase distribution of sunflower array is estimated using PSO to radiate dual-beams in different planes. Dual-beam with pencil, flat-top, and cosecant beams are obtained with different half-power beam widths. 3D conformal antenna arrays of cylindrical and spherical helical arrangements are studied. Each 3D conformal array consists of four arms shifted in position by 90° orintation angle. Each arm is designed to radiate single beam in a specific direction. Four-beams are considered to radiate in the directions of θ1,2,3,4?=?30°, and ?1?=?0°, ?2?=?90°, ?3?=?180°, and ?4?=?270° with SLL optimized below ??17 dB. The array arrangements analysis is based on the array theory formulation, through the implemention of the estimiated equation using a home programmed MATLAB code.

  相似文献   
59.
This paper presents a simple and efficient multiple access interference (MAI) cancelation technique in optical code division multiple access (OCDMA) system. The proposed technique is based on hybrid frequency shift keying (FSK) with an enhanced modified prime code as a signature sequence for coding techniques. Coherent FSK modulation along with incoherent demodulation using Arrayed-Waveguide Grating has been examined in the transceiver structure. In the proposed technique, a reference signal is constructed by using one of the addressed spreading sequences, and MAI cancelation is performed by subtracting the reference signal from the received signal of the desired user. The performance of the proposed FSK-OCDMA system is compared with the performance of the existing pulse position modulation (PPM)–OCDMA system. The simulation results reveal that the bit-error rate performance of the proposed technique is superior to the performance of the pulse position modulation (PPM) technique. Also, the results indicate that the proposed technique is very power efficient, and when the bit rate is constant, the network capacity can be expanded to accommodate a large number of simultaneous active users with low error rate. Moreover, the proposed technique simplifies the hardware of the receiver design.  相似文献   
60.
Latterly, reduction of power loss in distribution system is the objective of many researches due to its impact on total costs and voltage profiles. It can be handled by optimal restructure of radial distribution system (RDS). This article introduces an innovative approach to restructure of RDS by electing the optimal switches combination subject to the system operating constraints, which is improved whale optimization approach (IWOA). The suggested approach combines exploitation of WOA with exploration of differential evolution (DE), and thus, it supplies a promising candidate solution. The suggested approach is tested on IEEE 33 and 69 bus RDS. The superiority of the suggested approach compared with other well‐known approaches is verified through simulation results by observation of total losses, cost, and saving. Also, the impact of alterable loading is investigated to prove the effectiveness of the suggested IWOA.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号