首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7635篇
  免费   342篇
  国内免费   48篇
电工技术   213篇
综合类   20篇
化学工业   1635篇
金属工艺   159篇
机械仪表   183篇
建筑科学   237篇
矿业工程   8篇
能源动力   511篇
轻工业   758篇
水利工程   89篇
石油天然气   153篇
武器工业   4篇
无线电   940篇
一般工业技术   1346篇
冶金工业   450篇
原子能技术   77篇
自动化技术   1242篇
  2024年   17篇
  2023年   178篇
  2022年   422篇
  2021年   524篇
  2020年   372篇
  2019年   373篇
  2018年   479篇
  2017年   334篇
  2016年   377篇
  2015年   232篇
  2014年   357篇
  2013年   588篇
  2012年   389篇
  2011年   441篇
  2010年   280篇
  2009年   240篇
  2008年   226篇
  2007年   206篇
  2006年   172篇
  2005年   152篇
  2004年   124篇
  2003年   102篇
  2002年   117篇
  2001年   62篇
  2000年   65篇
  1999年   76篇
  1998年   123篇
  1997年   107篇
  1996年   71篇
  1995年   78篇
  1994年   51篇
  1993年   50篇
  1992年   40篇
  1991年   23篇
  1990年   28篇
  1989年   42篇
  1988年   46篇
  1987年   28篇
  1986年   28篇
  1985年   42篇
  1984年   49篇
  1983年   41篇
  1982年   26篇
  1981年   21篇
  1980年   28篇
  1979年   23篇
  1978年   18篇
  1977年   21篇
  1976年   30篇
  1974年   16篇
排序方式: 共有8025条查询结果,搜索用时 15 毫秒
101.
Abdalrazik  Ahmad  Gomaa  Ahmed  Kishk  Ahmed A. 《Wireless Networks》2022,28(8):3779-3786
Wireless Networks - This paper proposes a quadruple band stacked oval patch antenna with sunlight-shaped slots supporting L1/L2/L5 GNSS bands and the 2.3 Ghz WiMAX band. The antenna produces...  相似文献   
102.
In multiprocessor system-on-chip, tasks and communications should be scheduled carefully since their execution order affects the performance of the entire system. When we implement an MPSoC according to the scheduling result, we may find that the scheduling result is not correct or timing constraints are not met unless it takes into account the delays of MPSoC architecture. The unexpected scheduling results are mainly caused from inaccurate communication delays and or runtime scheduler’s overhead. Due to the big complexity of scheduling problem, most previous work neglects the inter-processor communication, or just assumes a fixed delay proportional to the communication volume, without taking into consideration subtle effects like the communication congestion and synchronization delay, which may change dynamically throughout tasks execution. In this paper, we propose an accurate scheduling model of hardware/software communication architecture to improve timing accuracy by taking into account the effects of dynamic software synchronization and detailed hardware resource constraints such as communication congestion and buffer sharing. We also propose a method for runtime scheduler implementation and consider its performance overhead in scheduling. In particular, we introduce efficient hardware and software scheduler architectures. Furthermore, we address the issue of centralized implementation versus distributed implementation of the schedulers. We investigate the pros and cons of the two different scheduler implementations. Through experiments with significant demonstration examples, we show the effectiveness of the proposed approach.  相似文献   
103.
In recent years, the usage and applications of Internet of Things (IoT) have increased exponentially. IoT connects multiple heterogeneous devices like sensors, micro controllers, actuators, smart devices like mobiles, watches, etc. IoT contributes the data produced in the context of data collection, including the domains like military, agriculture, healthcare, etc. The diversity of possible applications at the intersection of the IoT and the web semantics has prompted many research teams to work at the interface between these two disciplines. This makes it possible to collect data and control various objects in transparent way. The challenge lies in the use of this data. Ontologies address this challenge to meet specific data needs in the IoT field. This paper presents the implementation of a dynamic agriculture ontology-building tool that parses the ontology files to extract full data and update it based on the user needs. The technology is used to create the angular library for parsing the OWL files. The proposed ontology framework would accept user-defined ontologies and provide an interface for an online updating of the owl files to ensure the interoperability in the agriculture IoT.  相似文献   
104.
Sn-9Zn solder joints containing Ag nano particles were prepared by mechanically mixing Ag nano particles (0.3, 0.5 and 1 wt%) with Sn-9Zn solder paste. In the monolithic Sn-Zn solder joints, scallop-shaped AuZn3 intermetallic compound layers were found at their interfaces. However, after the addition of Ag nano particles, an additional uniform AgZn3 intermetallic compound layer well adhered to the top surface of the AuZn3 intermetallic compound layer was found. In addition, in the solder ball region, fine spherical-shaped AgZn3 intermetallic compound particles were observed as well as Zn-rich and β-Sn phases. With the addition of Ag nano particles, the shear strengths consistently increased with an increase in the Ag nano particle content due to the uniform distribution of fine AgZn3 intermetallic compound particles. The shear strength of monolithic Sn-Zn and 1 wt% Ag nano particle content Sn-Zn solder joints after one reflow cycle were about 42.1 MPa and 48.9 MPa, respectively, while their shear strengths after eight reflow cycles were about 39.0 MPa and 48.4 MPa, respectively. The AgZn3 IMCs were found to be uniformly distributed in the β-Sn phase for Ag particle doped Sn-9Zn composite solder joints, which result in an increase in the tensile strength, due to a second phase dispersion strengthening mechanism. The fracture surface of monolithic Sn-Zn solder exhibited a brittle fracture mode with a smooth surface while Sn-Zn solder joints containing Ag nano particles showed a typical ductile failure with very rough dimpled surfaces.  相似文献   
105.
Most trust and reputation solutions in wireless mesh networks (WMNs) rely on the intrusion detection system (IDS) Watchdog. Nevertheless, Watchdog does not consider packet loss on wireless links and may generate false positives. Consequently, a node that suffers from packet loss on one of its links may be accused wrongly, by Watchdog, of misbehaving. To deal with this issue, we propose in this paper a novel trust system which considers packet loss of links. Our trust system is based on a statistical detection method (SDM) implemented on each node of the network. Firstly, the SDM, via CUSUM test, analyzes the behavior of the packets loss in order to detect a dropping attack. Secondly, the SDM, through the Kolmogorov-Smirnov test, compares the behavior of the total packets loss with that of the control packets in order to identify the attack type. Our system allows every WMN’s node to assign to each of its neighbors, a trust value which reflects its real behavior. We have validated the proposed SDM method via extensive simulations on ns2 and have compared our trust system with an existing solution. The results display that our SDM solution offers better performance.  相似文献   
106.
107.
Hisham  Mohamed  Elmogy  Ahmed  Sarhan  Amany  Sallam  Alsayed 《Wireless Networks》2020,26(1):685-698
Wireless Networks - In Wireless Local Area Networks (WLAN), portable devices such as notebooks, tabs, and smart phones are powered by batteries with limited energy. With the great increase of using...  相似文献   
108.
Wireless Networks - This paper discusses a framework for algorithm-architecture synergy for (1) performance evaluation and (2) FPGA implementation complexity analysis of linear massive MIMO...  相似文献   
109.
Traditional protocols for routing in ad hoc networks attempt to obtain optimal or shortest paths, and in doing so may incur significant route discovery overhead. Such approaches may be appropriate for routing long-lived transfers where the initial cost of route discovery may be amortized over the life of the connection. For short-lived connections, however, such as resource discovery and small transfers, traditional shortest path approaches may be quite inefficient. In this paper we propose a novel architecture, CARD, for resource discovery in large-scale wireless ad hoc networks. Our mechanism is suitable for resource discovery as well as routing very small data transfers or transactions in which the cost of data transfer is much smaller than the cost of route discovery. Our architecture avoids expensive mechanisms such as global flooding and complex hierarchy formation and does not require any location information. In CARD resources within the vicinity of a node, up to a limited number of hops, are discovered using a proactive scheme. For resources beyond the vicinity, each node maintains a few distant nodes called contacts. Contacts help in creating a small world in the network and provide an efficient way to query for distant resources. Using contacts, the network view (or reachability) of the nodes increases, reducing the discovery overhead and increasing the success rate. On the other hand, increasing the number of contacts also increases control overhead. We study such trade-off in depth and present mechanisms for contact selection and maintenance that attempt to increase reachability with reduced overhead. Our schemes adapt gracefully to network dynamics and mobility using soft-state periodic mechanisms to validate and recover paths to contacts. Our simulation results show that CARD is scalable and can be configured to provide desirable performance for various network sizes. Comparisons with other schemes show overhead savings reaching over 93% (vs. flooding) and 80% (vs. bordercasting or zone routing) for high query rates in large-scale networks.  相似文献   
110.
A new RF switched capacitor bandpass filter and its command circuit made up of a ring voltage controlled oscillator with ‘XOR’ gates are proposed. Implemented in a standard CMOS technology, this circuit is intended to be used in a subset of professional mobile phone applications [380–520 MHz]. Experiments carried out on a prototype show a tunable center frequency range of 260 MHz [240–500 MHz], with a quality factor that can be as high as 300.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号