首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3362篇
  免费   160篇
  国内免费   4篇
电工技术   39篇
综合类   3篇
化学工业   891篇
金属工艺   59篇
机械仪表   82篇
建筑科学   99篇
矿业工程   35篇
能源动力   159篇
轻工业   397篇
水利工程   30篇
石油天然气   8篇
无线电   268篇
一般工业技术   455篇
冶金工业   384篇
原子能技术   32篇
自动化技术   585篇
  2024年   13篇
  2023年   46篇
  2022年   107篇
  2021年   157篇
  2020年   104篇
  2019年   88篇
  2018年   105篇
  2017年   91篇
  2016年   111篇
  2015年   83篇
  2014年   151篇
  2013年   213篇
  2012年   217篇
  2011年   219篇
  2010年   174篇
  2009年   139篇
  2008年   166篇
  2007年   134篇
  2006年   94篇
  2005年   93篇
  2004年   75篇
  2003年   52篇
  2002年   58篇
  2001年   53篇
  2000年   43篇
  1999年   44篇
  1998年   72篇
  1997年   55篇
  1996年   53篇
  1995年   48篇
  1994年   31篇
  1993年   41篇
  1992年   20篇
  1991年   27篇
  1990年   14篇
  1989年   14篇
  1988年   15篇
  1987年   15篇
  1986年   13篇
  1985年   20篇
  1984年   16篇
  1983年   13篇
  1982年   21篇
  1981年   15篇
  1980年   11篇
  1979年   11篇
  1977年   15篇
  1972年   11篇
  1944年   10篇
  1943年   21篇
排序方式: 共有3526条查询结果,搜索用时 15 毫秒
41.
The periodic structure of the underlying support of paintings on canvas can become quite prominent and disturbing in high resolution digital recordings. In this paper, we construct a new model and method for the digital removal of canvas which is considered as a noise component superimposed on the painting artwork. The high resolution of the images prohibits the efficient application of existing adaptive denoising filters. Hence, a two-step approach is proposed. First a (smoothing) Wiener filter is applied to the complete image. The second step consists of a spatially adaptive extension with low-complexity to obtain a generic digital canvas removal filter.  相似文献   
42.
Some statistical properties of mathematical morphology   总被引:4,自引:0,他引:4  
Analyzes the statistical properties of the basic binary and multilevel morphological operations with both 1-D and 2D structuring elements. Very simple expressions for the output distribution of erosion and opening are derived in the case of any independent identically or nonidentically distributed inputs. The probability relations between erosion and dilation, also between opening and closing, are developed. The output expectation bias and variances are analyzed and computed to show the efficiency of morphological operations for noise supression. As applications of theoretical results, the effects of the morphological operations on noisy signals are illustrated by several examples. The study reveals certain interesting phenomena. For example, the output variances of opening for some input distributions are greater than those of erosion, and morphological operations perform better than median filters in edge preservation  相似文献   
43.
The design of secure ICs requires fulfilling means conforming to many design rules in order to protect access to secret data. On the other hand, designers of secure chips cannot neglect the testability of their chip since high quality production testing is primordial to a good level of security. However, security requirements may be in conflict with test needs and testability improvement techniques that increase both observability and controllability. In this paper, we propose to merge security and testability requirements in a control-oriented design for security scan technique. The proposed security scan design methodology induces an adaptation of two main aspects of testability technique design: protection at protocol level and at scan path level. Without loss of generality, the proposed solution is evaluated on a simple crypto chip in terms of security and design cost.
Bruno Rouzeyre (Corresponding author)Email:
  相似文献   
44.
In the last years, the number of Wi-Fi hotspots at public venues has undergone a substantial growth, promoting the WLAN technologies as the ubiquitous solution to provide high-speed wireless connectivity in public areas. However, the adoption of a random access CSMA-based paradigm for the 802.11 MAC protocol makes difficult to ensure high throughput and a fair allocation of radio resources in 802.11-based WLANs. In this paper we evaluate extensively via simulations the interaction between the flow control mechanisms implemented at the TCP layer and the contention avoidance techniques used at the 802.11 MAC layer. We conducted our study considering initially M wireless stations performing downloads from the Internet. From our results, we observed that the TCP downlink throughput is not limited by the collision events, but by the inability of the MAC protocol to assign a higher chance of accessing the channel to the base station. We propose a simple and easy to implement modification of the base station’s behavior with the purpose of increasing the TCP throughput reducing useless MAC protocol overheads. With our scheme, the base station is allowed to transmit periodically bursts of data frames towards the mobile hosts. We design a resource allocation protocol aimed at maximizing the success probability of the uplink transmissions by dynamically adapting the burst length to the collision probability estimated by the base station. By its design, our scheme is also beneficial to achieve a fairer allocation of the channel bandwidth among the downlink and uplink flows, and among TCP and UDP flows. Simulation results confirm both the improvement in the TCP downlink throughput and the reduction of system unfairness.  相似文献   
45.
In the last century, owing to the constant evolution of technologies telecommunication networks have become increasingly robust, being able to support multiple services. These services are part of the heterogeneous network traffic that can be carried through the Internet. Many of these services, including VoIP, are latency sensitive. In other words, this means that their quality depends directly on the network quality of service. Since users tend to become more sensitive with the instability and unavailability of the network, it is important to improve traffic management. A particular type of data that could be used to improve VoIP traffic management is the Internet Protocol Detail Record (IPDR). IPDRs are tickets created by all VoIP call attempts which contain a group of information related to the call history. Because of its full range of information, IPDRs can be used to create VoIP traffic baselines. This paper presents the development of baselines based on IPDRs to support VoIP traffic management in open‐access Metropolitan Area Networks (MAN). Copyright © 2013 John Wiley & Sons, Ltd.  相似文献   
46.
The complexity of modern hardware design has created the need for higher levels of abstraction, where system modeling is used to integrate modules into complex System-on-Chip (SoCs) platforms. SystemC, and its TLM (Transaction Level Modeling) extensions, have been used for this purpose mainly because of their fast prototyping and simulation features, which allow for early design space exploration. This paper proposes an approach to explore and interact with SystemC models by means of an introspection technique known as Computational Reflection. We use reflection to implement a white-box introspection mechanism called ReflexBox. We show that ReflexBox is a fast, non-intrusive technique that can be used to dynamically gather and inject stimuli into any SystemC module, without the need to use a proprietary SystemC implementation, change the SystemC library, instrument or even inspect the module source code. Our approach can be used to support many different verification tasks like platform debugging, performance evaluation and communication analysis. To show ReflexBox effectiveness we used it in three platforms case studies to address tasks like register inspection, performance analysis and signal replaying for testbench reuse. In all cases we assumed no source code availability and measured the impact on the overall platform performance.  相似文献   
47.
48.
49.
Focused ultrasound is very well suited for inducing noninvasive local hyperthermia. Since magnetic resonance imaging (MRI) may be employed to obtain real-time temperature maps noninvasively the combination of these two technologies offers great advantages specifically aimed toward oncological studies. Real-time identification of the target region and accurate control of the temperature evolution during the treatment has now become possible. Thermal ablation of pathological tissue, local drug delivery using thermosensitive micro-carriers and controlled transgene expression using thermosensitive promoters have recently been demonstrated with this unique technology. Based on these experiments combined focused ultrasound and MRI thermometry holds promise for future oncological diagnostics and treatment. In this paper, we review some of the recent methodological developments as well as experimental and first clinical studies using this approach.  相似文献   
50.
Assembly technologies follow the reduction in size of circuit board components and correlatively the number of active layers increases significantly. Therefore, during a conventional acoustic analysis, the obtained image becomes more and more complicated to analyze. In a previous paper, we focused our research on a method for a suitable visualization of the timescale of an acoustic signal (CWT). In this paper we present the use of the non-destructive control for the study of a 3D package submitted to accelerated ageing tests using harsh conditions.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号