首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5172篇
  免费   143篇
  国内免费   11篇
电工技术   69篇
综合类   7篇
化学工业   948篇
金属工艺   118篇
机械仪表   170篇
建筑科学   132篇
矿业工程   6篇
能源动力   202篇
轻工业   282篇
水利工程   10篇
石油天然气   16篇
无线电   916篇
一般工业技术   926篇
冶金工业   530篇
原子能技术   26篇
自动化技术   968篇
  2023年   27篇
  2022年   95篇
  2021年   131篇
  2020年   39篇
  2019年   62篇
  2018年   77篇
  2017年   79篇
  2016年   101篇
  2015年   105篇
  2014年   148篇
  2013年   428篇
  2012年   264篇
  2011年   353篇
  2010年   296篇
  2009年   348篇
  2008年   287篇
  2007年   254篇
  2006年   211篇
  2005年   167篇
  2004年   149篇
  2003年   140篇
  2002年   111篇
  2001年   108篇
  2000年   77篇
  1999年   95篇
  1998年   217篇
  1997年   148篇
  1996年   130篇
  1995年   85篇
  1994年   96篇
  1993年   87篇
  1992年   56篇
  1991年   37篇
  1990年   38篇
  1989年   36篇
  1988年   36篇
  1987年   19篇
  1986年   18篇
  1985年   15篇
  1984年   16篇
  1983年   10篇
  1982年   17篇
  1980年   9篇
  1979年   20篇
  1978年   12篇
  1977年   11篇
  1976年   9篇
  1975年   9篇
  1974年   8篇
  1973年   9篇
排序方式: 共有5326条查询结果,搜索用时 15 毫秒
41.
A silicon bipolar process for RF and microwave applications, which features 25-GHz double-polysilicon self-aligned npn bipolar transistors with 5.5-V BV/sub CEO/, optional 0.7-/spl mu/m (L/sub eff/) NMOS transistors with p/sup +/ polysilicon gates for switch applications, lateral pnp transistors, high and low valued resistors, p/sup +/ polysilicon-to-n/sup +/ plug capacitors, and inductors is described. The npn transistors utilize nitride-oxide composite spacers formed using sacrificial TEOS spacers, a process which is simpler than the previously reported composite spacer processes. Use of the composite spacer structure virtually eliminates problems relating to the extrinsic-intrinsic base link-up and reduces plasma induced damage associated with the conventional spacer process. Microwave and RF capabilities of the process up to several GHz are demonstrated by fabricating and characterizing RF amplifiers, low noise amplifiers, and RF switches.<>  相似文献   
42.
This paper proposes a scheduling policy called latest preempted, earliest resumed (LPER) for personal communications services (PCS) systems that support voice services as well as the circuit mode data services. The policy gives priority to the voice services over the data services. The scheduling of voice requests is performed as if no data requests exist. Thus, if no idle channel is available when a voice request arrives, a data channel (if exists) is interrupted and the channel will be used for the voice request. The interrupted data request will be resumed when an idle channel is available. In LPER, the data channel selected for interruption is the one that serves the latest outstanding data request (i.e., other outstanding requests enter the system earlier than this request). When an occupied channel is released, LPER resumes the earliest request that entered the system. An analytic model is proposed to study the performance of LPER and provides guidelines to select the input parameters for the PCS systems. This revised version was published online in June 2006 with corrections to the Cover Date.  相似文献   
43.
Coplanar waveguide-fed uniplanar bow-tie antenna   总被引:3,自引:0,他引:3  
The design of coplanar waveguide (CPW)-fed bow-tie antenna for the 2.4-GHz ISM band is described. A coplanar waveguide-to-coplanar strips (CPW-to-CPS) balun is used to obtain the balanced feed line for the printed bow-tie. An analysis method based on the mixed potential integral equation method is used to characterize the input characteristics of the bow-tie antenna. The numerical results obtained are in good agreement with the experimental data. Through experiments with bow-tie antennas of various extended angles, the bow-tie antenna with a 90° extended angle exhibits the widest bandwidth in the desired frequency band which has a bandwidth of 17% for a VSWR <1.5:1  相似文献   
44.
In this paper, a novel InGaP/GaAs multiple S-shaped negative-differential-resistance (NDR) switch based on a heterostructure-emitter bipolar transistor (HEBT) structure is fabricated and demonstrated. An interesting multiple NDR phenomenon resulting from an avalanche multiplication and successive two-stage barrier lowering process is observed under the inverted operation mode. The three-terminal-controlled and temperature-dependent NDR characteristics are also investigated. In addition, a typical transistor performance is found under the normal operation mode. Consequently, owing to the presented different stable operation points and transistor action, the studied device shows a good potential for multiple-valued logic and analog amplification circuit applications  相似文献   
45.
Recently, there has been an increasing interest in mobile ad hoc networks. In a mobile ad hoc network, each mobile node can freely move around and the network is dynamically constructed by collections of mobile nodes without using any existing network infrastructure. Compared to static networks, it faces many problems such as the inefficiency of routing algorithms. Also, the number of control packets in any routing algorithm increases as the mobile speed or the number of mobile nodes increases. Most of the current routing protocols in ad hoc networks broadcast the control packets to the entire network. Therefore, by reducing the number of control packets, the efficiency of the network routing will be improved. If we know where the destination is, we can beam our search toward that direction. However, without using global positioning systems, how can we do this? Define the range nodes as the 1‐hop or 2‐hop neighbors of the destination node. In this paper, we propose using the range nodes to direct our searches for the destination. It can be combined with the existing routing protocols to reduce the control overhead. We show through simulations that AODV and DSR combined with the range node method outperforms the original AODV and DSR routing protocols in terms of control packets overhead. We also show that the delay introduced in find range nodes is insignificant. Copyright © 2006 John Wiley & Sons, Ltd.  相似文献   
46.
A graphene oxide (GO) film is functionalized with metal (Au) and metal‐oxide (MoOx) nanoparticles (NPs) as a hole‐extraction layer for high‐performance inverted planar‐heterojunction perovskite solar cells (PSCs). These NPs can increase the work function of GO, which is confirmed with X‐ray photoelectron spectra, Kelvin probe force microscopy, and ultraviolet photoelectron spectra measurements. The down‐shifts of work functions lead to a decreased level of potential energy and hence increased Voc of the PSC devices. Although the GO‐AuNP film shows rapid hole extraction and increased Voc, a Jsc improvement is not observed because of localization of the extracted holes inside the AuNP that leads to rapid charge recombination, which is confirmed with transient photoelectric measurements. The power conversion efficiency (PCE) of the GO‐AuNP device attains 14.6%, which is comparable with that of the GO‐based device (14.4%). In contrast, the rapid hole extraction from perovskite to the GO‐MoOx layer does not cause trapping of holes and delocalization of holes in the GO film accelerates rapid charge transfer to the indium tin oxide substrate; charge recombination in the perovskite/GO‐MoOx interface is hence significantly retarded. The GO‐MoOx device consequently shows significantly enhanced Voc and Jsc, for which its device performance attains PCE of 16.7% with great reproducibility and enduring stability.  相似文献   
47.
Jia-Lun Tsai 《电信纪事》2011,66(11-12):663-669
An authenticated group key agreement protocol allows a group of parties to authenticate each other and then determine a group key via an insecure network environment. In 2009, Lee et al. first adopted bilinear pairings to propose a new nonauthenticated group key agreement protocol and then extend it to an authenticated group key agreement protocol. This paper points out that the authenticated protocol of Lee et al. is vulnerable to an impersonation attack such that any adversary can masquerade as a legal node to determine a group key with the other legal nodes and the powerful node. This paper shall employ the short signature scheme of Zhang et al. to propose a new authenticated group key agreement protocol. The short signature scheme of Zhang et al. is proven to be secure against the adaptive chosen-message attacks in the random oracle model, so the proposed protocol can withstand the possible attacks. Besides, compared with the authenticated protocol of Lee et al., the proposed protocol is more secure and efficient.  相似文献   
48.
In this letter, we present a comparison between the bit error rate (BER) performance of a uniform circular array (UCA) and a uniform linear array (ULA) assuming quadrature phase-shift keying (QPSK) and maximal-ratio-combining (MRC) in a mobile radio communication environment. The results are based on analysis, assuming a flat Rayleigh fading channel with omni-directional antennnas and considering the azimuthal plane only. The analytical BER is derived as a function of the spatial fading correlation for both types of antenna arrays. Results show that for similar aperture sizes the UCA outperforms the ULA when considering all angles-of-arrival. However, there is considerable variability over central angle-of-arrival (AOA) for low-to-moderate angle spreads. For angles-of-arrival concentrated near the broadside of the linear array, the ULA typically performs as well as or better than the UCA. A truncated Gaussian AOA (AOA) distribution is assumed to model spatial correlation and the numerical results focus on four element arrays.  相似文献   
49.
This paper examines the feasibility of adding a personal communication network (PCN) to a frequency band which is already allocated to fixed-service microwave systems. To achieve this goal, spread spectrum techniques are used to spread narrowband PCN signals into wideband. The forward and reverse link performance of PCN users under the influence of the microwave system and the influence of PCN users on the microwave system are both examined. It is proven that spectrum sharing between the PCN network and microwave systems is indeed feasible. Although our analysis is done based upon the consideration of only one microwave system, it can be easily extended to allow the appearance of two or more microwave systems  相似文献   
50.
Architectures for packet switches are approaching the limit of electronic switching speed. This raises the question of how best to utilize advances in photonic technology to enable higher speeds. The authors introduce cascaded optical delay line (COD) architectures. The COD architectures utilize an extremely simple distributed electronic control algorithm to configure the states of 2×2 photonic switches and use optical fiber delay lines to temporarily buffer packets if necessary. The simplicity of the architectures may also make them suitable for “lightweight” all-electronic implementations. For optical implementations, the number of 2×2 photonic switches used is a significant factor determining cost. The authors present a “baseline” architecture for a 2×2 buffered packet switch that is work conserving and has the first-in, first-out (FIFO) property. If the arrival processes are independent and without memory, the maximum utilization factor is ρ, and the maximum acceptable packet loss probability is ϵ, then the required number of 2×2 photonic switches is O(log(ϵ)/log(γ)), where γ=ρ2/(ρ2+4-4ρ). If one modifies the baseline architecture by changing the delay line lengths then the system is no longer work conserving and loses the FIFO property, but the required number of 2×2 photonic switches is reduced to O(log[log(ϵ)/log(γ)]). The required number of 2×2 photonic switches is essentially insensitive to the distribution of packet arrivals, but long delay lines are required for bursty traffic  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号