首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3004篇
  免费   143篇
  国内免费   24篇
电工技术   45篇
综合类   5篇
化学工业   708篇
金属工艺   89篇
机械仪表   95篇
建筑科学   98篇
矿业工程   6篇
能源动力   398篇
轻工业   264篇
水利工程   16篇
石油天然气   60篇
无线电   256篇
一般工业技术   557篇
冶金工业   146篇
原子能技术   14篇
自动化技术   414篇
  2024年   8篇
  2023年   63篇
  2022年   142篇
  2021年   183篇
  2020年   124篇
  2019年   106篇
  2018年   186篇
  2017年   134篇
  2016年   150篇
  2015年   89篇
  2014年   137篇
  2013年   248篇
  2012年   153篇
  2011年   189篇
  2010年   119篇
  2009年   135篇
  2008年   99篇
  2007年   91篇
  2006年   83篇
  2005年   43篇
  2004年   56篇
  2003年   61篇
  2002年   40篇
  2001年   30篇
  2000年   29篇
  1999年   29篇
  1998年   49篇
  1997年   32篇
  1996年   29篇
  1995年   39篇
  1994年   18篇
  1993年   25篇
  1992年   19篇
  1991年   18篇
  1990年   13篇
  1989年   19篇
  1988年   12篇
  1987年   11篇
  1986年   10篇
  1985年   21篇
  1984年   16篇
  1983年   8篇
  1982年   15篇
  1981年   12篇
  1980年   13篇
  1979年   9篇
  1977年   7篇
  1975年   6篇
  1974年   6篇
  1973年   11篇
排序方式: 共有3171条查询结果,搜索用时 15 毫秒
41.
Reliability and ageing tests on power semiconductor devices require estimation of junction temperatures in order to control thermal stresses and monitor failure criteria. For this purpose, thermo-electrical parameters, such as voltage forward drop dependence with temperature are usually carried out in low injection level. Nevertheless, it is still difficult to evaluate the limits of such exploitation. An analytical model has been developed and validated by experimental measurements in order to evaluate self-heating effects and to understand high temperature effects. This model should also allow to highlight the role of some physical parameters in the voltage–temperature dependence and to clarify such thermal calibration.  相似文献   
42.
As a network-based localized mobility management protocol, Proxy Mobile IPv6 (PMIPv6) enables a Mobile Host (MH) to roam within a localized domain without MH intervention in the mobility-related signalling. However, the PMIPv6 maintains MH mobility support in a restriction domain. Therefore, whenever the MH roams away from the PMIPv6 domain, its reachability status will be broken-down causing high handover latency and inevitable traffic loss for its communication session. This article proposes a proactive mechanism to mange the MH handover and maintain its data session continually across inter-PMIPv6-domains. The proposed mechanism introduces an intermediate global mobility anchor entity, called, which is responsible to coordinate MH handover as well as redirect its traffic across inter-PMIPv6-domains. Through various simulation evaluations, via ns-2, several experiments were conducted, revealing numerous results that verify the proposed mechanism superior performance over the conventional inter-PMIPv6-domain handover schemes in terms of handover latency, achieved throughput, protocol signalling cost and end-to-end traffic delivery latency.  相似文献   
43.
In this paper the bit error rate performance and error vector magnitude of a tunable impedance matching network is analyzed assuming QPSK, 16-QAM and 64-QAM digital modulation schemes. The characterized tunable impedance matching network is based on barium–strontium–titanate ferroelectric thick-film varactors. Inherent dispersive behavior is subsumed into the forward transmission of the passive device. Due to this nonlinear phase response, in general to maximize the overall system performance, an agile tuning of the varactor values is demonstrated, taking into account the phase and group delay of s21 parameter. Detailed signal simulation results based on measured data of a testbed are presented. The influence of varying matched impedances on the tuning behavior with different modulation bandwidths is discussed at a center frequency of 1.9 GHz.  相似文献   
44.

Radio-frequency identification (RFID) is an up-and-coming technology. The major limitations of RFID technology are security and privacy concerns. Many methods, including encryption, authentication and hardware techniques, have been presented to overcome security and privacy problems. This paper focuses on authentication protocols. The combination of RFID technology being popular but unsecure has led to an influx of mutual authentication protocols. Authentication protocols are classified as being fully fledged, simple, lightweight or ultra-lightweight. Since 2002, much important research and many protocols have been presented, with some of the protocols requiring further development. The present paper reviews in detail recently proposed RFID mutual authentication protocols, according to the classes of the authentication protocols. The protocols were compared mainly in terms of security, the technique that they are based on, protocols that the presented protocol has been compared with, and finally, the method of verifying the protocol. Important points of the comparisons were collected in two tables.

  相似文献   
45.
Sleep scheduling with expected common coverage in wireless sensor networks   总被引:1,自引:0,他引:1  
Sleep scheduling, which is putting some sensor nodes into sleep mode without harming network functionality, is a common method to reduce energy consumption in dense wireless sensor networks. This paper proposes a distributed and energy efficient sleep scheduling and routing scheme that can be used to extend the lifetime of a sensor network while maintaining a user defined coverage and connectivity. The scheme can activate and deactivate the three basic units of a sensor node (sensing, processing, and communication units) independently. The paper also provides a probabilistic method to estimate how much the sensing area of a node is covered by other active nodes in its neighborhood. The method is utilized by the proposed scheduling and routing scheme to reduce the control message overhead while deciding the next modes (full-active, semi-active, inactive/sleeping) of sensor nodes. We evaluated our estimation method and scheduling scheme via simulation experiments and compared our scheme also with another scheme. The results validate our probabilistic method for coverage estimation and show that our sleep scheduling and routing scheme can significantly increase the network lifetime while keeping the message complexity low and preserving both connectivity and coverage.  相似文献   
46.
47.
The mobility and openness of wireless communication technologies make Mobile Healthcare Systems (mHealth) potentially exposed to a number of potential attacks, which significantly undermines their utility and impedes their widespread deployment. Attackers and criminals, even without knowing the context of the transmitted data, with simple eavesdropping on the wireless links, may benefit a lot from linking activities to the identities of patient’s sensors and medical staff members. These vulnerabilities apply to all tiers of the mHealth system. A new anonymous mutual authentication scheme for three-tier mobile healthcare systems with wearable sensors is proposed in this paper. Our scheme consists of three protocols: Protocol-1 allows the anonymous authentication nodes (mobile users and controller nodes) and the HSP medical server in the third tier, while Protocol-2 realizes the anonymous authentication between mobile users and controller nodes in the second tier, and Protocol-3 achieves the anonymous authentication between controller nodes and the wearable body sensors in the first tier. In the design of our protocols, the variation in the resource constraints of the different nodes in the mHealth system are taken into consideration so that our protocols make a better trade-off among security, efficiency and practicality. The security of our protocols are analyzed through rigorous formal proofs using BAN logic tool and informal discussions of security features, possible attacks and countermeasures. Besides, the efficiency of our protocols are concretely evaluated and compared with related schemes. The comparisons show that our scheme outperforms the previous schemes and provides more complete and integrated anonymous authentication services. Finally, the security of our protocols are evaluated by using the Automated Validation of Internet Security Protocols and Applications and the SPAN animator software. The simulation results show that our scheme is secure and satisfy all the specified privacy and authentication goals.  相似文献   
48.

We perceive big data with massive datasets of complex and variegated structures in the modern era. Such attributes formulate hindrances while analyzing and storing the data to generate apt aftermaths. Privacy and security are the colossal perturb in the domain space of extensive data analysis. In this paper, our foremost priority is the computing technologies that focus on big data, IoT (Internet of Things), Cloud Computing, Blockchain, and fog computing. Among these, Cloud Computing follows the role of providing on-demand services to their customers by optimizing the cost factor. AWS, Azure, Google Cloud are the major cloud providers today. Fog computing offers new insights into the extension of cloud computing systems by procuring services to the edges of the network. In collaboration with multiple technologies, the Internet of Things takes this into effect, which solves the labyrinth of dealing with advanced services considering its significance in varied application domains. The Blockchain is a dataset that entertains many applications ranging from the fields of crypto-currency to smart contracts. The prospect of this research paper is to present the critical analysis and review it under the umbrella of existing extensive data systems. In this paper, we attend to critics' reviews and address the existing threats to the security of extensive data systems. Moreover, we scrutinize the security attacks on computing systems based upon Cloud, Blockchain, IoT, and fog. This paper lucidly illustrates the different threat behaviour and their impacts on complementary computational technologies. The authors have mooted a precise analysis of cloud-based technologies and discussed their defense mechanism and the security issues of mobile healthcare.

  相似文献   
49.
This paper presents a simple and efficient multiple access interference (MAI) cancelation technique in optical code division multiple access (OCDMA) system. The proposed technique is based on hybrid frequency shift keying (FSK) with an enhanced modified prime code as a signature sequence for coding techniques. Coherent FSK modulation along with incoherent demodulation using Arrayed-Waveguide Grating has been examined in the transceiver structure. In the proposed technique, a reference signal is constructed by using one of the addressed spreading sequences, and MAI cancelation is performed by subtracting the reference signal from the received signal of the desired user. The performance of the proposed FSK-OCDMA system is compared with the performance of the existing pulse position modulation (PPM)–OCDMA system. The simulation results reveal that the bit-error rate performance of the proposed technique is superior to the performance of the pulse position modulation (PPM) technique. Also, the results indicate that the proposed technique is very power efficient, and when the bit rate is constant, the network capacity can be expanded to accommodate a large number of simultaneous active users with low error rate. Moreover, the proposed technique simplifies the hardware of the receiver design.  相似文献   
50.
Sr2La3Nb1?x Ta x Ti4O17 (0 ≤ x ≤ 1) ceramics were processed via a solid-state mixed oxide route. Sr2La3Nb1?x Ta x Ti4O17 (0 ≤ x ≤ 1) solid solutions were single phase in the whole range of x values within the x-ray diffraction (XRD) detection limit. The microstructure comprised elongated and needle-shaped grains. The ceramics exhibit relative permittivity (ε r) of 73 to 68.6, product of unloaded quality factor and resonant frequency (Q u f 0) of 7100 GHz to 9500 GHz, and temperature coefficient of resonant frequency (τ f) of 78.6 ppm/°C to 56.6 ppm/°C.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号