首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   550篇
  免费   31篇
电工技术   24篇
化学工业   94篇
金属工艺   13篇
机械仪表   12篇
建筑科学   32篇
能源动力   9篇
轻工业   85篇
水利工程   2篇
石油天然气   1篇
无线电   116篇
一般工业技术   85篇
冶金工业   68篇
原子能技术   4篇
自动化技术   36篇
  2024年   1篇
  2023年   9篇
  2022年   9篇
  2021年   6篇
  2020年   13篇
  2019年   9篇
  2018年   11篇
  2017年   14篇
  2016年   15篇
  2015年   20篇
  2014年   24篇
  2013年   29篇
  2012年   25篇
  2011年   25篇
  2010年   20篇
  2009年   28篇
  2008年   36篇
  2007年   23篇
  2006年   22篇
  2005年   21篇
  2004年   26篇
  2003年   24篇
  2002年   16篇
  2001年   14篇
  2000年   16篇
  1999年   20篇
  1998年   28篇
  1997年   20篇
  1996年   5篇
  1995年   7篇
  1994年   7篇
  1993年   5篇
  1992年   6篇
  1991年   2篇
  1990年   1篇
  1989年   4篇
  1988年   4篇
  1987年   3篇
  1985年   1篇
  1983年   1篇
  1981年   1篇
  1979年   2篇
  1978年   1篇
  1977年   2篇
  1976年   3篇
  1969年   1篇
  1968年   1篇
排序方式: 共有581条查询结果,搜索用时 62 毫秒
131.
It is demonstrated how modulation schemes based on QPSK can be directly incorporated into QAM-based systems. It is argued that this leads directly to an easily implementable structure that is both efficient in bandwidth and data reliability. It is contended that the correct solution to the concatenated coding problem for HDTV transmission is to simply extend the modulation codes developed for QPSK-to-QAM modulation. In nonconcatenated situations, a trellis code based on a binary code at rate 2/3 is usually best. However, this is not the case for higher error rates at the output of the trellis decoder (e.g., when a symbol error correcting decoder follows as a concatenated code). The reason for this follows from an analysis of the effect of the number of nearest neighbors on the error rate. A four-way partition of QAM is a natural extension of QPSK modulation; it is a simple matter to incorporate any good QPSK code into a trellis coding scheme for QAM modulation. A concatenated coding scheme based on QPSK trellis codes and symbol error correcting coding is proposed. An example is presented to show the advantages of this approach  相似文献   
132.
The Grand Alliance system for US HDTV   总被引:1,自引:0,他引:1  
The US HDTV process has fostered substantial research and development activity over the last several years. The Advisory Committee on Advanced Television Service (ACATS) was formed to advise the FCC on the technology and systems suitable for delivery of high definition service over terrestrial broadcast channels. Four digital HDTV systems where tested at the Advanced Television Testing Center. All the systems gave excellent performance, but the results were inconclusive and a plan for a second round of tests was prepared. As each of the four systems where being readied for retest. The proponents of the four individual digital HDTV proposals worked together to define a single HDTV system which incorporated the best technology from the individual systems. The consortium of companies, called the Grand Alliance (GA), announced a combined system and submitted it to ACATS for consideration. After ACATS certification, the GA began construction of a prototype system to submit for laboratory testing at the end of 1994. This paper describes the video compression subsystem and the hardware prototype. The preprocessing, motion estimation, quantization, and rate control subsystems are described. The system uses bidirectional motion compensation, discrete cosine transform, quantization and Huffman coding. The resulting bitstream is input into a transport system which uses fixed length packets. The multiplex transport stream is input into the 8-VSB transmission system. Finally, the specifics of the hardware implementation are described and some simulation results are presented  相似文献   
133.
Even though electroless Ni-P and Sn-Ag-Cu solders are widely used materials in flip-chip bumping technologies, interfacial reactions of the ternary Cu-Ni-Sn system are not well understood. The growth of intermetallic compounds (IMCs) at the under bump metallization (UBM)/solder interface can affect solder-joint reliability, so analysis of IMC phases and understanding their growth kinetics are important. In this study, interfacial reactions between electroless Ni-P UBM and the 95.5Sn-4.0Ag-0.5Cu alloy were investigated, focusing on identification of IMC phases and IMC growth kinetics at various reflowing and aging temperatures and times. The stable ternary IMC initially formed at the interface after reflowing was the (Cu,Ni)6Sn5 phase. However, during aging, the (Cu,Ni)6Sn5 phase slowly changed into the quaternary IMC composed of Cu, Ni, Sn, and a small amount of Au. The Au atoms in the quaternary IMC originated from immersion Au plated on electroless Ni-P UBM. During further reflowing or aging, the (Ni,Cu)3Sn4 IMC started forming because of the limited Cu content in the solder. Morphology, composition, and crystal structure of each IMC were identified using transmission electron microscopy (TEM) and scanning electron microscopy (SEM). Small amounts of Cu in the solder affect the types of IMC phases and the amount of the IMC. The activation energies of (Cu,Ni)6Sn5 and (Ni,Cu)3Sn4 IMCs were used to estimate the growth kinetics of IMCs. The growth of IMCs formed in aging was very slow and temperature-dependent compared to IMCs formed in reflow because of the higher activation energies of IMCs in aging. Comparing activation energies of each IMC, growth mechanism of IMCs at electroless Ni-P/SnAgCu solder interface will be discussed.  相似文献   
134.
An edge detection algorithm using multi-state adaptive linear neurons (ADALINES) is presented. Although the tri-state ADALINE is only considered in this work, general multi-state input vectors with extreme values are shown to be linearly separable from the rest of the vectors with the same dimension. The input state of each ADALINE is defined using the local mean in a predefined mask. In addition to the binary input states ± 1, the 0 input state is introduced for controlling the noise effect. If the input pattern matches one of the predefined edge patterns, the corresponding pixel is detected as an edge pixel. Experimental results are shown where the proposed detector is compared with both the Canny and LOG edge detectors.  相似文献   
135.
This standard for digital high-definition television has been submitted to the Federal Communications Commission for its approval. Based as it is on the MPEG-2 video compression and transport protocol, multiple transmission formats, Dolby AC-3 digital audio, and vestigial sideband digital modulation, this HDTV system will supply the home with superb images and spectacular sound while also, as part of the National Information Infrastructure (NII), relaying digital data. An HDTV system employing multiple transmission formats, digital compression, packetization, and modulation techniques is a marked advance over current world television standards such as NTSC, PAL, or SECAM  相似文献   
136.
137.
Fast Hartley transforms for image processing   总被引:1,自引:0,他引:1  
The fast Hartley transform (FHT) is used to transform two-dimensional image data. Because the Hartley transform is real-valued, it does not require complex operations. Both spectra and autocorrelations of two-dimensional ultrasound images of normal and abnormal livers were computed  相似文献   
138.
Lead‐free 0.77(Bi0.5Na0.5)TiO3–0.23Sr(Ti1?xFex)O3 (= 0, 0.04) (BNT–23STFx) was prepared using a conventional solid‐state reaction route. The effects of Fe‐modification on the chemical homogeneity from a μm scale perspective, the core‐shell domains structures, and the ferroelectric properties were investigated. The chemical homogeneity was analyzed using energy dispersive X‐ray mapping in scanning transmission electron microscopy mode, and the field‐dependent behaviors of strain and polarization were obtained to determine the ferroelectric properties. Substituting Fe3+ for Ti4+ resulted in completely different electrical behavior and properties, despite similar XRD patterns and microstructures. The Fe‐substitution promoted the mobility of Sr2+ ions in the BNT phase and, as a consequence, the chemical homogeneity increased and the core‐domains collapsed. Extending the ceramic processing, such as milling time and sintering time, affected domain distribution and compositional inhomogeneity, which led to a gradual transformation from ferroelectric to relaxor.  相似文献   
139.
In this paper the ultimate strength characteristics of dented steel plates under axial compressive loads are investigated using the ANSYS nonlinear finite element code. The effects of shape, size (depth, diameter), and location of the dent on the ultimate strength behavior of simply supported steel plates under axial thrust are studied. A closed-form formula for predicting the ultimate compressive strength of dented steel plates are empirically derived by curve fitting based on the computed results. The results and insights developed in the present study will be useful for damage tolerant design of steel plated structures with local denting.  相似文献   
140.
File entropy is one of the major indicators of crypto-ransomware because the encryption by ransomware increases the randomness of file contents. However, entropy-based ransomware detection has certain limitations; for example, when distinguishing ransomware-encrypted files from normal files with inherently high-level entropy, misclassification is very possible. In addition, the entropy evaluation cost for an entire file renders entropy-based detection impractical for large files. In this paper, we propose two indicators based on byte frequency for use in ransomware detection; these are termed EntropySA and DistSA, and both consider the interesting characteristics of certain file subareas termed "sample areas' (SAs). For an encrypted file, both the sampled area and the whole file exhibit high-level randomness, but for a plain file, the sampled area embeds informative structures such as a file header and thus exhibits relatively low-level randomness even though the entire file exhibits high-level randomness. EntropySA and DistSA use "byte frequency" and a variation of byte frequency, respectively, derived from sampled areas. Both indicators cause less overhead than other entropy-based detection methods, as experimentally proven using realistic ransomware samples. To evaluate the effectiveness and feasibility of our indicators, we also employ three expensive but elaborate classification models (neural network, support vector machine and threshold-based approaches). Using these models, our experimental indicators yielded an average F1-measure of 0.994 and an average detection rate of 99.46% for file encryption attacks by realistic ransomware samples.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号