全文获取类型
收费全文 | 129542篇 |
免费 | 2027篇 |
国内免费 | 458篇 |
专业分类
电工技术 | 1111篇 |
综合类 | 2364篇 |
化学工业 | 19921篇 |
金属工艺 | 5568篇 |
机械仪表 | 3894篇 |
建筑科学 | 3625篇 |
矿业工程 | 652篇 |
能源动力 | 2055篇 |
轻工业 | 9978篇 |
水利工程 | 1654篇 |
石油天然气 | 533篇 |
武器工业 | 4篇 |
无线电 | 11892篇 |
一般工业技术 | 23849篇 |
冶金工业 | 13770篇 |
原子能技术 | 503篇 |
自动化技术 | 30654篇 |
出版年
2024年 | 437篇 |
2023年 | 463篇 |
2022年 | 424篇 |
2021年 | 1045篇 |
2020年 | 927篇 |
2019年 | 855篇 |
2018年 | 15568篇 |
2017年 | 14534篇 |
2016年 | 11296篇 |
2015年 | 1829篇 |
2014年 | 1827篇 |
2013年 | 3236篇 |
2012年 | 5670篇 |
2011年 | 11512篇 |
2010年 | 9982篇 |
2009年 | 7100篇 |
2008年 | 8550篇 |
2007年 | 9295篇 |
2006年 | 1539篇 |
2005年 | 2362篇 |
2004年 | 2201篇 |
2003年 | 2108篇 |
2002年 | 1410篇 |
2001年 | 683篇 |
2000年 | 765篇 |
1999年 | 771篇 |
1998年 | 3571篇 |
1997年 | 2160篇 |
1996年 | 1456篇 |
1995年 | 842篇 |
1994年 | 745篇 |
1993年 | 719篇 |
1992年 | 279篇 |
1991年 | 286篇 |
1990年 | 277篇 |
1989年 | 268篇 |
1988年 | 235篇 |
1987年 | 209篇 |
1986年 | 222篇 |
1985年 | 257篇 |
1984年 | 236篇 |
1983年 | 177篇 |
1982年 | 200篇 |
1981年 | 214篇 |
1980年 | 195篇 |
1979年 | 172篇 |
1978年 | 139篇 |
1977年 | 249篇 |
1976年 | 467篇 |
1975年 | 115篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
961.
Rodrigo Calderón-Rico Roberto Carrasco-Alvarez Javier Vázquez Castillo 《Telecommunication Systems》2018,68(2):193-200
In a cognitive radio system, the goal is to make better use of the radio electric spectrum, allowing non-licensed users access to those currently unused electromagnetic bands assigned to licensed users (LUs). This can be achieved using OFDM, where the non-licensed users must select the temporarily available subcarriers and turn off those subcarriers used by LUs in order to avoid interference. Hence, only a subset of the subcarriers can be used for data or pilot tone transmission. To this end, some pilot allocation algorithms have been proposed for this dynamic scenario, but they are designed in such away that an equispaced pilot placement is respected (as much as possible) while minimizing the mean squared error of the channel estimate. Nevertheless, this equispaced placement can lead to the use of an increased number of pilots in order to achieve a good channel estimation. In this work, a new pilot allocation algorithm based on wavelet transform is presented. The proposed algorithm uses the discrete wavelet transform to analyze the previous channel state information, taking the knowledge of the available subcarriers into account to provide a suboptimal solution for the pilot positions. This solution leads to a non-equispaced pilot placement, which improves the channel estimation and consequently, the system performance. Likewise, the introduced algorithm allows a reduction of the number of necessary pilots, which aids in increasing the data rate. Finally, simulation results corroborate the effectiveness of the algorithm in dynamic channel scenarios. 相似文献
962.
This paper presents a new method to enhance the trust of traditional computing device by using the popular mobile phone. We first propose a formal method to analyze the platform trust establishment process based on trusted computing technology, and the formal results reveal possible attack and suggest potential solutions. Then, we design an improved solution, in which the mobile phone is extended to support three trusted computing functions: using mobile phone as a root of trust instead of Trusted Platform Module, as a local investigator to obtain evidences from the local computing platform, and as a trusted agent to build a secure communication channel with an external entity in the remote attestation applications. Finally, to describe the feasibility and efficiency, a prototype of the trusted mobile phone is implemented and evaluated based on an ARM development board. 相似文献
963.
This paper investigates the energy-efficient radio resource allocation problem of the uplink smallcell networks. Different from the existing literatures which focus on improving the energy efficiency (EE) or providing fairness measured by data rates, this paper aims to provide fairness guarantee in terms of EE and achieve EE-based proportional fairness among all users in smallcell networks. Specifically, EE-based global proportional fairness utility optimization problem is formulated, taking into account each user’s quality of service, and the cross-tier interference limitation to ensure the macrocell transmission. Instead of dealing with the problem in forms of sum of logarithms directly, the problem is transformed into a form of sum of ratios firstly. Then, a two-step scheme which solves the subchannel and power allocation separately is adopted, and the corresponding subchannel allocation algorithm and power allocation algorithm are devised, respectively. The subchannel allocation algorithm is heuristic, but can achieve close-to-optimal performance with much lower complexity. The power allocation scheme is optimal, and is derived based on a novel method which can solve the sum of ratios problems efficiently. Numerical results verify the effectiveness of the proposed algorithms, especially the capability of EE fairness provisioning. Specifically, it is suggested that the proposed algorithms can improve the fairness level among smallcell users by 150–400 % compared to the existing algorithms. 相似文献
964.
In this paper, multicarrier code division multiple access (MC-CDMA) modulation is adapted to constitute wireless sensors to improve the monitoring performance of wireless sensor networks (WSNs) for underground coal mine. A subcarrier phase compensation algorithm based on selective mapping (SLM) is proposed to reduce the relatively high PAPR of MC-CDMA signal. To further improve the monitoring performance of the underground MC-CDMA WSNs, a joint cross-layer transmission with time–frequency coded cooperation hybrid automatic repeat request (HARQ) is also proposed. The proposed cross-layer transmission combines time–frequency coded cooperation of physical layer with HARQ of media access control (MAC) layer. In the proposed transmission, the cooperative sensor utilizes time–frequency coded cooperation method to retransmit the monitoring information of source sensor at each retransmission time to obtain the coding gain and spatial diversity gain. Simulation results show that the proposed joint cross-layer transmission for underground coal mine MC-CDMA WSNs based on SLM phase compensation has significantly reduced the PAPR of MC-CDMA signal and improved the monitor performance of the coal mine MC-CDMA WSNs. 相似文献
965.
Ahmad Khasawneh Muhammad Shafie Bin Abd Latiff Omprakash Kaiwartya Hassan Chizari 《Wireless Networks》2018,24(6):2061-2075
Recently, Underwater Wireless Sensor Networks (UWSNs) has witnessed significant attention from both academia and industries in research and development, due to the growing number of applications for wide range of purposes including commercial, scientific, environmental and military. Some of the major applications include pollution monitoring, tactical surveillance, tsunami warnings and offshore exploration. Efficient communication among sensors in UWSNs is a challenging task due to the harsh environments and peculiar characteristics of UWSNs. Therefore, design of routing protocol for efficient communication among sensors and sink is one of the fundamental research themes in UWSNs. In this context, this paper proposes a location-free Reliable and Energy efficient Pressure-Based Routing (RE-PBR) protocol for UWSNs. RE-PBR considers three parameters including link quality, depth and residual energy for balancing energy consumption and reliable data delivery. Specifically, link quality is estimated using triangle metric method. A light weight information acquisition algorithm is developed for efficient knowledge discovery of the network. Multi-metric data forwarding algorithm is designed based on route cost calculation which utilizes residual energy and link quality. Simulations are carried out in NS-2 with Aqua-Sim package to evaluate the performance of RE-PBR. The performance of the proposed protocol is compared with the stat-of-the-art techniques: DBR and EEDBR. The comprehensive performance evaluation attests the benefit of RE-PBR as compared to the state-of-the-art techniques in terms of network lifetime, energy consumption, end-to-end delay and packet delivery ratio. 相似文献
966.
Jiyoung Kang 《Wireless Personal Communications》2018,98(2):1931-1940
Virtual reality has recently rapidly emerged into the global spotlight. With the current increasing interest in head mounted display (HMD) as the next-generation content platform to replace smartphones, many companies are endeavoring to gain an early foothold in the virtual reality market. In HMD-based virtual reality environments, users are completely isolated from the real world, and are thus unable to perform even simple and familiar interactions with the real world. This paper proposes interaction based on context information augmented with stories, visuals, and sounds, as opposed to an interface that replicates the existing real world, in order to enable easy and natural interactions by users in HMD-based immersive virtual reality environments. The results of a user study conducted using our proposed augmented context-based interactions in an immersive virtual reality environment verify that it provides users with higher levels of immersion, accuracy, and emotional empathy than a virtual reality environment that simply replicates the existing real world. 相似文献
967.
YunJeong Kim WonKyun Joo KiSeok Choi MyungSeok Yang 《Wireless Personal Communications》2018,98(4):3211-3226
Major countries are supporting new knowledge creation and innovative activities by opening data so that the research results carried out by government budgets can serve as public goods. The Republic of Korea has also made research and development (R&D) reports and papers available in electronic file format, which is the result of national R&D programs for the general public. However, the extraction of meaningful information among unstructured data in text format has not satisfied researchers’ expectations. In order to evolve into a customized service reflecting the opinions of researchers, we investigated the demand for necessary contents and services at the planning stage of R&D projects. This study attempts to propose a method to offer significant information which shows a bigger unit than objects based on trend information with extraction and processing demands focusing on R&D reports based on the results of questionnaire survey and interviews with researchers. This study aims to provide the integration service, tentatively named ‘element data service’, of key sentences and table/figure images with a high demand for the utilization of researchers. The main procedure of the proposed method consists of the subject classification of the R&D report, the extraction of table/figure image, and the extraction of main sentence. We used public reports of the same classification published from 2012 to 2016 for the experiment and utilized the extractive summarization method for the copyright protection of report original text. After realizing the simple prototype, we examined the service possibility through the researcher target reviews. 相似文献
968.
Iris anti-spoofing is one of the most important topics, in which the development is increasing rapidly. This paper introduces an efficient system for detecting iris attacks. The system avoids the segmentation and the normalization stages employed traditionally in fake detection systems. Wavelet packets (WPs) are used to decompose the original image into wavelet approximation and detail channels. Entropy values are extracted from the wavelet channels, and also from the local binary pattern (LBP) images of the channels. These features are used for discriminating between real and fake iris images. Support vector machines are used for the classification purpose. The aim is to contribute for improved classification accuracy with less computational complexity and reduced processing time. Entropy of the WP channels gives 99.9237% classification accuracy, and the entropy of the LBP images yields 99.781%, using ATVS-FIr-DB. Fusion of these features yields 100% classification accuracy. Entropy of the wavelet channels is sufficient to obtain 100% accuracy using CASIA-Iris-Syn database, without fusion. All images in both databases are used, without the need to discard images with unsuccessful segmentation. Segmented images from both databases are used for comparison. Results show that more discriminative features can be obtained using the proposed algorithm. System complexity and processing time are reduced noticeably, and the system is robust to different types of fakes. 相似文献
969.
With the innovation of Cognitive Radio Wireless Mesh Network’s, Opportunistic Spectrum Allocation can possibly moderate spectrum lack, by letting Secondary User’s a chance to sense and use unused bits of opportunistic licensed spectrum without any unfavourable effect on the Primary User’s. In Cognitive Radio Wireless Mesh Network’s, the Medium-Access-Control protocols characterizes the utilization of spectrum proficiently by allocating the channels among the users. Majority of proposed Medium-Access-Control protocols are utilizing Common-Control-Channel for dealing with the assets of Secondary-Users. The major downsides of these Medium-Access-Control protocols are broadcasting of Control-channel when substantial number of Secondary-User exists. In contrast with these Medium-Access-Control protocols, we develop an algorithm Time-Slotted-Allocation-Medium-Access-Control (TSA-MAC) protocol which is based on Clustered Time-Division-Medium-Access approach, which permits Secondary-User’s to allocate opportunistic spectrum with the help of co-operative decisions by exchange control information. In this approach, we are dividing the channels as different slots on which Secondary-User’s can transfer control and data packets. The TSA-MAC protocol will enhance the throughput for the Secondary-User’s over the communication channel. And also this method will facilitate to decide and allocate free channels for Secondary-User’s without interfering with Primary User’s. 相似文献
970.
Wei Zhang Shiming Qin Shengming Wang Longkai Wu Baolin Yi 《Wireless Personal Communications》2018,103(1):133-143
Radio-frequency Identification (RFID) grouping proof protocol is widely used in medical healthcare industry, transportation industry, crime forensics and so on,it is a research focus in the field of information security. The RFID grouping proof protocol is to prove that some tags belong to the same group and exist simultaneously. To improve the applicability of the RFID grouping proof protocol in low cost tag applications, this paper proposes a new scalable lightweight RFID grouping proof protocol. Tags in the proposed protocol only generate pseudorandom numbers and execute exclusive-or(XOR) operations. An anti-collision algorithm based on adaptive 4-ary pruning query tree (A4PQT) is used to identify the response message of tags. Updates to secret information in tags are kept synchronized with the verifier during the entire grouping proof process. Based on these innovations, the proposed protocol resolves the scalability issue for low-cost tag systems and improves the efficiency and security of the authentication that is generated by the grouping proof. Compared with other state-of-the art protocols, it is shows that the proposed protocol requires lower tag-side computational complexity, thereby achieving an effective balance between protocol security and efficiency. 相似文献