首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   129542篇
  免费   2027篇
  国内免费   458篇
电工技术   1111篇
综合类   2364篇
化学工业   19921篇
金属工艺   5568篇
机械仪表   3894篇
建筑科学   3625篇
矿业工程   652篇
能源动力   2055篇
轻工业   9978篇
水利工程   1654篇
石油天然气   533篇
武器工业   4篇
无线电   11892篇
一般工业技术   23849篇
冶金工业   13770篇
原子能技术   503篇
自动化技术   30654篇
  2024年   437篇
  2023年   463篇
  2022年   424篇
  2021年   1045篇
  2020年   927篇
  2019年   855篇
  2018年   15568篇
  2017年   14534篇
  2016年   11296篇
  2015年   1829篇
  2014年   1827篇
  2013年   3236篇
  2012年   5670篇
  2011年   11512篇
  2010年   9982篇
  2009年   7100篇
  2008年   8550篇
  2007年   9295篇
  2006年   1539篇
  2005年   2362篇
  2004年   2201篇
  2003年   2108篇
  2002年   1410篇
  2001年   683篇
  2000年   765篇
  1999年   771篇
  1998年   3571篇
  1997年   2160篇
  1996年   1456篇
  1995年   842篇
  1994年   745篇
  1993年   719篇
  1992年   279篇
  1991年   286篇
  1990年   277篇
  1989年   268篇
  1988年   235篇
  1987年   209篇
  1986年   222篇
  1985年   257篇
  1984年   236篇
  1983年   177篇
  1982年   200篇
  1981年   214篇
  1980年   195篇
  1979年   172篇
  1978年   139篇
  1977年   249篇
  1976年   467篇
  1975年   115篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
961.
In a cognitive radio system, the goal is to make better use of the radio electric spectrum, allowing non-licensed users access to those currently unused electromagnetic bands assigned to licensed users (LUs). This can be achieved using OFDM, where the non-licensed users must select the temporarily available subcarriers and turn off those subcarriers used by LUs in order to avoid interference. Hence, only a subset of the subcarriers can be used for data or pilot tone transmission. To this end, some pilot allocation algorithms have been proposed for this dynamic scenario, but they are designed in such away that an equispaced pilot placement is respected (as much as possible) while minimizing the mean squared error of the channel estimate. Nevertheless, this equispaced placement can lead to the use of an increased number of pilots in order to achieve a good channel estimation. In this work, a new pilot allocation algorithm based on wavelet transform is presented. The proposed algorithm uses the discrete wavelet transform to analyze the previous channel state information, taking the knowledge of the available subcarriers into account to provide a suboptimal solution for the pilot positions. This solution leads to a non-equispaced pilot placement, which improves the channel estimation and consequently, the system performance. Likewise, the introduced algorithm allows a reduction of the number of necessary pilots, which aids in increasing the data rate. Finally, simulation results corroborate the effectiveness of the algorithm in dynamic channel scenarios.  相似文献   
962.
This paper presents a new method to enhance the trust of traditional computing device by using the popular mobile phone. We first propose a formal method to analyze the platform trust establishment process based on trusted computing technology, and the formal results reveal possible attack and suggest potential solutions. Then, we design an improved solution, in which the mobile phone is extended to support three trusted computing functions: using mobile phone as a root of trust instead of Trusted Platform Module, as a local investigator to obtain evidences from the local computing platform, and as a trusted agent to build a secure communication channel with an external entity in the remote attestation applications. Finally, to describe the feasibility and efficiency, a prototype of the trusted mobile phone is implemented and evaluated based on an ARM development board.  相似文献   
963.
This paper investigates the energy-efficient radio resource allocation problem of the uplink smallcell networks. Different from the existing literatures which focus on improving the energy efficiency (EE) or providing fairness measured by data rates, this paper aims to provide fairness guarantee in terms of EE and achieve EE-based proportional fairness among all users in smallcell networks. Specifically, EE-based global proportional fairness utility optimization problem is formulated, taking into account each user’s quality of service, and the cross-tier interference limitation to ensure the macrocell transmission. Instead of dealing with the problem in forms of sum of logarithms directly, the problem is transformed into a form of sum of ratios firstly. Then, a two-step scheme which solves the subchannel and power allocation separately is adopted, and the corresponding subchannel allocation algorithm and power allocation algorithm are devised, respectively. The subchannel allocation algorithm is heuristic, but can achieve close-to-optimal performance with much lower complexity. The power allocation scheme is optimal, and is derived based on a novel method which can solve the sum of ratios problems efficiently. Numerical results verify the effectiveness of the proposed algorithms, especially the capability of EE fairness provisioning. Specifically, it is suggested that the proposed algorithms can improve the fairness level among smallcell users by 150–400 % compared to the existing algorithms.  相似文献   
964.
In this paper, multicarrier code division multiple access (MC-CDMA) modulation is adapted to constitute wireless sensors to improve the monitoring performance of wireless sensor networks (WSNs) for underground coal mine. A subcarrier phase compensation algorithm based on selective mapping (SLM) is proposed to reduce the relatively high PAPR of MC-CDMA signal. To further improve the monitoring performance of the underground MC-CDMA WSNs, a joint cross-layer transmission with time–frequency coded cooperation hybrid automatic repeat request (HARQ) is also proposed. The proposed cross-layer transmission combines time–frequency coded cooperation of physical layer with HARQ of media access control (MAC) layer. In the proposed transmission, the cooperative sensor utilizes time–frequency coded cooperation method to retransmit the monitoring information of source sensor at each retransmission time to obtain the coding gain and spatial diversity gain. Simulation results show that the proposed joint cross-layer transmission for underground coal mine MC-CDMA WSNs based on SLM phase compensation has significantly reduced the PAPR of MC-CDMA signal and improved the monitor performance of the coal mine MC-CDMA WSNs.  相似文献   
965.
Recently, Underwater Wireless Sensor Networks (UWSNs) has witnessed significant attention from both academia and industries in research and development, due to the growing number of applications for wide range of purposes including commercial, scientific, environmental and military. Some of the major applications include pollution monitoring, tactical surveillance, tsunami warnings and offshore exploration. Efficient communication among sensors in UWSNs is a challenging task due to the harsh environments and peculiar characteristics of UWSNs. Therefore, design of routing protocol for efficient communication among sensors and sink is one of the fundamental research themes in UWSNs. In this context, this paper proposes a location-free Reliable and Energy efficient Pressure-Based Routing (RE-PBR) protocol for UWSNs. RE-PBR considers three parameters including link quality, depth and residual energy for balancing energy consumption and reliable data delivery. Specifically, link quality is estimated using triangle metric method. A light weight information acquisition algorithm is developed for efficient knowledge discovery of the network. Multi-metric data forwarding algorithm is designed based on route cost calculation which utilizes residual energy and link quality. Simulations are carried out in NS-2 with Aqua-Sim package to evaluate the performance of RE-PBR. The performance of the proposed protocol is compared with the stat-of-the-art techniques: DBR and EEDBR. The comprehensive performance evaluation attests the benefit of RE-PBR as compared to the state-of-the-art techniques in terms of network lifetime, energy consumption, end-to-end delay and packet delivery ratio.  相似文献   
966.
Virtual reality has recently rapidly emerged into the global spotlight. With the current increasing interest in head mounted display (HMD) as the next-generation content platform to replace smartphones, many companies are endeavoring to gain an early foothold in the virtual reality market. In HMD-based virtual reality environments, users are completely isolated from the real world, and are thus unable to perform even simple and familiar interactions with the real world. This paper proposes interaction based on context information augmented with stories, visuals, and sounds, as opposed to an interface that replicates the existing real world, in order to enable easy and natural interactions by users in HMD-based immersive virtual reality environments. The results of a user study conducted using our proposed augmented context-based interactions in an immersive virtual reality environment verify that it provides users with higher levels of immersion, accuracy, and emotional empathy than a virtual reality environment that simply replicates the existing real world.  相似文献   
967.
Major countries are supporting new knowledge creation and innovative activities by opening data so that the research results carried out by government budgets can serve as public goods. The Republic of Korea has also made research and development (R&D) reports and papers available in electronic file format, which is the result of national R&D programs for the general public. However, the extraction of meaningful information among unstructured data in text format has not satisfied researchers’ expectations. In order to evolve into a customized service reflecting the opinions of researchers, we investigated the demand for necessary contents and services at the planning stage of R&D projects. This study attempts to propose a method to offer significant information which shows a bigger unit than objects based on trend information with extraction and processing demands focusing on R&D reports based on the results of questionnaire survey and interviews with researchers. This study aims to provide the integration service, tentatively named ‘element data service’, of key sentences and table/figure images with a high demand for the utilization of researchers. The main procedure of the proposed method consists of the subject classification of the R&D report, the extraction of table/figure image, and the extraction of main sentence. We used public reports of the same classification published from 2012 to 2016 for the experiment and utilized the extractive summarization method for the copyright protection of report original text. After realizing the simple prototype, we examined the service possibility through the researcher target reviews.  相似文献   
968.
Iris anti-spoofing is one of the most important topics, in which the development is increasing rapidly. This paper introduces an efficient system for detecting iris attacks. The system avoids the segmentation and the normalization stages employed traditionally in fake detection systems. Wavelet packets (WPs) are used to decompose the original image into wavelet approximation and detail channels. Entropy values are extracted from the wavelet channels, and also from the local binary pattern (LBP) images of the channels. These features are used for discriminating between real and fake iris images. Support vector machines are used for the classification purpose. The aim is to contribute for improved classification accuracy with less computational complexity and reduced processing time. Entropy of the WP channels gives 99.9237% classification accuracy, and the entropy of the LBP images yields 99.781%, using ATVS-FIr-DB. Fusion of these features yields 100% classification accuracy. Entropy of the wavelet channels is sufficient to obtain 100% accuracy using CASIA-Iris-Syn database, without fusion. All images in both databases are used, without the need to discard images with unsuccessful segmentation. Segmented images from both databases are used for comparison. Results show that more discriminative features can be obtained using the proposed algorithm. System complexity and processing time are reduced noticeably, and the system is robust to different types of fakes.  相似文献   
969.
With the innovation of Cognitive Radio Wireless Mesh Network’s, Opportunistic Spectrum Allocation can possibly moderate spectrum lack, by letting Secondary User’s a chance to sense and use unused bits of opportunistic licensed spectrum without any unfavourable effect on the Primary User’s. In Cognitive Radio Wireless Mesh Network’s, the Medium-Access-Control protocols characterizes the utilization of spectrum proficiently by allocating the channels among the users. Majority of proposed Medium-Access-Control protocols are utilizing Common-Control-Channel for dealing with the assets of Secondary-Users. The major downsides of these Medium-Access-Control protocols are broadcasting of Control-channel when substantial number of Secondary-User exists. In contrast with these Medium-Access-Control protocols, we develop an algorithm Time-Slotted-Allocation-Medium-Access-Control (TSA-MAC) protocol which is based on Clustered Time-Division-Medium-Access approach, which permits Secondary-User’s to allocate opportunistic spectrum with the help of co-operative decisions by exchange control information. In this approach, we are dividing the channels as different slots on which Secondary-User’s can transfer control and data packets. The TSA-MAC protocol will enhance the throughput for the Secondary-User’s over the communication channel. And also this method will facilitate to decide and allocate free channels for Secondary-User’s without interfering with Primary User’s.  相似文献   
970.
Radio-frequency Identification (RFID) grouping proof protocol is widely used in medical healthcare industry, transportation industry, crime forensics and so on,it is a research focus in the field of information security. The RFID grouping proof protocol is to prove that some tags belong to the same group and exist simultaneously. To improve the applicability of the RFID grouping proof protocol in low cost tag applications, this paper proposes a new scalable lightweight RFID grouping proof protocol. Tags in the proposed protocol only generate pseudorandom numbers and execute exclusive-or(XOR) operations. An anti-collision algorithm based on adaptive 4-ary pruning query tree (A4PQT) is used to identify the response message of tags. Updates to secret information in tags are kept synchronized with the verifier during the entire grouping proof process. Based on these innovations, the proposed protocol resolves the scalability issue for low-cost tag systems and improves the efficiency and security of the authentication that is generated by the grouping proof. Compared with other state-of-the art protocols, it is shows that the proposed protocol requires lower tag-side computational complexity, thereby achieving an effective balance between protocol security and efficiency.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号