首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   14533篇
  免费   397篇
  国内免费   11篇
电工技术   230篇
综合类   9篇
化学工业   1798篇
金属工艺   358篇
机械仪表   209篇
建筑科学   236篇
矿业工程   5篇
能源动力   211篇
轻工业   552篇
水利工程   41篇
石油天然气   23篇
无线电   727篇
一般工业技术   1001篇
冶金工业   299篇
原子能技术   113篇
自动化技术   9129篇
  2024年   6篇
  2023年   85篇
  2022年   248篇
  2021年   322篇
  2020年   174篇
  2019年   200篇
  2018年   207篇
  2017年   206篇
  2016年   250篇
  2015年   213篇
  2014年   476篇
  2013年   609篇
  2012年   1149篇
  2011年   2703篇
  2010年   1421篇
  2009年   1263篇
  2008年   949篇
  2007年   822篇
  2006年   650篇
  2005年   716篇
  2004年   636篇
  2003年   659篇
  2002年   355篇
  2001年   63篇
  2000年   56篇
  1999年   57篇
  1998年   79篇
  1997年   64篇
  1996年   52篇
  1995年   26篇
  1994年   36篇
  1993年   29篇
  1992年   12篇
  1991年   11篇
  1990年   12篇
  1989年   10篇
  1988年   6篇
  1987年   11篇
  1985年   12篇
  1984年   8篇
  1983年   16篇
  1982年   8篇
  1981年   4篇
  1980年   8篇
  1979年   9篇
  1978年   6篇
  1977年   10篇
  1974年   2篇
  1973年   3篇
  1971年   3篇
排序方式: 共有10000条查询结果,搜索用时 482 毫秒
991.
This paper proposes two algorithms for multi-video-source in a new mobile P2P architecture for streaming media systems. One is serial, and the other is parallel. When the service peer set providing expected QoS is not empty, the former is called, otherwise the latter is called. The former triggers the video source change event, re-selects a video source, and synchronizes the multi-video-source by the time model of the streaming sequence when QoS is degraded. The latter allows the multiple video sources to concurrently send the data to the receiving peer according to the assigned transmission. Compared to the existing papers, the contribution of this paper is fourfold: (1) the serial and parallel scheduling algorithms, correctly switched according to the actual situation, are firstly proposed; (2) the mobile feature of peers are firstly considered and validated; (3) the client nodes have better and smoother video quality; (4) our algorithms have shorter run time, which is a crucial factor for an on-line system.  相似文献   
992.
To deal with the file pollution problem in structured P2P networks, this paper proposes an anti-pollution strategy based on the immune approach and the file propagation-chain tracing technique. With the characteristics of the structured P2P networks, we establish a biological immune model and a file propagation tracing mechanism, based on which the mechanisms for alarms collection, propagation-chain tracing, immune response and antibody memorizing are designed. The proposed immune strategy can not only eliminate the polluted clusters and indices effectively but also prevent the reviving of the old pollution. In addition, the node permission is employed to control the ability to request files. The experimental results show that our strategy can curb the propagations of the polluted files effectively and efficiently even in the severely polluted structured P2P networks.  相似文献   
993.
This paper presents an effective weighted least square formulation for the solution of the state estimation problem, considering conventional as well as synchronized phasor measurements. The proposed algorithm is based on a reference-free formulation, using both rectangular and polar coordinates for branch current phasor measurements, and alleviates any numerical problems encountered during initialization stage of the state estimation algorithm. Analytical equations are provided for the conventional and the phasor measurements and their corresponding partial derivatives with respect to state variables. The proposed algorithm is tested with a seven bus system and is compared with the traditional state estimator. Simulation results show that the proposed algorithm improves the precision greatly and gets better behavior as compared with the traditional state estimator.  相似文献   
994.
995.
In this paper, we introduce an efficient and multi-level conditional privacy preservation authentication protocol in vehicular ad hoc networks (VANETs) based on ring signature. The proposed protocol has three appealing characteristics: First, it offers conditional privacy preservation authentication: while every receiver can verify that a message issuer is an authorized participant in the system only a trusted authority can reveal the true identity of a message sender. Second, it is equipped with multi-level countermeasure: each vehicle can select the degree of privacy according to its own requirements. Third, it is efficient: our system outperforms previous proposals in message authentication and verification, cost-effective identity tracking in case of a dispute, and low storage requirements. We demonstrate the merits gained by the proposed protocol through extensive analysis.  相似文献   
996.
This paper introduces a novel global thresholding approach that exploits the multiscale gradient information. The multiscale gradient information, that is, the product of gradient magnitude (PGM), is obtained by multiplying the responses of the first derivative of Gaussian (FDoG) filter at three adjacent space scales. The output threshold is selected as the one that maximizes a new objective function of the gray level variable t. The objective function is defined as the ratio of the mean PGM values of the boundary and non-boundary regions in the binary image obtained by thresholding with variable t. Through analysis of 35 real images from different application areas, our results show that the proposed method can perform bilevel thresholding on the images with different histogram patterns, such as unimodal, bimodal, multimodal, or comb-like shape. Its segmentation quality is superior to five popular thresholding algorithms.  相似文献   
997.
Wireless mesh network (WMN) is a promising solution for last mile broadband internet access. Mesh nodes or mesh routers are connected via wireless links to form a multi-hop backbone infrastructure and improving throughput is the primary goal. While previous works mainly focused on either link level protocol design or complex mathematical model, in this paper, we investigate the performance gains from jointly optimizing scheduling and routing in a multi-radio, multi-channel and multi-hop wireless mesh network. Then, two optimization objectives are addressed by considering wireless media contention and spatial multiplexing. The first objective is to maximize throughput by exploiting spatial reuse while the second one is to ensure fairness among different links. We design a cross-layer algorithm by considering both MAC layer and network layer. Simulation results show that our joint optimization algorithm can significantly increase throughput as well as fairness.  相似文献   
998.
This paper addresses the field of stereophonic acoustic echo cancellation (SAEC) by adaptive filtering algorithms. Recently, we have proposed a new version of the fast Newton transversal FNTF algorithm for SAEC applications. In this paper, we propose an efficient modification of this algorithm for the same applications. This new algorithm uses a new proposed and simplified numerical stabilization technique and takes into account the cross-correlation between the inputs of the channels. The basic idea is to introduce a small nonlinearity into each channel that has the effect of reducing the inter-channel coherence while not being noticeable for speech due to self masking. The complexity of the proposed algorithm does not alter the complexity of the original version and is kept less than half the complexity of the fastest two-channel FTF filter version. Simulation results and comparisons with the extended two-channel normalized least mean square NLMS and FTF algorithms are presented.  相似文献   
999.
A procedure for designing digital Butterworth filters is proposed. The procedure determines the denominator and the numerator of the filter transfer function based on the positions of the poles in the s-plane and zeros in the z-plane, respectively, and calculates the gain factor using a maximum point normalization method. In contrast to some conventional algorithms, the presented procedure is much simpler by directly obtaining the filter with 3-dB frequencies. This makes the presented algorithm a useful tool for determining the boundaries in electronic or communication systems’ frequency responses. Moreover, the proposed algorithm is compatible with high-order transformations which are the limitations of general pole-zero placement techniques. The proposed method is illustrated by the examples of designing the low-pass, high-pass, band-pass, and band-stop filter.  相似文献   
1000.
This study investigates the effect of multiple sources using STS across a Time-Hopping-PPM Modulation that is over an UWB Saleh-Valenzuela channel with each source using two transmit antennas. We model and analyze this system, showing that the presence of such MAI results in a significant degradation in BER performance. Simulation results show that for strong signal strength of interfering MAI signals degradation in BER performance is observed for the cases where we have five and 10 distinct MAI sources present when using Walsh-Hadamard thirty two chip spreading sequences. Using simulation, we investigate the use of other sets of orthogonal spreading sequences with improved cross correlation properties and find that for some sequences a significant improvement is seen compared to Walsh-Hadamard sequences when they are similarly misaligned. We show that MAI degrades the BER performance of such systems and that selection of improved cross correlation spreading code sequence sets improves BER.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号