首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9765篇
  免费   722篇
  国内免费   99篇
电工技术   128篇
综合类   30篇
化学工业   2130篇
金属工艺   189篇
机械仪表   368篇
建筑科学   209篇
矿业工程   36篇
能源动力   568篇
轻工业   1024篇
水利工程   107篇
石油天然气   71篇
武器工业   1篇
无线电   1207篇
一般工业技术   2218篇
冶金工业   617篇
原子能技术   111篇
自动化技术   1572篇
  2024年   47篇
  2023年   267篇
  2022年   602篇
  2021年   1005篇
  2020年   614篇
  2019年   685篇
  2018年   687篇
  2017年   577篇
  2016年   568篇
  2015年   377篇
  2014年   463篇
  2013年   761篇
  2012年   451篇
  2011年   531篇
  2010年   331篇
  2009年   283篇
  2008年   235篇
  2007年   214篇
  2006年   146篇
  2005年   105篇
  2004年   97篇
  2003年   104篇
  2002年   77篇
  2001年   59篇
  2000年   58篇
  1999年   75篇
  1998年   170篇
  1997年   137篇
  1996年   109篇
  1995年   89篇
  1994年   67篇
  1993年   65篇
  1992年   44篇
  1991年   49篇
  1990年   36篇
  1989年   36篇
  1988年   29篇
  1987年   34篇
  1986年   34篇
  1985年   36篇
  1984年   29篇
  1983年   31篇
  1982年   16篇
  1981年   16篇
  1980年   12篇
  1979年   11篇
  1978年   18篇
  1977年   20篇
  1976年   23篇
  1972年   8篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
In a wide area campus, a university provides Wireless Local Area Network (WLAN) for users to connect to the Internet. Most users take advantage of this WLAN benefit by using their laptops. However, the number of smart phone users is growing fast. Since a smart phone is able to get an Internet connection using WLAN, users can use their smart phones without having to pay for a cellular operator. Users tend to use their smart phones more, due to their higher mobility compared to a laptop. This capability enables new services in the market, such as Fixed-Mobile Convergence (FMC), which integrates a fixed network (traditional telephony, WLAN) and a mobile network (cellular) to provide seamless voice communications anytime, anywhere. These new applications require a WLAN connection availability nearly everywhere. However, due to limited budgets, a university can only install APs in places with a high connection demand. We propose a novel WLAN AP placement technique that takes user mobility into consideration. This new approach is more complete than previous approaches, which mainly focus on coverage area and throughput data. Our technique has been implemented in our university. The results show the suitability of the WLAN access point locations in our university campus based on user mobility and activities.  相似文献   
992.
The effects of doping of MgAl2O4 by a binary mixture of Co and Zn ions on the absorbance, electrical resistivity, capacitance, thermal conductivity, heat capacity and thermal diffusivity are reported in this paper. The materials with the nominal composition Mg1−2x(Co,Zn)xAl2O4 (x = 0.0-0.5) are synthesized by solution combustion synthesis assisted by microwave irradiation. The substituted spinels are produced with a Scherrer crystallite size of 18-23 nm, as opposed to 45 nm for undoped samples, indicated by X-ray diffraction and confirmed by transmission electron microscopy. These materials also show better thermal stability in the temperature range of 298-1773 K. Three strong absorption bands at 536, 577 and 630 nm are observed for the doped samples which are attributed to the three spin allowed (4A2 (F) → 4T1 (P)) electronic transitions of Co2+ at tetrahedral lattice sites while pure magnesium aluminate remains transparent in the whole spectral range. The semiconducting behavior of the materials is evident from the temperature dependence of the electrical resistivity. Resistivity and activation energy are higher for the substituted samples. Fitting of the resistivity data is achieved according to the hopping polaron model of solids. Both dielectric constant and loss increase on account of doping. The dielectric data are explained on the basis of space charge polarization. The thermal conductivity and diffusivity are lowered and the heat capacity is increased in the doped materials. Wiedemann-Franz's law is used to compute the electronic and lattice contributions towards the total thermal conductivity.  相似文献   
993.
Diabetic macular edema(DME)is a retinal thickening involving the center of the macula.It is one of the serious eye diseases which affects the central vision and can lead to partial or even complete visual loss.The only cure is timely diagnosis,prevention,and treatment of the disease.This paper presents an automated system for the diagnosis and classification of DME using color fundus image.In the proposed technique,first the optic disc is removed by applying some preprocessing steps.The preprocessed image is then passed through a classifier for segmentation of the image to detect exudates.The classifier uses dynamic thresholding technique by using some input parameters of the image.The stage classification is done on the basis of an early treatment diabetic retinopathy study(ETDRS)given criteria to assess the severity of disease.The proposed technique gives a sensitivity,specificity,and accuracy of 98.27%,96.58%,and 96.54%,respectively on publically available database.  相似文献   
994.
995.
996.
Mobile WiMAX is a 3rd generation broadband wireless technology that enables the convergence of mobile and fixed broadband networks through a wide area radio-access. Since January 2007, the IEEE 802.16 working group has been developing a new amendment the IEEE 802.16 standard i.e. IEEE 802.16 m as an advanced air interface to meet the requirements of ITU-R/IMT-Advanced for 4G systems. The mobile WiMAX air interface adopts orthogonal frequency division multiple access (OFDMA) as multiple access technique for its uplink and downlink to improve signal performance affected by multipath distortion. All OFDMA based networks, including mobile WiMAX, experience the problem of high peak-to-average power ratio (PAPR). This paper presents a discrete-sine-transform precoding technique based random-interleaved OFDMA (RI-OFDMA) uplink system for PAPR reduction in mobile WiMAX. The PAPR of proposed system is analyzed with root-raised-cosine pulse shaping filter to keep out of band radiation low and to fulfill the spectrum mask requirements. Simulation results show that, the proposed system has low PAPR compared to the Hadamard transform precoded RI-OFDMA uplink systems and the conventional RI-OFDMA uplink systems.  相似文献   
997.
In the past, security protocols including key transport protocols are designed with the assumption that there are two parties communication with each other and an adversary tries to intercept this communication. In Delay/Disruption Tolerant Networking (DTN), packet delivery relies on intermediate parties in the communication path to store and forward the packets. DTN security architecture requires that integrity and authentication should be verified at intermediate nodes as well as at end nodes and confidentiality should be maintained for end communicating parties. This requires new security protocols and key management to be defined for DTN as traditional end-to-end security protocols will not work with DTN. To contribute towards solving this problem, we propose a novel Efficient and Scalable Key Transport Scheme (ESKTS) to transport the symmetric key generated at a DTN node to other communicating body securely using public key cryptography and proxy signatures. It is unique effort to design a key transport protocol in compliance with DTN architecture. ESKTS ensures that integrity and authentication is achieved at hop-by-hop level as well as end-to-end level. It also ensures end-to-end confidentiality and freshness for end communicating parties. This scheme provides a secure symmetric key transport mechanism based on public key cryptography to exploit the unique bundle buffering characteristics of DTN to reduce communication and computation cost .  相似文献   
998.
With the use of smart card in user authentication mechanisms, the concept of two‐factor authentication came into existence. This was a forward move towards more secure and reliable user authentication systems. It elevated the security level by requiring a user to possess something in addition to know something. In 2010, Sood et al. and Song independently examined a smart‐card‐based authentication scheme proposed by Xu et al. They showed that in the scheme of Xu et al., an internal user of the system can turn hostile to impersonate other users of the system. Both of them also proposed schemes to improve the scheme of Xu et al. Recently, Chen et al. identified some security problems in the improved schemes proposed by Sood et al. and Song. To fix these problems, Chen et al. presented another scheme, which they claimed to provide mutual authentication and withstand lost smart card attack. Undoubtedly, in their scheme, a user can also verify the legitimacy of server, but we find that the scheme fails to resist impersonation attacks and privileged insider attack. We also show that the scheme does not provide important features such as user anonymity, confidentiality to air messages, and revocation of lost/stolen smart card. Besides, the scheme defies the very purpose of two‐factor security. Furthermore, an attacker can guess a user's password from his or her lost/stolen smart card. To meet these challenges, we propose a user authentication method with user anonymity. We show through analysis and comparison that the proposed scheme exhibits enhanced efficiency in contrast to related schemes, including the scheme of Chen et al. Copyright © 2013 John Wiley & Sons, Ltd.  相似文献   
999.
Moments have been used in all sorts of object classification systems based on image. There are lots of moments studied by many researchers in the area of object classification and one of the most preference moments is the Zernike moment. In this paper, the performance of object classification using the Zernike moment has been explored. The classifier based on neural networks has been used in this study. The results indicate the best performance in identifying the aggregate is at 91.4% with a ten orders of the Zernike moment. This encouraging result has shown that the Zernike moment is a suitable moment to be used as a feature of object classification systems.  相似文献   
1000.
Phenanthrene sorption to soil humic acid and different humin fractions   总被引:13,自引:0,他引:13  
This study was undertaken to provide an insight into the effect of heterogeneous soil organic matter (SOM) on the sorption of phenanthrene. Humic acid (HA) and humin were extracted from a peat soil. Humin was further fractionated into bound-humic acid (BHA), lipid, and insoluble residue (IR) fractions. Heterogeneous natures of these fractions were characterized by elemental analysis, ultraviolet-visible spectroscopy, Fourier transform infrared spectroscopy, and solid-state 13C NMR. Aliphaticity of the fractions followed the order lipid >BHA > HA > IR, while the polarity order was IR > BHA> HA > lipid. Sorption of phenanthrene on these fractions fitted the Freundlich equation, suggesting that phenanthrene sorption isotherms of lipid were almost linear (N = 0.993), while those of HA, BHA, and IR were nonlinear, with N values ranging from 0.723 to 0.910. The N values followed the order lipid > HA > BHA > IR and were significantly correlated inversely with their polarities (p < 0.05). Organic carbon-normalized sorption coefficients (K(FOC)) were independent of aliphatic or aromatic contents of the SOM fractions. The results suggested that SOM, especially for the humin fractions, was highly heterogeneous in terms of elemental composition, structure, and polarity. Such heterogeneity was considered to be responsible forthe nonlinear sorption of phenanthrene.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号