首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9283篇
  免费   635篇
  国内免费   79篇
电工技术   123篇
综合类   32篇
化学工业   2334篇
金属工艺   199篇
机械仪表   399篇
建筑科学   196篇
矿业工程   17篇
能源动力   591篇
轻工业   1011篇
水利工程   103篇
石油天然气   84篇
武器工业   1篇
无线电   1072篇
一般工业技术   1879篇
冶金工业   304篇
原子能技术   97篇
自动化技术   1555篇
  2024年   42篇
  2023年   263篇
  2022年   633篇
  2021年   952篇
  2020年   606篇
  2019年   696篇
  2018年   699篇
  2017年   581篇
  2016年   594篇
  2015年   379篇
  2014年   488篇
  2013年   774篇
  2012年   451篇
  2011年   539篇
  2010年   355篇
  2009年   308篇
  2008年   229篇
  2007年   186篇
  2006年   150篇
  2005年   92篇
  2004年   100篇
  2003年   77篇
  2002年   73篇
  2001年   39篇
  2000年   50篇
  1999年   38篇
  1998年   89篇
  1997年   49篇
  1996年   54篇
  1995年   48篇
  1994年   39篇
  1993年   36篇
  1992年   33篇
  1991年   25篇
  1990年   15篇
  1989年   25篇
  1988年   17篇
  1987年   20篇
  1986年   8篇
  1985年   18篇
  1984年   13篇
  1983年   11篇
  1982年   12篇
  1981年   13篇
  1980年   11篇
  1979年   11篇
  1978年   11篇
  1977年   11篇
  1976年   13篇
  1971年   4篇
排序方式: 共有9997条查询结果,搜索用时 15 毫秒
51.
The mobile cloud computing (MCC) has enriched the quality of services that the clients access from remote cloud‐based servers. The growth in the number of wireless users for MCC has further augmented the requirement for a robust and efficient authenticated key agreement mechanism. Formerly, the users would access cloud services from various cloud‐based service providers and authenticate one another only after communicating with the trusted third party (TTP). This requirement for the clients to access the TTP during each mutual authentication session, in earlier schemes, contributes to the redundant latency overheads for the protocol. Recently, Tsai et al have presented a bilinear pairing based multi‐server authentication (MSA) protocol, to bypass the TTP, at least during mutual authentication. The scheme construction works fine, as far as the elimination of TTP involvement for authentication has been concerned. However, Tsai et al scheme has been found vulnerable to server spoofing attack and desynchronization attack, and lacks smart card‐based user verification, which renders the protocol inapt for practical implementation in different access networks. Hence, we have proposed an improved model designed with bilinear pairing operations, countering the identified threats as posed to Tsai scheme. Additionally, the proposed scheme is backed up by performance evaluation and formal security analysis.  相似文献   
52.
Quadrifilar helix antenna (QHA) has its applications in satellite communications. This paper presents the performance optimisation of input and radiation characteristics of QHA in the presence of infinite and finite metallic ground planes. For the infinite ground plane, it has been observed that input parameters such as impedance and voltage standing wave ratio (VSWR) are stable, and the antenna has broader half power beamwidth (HPBW). Smaller metallic platforms that act as finite ground planes produce better 3‐dB axial ratio beamwidth and boresight axial ratio. Deployment of QHA on smaller metallic platforms such as nanosatellites and CubeSats enhances the circularly polarised beamwidth of the antenna with improved boresight axial ratio. However, on large low earth orbit (LEO) satellites, stable input characteristics and broader HPBW have been achieved at the cost of narrow circularly polarised beamwidth and degraded boresight axial ratio.  相似文献   
53.
Coexistence analysis is extremely important in examining the possibility for spectrum sharing between orthogonal frequency‐division multiplexing (OFDM)‐based international mobile telecommunications (IMT)‐Advanced and other wireless services. In this letter, a new closed form method is derived based on power spectral density analysis in order to analyze the coexistence of OFDM‐based IMT‐Advanced systems and broadcasting frequency modulation (FM) systems. The proposed method evaluates more exact interference power of IMT‐Advanced systems in FM broadcasting systems than the advanced minimum coupling loss (A‐MCL) method. Numerical results show that the interference power is 1.3 dB and 3 dB less than that obtained using the A‐MCL method at cochannel and adjacent channel, respectively. This reduces the minimum separation distance between the two systems, which eventually saves spectrum resources.  相似文献   
54.
Single point, sender based control does not scale well for multicast delivery. For applications, such as group video or teleconferencing a low total cost multicast tree is required. In this article we present a destination driven algorithm to minimize the total tree cost of multicast tree in a dynamic situation for the whole session duration. In this heuristic approach we considered the staying duration of participants are available at the time of joining. The performance of our algorithm is analyzed through extensive simulation and evaluated against several other existing dynamic multicast routing and also against one well known near optimum heuristic algorithm used for solving Steiner tree problem. We have further tested our algorithm using erroneous information given by the joining participants. Simulation results show that its performance does not degrade that much even when the range of error is considerably high, which proves the robustness of our algorithm.  相似文献   
55.
We report on plasma processing-induced damage to sub-half-micron n-MOSFETs that is invoked by potential differences between device terminals during metal-1 plasma processing. The damage mechanism is identified as hot carrier (HC) injection promoted by the layout of metal-1 interconnect. Using conventional and modified charge pumping techniques as well as transistor parameter measurements, we also investigate the impact of the damage on device reliability by applying Fowler-Nordheim (FN) and hot carrier stresses. The results show the severe impact of this damage on device reliability, which is attributed to trapping of positive charge at the drain edge that is enough to shorten the device channel  相似文献   
56.
Among test techniques for analog circuits, DC test is one of the simplest method for BIST application since easy to integrate test pattern generator and response analyzer are conceivable. Precisely, this paper presents such an investigation for a CMOS operational amplifier that is latter extended to active analog filters. Since the computation of fault coverage is still a controversy question for analog cells, we develop first an evaluation technique for optimizing the tolerance band of the measurements to test. Then, using some DFT solutions we derive single DC pattern and discuss the minimal number of points to test for the detection of defects. A response analyzer is integrated with a Built-in Voltage Sensor (BIVS) and provides directly a logic pass/fail test result. Finally, the extra circuitry introduced by this BIST technique for analog modules does not exceed 5% of the total silicon area of the circuit under test and detects most of the faults.  相似文献   
57.
The performance of a countermeasure technique in the presence of the optimal follower multitone jammer is evaluated for frequency-hopped spread spectrum (FHSS) communications. It is shown that, with a certain probability, the optimal jammer will have dual tones in a frequency channel  相似文献   
58.
Time-division multiple access (TDMA)-based systems have been adopted as the first generation digital cellular standards in North America, Europe, and Japan. The increasing demand for capacity motivates the study of alternate systems and enhancements to the adopted TDMA standards. In particular, CDMA techniques using direct sequence and slow frequency hopping have been suggested. We analyze the capacity of a slow-frequency-hopped TDMA-based cellular system via calculation of the outage probability. Expressions for the outage probability as a function of voice activity, power control, and antenna diversity are provided for mobile-to-base transmission. These expressions are used to evaluate the system capacity (users/MHz/cell) based on simulating mobile locations within 37 hexagonal cells. The sensitivity to power control error, voice activity factor, and soft capacity of the system is investigated  相似文献   
59.
This paper is a brief review of the method for analyzing the space and time dependent exergy and irreversibility fields in processes. It presents the basic equations, the method for their use, major literature sources, and three examples from the authors' work: flow desiccation, combustion of oil droplets, and combustion of pulverized coal. Conclusions from this Second Law analysis are used to attempt process improvement suggestions.  相似文献   
60.
A detailed review of the archival reveals that the heat transfer and fluid flow characteristics of circular cavities have not been investigated so far and of course their physical features are not understood. A prominent application of these cavities arises in the miniaturized packaging of electronic components that are subject to strict constraints. This paper addresses primarily steady-state laminar natural convection of air in a circular cavity of diameter H inscribed in a square cavity of side H where the corresponding sides are in contact at four points. A third cavity, an arc–square cavity whose shape lies between the square and circular cavity shapes is included in the analysis. The finite volume method is used to perform the numerical simulations. The methodology takes into account the second-order-accurate QUICK scheme for the discretization of the convective term, whereas the pressure–velocity coupling is handled with the SIMPLE scheme. Since the air is not assumed a Boussinesq gas, it was decided to take all thermophysical properties as temperature-dependent. In the end, it has been demonstrated that the circular cavity possesses a superior balance between heat transfer enhancement and size in cross-section area in comparison with the standard square cavity. The side of the square cavity is similar to the diameter of the circular cavity.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号