首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   85891篇
  免费   1012篇
  国内免费   407篇
电工技术   787篇
综合类   2318篇
化学工业   11740篇
金属工艺   4814篇
机械仪表   3056篇
建筑科学   2336篇
矿业工程   567篇
能源动力   1143篇
轻工业   3804篇
水利工程   1301篇
石油天然气   351篇
武器工业   1篇
无线电   9366篇
一般工业技术   16656篇
冶金工业   3139篇
原子能技术   286篇
自动化技术   25645篇
  2021年   45篇
  2020年   35篇
  2019年   44篇
  2018年   14473篇
  2017年   13407篇
  2016年   10000篇
  2015年   648篇
  2014年   285篇
  2013年   347篇
  2012年   3246篇
  2011年   9515篇
  2010年   8364篇
  2009年   5637篇
  2008年   6895篇
  2007年   7877篇
  2006年   204篇
  2005年   1290篇
  2004年   1185篇
  2003年   1231篇
  2002年   600篇
  2001年   129篇
  2000年   216篇
  1999年   99篇
  1998年   129篇
  1997年   91篇
  1996年   84篇
  1995年   47篇
  1994年   49篇
  1993年   42篇
  1992年   28篇
  1991年   38篇
  1989年   23篇
  1988年   35篇
  1984年   33篇
  1982年   24篇
  1976年   27篇
  1969年   30篇
  1968年   45篇
  1967年   35篇
  1966年   44篇
  1965年   44篇
  1963年   31篇
  1962年   23篇
  1960年   30篇
  1959年   37篇
  1958年   39篇
  1957年   36篇
  1956年   37篇
  1955年   64篇
  1954年   68篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
991.
The degradation of end-to-end quality of service (QoS) on mobile users is becoming a common issue for IEEE 802.11 infrastructure-based networks in crowded areas. This research tackles the issue by employing an SDN framework on an integrated wireless/wired environment. Thereby, we present the development and implementation of a system that performs user management by analyzing the network load from the OpenFlow statistics, as well as the wireless information collected from the associated users. In order to analyse the behaviour of the proposed user migration algorithm, we evaluate the system under scenarios with different traffic load and user session duration. From the experiments, we observed that in several cases wireless users get a considerable QoS improvement at the application layer (up to 30% improvement in throughput and up to 20% in delay in our simulations) once the system is activated. Based on the results, we present an analysis on how and when user migration in multi-access point IEEE 802.11 networks can be most effective.  相似文献   
992.
In this paper, we propose an efficient privacy-preserving energy consumption scheme with updating certificates, called EPEC, for secure smart grid communications. Specifically, the proposed EPEC scheme consists of four phases: gateways initialization, party registration, privacy-preserving energy consumption, and updating certificates. Based on the bilinear pairing, the identity-based encryption, and the strategy of updating certificates, EPEC can achieve data privacy, gateway privacy, and is robust to data replay attack, availability attack, modification attack, man-in-the-middle attack, and Sybil attack. Through extensive performance evaluations, we demonstrate the effectiveness of EPEC in terms of transmission delay performance at the HAN gateway and average delivery ratio, by implementing three types of curves including, the Barreto–Naehrig curve with modulus 256 bits, the Kachisa–Schaefer–Scott curve with modulus 512 bits, and the Barreto–Lynn–Scott curve with modulus 640 bits.  相似文献   
993.
This article suggests a novel method to retrieve a narrowband signal sent in a multipath environment with a delay spread considering ISI between symbols. The proposed method does not require any preamble nor known signal. Using the joint direction and time delay of arrivals estimation algorithm developed in prior work, the directions and time delays of arrival in the multipath channel are jointly estimated and associated while keeping a low computational cost. In this process, a MVDR beamformed copy of each arriving signal is created. The quality of these “pseudo copies” is evaluated and compared to the original direct and reflected signals in this work. Another beamforming method, the Moore–Penrose pseudoinverse, with better retrieval of the direct and reflected signals is also proposed. Using a simple delay-and-sum operation on the previously beamformed copies, it is possible to substantially improve the the system’s performance in terms of bit error rate. An approach using oversampling on the array antenna is introduced to improve performance. Numerical simulations are discussed to support theory.  相似文献   
994.
Related key attacks (RKAs) are powerful cryptanalytic attacks where an adversary can change the secret key and observe the effect of such changes at the output. The state of the art in RKA security protects against an a-priori unbounded number of certain algebraic induced key relations, e.g., affine functions or polynomials of bounded degree. In this work, we show that it is possible to go beyond the algebraic barrier and achieve security against arbitrary key relations, by restricting the number of tampering queries the adversary is allowed to ask for. The latter restriction is necessary in case of arbitrary key relations, as otherwise a generic attack of Gennaro et al. (TCC 2004) shows how to recover the key of almost any cryptographic primitive. We describe our contributions in more detail below. (1) We show that standard ID and signature schemes constructed from a large class of \(\Sigma \)-protocols (including the Okamoto scheme, for instance) are secure even if the adversary can arbitrarily tamper with the prover’s state a bounded number of times and obtain some bounded amount of leakage. Interestingly, for the Okamoto scheme we can allow also independent tampering with the public parameters. (2) We show a bounded tamper and leakage resilient CCA-secure public key cryptosystem based on the DDH assumption. We first define a weaker CCA-like security notion that we can instantiate based on DDH, and then we give a general compiler that yields CCA security with tamper and leakage resilience. This requires a public tamper-proof common reference string. (3) Finally, we explain how to boost bounded tampering and leakage resilience [as in (1) and (2) above] to continuous tampering and leakage resilience, in the so-called floppy model where each user has a personal hardware token (containing leak- and tamper-free information) which can be used to refresh the secret key. We believe that bounded tampering is a meaningful and interesting alternative to avoid known impossibility results and can provide important insights into the security of existing standard cryptographic schemes.  相似文献   
995.
Random waypoint mobility model in cellular networks   总被引:2,自引:0,他引:2  
In this paper we study the so-called random waypoint (RWP) mobility model in the context of cellular networks. In the RWP model the nodes, i.e., mobile users, move along a zigzag path consisting of straight legs from one waypoint to the next. Each waypoint is assumed to be drawn from the uniform distribution over the given convex domain. In this paper we characterise the key performance measures, mean handover rate and mean sojourn time from the point of view of an arbitrary cell, as well as the mean handover rate in the network. To this end, we present an exact analytical formula for the mean arrival rate across an arbitrary curve. This result together with the pdf of the node location, allows us to compute all other interesting measures. The results are illustrated by several numerical examples. For instance, as a straightforward application of these results one can easily adjust the model parameters in a simulation so that the scenario matches well with, e.g., the measured sojourn times in a cell.  相似文献   
996.
In this paper, we introduce a new technique for the design of high-performance Rayleigh fading channel simulators. The proposed design method uses set partitioning – a technique, which plays a key role in the design of trellis-coded modulation schemes. We show how set partitioning can be used to design multiple uncorrelated fading waveforms enabling the simulation of Rayleigh fading channels. For the important case of isotropic scattering, we show that the sample average of the generated waveforms results in a deterministic process, the autocorrelation function (ACF) of which tends to the zeroth-order Bessel function of the first kind as the number of sample functions increases. The proposed procedure is completely deterministic. The comparison with a stochastic procedure using Monte Carlo techniques will be made. A study of the performance shows clearly that the new technique using set partitioning outperforms by far existing Monte Carlo methods.  相似文献   
997.
Aiming at the significance of the energy controls of wireless sensor networks, an economical energy consumption algorithm for wireless communicating in Wireless Sensor Networks (WSN) is presented. Based on the algorithm, the maximal system throughput of WSN is analyzed, and the upper bound of throughput of WSN is proposed and proved. Some numerical simulations are conducted and analyzed. The conclusions include that the transmitting radius of sensor node and the parameters of the energy cost function have significant influence upon the throughput, but the monitoring region radius has little influence. For the same transmitting distance, the more the hopping of information trans- mitting, the better the throughput of WSN. On the other hand, for the energy optimization of the whole WSN, the trade-off problem between the throughput capacity and the relay nodes is proposed, and the specific expression of relay hops that minimized the energy consumptions and the maximal throughput of WSN under the specific situation is derived.  相似文献   
998.
This paper investigates new criteria of the robust \(H_\infty \) stability for a class of uncertain stochastic fuzzy mixed-delay systems with nonlinear noise disturbances by employing an improved free-weighting matrix approach. The fuzzy system is based on the Takagi–Sugeno model that is often used to represent the complex nonlinear systems in terms of fuzzy sets and fuzzy reasoning. To reflect more realistic dynamical behaviors of the system, both the parameter uncertainties and stochastic disturbances are considered, the stochastic disturbances are given in the form of a Brownian motion. The mixed delays comprise both discrete and distributed time-varying delays. In terms of a stochastic fuzzy Lyapunov functional, a sufficient criterion is proposed to investigate dynamical behaviors of the system in the mean-square sense with an \(H_\infty \) performance index.  相似文献   
999.
This paper presents a novel analog circuit fault diagnosis approach using generalized multiple kernel learning-support vector machine (GMKL-SVM) method and particle swarm optimization (PSO) algorithm. First, the wavelet coefficients’ energies of impulse responses are generated as features. Then, a diagnosis model is constructed by using GMKL-SVM method based on features. Meanwhile, the PSO algorithm yields parameters for the GMKL-SVM method. Sallen-Key bandpass filter and two-stage four-op-amp biquad lowpass filter fault diagnosis simulations are given to demonstrate the proposed diagnose procedure, and the comparison simulations reveal that the proposed approach has higher diagnosis precision than the referenced methods.  相似文献   
1000.
A radiotracer technique has been used to measure both mercury self-diffusion and surface concentration values in bulk and liquid phase epitaxy, LPE, grown Hg1−xCdxTe. A high resolution sectioning technique has allowed profiling of thin epitaxial layers in submicron steps. Hg1-xCdxTe samples with composition values betweenx Cd= 0.16 and 0.23 were isothermally annealed in carefully controlled and monitored diffusion con-ditions. Mercury reservoirs containing Hg203 were used to provide vapour diffusion sources during closed tube isothermal anneals in the temperature range 300° C to 400° C. Evidence has been found which may indicate the presence of two components in the radio-tracer profiles for both bulk and epitaxially grown material. In some cases it was possible to estimate two diffusion coefficients,D 1andD 2, from the near surface and deeply penetrating components, respectively. Our results forD 1andD 2are compared with other work. For bulk material annealed at 400° C under a saturated mercury pressureD 1= 2.0 x 10-12cm2s-1 andD 2= 1.1 x 10-11cm2s−1. Diffusion coefficients at 310° C under saturated mercury pressure, have been measured in bulk and epitaxial material. Close agreement was found between these results with an average value ofD 1= 1.4 x 10−13cm2s−1. We believe this to be the first time radiotracer results for epitaxial material have been presented. We have collated diffusion data, as a function of reciprocal temperature, from several workers and suggest there is evidence for a change in the activation energy for mercury diffusion around 350° C. This may be due to a change in the dominant diffusion mechanism.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号