首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1527篇
  免费   64篇
  国内免费   2篇
电工技术   15篇
化学工业   424篇
金属工艺   29篇
机械仪表   41篇
建筑科学   37篇
矿业工程   5篇
能源动力   44篇
轻工业   182篇
水利工程   18篇
石油天然气   5篇
无线电   110篇
一般工业技术   217篇
冶金工业   99篇
原子能技术   4篇
自动化技术   363篇
  2024年   16篇
  2023年   18篇
  2022年   50篇
  2021年   73篇
  2020年   44篇
  2019年   44篇
  2018年   49篇
  2017年   44篇
  2016年   46篇
  2015年   40篇
  2014年   57篇
  2013年   113篇
  2012年   96篇
  2011年   115篇
  2010年   92篇
  2009年   82篇
  2008年   77篇
  2007年   61篇
  2006年   58篇
  2005年   46篇
  2004年   44篇
  2003年   32篇
  2002年   29篇
  2001年   26篇
  2000年   11篇
  1999年   16篇
  1998年   16篇
  1997年   12篇
  1996年   7篇
  1995年   12篇
  1993年   13篇
  1992年   8篇
  1991年   4篇
  1990年   5篇
  1989年   5篇
  1988年   5篇
  1987年   4篇
  1985年   8篇
  1984年   8篇
  1983年   9篇
  1982年   8篇
  1981年   14篇
  1979年   5篇
  1978年   5篇
  1977年   4篇
  1976年   7篇
  1971年   6篇
  1970年   4篇
  1966年   4篇
  1936年   4篇
排序方式: 共有1593条查询结果,搜索用时 15 毫秒
991.
Analog-to-digital converters based on sigma-delta modulation have shown promising performance, with steadily increasing bandwidth. However, associated with the increasing bandwidth is an increasing modulator sampling rate, which becomes costly to decimate in the digital domain. Several architectures exist for the digital decimation filter, and among the more common and efficient are polyphase decomposed finite-length impulse response (FIR) filter structures. In this paper, we consider such filters implemented with partial product generation for the multiplications, and carry-save adders to merge the partial products. The focus is on the efficient pipelined reduction of the partial products, which is done using a bit-level optimization algorithm for the tree design. However, the method is not limited only to filter design, but may also be used in other applications where high-speed reduction of partial products is required. The presentation of the reduction method is carried out through a comparison between the main architectural choices for FIR filters: the direct-form and transposed direct-form structures. For the direct-form structure, usage of symmetry adders for linear-phase filters is investigated, and a new scheme utilizing partial symmetry adders is introduced. The optimization results are complemented with energy dissipation and cell area estimations for a 90 nm CMOS process.  相似文献   
992.
This paper presents an analysis of several Transmission Control Protocol (TCP) variants working over a digital video broadcasting‐second generation (DVB‐S2) satellite link with the support of the Differentiated Services (DiffServ) architecture to provide quality of service (QoS). This analysis is carried out using the NS‐2 simulator tool. Three TCP variants are considered: SACK TCP, Hybla TCP, and CUBIC TCP. These TCP variants are taken as a starting point because they have proven to be the most suitable variants to deal with long delays present in satellite links. The DVB‐S2 link also introduces the challenge of dealing with variable bandwidth, whereas the DiffServ architecture introduces the challenge of dealing with different priorities. In this paper, we propose a DiffServ model that includes a modified queuing mechanism to enhance the goodput of the assured forwarding traffic class. This modified DiffServ model is simulated and tested, considering the interaction of the selected TCP variants. In addition, we present evaluation metrics, significant simulations results, and conclusions about the performance of these TCP variants evaluated over the proposed scenario. As a general conclusion, we show that CUBIC TCP is the TCP variant that shows the best performance in terms of goodput, latency, and friendliness. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   
993.
The application of an object-oriented approach to modeling the application and presentation layer of the human-machine interfaces in a telecommunications management network architecture is described. It is argued that a significant simplification in information interchange between human and machine occurs when the machine has a model of the user to which it can conform. Several aspects of user modeling are discussed. The development and implementation of new input devices are also discussed  相似文献   
994.
One of the most interesting radio‐frequency identification applications is the detection of missing tags along with the objects they are attached to. This process must be executed in a fast and efficient way. A monitoring function may need to be periodically executed in order to implement a reliable detection system, therefore raising the need to optimize its performance, in terms of both time and reliability. The contribution of this paper is twofold; on one hand, we provide a protocol taxonomy for the missing‐tag detection problem, which up to our best knowledge is the first of its class, and on the other hand, we propose two novel protocols for a fast detection of the missing tags in a passive radio‐frequency identification system. By increasing the length of the packets exchanged among the reader and the tags, our protocols are able to reduce the time needed to detect the missing tags, by decreasing the number of broadcast messages in the network. Our results show that our proposals outperform the most recent protocols in the literature, obtaining improvements on the execution time going from 25% to 75%. Copyright © 2016 John Wiley & Sons, Ltd.  相似文献   
995.
Mobile agents are software entities consisting of code, data, and state that can migrate autonomously from host to host executing their code. In such scenario there are some security issues that must be considered. In particular, this paper deals with the protection of mobile agents against manipulation attacks performed by the host, which is one of the main security issues to solve in mobile agent systems. This paper introduces an infrastructure for mobile agent watermarking (MAW). MAW is a lightweight approach that can efficiently detect manipulation attacks performed by potentially malicious hosts that might seek to subvert the normal agent operation. MAW is the first proposal in the literature that adapts software watermarks to verify the execution integrity of an agent. The second contribution of this paper is a technique to punish a malicious host that performed a manipulation attack by using a trusted third party (TTP) called host revocation authority (HoRA). A proof‐of‐concept has also been developed and we present some performance evaluation results that demonstrate the usability of the proposed mechanisms. Copyright © 2010 John Wiley & Sons, Ltd.  相似文献   
996.
Chemically synthesized undoped poly3-octylthiophene (P3OT) was deposited as thin films on conducting glass substrates by drop casting. Doping state of P3OT was obtained by adding FeCl3 into the original P3OT solution. A qualitative explanation of the electrical contact behavior of the P3OT films was given by a band diagram made from optical absorbance spectra and electrochemical current–voltage curves of the polymeric films. Gold contacts on both undoped and doped P3OT films give an ohmic contact. Silver/P3OT contact shows a rectifying behavior; the forward current is 500 times the reverse current at 0.5 V. Aluminum also forms rectifying contact with the two types of P3OT films, although the experimental rectification ratio is lower than that of the silver. The I–V curves of rectifying contacts were analyzed with Schottky equation and different diode parameters were obtained.  相似文献   
997.
Residue 31 of porcine pancreatic phospholipase A2 (PLA2) islocated at the entrance to the active site. To study the roleof residue 31 in PLA2, six mutant enzymes were produced by site-directedmutagenesis, replacing Leu by either Trp, Arg, Ala, Thr, Seror Gly. Direct binding studies indicated a three to six timesgreater affinity of the Trp31 PLA2 for both monomeric and micellarsubstrate analogs, relative to the wild-type enzyme. The otherfive mutants possess an unchanged affinity for monomers of theproduct analog n-decylphosphocholine and for micelles of thediacyl substrate analog rac-l,2-dioctanoylamino-dideoxy-glycero-3-phosphocholine.The affinities for micelles of the monoacyl product analog n-hexadecylphosphocholinewere decreased 9–20 times for these five mutants. Kineticstudies with monomeric substrates showed that the mutants haveVmax values which range between 15 and 70% relative to the wild-typeenzyme. The Vmax values for micelles of the zwitterionic substratel,2-dioctanoyl-sn-glycero-3-phosphocholine were lowered 3–50times. The Km values for the monomeric substrate and the kmvalues for the micellar substrate were hardly affected in thecase of five of the six mutants, but were considerably decreasedwhen Trp was present at position 31. The results of these investigationspoint to a versatile role for the residue at position 31: involvementin the binding and orientating of monomeric substrate (analogs),involvement in the binding of the enzyme to micellar substrateanalogs and possibly involvement in shielding the active sitefrom excess water.  相似文献   
998.
Multi-Hypothesis motion compensated filter (MHMCF) utilizes a number of hypotheses (temporal predictions) to estimate the current pixel which is corrupted with noise. While showing remarkable denoising results, MHMCF is computationally intensive as full search is employed in the expectation of finding good temporal predictions in the presence of noise. In the frame of MHMCF, a fast denoising algorithm FMHMCF is proposed in this paper. With edge preserved low-pass prefiltering and noise-robust fast multihypothesis search, FMHMCF could find reliable hypotheses while checking very few search locations, so that the denoising process can be dramatically accelerated. Experimental results show that FMHMCF can be 10 to 14 times faster than MHMCF, while achieving the same or even better denoising performance with up to 1.93 dB PSNR (peak-signal-noise-ratio) improvement.  相似文献   
999.
Mobile Networks and Applications - Recently, Unmanned Aerial Vehicles (UAVs) have become a cheap alternative to sense pollution values in a certain area due to their flexibility and ability to...  相似文献   
1000.

Access Networks based on Passive Optical Network (PON) technology can offer transport services to broadband service providers, such as mobile backhauling/fronthauling for Mobile Network Operators and multi-ONU Service Level Agreements for Virtual Network Operators. Besides that, Infrastructure Service Provider (InP) also provides broadband access services to end-users, such as residential subscribers and single or multi-site enterprises. In such a scenario, the InPs support diverse customers in the same PON. This paper proposes a bandwidth slicing mechanism to assure bandwidth isolation for different PON customers who rent part of a PON infrastructure from the InP. We introduce a Dynamic Bandwidth Allocation algorithm for Ethernet PONs called MAB-IPACT, which assures bandwidth on different granularity: conventional customers with a single ONU, multi-ONU customers owning a group of ONUs and providing a single type of service, and multi-ONU customers having diverse types of services. The MAB-IPACT algorithm also prioritizes bandwidth distribution among subgroups of ONUs of the same multi-ONU customer. A subgroup of ONUs is a subset of ONUs that belongs to the same multi-ONU customer, which are employed for the same type of service (e.g., ONUs for business service.). Simulation results show that the proposed mechanism improves the network performance of multi-ONU customers with subgroups of ONUs serving different services.

  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号