首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   38321篇
  免费   2655篇
  国内免费   1537篇
电工技术   1856篇
技术理论   1篇
综合类   2265篇
化学工业   5044篇
金属工艺   2158篇
机械仪表   1858篇
建筑科学   2362篇
矿业工程   782篇
能源动力   814篇
轻工业   1921篇
水利工程   597篇
石油天然气   1389篇
武器工业   272篇
无线电   3440篇
一般工业技术   3444篇
冶金工业   1261篇
原子能技术   344篇
自动化技术   12705篇
  2024年   96篇
  2023年   381篇
  2022年   599篇
  2021年   985篇
  2020年   714篇
  2019年   702篇
  2018年   740篇
  2017年   763篇
  2016年   683篇
  2015年   1057篇
  2014年   1427篇
  2013年   1639篇
  2012年   2457篇
  2011年   4869篇
  2010年   2808篇
  2009年   2750篇
  2008年   2295篇
  2007年   2166篇
  2006年   2198篇
  2005年   2001篇
  2004年   1625篇
  2003年   1762篇
  2002年   1702篇
  2001年   1226篇
  2000年   795篇
  1999年   822篇
  1998年   647篇
  1997年   478篇
  1996年   462篇
  1995年   394篇
  1994年   281篇
  1993年   242篇
  1992年   185篇
  1991年   116篇
  1990年   101篇
  1989年   83篇
  1988年   72篇
  1987年   42篇
  1986年   22篇
  1985年   24篇
  1984年   35篇
  1983年   19篇
  1982年   16篇
  1981年   13篇
  1980年   12篇
  1979年   3篇
  1978年   1篇
  1951年   3篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
941.
本文介绍了当前互联网上最热门的技术,Widget。从Widget的技术原理、价值意义,体系架构、应用案例及未来展望等五个方面说明Widget在移动互联网中应用价值:给用户业务体验带来革命性变化的同时,也会给电信运营商在移动互联网领域带来巨大机遇。  相似文献   
942.
This paper proposes a novel signal transformation and interpolation approach based on the modification of DCT (Discrete Cosine Transform). The proposed algorithm can be applied to any periodic or quasi periodic waveform for time scale and/or pitch modification purposes in addition to signal reconstruction, compression, coding and packet lost concealment. The proposed algorithm has two advantages:
  • (i) 
    Since DCT does not have the explicit phase information, one does not need the cubic spline interpolation of the phase component of the sinusoidal model.
  • (ii) 
    The parameters to be interpolated can be reduced because of the energy packing efficiency of the DCT. This is particularly important if signal synthesis is carried out on a remote location from the transmitted parameters.
The results are presented on periodic waveforms and on speech signal in order to appreciate the fidelity of the proposed algorithm. In addition, the proposed method is compared with TD-PSOLA, sinusoidal model and phase vocoder algorithms. The results are presented in objective PESQ scores for time scale modification and output files are provided as supplementary material,1 for subjective evaluation, for packet lost concealment. Results prove that the proposed modification of the DCT synthesis provides a favorable algorithm for specialists working in the signal processing area.  相似文献   
943.
Many secret sharing schemes for digital images have been developed in recent decades. Traditional schemes typically must deal with the problem of computational complexity, and other visual secret sharing schemes come with a higher transmission cost and storage cost; that is, each shadow size is m times as big as the original secret image. The new (2,n) secret sharing scheme for grayscale images proposed in this paper is based a combination of acceptable image quality using block truncation coding (BTC), high compression ratio discrete wavelet transform (DWT) and good subjective performance of the vector quantization (VQ) technique. Experimental results confirm that our proposed scheme not only generates a high quality reconstructed original image but also generates small, random-like grayscale shadows.  相似文献   
944.
This paper examines the role played by feedforward in model predictive control (MPC). We contrast feedforward with preview action. The latter is standard in model predictive control, whereas feedforward has been rarely, if ever, used in contemporary formulations of MPC. We argue that feedforward can significantly improve performance in the presence of measurement noise and certain types of model uncertainty.  相似文献   
945.
The migration from circuit-switched networks to packet-switched networks necessitates the investigation of related issues such as service delivery, QoS, security, and service fraud and misuse. The latter can be seen as a combination of accounting and security aspects. In traditional telecommunication networks, fraud accounts for annual losses at an average of 3%–5% of the operators’ revenue and still increasing at a rate of more than 10% yearly. It is also expected that in VoIP networks, the situation will be worse due to the lack of strong built-in security mechanisms, and the use of open standards. This paper discusses the fraud problem in VoIP networks and evaluates the related available solutions.  相似文献   
946.
In coming years, there will be billions of RFID tags living in the world tagging almost everything for tracking and identification purposes. This phenomenon will impose a new challenge not only to the network capacity but also to the scalability of event processing of RFID applications. Since most RFID applications are time sensitive, we propose a notion of Time To Live (TTL), representing the period of time that an RFID event can legally live in an RFID data management system, to manage various temporal event patterns. TTL is critical in the “Internet of Things” for handling a tremendous amount of partial event-tracking results. Also, TTL can be used to provide prompt responses to time-critical events so that the RFID data streams can be handled timely. We divide TTL into four categories according to the general event-handling patterns. Moreover, to extract event sequence from an unordered event stream correctly and handle TTL constrained event sequence effectively, we design a new data structure, namely Double Level Sequence Instance List (DLSIList), to record intermediate stages of event sequences. On the basis of this, an RFID data management system, namely Temporal Management System over RFID data streams (TMS-RFID), has been developed. This system can be constructed as a stand-alone middleware component to manage temporal event patterns. We demonstrate the effectiveness of TMS-RFID on extracting complex temporal event patterns through a detailed performance study using a range of high-speed data streams and various queries. The results show that TMS-RFID has a very high throughput, namely 170,000–870,000 events per second for different highly complex continuous queries. Moreover, the experiments also show that the main structure to record the intermediate stages in TMS-RFID does not increase exponentially with the number of events. These results demonstrate that TMS-RFID not only supports high processing speeds, but is also highly scalable.  相似文献   
947.
We present opportunistic resource utilization networks or oppnets, a novel paradigm of specialized ad hoc networks. We believe that applications can benefit from using specialized ad hoc networks that provide a natural basis for them, the basis more efficient and effective than what general-purpose ad hoc networks can offer. Oppnets constitute the subcategory of ad hoc networks where diverse systems, not employed originally as nodes of an oppnet, join it dynamically in order to perform certain tasks they have been called to participate in. Oppnets have a significant potential to improve a variety of applications, and to create new application niches. We categorize opportunistic networks currently known in the literature as class 1opportunistic networks that use opportunistically only communication resources, and class 2opportunistic networks or oppnets that use opportunistically all kinds of resources, including not only communication but also computation, sensing, actuation, storage, etc. After describing the oppnets and the basics of their operation, we discuss the Oppnet Virtual Machine (OVM)—a proposed standard implementation framework for oppnet applications. It is followed by a discussion of an example application scenario using the OVM primitives. Next, we discuss the design and operations of a small-scale oppnet, named MicroOppnet, originally developed as a proof of concept. MicroOppnet is now being extended to serve as a testbed for experimentation and pilot implementations of oppnet architectures and their components. We conclude with a summary and a list of some open issues for oppnets.  相似文献   
948.
We investigate the characteristics of the received signal as trilinear model for multi-carrier code division multiple access (MC-CDMA) system with antenna array, and propose a blind multiuser detection method for MC-CDMA system in this paper. The trilinear-based multiuser detection algorithm (Trilinear-MUDE) that we presented exploits the versatile diversity in MC-CDMA system while require neither channel information nor statistical characteristics. The algorithmic performance indicates that the proposed algorithm is very close to the nonblind MMSE method, and better than minimum output energy (MOE) receiver and matched filter. Numerical results also reveal its compatibility in condition of small sampling sizes.  相似文献   
949.
This paper presents a novel video augmentation approach: a video recording of a real entity augmented by structured data. This augmented video is a self-contained entity integrating values of perceptible and non-perceptible attributes of the same real entity. It simplifies data search, storage and management. Streaming, sharing, collaboration and synchronization are also simplified by the fact that the structured data (so-called augmented data) are integrated in the video file and therefore only one file needs to be manipulated. Our approach was applied to address the issues which road engineers experience while using the ROad Measurement and Data Acquisition System (ROMDAS). The ROMDAS system collects and analyses the road-condition state through video recordings and the data corresponding acquired by specific measuring devices. Currently, however, road engineers have to search the videos manually in order to find details of interest provided by the analysis of the data measured due to the separation of the video from the data. The ROMDAS system manages a large collection of road-condition data. It does not offer history management of video recordings of the same road captured at different time. We present this hybrid video augmentation system: the Augmented Video stream Framework (AVF). It allows creation, search, history management and playback of such augmented video files for effective road surveying based on the discrete data recorded in parallel to the video recordings. The AVF provides road engineers with effective and more comfortable perceptible and non-perceptible data search, storage and history management to be used for (collaborative) road inspection and maintenance.  相似文献   
950.
One of the most challenging problems in high-data-rate wireless transmission is to reduce inter-symbol interference (ISI) resulted from the time dispersion caused by multi-path propagation. To solve this problem, equalization is introduced. Generally, efficient decision feedback equalizer (DFE) holds better performance than linear equalizer for the cancellation of ISI without noise enhancement. However, its inherent error propagation has some limitation for further improvement. In fact, as shown later in simulation results, conventional frequency domain DFE (FD-DFE) almost cannot be used in Discrete Fourier Transform-Spread Orthogonal Frequency Division Multiplex (DFT-S OFDM) system in Evolved-UMTS (Universal Mobile Telecommunications System) Terrestrial Radio Access (E-UTRA) uplink transmission [3GPP, TR 25.814 V1.2.3. Physical layer aspects for evolved UTRA. May 2006 [release 7]]. Unique word (UW) is proposed in the literatures, as a known symbol sequence, can make error propagation beyond one FFT-block impossible since the last symbols of every block are always decided correctly. But the UW-based scheme is not appropriate for DFT-S OFDM, so it must be modified. This paper proposes a simple DFE-based equalization algorithm for DFT-S OFDM. Through cyclic detection and iteration, the new algorithm obtains a noticeable gain than conventional DFE, and is almost as effective as the modified UW-based methods but with much higher bandwidth efficiency. Furthermore, it does not need to change the frame structure of existing protocol.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号