首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1904篇
  免费   73篇
  国内免费   10篇
电工技术   22篇
综合类   3篇
化学工业   378篇
金属工艺   68篇
机械仪表   30篇
建筑科学   26篇
矿业工程   4篇
能源动力   44篇
轻工业   63篇
水利工程   5篇
石油天然气   5篇
无线电   291篇
一般工业技术   513篇
冶金工业   229篇
原子能技术   15篇
自动化技术   291篇
  2023年   31篇
  2022年   37篇
  2021年   53篇
  2020年   50篇
  2019年   52篇
  2018年   60篇
  2017年   67篇
  2016年   70篇
  2015年   46篇
  2014年   73篇
  2013年   109篇
  2012年   75篇
  2011年   78篇
  2010年   67篇
  2009年   73篇
  2008年   63篇
  2007年   67篇
  2006年   50篇
  2005年   33篇
  2004年   43篇
  2003年   54篇
  2002年   45篇
  2001年   29篇
  2000年   32篇
  1999年   32篇
  1998年   55篇
  1997年   33篇
  1996年   45篇
  1995年   32篇
  1994年   42篇
  1993年   30篇
  1992年   26篇
  1991年   21篇
  1990年   23篇
  1989年   15篇
  1988年   22篇
  1987年   22篇
  1986年   22篇
  1985年   26篇
  1984年   22篇
  1983年   17篇
  1982年   11篇
  1981年   14篇
  1980年   13篇
  1979年   12篇
  1978年   17篇
  1977年   20篇
  1976年   10篇
  1973年   7篇
  1968年   6篇
排序方式: 共有1987条查询结果,搜索用时 15 毫秒
41.
Survivable WDM mesh networks   总被引:9,自引:0,他引:9  
In a wavelength-division-multiplexing (WDM) optical network, the failure of network elements (e.g., fiber links and cross connects) may cause the failure of several optical channels, thereby leading to large data losses. This study examines different approaches to protect a mesh-based WDM optical network from such failures. These approaches are based on two survivability paradigms: 1) path protection/restoration and 2) link protection/restoration. The study examines the wavelength capacity requirements, and routing and wavelength assignment of primary and backup paths for path and link protection and proposes distributed protocols for path and link restoration. The study also examines the protection-switching time and the restoration time for each of these schemes, and the susceptibility of these schemes to multiple link failures. The numerical results obtained for a representative network topology with random traffic demands demonstrate that there is a tradeoff between the capacity utilization and the susceptibility to multiple link failures. We find that, on one hand, path protection provides significant capacity savings over link protection, and shared protection provides significant savings over dedicated protection; while on the other hand, path protection is more susceptible to multiple link failures than link protection, and shared protection is more susceptible to multiple link failures than dedicated protection. We formulate a model of protection-switching times for the different protection schemes based on a fully distributed control network. We propose distributed control protocols for path and link restoration. Numerical results obtained by simulating these protocols indicate that, for a representative network topology, path restoration has a better restoration efficiency than link restoration, and link restoration has a faster restoration time compared with path restoration.  相似文献   
42.
WDM optical communication networks: progress and challenges   总被引:25,自引:0,他引:25  
While optical-transmission techniques have been researched for quite some time, optical "networking" studies have been conducted only over the past dozen years or so. The field has matured enormously over this time: many papers and Ph.D. dissertations have been produced, a number of prototypes and testbeds have been built, several books have been written, a large number of startups have been formed, and optical WDM technology is being deployed in the marketplace at a very rapid rate. The objective of this paper is to summarize the basic optical networking approaches, report on the WDM deployment strategies of two major US carriers, and outline the current research and development trends on WDM optical networks.  相似文献   
43.
We present a graph-theoretic interpretation of convergence of fractal encoding based on partial iterated function system (PIFS). First we have considered a special circumstance, where no spatial contraction has been allowed in the encoding process. The concept leads to the development of a linear time fast decoding algorithm from the compressed image. This concept is extended for the general scheme of fractal compression allowing spatial contraction (on averaging) from larger domains to smaller ranges. A linear time fast decoding algorithm is also proposed in this situation, which produces a decoded image very close to the result obtained by an ordinary iterative decompression algorithm.  相似文献   
44.
Related key attacks (RKAs) are powerful cryptanalytic attacks where an adversary can change the secret key and observe the effect of such changes at the output. The state of the art in RKA security protects against an a-priori unbounded number of certain algebraic induced key relations, e.g., affine functions or polynomials of bounded degree. In this work, we show that it is possible to go beyond the algebraic barrier and achieve security against arbitrary key relations, by restricting the number of tampering queries the adversary is allowed to ask for. The latter restriction is necessary in case of arbitrary key relations, as otherwise a generic attack of Gennaro et al. (TCC 2004) shows how to recover the key of almost any cryptographic primitive. We describe our contributions in more detail below. (1) We show that standard ID and signature schemes constructed from a large class of \(\Sigma \)-protocols (including the Okamoto scheme, for instance) are secure even if the adversary can arbitrarily tamper with the prover’s state a bounded number of times and obtain some bounded amount of leakage. Interestingly, for the Okamoto scheme we can allow also independent tampering with the public parameters. (2) We show a bounded tamper and leakage resilient CCA-secure public key cryptosystem based on the DDH assumption. We first define a weaker CCA-like security notion that we can instantiate based on DDH, and then we give a general compiler that yields CCA security with tamper and leakage resilience. This requires a public tamper-proof common reference string. (3) Finally, we explain how to boost bounded tampering and leakage resilience [as in (1) and (2) above] to continuous tampering and leakage resilience, in the so-called floppy model where each user has a personal hardware token (containing leak- and tamper-free information) which can be used to refresh the secret key. We believe that bounded tampering is a meaningful and interesting alternative to avoid known impossibility results and can provide important insights into the security of existing standard cryptographic schemes.  相似文献   
45.
Fabrication of microrods from multi-quantum well (MQW) PbSe–PbSrSe structure grown in molecular beam epitaxy (MBE) followed by its morphological as well as optical characterizations are described. Pulsed PL intensity is increased by 64 times per unit surface area from a free-standing MQW microrod mounted on copper heat sink compared with the bulk sample. Enhancement in side emission power due to the higher optical confinement effect during pulsed photoluminescence (PL) from MQW semiconductor microtube inserted in hollow quartz optical fiber signifies that these microstructures are robust in nature and crucial contenders for portable mid-infrared optoelectronic devices to be used in the field of industrial trace-gas sensing.  相似文献   
46.
For the past few decades there has been tremendous innovation and development of Terahertz (THz) science and imaging. In particular, the technique of 3-D computed tomography has been adapted from the X-Ray to the THz range. However, the finite refractive index of materials in the THz range can severally refract probing THz beams during the acquisition of tomography data. Due to Fresnel reflection power losses at the boundaries as well as steering of the THz beam through the sample, refractive effects lead to anomalously high local attenuation coefficients near the material boundaries of a reconstructed image. These boundary phenomena can dominate the reconstructed THz-CT images making it difficult to distinguish structural defect(s) inside the material. In this paper an algorithm has been developed to remove the effects of refraction in THz-CT reconstructed images. The algorithm is successfully implemented on cylindrical shaped objects.  相似文献   
47.
In this paper we review THz radiation properties, generation methods, and antenna configurations. This paper suggests some new class of antennas that can be used at THz frequency, like optical antennas or Carbon nanotube antennas. THz technology has become attractive due to the low energy content and nonionizing nature of the signal. This property makes them suitable for imaging and sensing applications. But at the same time detection and generation of THz signals has been technologically challenging. This paper presents a comparative study of the generation techniques for THz frequency signals giving emphasis to the some new techniques like Quantum Cascade lasers which has created significant research interest. The main aim for this study is to find out the materials suitable for fabricating THz devices and antennas, a suitable method for generation of high power at THz frequency and an antenna that will make THz communication possible.  相似文献   
48.
We consider a new heuristic method for design of survivable wavelength-division multiplexing (WDM) networks with preconfigured protection cycles (p-cycles). Numerical studies show that the new heuristic works well for different traffic patterns, and the spare capacity obtained by the new heuristic is very close to that of the optimal solution but with much reduced computational time.  相似文献   
49.
Pioneering research suggests various modes of cellular therapeutics and biomaterial strategies for myocardial tissue engineering. Despite several advantages, such as safety and improved function, the dynamic myocardial microenvironment prevents peripherally or locally administered therapeutic cells from homing and integrating of biomaterial constructs with the infarcted heart. The myocardial microenvironment is highly sensitive due to the nanoscale cues that it exerts to control bioactivities, such as cell migration, proliferation, differentiation, and angiogenesis. Nanoscale control of cardiac function has not been extensively analyzed in the field of myocardial tissue engineering. Inspired by microscopic analysis of the ventricular organization in native tissue, a scalable in‐vitro model of nanoscale poly(L ‐lactic acid)‐co ‐poly(? ‐caprolactone)/collagen biocomposite scaffold is fabricated, with nanofibers in the order of 594 ± 56 nm to mimic the native myocardial environment for freshly isolated cardiomyocytes from rabbit heart, and the specifically underlying extracellular matrix architecture: this is done to address the specificity of the underlying matrix in overcoming challenges faced by cellular therapeutics. Guided by nanoscale mechanical cues provided by the underlying random nanofibrous scaffold, the tissue constructs display anisotropic rearrangement of cells, characteristic of the native cardiac tissue. Surprisingly, cell morphology, growth, and expression of an interactive healthy cardiac cell population are exquisitely sensitive to differences in the composition of nanoscale scaffolds. It is shown that suitable cell–material interactions on the nanoscale can stipulate organization on the tissue level and yield novel insights into cell therapeutic science, while providing materials for tissue regeneration.  相似文献   
50.
The hybrid wireless-optical broadband-access network (WOBAN) is a promising architecture for future access networks. Recently, the wireless part of WOBAN has been gaining increasing attention, and early versions are being deployed as municipal access solutions to eliminate the wired drop to every wireless router at customer premises. This architecture saves on network deployment cost because the fiber need not penetrate each end-user, and it extends the reach of emerging optical-access solutions, such as passive optical networks. This paper first presents an architecture and a vision for the WOBAN and articulates why the combination of wireless and optical presents a compelling solution that optimizes the best of both worlds. While this discussion briefly touches upon the business drivers, the main arguments are based on technical and deployment considerations. Consequently, the rest of this paper reviews a variety of relevant research challenges, namely, network setup, network connectivity, and fault-tolerant behavior of the WOBAN. In the network setup, we review the design of a WOBAN where the back end is a wired optical network, the front end is managed by a wireless connectivity, and, in between, the tail ends of the optical part [known as optical network unit (ONU)] communicate directly with wireless base stations (known as ldquogateway routersrdquo). We outline algorithms to optimize the placement of ONUs in a WOBAN and report on a survey that we conducted on the distribution and types of wireless routers in the Wildhorse residential neighborhood of North Davis, CA. Then, we examine the WOBAN's routing properties (network connectivity), discuss the pros and cons of various routing algorithms, and summarize the idea behind fault-tolerant design of such hybrid networks.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号