首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   83951篇
  免费   961篇
  国内免费   407篇
电工技术   775篇
综合类   2316篇
化学工业   11513篇
金属工艺   4786篇
机械仪表   3018篇
建筑科学   2158篇
矿业工程   565篇
能源动力   1107篇
轻工业   3583篇
水利工程   1266篇
石油天然气   341篇
无线电   9247篇
一般工业技术   16322篇
冶金工业   2629篇
原子能技术   253篇
自动化技术   25440篇
  2022年   16篇
  2021年   19篇
  2020年   8篇
  2019年   12篇
  2018年   14453篇
  2017年   13379篇
  2016年   9972篇
  2015年   611篇
  2014年   239篇
  2013年   210篇
  2012年   3149篇
  2011年   9415篇
  2010年   8289篇
  2009年   5552篇
  2008年   6770篇
  2007年   7782篇
  2006年   126篇
  2005年   1221篇
  2004年   1134篇
  2003年   1183篇
  2002年   554篇
  2001年   99篇
  2000年   179篇
  1999年   61篇
  1998年   53篇
  1997年   32篇
  1996年   54篇
  1995年   14篇
  1994年   13篇
  1993年   14篇
  1992年   16篇
  1991年   23篇
  1988年   12篇
  1985年   9篇
  1969年   24篇
  1968年   43篇
  1967年   33篇
  1966年   42篇
  1965年   44篇
  1964年   11篇
  1963年   29篇
  1962年   23篇
  1961年   18篇
  1960年   30篇
  1959年   35篇
  1958年   37篇
  1957年   36篇
  1956年   34篇
  1955年   63篇
  1954年   68篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
The N-Queens Puzzle is a fascinating combinatorial problem. Up to now, the number of distinct valid placements of N non-attacking queens on a generalized N × N chessboard cannot be computed by a formula. The computation of these numbers is instead based on an exhaustive search whose complexity grows dramatically with the problem size N. Solutions counts are currently known for all N up to 26. The parallelization of the search for solutions is embarrassingly simple. It is achieved by pre-placing the queens within a certain board region. These pre-placements partition the search space. The chosen extent of the pre-placement allows for a wide range of the partitioning granularity. This ease of partitioning makes the N-Queens Puzzle a great show-off case for tremendously parallel computation approaches and a flexible benchmark for parallel compute resources. This article presents the Q27 Project, an open-source effort targeting the computation of the solution count of the 27-Queens Puzzle. It is the first undertaking pushing the frontier of the N-Queens Puzzle that exploits the complete symmetry group D 4 of the square. This reduces the overall computational complexity already to an eighth in comparison to a naive exploration of the whole search space. This article details the coronal pre-placement that enables the partitioning of the overall search under this approach. With respect to the physical implementation of the computation, it describes the hardware structure that explores the resulting subproblems efficiently by exploiting bit-level operations and their mapping to FPGA devices as well as the infrastructure that organizes the contributing devices in a distributed computation. The performance of several FPGA platforms is evaluated using the Q27 computation as a benchmark, and some intriguing observations obtained from the available partial solutions are presented. Finally, an estimate on the remaining run time and on the expected magnitude of the final result is dared.  相似文献   
992.
LTE networks’ main challenge is to efficiently use the available spectrum, and to provide satisfying quality of service for mobile users. However, using the same bandwidth among adjacent cells leads to occurrence of Inter-cell Interference especially at the cell-edge. Basic interference mitigation approaches consider bandwidth partitioning techniques between adjacent cells, such as frequency reuse of factor m schemes, to minimize cell-edge interference. Although SINR values are improved, such techniques lead to significant reduction in the maximum achievable data rate. Several improvements have been proposed to enhance the performance of frequency reuse schemes, where restrictions are made on resource blocks usage, power allocation, or both. Nevertheless, bandwidth partitioning methods still affect the maximum achievable throughput. In this proposal, we intend to perform a comprehensive survey on Inter-Cell Interference Coordination (ICIC) techniques, and we study their performance while putting into consideration various design parameters. This study is implemented throughout intensive system level simulations under several parameters such as different network loads, radio conditions, and user distributions. Simulation results show the advantages and the limitations of each technique compared to frequency reuse-1 model. Thus, we are able to identify the most suitable ICIC technique for each network scenario.  相似文献   
993.
Modern vehicles are proficient in establishing a spontaneous connection over a wireless radio channel, synchronizing actions and information. Security infrastructure is most important in such a sensitive scope of vehicle communication for coordinating actions and avoiding accidents on the road. One of the first security issues that need to be established is authentication via IEEE 1609.2 security infrastructure. According to our preliminary work, vehicle owners are bound to preprocess a certificate from the certificate authority. The certificate carries vehicle static attributes (e.g., licence number, brand and color) certified together with the vehicle public key in a monolithic manner. Nevertheless, a malicious vehicle might clone the static attributes to impersonate a specific vehicle. Therefore, in this paper we consider a resource expensive attack scenario involving multiple malicious vehicles with identical visual static attributes. Apparently, dynamic attributes (e.g., location and direction) can uniquely define a vehicle and can be utilized to resolve the true identity of the vehicle. However, unlike static attributes, dynamic attributes cannot be signed by a trusted authority beforehand. We propose an approach to verify the coupling between non-certified dynamic attributes and certified static attributes on an auxiliary communication channel, for example, a modulated laser beam. Furthermore, we illustrate that the proposed approach can be used to facilitate the usage of existing authentication protocols such as NAXOS, in the new scope of ad-hoc vehicle networks. We use BAN logic to verify the security claims of the protocol against the passive and active interception.  相似文献   
994.
In this paper, we consider simultaneous wireless information and energy transfer in an orthogonal-frequency-division-multiple-access decode-and-forward relay network, in which an energy-constrained relay node harvests energy from a source node and uses the harvested energy to forward information to multiple destination nodes. Our objective is to maximize the end-to-end sum rate by resource allocation, subject to transmit power constraint at the source and energy-harvesting (EH) constraint at the relay. A non-convex and mixed-integer programming (MIP) problem is formulated to optimize time-switching (TS) ratios of EH and information decoding at the relay, TS ratio of information transmission from relay to destinations, subcarrier allocation as well as power allocation (PA) over all subcarriers at source and relay. We propose to decouple this problem into a convex problem and an MIP problem in fractional form. To solve the MIP problem, we transform it into an equivalent optimization problem in subtractive form which has a tractable solution. As a result, we propose a novel scheme to achieve jointly optimal TS ratios, subcarrier allocation and PA. Simulation results verify the optimality of our proposed resource allocation scheme.  相似文献   
995.
The main objective of this research is to conduct a performance analysis of various multipath routing protocols in wireless multimedia sensor networks for the efficient transmission of the image, audio and video data. To provide efficient routing for the large sized multimedia content, various multipath routing protocols such as energy-aware routing, QoS based routing and geographical routing methods are analyzed. In this analysis, the efficient routing techniques including geographical routing techniques such as GPSR, DGR, PW-DGR presented for wireless multimedia sensor networks are studied and the performance of each technique is evaluated to determine the efficient multipath routing technique. Comparisons are made for evaluated protocols and it is proved that the PW-DGR provides better routing performance for the multimedia data. The findings of the research also show that the PW-DGR method efficiently overcomes the routing problems such as energy bottleneck problem, energy-hole, reduced network lifetime and high delay in packet transmission.  相似文献   
996.
The localization of nodes plays a fundamental role in Wireless Sensor and Actors Networks (WSAN) identifying geographically where an event occurred, which facilitates timely response to this action. This article presents a performance evaluation of multi-hop localization range-free algorithms used in WSAN, such as Distance Vector Hop (DV-Hop), Improved DV-Hop (IDV-Hop), and the Weighted DV-Hop (WDV-Hop). In addition, we propose a new localization algorithm, merging WDV-Hop, with the weighted hyperbolic localization algorithm (WH), which includes weights to the correlation matrix of the estimated distances between the node of interest (NOI) and the reference nodes (RN) in order to improve accuracy and precision. As performance metrics, the accuracy, precision, and computational complexity are evaluated. The algorithms are evaluated in three scenarios where all nodes are randomly distributed in a given area, varying the number of RNs, the density of nodes in the network, and radio coverage of the nodes. The results show that in networks with 100 nodes, WDV-Hop outperforms the DV-Hop and IDV-Hop even if the number of RNs is reduced to 10. Moreover, our proposal shows an improvement in terms of accuracy and precision at the cost of increased computational complexity, specifically in the algorithm execution time, but without affecting the hardware cost or power consumption.  相似文献   
997.
Virtual network (VN) mapping which deals with the allocation of network resources from the shared physical substrate to individual VNs is one of the key challenges for the application of realizing network virtualization. While a variety of state-of-the-art algorithms have attempted to address this issue from different aspects, the challenge still remains for mapping virtual link with hop count constraint. This paper presents a fast approximation path mapping algorithm to address this issue by formulating such virtual link mapping problem as a path-flow mathematical programming model, which aims to minimize the maximum link load factor. Through the use of the primal–dual method, a fully polynomial time approximation algorithm is proposed to solve this model. The experimental results show that the proposed algorithm can effectively solve the problem of path mapping with hop limit.  相似文献   
998.
This study established the Kriging model to simplify the mathematical model for calculations and to improve the operational efficiency of global optimization in seismic exploration engineering. Accordingly, wireless seismic sensor network (WSSN) was used as an example in this research, and the generated seismic data flow rate and the flow rate of seismic data transmission are the simulation sample points. Thereafter, the Kriging model was constructed and the function was fitted. An improved particle swarm optimization (PSO) was also utilized for the global optimization of the Kriging model of WSSN to determine the optimized network lifetime. Results show that the Kriging model and the improved PSO algorithm significantly enhanced the lift performance and computer operational efficiency of WSSN.  相似文献   
999.
The structural and electrical characteristics of Ag/Ni bilayer metallization on polycrystalline thermoelectric SnSe were investigated. Two difficulties with thermoelectric SnSe metallization were identified for Ag and Ni single layers: Sn diffusion into the Ag metallization layer and unexpected cracks in the Ni metallization layer. The proposed Ag/Ni bilayer was prepared by hot-pressing, demonstrating successful metallization on the SnSe surface without interfacial cracks or elemental penetration into the metallization layer. Structural analysis revealed that the Ni layer reacts with SnSe, forming several crystalline phases during metallization that are beneficial for reducing contact resistance. Detailed investigation of the Ni/SnSe interface layer confirms columnar Ni-Sn intermetallic phases [(Ni3Sn and Ni3Sn2) and Ni5.63SnSe2] that suppress Sn diffusion into the Ag layer. Electrical specific-contact resistivity (5.32 × 10?4 Ω cm2) of the Ag/Ni bilayer requires further modification for development of high-efficiency polycrystalline SnSe thermoelectric modules.  相似文献   
1000.
The potential of transient liquid-phase (TLP) bonding for chip packaging applications has been evaluated, focusing on three interlayer arrangements (Ag-Sn-Ag, Ni-Sn-Ni, and Ag-Sn-Ni). Shear tests on TLP-bonded components provided the interlayer-dependent mechanical strength as well as failure mode and position. Critical local stresses, i.e., failure criteria, within the intermetallic compound (IMC) layer were derived by replicating the shear test conditions with finite-element methods. The missing coefficient of thermal expansion for Ag3Sn IMC was obtained by producing small IMC bulk samples and subjecting them to dilatometric measurements. The experimental results were implemented into a finite-element model of a representative power module architecture to provide first predictions on thermally induced residual stresses that could be classified into fail/safe, as successfully validated by TLP chip bonding experiments. A numerical parameter study then assessed thermal stresses, including failure prediction and design optimization for TLP-bonded Si chips, considering the influence of process temperature, service conditions, TLP interlayer system, and metallization layers within the TLP joint. The presented procedure serves as a guideline to choose an appropriate TLP interlayer system for predefined boundary conditions, or vice versa.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号