首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2502篇
  免费   194篇
  国内免费   142篇
电工技术   97篇
综合类   140篇
化学工业   63篇
金属工艺   11篇
机械仪表   43篇
建筑科学   95篇
矿业工程   28篇
能源动力   56篇
轻工业   5篇
水利工程   72篇
石油天然气   11篇
武器工业   12篇
无线电   490篇
一般工业技术   157篇
冶金工业   33篇
原子能技术   4篇
自动化技术   1521篇
  2024年   2篇
  2023年   14篇
  2022年   22篇
  2021年   20篇
  2020年   31篇
  2019年   33篇
  2018年   57篇
  2017年   52篇
  2016年   62篇
  2015年   74篇
  2014年   117篇
  2013年   136篇
  2012年   189篇
  2011年   221篇
  2010年   151篇
  2009年   156篇
  2008年   181篇
  2007年   218篇
  2006年   196篇
  2005年   173篇
  2004年   139篇
  2003年   117篇
  2002年   89篇
  2001年   63篇
  2000年   74篇
  1999年   45篇
  1998年   25篇
  1997年   35篇
  1996年   20篇
  1995年   17篇
  1994年   16篇
  1993年   17篇
  1992年   10篇
  1991年   7篇
  1990年   13篇
  1989年   9篇
  1988年   10篇
  1987年   5篇
  1986年   4篇
  1985年   4篇
  1984年   2篇
  1983年   3篇
  1982年   1篇
  1981年   2篇
  1980年   2篇
  1979年   3篇
  1978年   1篇
排序方式: 共有2838条查询结果,搜索用时 15 毫秒
11.
王四海  迮超 《电子质量》2002,(12):117-118,128
本文在讨论了下一代信令转接点在满足传统信令网络功能的基础上,着重介绍了下一代的信令转接点上实现的号码携带、灵活路由等新业务,并如何实现传统STP面向下一代网络的平滑过渡。  相似文献   
12.
在非AWGN环境下,针对CW,AM,FM,OOK,PSK,QPSK,16QAM,FSK,MSK,SSB十种混合调制信号,对调制类型特征提取方法和自动识别算法进行了分析、综合、设计和计算机仿真。提出了梯层电平分析方法、频率瞬时信号分析、剔除载波的归一化能量分析、平方后信号的频谱分析、四次方后的信号频谱分析等方法。当SNR=10dB时,计算机仿真结果是正确识别率不低于95%,自动识别的平均处理时间为不超过10s。  相似文献   
13.
Routine inspection is the most common form of highway bridge inspection to satisfy the requirements of the National Bridge Inspection Standards. The accuracy and reliability of documentation generated during these inspections are critical to the allocation of Department of Transportation construction, maintenance, and rehabilitation resources. Routine inspections are typically completed using only the visual inspection technique and rely heavily on subjective assessments made by bridge inspectors. In light of this, and given the fact that visual inspection may have other limitations that influence its reliability, the Federal Highway Administration initiated an investigation to examine the reliability of visual inspection as it is currently applied to bridges in the United States. This paper will summarize results from this study related to the accuracy and reliability of routine inspection documentation. A number of important conclusions were developed from the experimental study. Generally, it was found that all structural condition documentation is collected with significant variability. Specifically, 95% of primary element condition ratings for individual bridge components will vary within two rating points of the average and only 68% will vary within one point. Documentation generally collected to support condition ratings also has significant variability as exemplified by the number and types of field notes and photographs taken by inspectors. With respect to the use of element-level inspections, it was found that element usage was generally consistent with the Commonly Recognized Element Guide. However, there is significant variability in the condition state assignments of those elements and in some cases the condition states are not applied correctly to particular elements.  相似文献   
14.
The concept of the combinatorial matrix of an unrestricted code and the notion of anr-partition design admitted by a code are introduced and discussed in detail. The theory includes a characterization of completely regular codes, and a combinatorial interpretation of the fact that the distinct rows of the distance distribution matrix of a code are linearly independent. In general, it is possible to compute the distance distribution matrix of any code admitting a given partition design by solving a well-defined system of linear equations; this is an efficient technique provided the number of classes in the partition is relatively small.  相似文献   
15.
本文介绍及分析了两种基本的动态路由选择算法.  相似文献   
16.
Antnio  Mrio  Pedro  Mrio 《Ad hoc Networks》2007,5(7):1031-1045
Domination of the electromagnetic spectrum is a crucial component of the 21st century warfare. In the harsh electromagnetic environment of the modern battlefield, it is of the utmost importance to deny the opposing force the opportunity to attack or exploit the detection/interception of friendly communications assets through the deployment of electronic protection (EP) measures in order to attain low probability of detection (LPD), low probability of interception (LPI) and anti-jam (A/J). Given that directional antennas are a suitable means to achieve both extended range and LPD/LPI, this paper proposes mechanisms to optimize the trade-off between these capabilities, minimizing the number of hops and end-to-end delay when routing packets in a multi-hop ad-hoc network, while taking into account stealth requirements. The novel scheme is based on a variant of Fisheye State Routing, coupled with a power control algorithm to guarantee a LPD/LPI beyond the zone covered by the omni-directional radiation footprint of the network. The performance of the proposed scheme is evaluated through computer simulation.  相似文献   
17.
This survey concerns the role of data structures for compactly storing and representing various types of information in a localized and distributed fashion. Traditional approaches to data representation are based on global data structures, which require access to the entire structure even if the sought information involves only a small and local set of entities. In contrast, localized data representation schemes are based on breaking the information into small local pieces, or labels , selected in a way that allows one to infer information regarding a small set of entities directly from their labels, without using any additional (global) information. The survey concentrates mainly on combinatorial and algorithmic techniques, such as adjacency and distance labeling schemes and interval schemes for routing, and covers complexity results on various applications, focusing on compact localized schemes for message routing in communication networks.Received: August 2001, Accepted: May 2002, Supported in part by a grant from the Israel Science Foundation.  相似文献   
18.
Broadcasting is the process of spreading one piece of information among a group of individuals connected by an interconnection network. In this paper we give exact lower and upper bounds for the number of broadcast schemes in arbitrary networks. Also, we give the exact value for complete bipartite graphs and an upper bound for regular networks. Based on the counting method we describe a new random algorithm for broadcasting in networks.  相似文献   
19.
韩飞  戴世举 《电子学报》1997,25(10):24-27,36
本文从地域通信网的特点出发,分析了以前所使用的路由选择方法的优缺点,提出了网控支持的基于业务量的动态中币管理方法,并描述了该路由管理方法的分层结构和在地域网网络管理系统中的具体实现。  相似文献   
20.
Threshold cryptography based on Asmuth-Bloom secret sharing   总被引:1,自引:0,他引:1  
In this paper, we investigate how threshold cryptography can be conducted with the Asmuth-Bloom secret sharing scheme and present three novel function sharing schemes for RSA, ElGamal and Paillier cryptosystems. To the best of our knowledge, these are the first provably secure threshold cryptosystems realized using the Asmuth-Bloom secret sharing. Proposed schemes are comparable in performance to earlier proposals in threshold cryptography.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号