首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1118篇
  免费   178篇
  国内免费   162篇
电工技术   88篇
综合类   124篇
化学工业   60篇
金属工艺   12篇
机械仪表   48篇
建筑科学   65篇
矿业工程   12篇
能源动力   11篇
轻工业   52篇
水利工程   14篇
石油天然气   12篇
武器工业   4篇
无线电   219篇
一般工业技术   55篇
冶金工业   10篇
原子能技术   3篇
自动化技术   669篇
  2024年   11篇
  2023年   28篇
  2022年   58篇
  2021年   43篇
  2020年   51篇
  2019年   47篇
  2018年   50篇
  2017年   54篇
  2016年   69篇
  2015年   61篇
  2014年   90篇
  2013年   83篇
  2012年   120篇
  2011年   128篇
  2010年   83篇
  2009年   85篇
  2008年   83篇
  2007年   72篇
  2006年   46篇
  2005年   38篇
  2004年   34篇
  2003年   24篇
  2002年   19篇
  2001年   12篇
  2000年   10篇
  1999年   7篇
  1998年   7篇
  1997年   11篇
  1996年   4篇
  1995年   6篇
  1994年   4篇
  1993年   4篇
  1992年   2篇
  1991年   1篇
  1990年   1篇
  1989年   2篇
  1987年   1篇
  1986年   1篇
  1983年   2篇
  1981年   1篇
  1980年   1篇
  1978年   1篇
  1976年   1篇
  1972年   1篇
  1964年   1篇
排序方式: 共有1458条查询结果,搜索用时 15 毫秒
21.
Methods based on minutiae matching have been extensively used in fingerprint recognition because minutiae can be reliably extracted from poor quality and noisy fingerprints. However, structures have to be defined due to minutiae displacements and irreproducibility. Some of the structures, though very efficient, incur large computational complexities. In this article, a feature vector of statistically based values derived from the minutiae pattern in a fingerprint is proposed for indexing fingerprints using the incremental search retrieval method. The proposed indexing technique in combination with the incremental retrieval method proves to have an added advantage over certain minutiae-based structures, especially when the minutiae points are numerous in a fingerprint. The feature vector for a fingerprint requires negligible storage resources and, consequently, the computational time in the retrieval of a candidate list for a query fingerprint is very little.  相似文献   
22.
谈玲  庄勇 《电信科学》2017,33(10):58-64
在物联网通信中,无线信道的抗干扰性依然受到各种因素影响,多天线系统对信道质量改善有较好的效果,但其信号检测的复杂度和性能还需要进一步提升。基于 QR 分解的检测算法具有较低的计算复杂度,但检测性能有待改善。为了改善QR分解检测算法的性能,提出一种基于ML准则结合判决候选机制的QR分解算法,并对其性能进行了分析。该算法采用 ML 准则对初始层进行精确估计检测,而后对其他检测层进行可靠判决,不可靠则引入候选点并从中选择最优候选点进行反馈。该算法可以显著改善系统干扰,并且在判决回馈中大大减少错误传播。实验仿真表明,在增加一定复杂度的情况下,该算法能够有效改善物联网系统性能。  相似文献   
23.
24.
Fault diagnosis of full-scan designs has been progressed significantly. However, most existing techniques are aimed at a logic block with a single fault. Strategies on top of these block-level techniques are needed in order to successfully diagnose a large chip with multiple faults. In this paper, we present such a strategy. Our strategy is effective in identifying more than one fault accurately. It proceeds in two phases. In the first phase we concentrate on the identification of the so-called structurally independent faults based on a concept referred to as word-level prime candidate, while in the second phase we further trace the locations of the more elusive structural dependent faults. Experimental results show that this strategy is able to find 3 to 4 faults within 10 signal inspections for three real-life designs randomly injected with 5 node-type or stuck-at faults. Part of this work has ever appeared in the proceedings of Asian Test Symposium in 2003. Yu-Chiun Lin received his BS degrees in Electrical Engineering from National Central University in 2000, and MS degree from Electrical Engineering of National Tsing Hua University in 2002. Since then, he has been with Ali Corporation as a design engineer. His current interests include the design of USB controllers and imaging periperals. Shi-Yu Huang received his BS, MS degrees in Electrical Engineering from National Taiwan University in 1988, 1992 and Ph.D. degree in Electrical and Computer Engineering from the University of California, Santa Barbara in 1997, respectively. From 1997 to 1998 he was a software engineer at National Semiconductor Corp., Santa Clara, investigating the System-On-Chip design methodology. From 1998 to 1999, he was with Worldwide Semiconductor Manufacturing Corp., designing the high-speed Built-In Self-Test circuits for memories. He joined the faculty of National Tsing-Hua University, Taiwan, in 1999, where he is currently an Associate Professor. Dr. Huang’s research interests include CMOS image sensor design, low-power memory design, power estimation, and fault diagnosis methodologies.  相似文献   
25.
In this paper, we investigate the capture effect through experiments conducted with Iris nodes equipped with AT86RF230 radio transceivers. It is shown that the first arriving packet in a collision can capture the radio channel for equal power transmissions and may be decoded depending on the amount of overlap. A new 3‐packet‐capture scenario is introduced and implemented. To be able to understand the impact of capture on the throughput performance of wireless sensor networks, we present an analysis of the capture coefficient using our practical results. For real‐world implementations, the throughput of pure ALOHA considering a finite number of users is presented in analytical form. The capture coefficient is then applied to pure ALOHA as a case study. Using analytical and practical implementations of the capture effect on ALOHA, a very good match in channel throughput performance enhancement is demonstrated over the non‐capture effect case. TinyOS‐2.x is used to program the nodes and to observe data exchange on a computer through a base station.  相似文献   
26.
在感知无线电自私ad hoc网络环境下提出一种低代销的诚实能效路由(Lowest Cost Path,LCP),将路由的开销结合对主用户的干扰和节点剩余能量,利用格罗夫斯-克拉克-威科瑞(Vickrey-Clark-Groves,VCG)定价机制给LCP上每个中继节点以一定报酬促使节点之间的合作,并证明VCG机制下节点真实的反映自身的类型是一个占优策略。仿真结果表明,该路由算法有效实现了感知无线电自私ad hoc网络的诚实能效路由,与现有最短路径路由协议比较,该协议具有更好的性能。  相似文献   
27.
An efficient communication key management scheme to mobile ad-hoc networks (MANET) based on the ideas of threshold cryptography is proposed, local-TTP and location-based virtual network infrastructure. The protocol is built upon a combinatorial formulation of the group key management issue. Primary features of the scheme include independently computation group keys by using a hash function and the mapping of nodes for group keys. Also, the proposed scheme scales well and supports dynamic setup and management of arbitrary structures of secure group communication in MANET.  相似文献   
28.
基于人工势场法的无人机路径规划避障算法   总被引:1,自引:0,他引:1  
随着无人机广泛应用于生产生活的各个方面,无人机的避障研究成为热点问题。为了提高无人机的避障性能,文中提出一种基于人工势场法的无人机路径规划避障算法。该算法通过生成预规划路径弱化了目标点对无人机的吸引作用,增加了路径的连贯性;在势场函数中加入了动态调节因子,可减少无人机轨迹不必要的转弯机动,减少机动能耗;该算法综合考虑无人机飞行中的安全性、平滑性和机动能耗,提出了一种新的代价函数,并通过使得代价函数最小化来选出最优路径。实验结果表明,该算法克服了传统人工势场的不足,在不同的飞行环境下均能够规划出安全、平滑、机动能耗小的路径,有效避开障碍物,且具有较好的适应性。  相似文献   
29.
无线传感器网络节点成簇是实现对传感器网络高效节能管理和应用的有效途径.网络安全问题中恶意节点尤为突出,它们破坏网络系统的正常工作规则,影响网络的工作效率和整体存活寿命.为了提高网络的整体性能,希望能在网络成簇阶段及时将破坏作用的恶意节点识别出来并别除.采用LEACH层次化网络通信思路,应用一种基于LEACH算法的密钥预...  相似文献   
30.
在编制遥测数据处理软件的过程中,面对大量的测试数据,经常需要编写高效率的数据过滤器。本文讨论了一种通过采用跨单元、跨类访问Delphi类的私有域的方法实现快速删除TList批连续结点的新算法,并通过测试结果得到验证。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号