首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   408篇
  免费   8篇
  国内免费   2篇
电工技术   1篇
综合类   2篇
化学工业   69篇
金属工艺   5篇
机械仪表   5篇
建筑科学   37篇
能源动力   15篇
轻工业   26篇
水利工程   6篇
石油天然气   2篇
无线电   86篇
一般工业技术   68篇
冶金工业   28篇
原子能技术   4篇
自动化技术   64篇
  2023年   11篇
  2022年   18篇
  2021年   17篇
  2020年   23篇
  2019年   21篇
  2018年   21篇
  2017年   15篇
  2016年   33篇
  2015年   7篇
  2014年   20篇
  2013年   21篇
  2012年   15篇
  2011年   37篇
  2010年   19篇
  2009年   15篇
  2008年   14篇
  2007年   16篇
  2006年   8篇
  2005年   11篇
  2004年   6篇
  2003年   6篇
  2002年   3篇
  2001年   4篇
  2000年   3篇
  1999年   4篇
  1998年   8篇
  1997年   3篇
  1996年   2篇
  1995年   8篇
  1994年   3篇
  1993年   2篇
  1991年   5篇
  1990年   2篇
  1986年   2篇
  1984年   1篇
  1977年   2篇
  1976年   1篇
  1975年   6篇
  1973年   4篇
  1969年   1篇
排序方式: 共有418条查询结果,搜索用时 31 毫秒
1.
Vu  Hoa T.  Nguyen  Manh B.  Vu  Tan M.  Le  Giang H.  Pham  Trang T. T.  Nguyen  Trinh Duy  Vu  Tuan A. 《Topics in Catalysis》2020,63(11-14):1046-1055
Topics in Catalysis - Nano Fe-BTC/graphene oxide (GO) composites were successfully synthesized by hydrothermal treatment with a microwave-assisted method. Samples were characterized by X-ray...  相似文献   
2.
This paper investigates the properties of the on-wafer interconnects built in a 0.18-/spl mu/m CMOS technology for RF applications. A scalable equivalent circuit model is developed. The model parameters are extracted directly from the on-wafer measurements and formulated into empirical expressions. The expressions are in functions of the length and the width of the interconnects. The proposed model can be easily implemented into commercial RF circuit simulators. It provides a novel solution to include the frequency-variant characteristics into a circuit simulation. The silicon-verified accuracy is proved to be up to 25 GHz with an average error less than 2%. Additionally, equivalent circuit model for longer wires can be obtained by cascading smaller subsections together. The scalability of the propose model is demonstrated.  相似文献   
3.
On the SEP of Cooperative Diversity with Opportunistic Relaying   总被引:1,自引:0,他引:1  
We analyze the exact symbol error probability (SEP) of cooperative diversity with opportunistic amplify-and-forward (AF) relaying. The benefit of this opportunism to the SEP is assessed by comparing with maximal ratio combining of orthogonal multiple AF relay transmissions.  相似文献   
4.
To investigate effects of diurnal thermal cycles on C-band polarimetric backscatter and millimeter-wave emission from sea ice, the authors carried out a winter experiment at the outdoor geophysical research facility (GRF) in the cold regions research and engineering laboratory (CRREL), the ice sheet grew from open sea water to a thickness of 10 cm in 2.5 days, during which they took polarimetric backscatter data with a C-band scatterometer, interlaced with brightness temperature measurements at 90 GHz in conjunction with meteorological and sea ice characterizations. The initial ice growth in the late morning was slow due to high insolation. As the air temperature dropped during the night, the growth rate increased significantly. Air temperature changed drastically from about -12 to -36°C between day and night, the diurnal thermal cycle repeated itself the next day and the growth rate varied in the same manner. Ice temperature profiles clearly show the diurnal response in the ice sheet with a lag of 2.5 h behind the time of the maximum short-wave incident solar radiation. The diurnal cycles are also evident in the millimeter-wave brightness temperature data, measured sea ice backscatter revealed substantial diurnal variations up to 6 dB with repeatable cycles in synchronization with the temperature cycles and the brightness temperature modulations, the diurnal cycles in backscatter indicate that the dominant scattering mechanism related to thermodynamic processes in sea ice is reversible, a diurnal backscatter model based on sea ice electrodynamics and thermodynamics explains the observed diurnal signature. This work shows that diurnal effects are important for inversion algorithms to retrieve sea ice geophysical parameters from remote sensing data acquired with a satellite synthetic aperture radar (SAR) or scatterometer on Sun-synchronous orbits  相似文献   
5.
During the 1997 winter season, shipborne polarimetric backscatter measurements of Great Lakes (freshwater) ice types using the Jet Propulsion Laboratory C-band scatterometer, together with surface-based ice physical characterization measurements and environmental parameters, were acquired concurrently with Earth Resource Satellite 2 (ERS-2) and RADARSAT Synthetic Aperture Radar (SAR) data. This polarimetric data set, composed of over 20 variations of different ice types measured at incident angles from 0° to 60° for all polarizations, was processed to radar cross-section to establish a library of signatures (look-up table) for different ice types. The library is used in the computer classification of calibrated satellite SAR data. Computer analysis of ERS-2 and RADARSAT ScanSAR images of Great Lakes ice cover using a supervised classification technique indicates that different ice types in the ice cover can be identified and mapped, and that wind speed and direction can have an influence on the classification of water as ice based on single frequency, single polarization data. Once satellite SAR data are classified into ice types, the ice map provides important and necessary input for environmental protection and management, ice control and ice breaking operations, and ice forecasting and modeling efforts.  相似文献   
6.
Attempting to understand and predict weather on a local and global basis has challenged both the scientific and engineering communities. One key parameter in understanding the weather is the ocean surface wind vector because of its role in the energy exchange at the air-sea surface. scatterometers, radars that measure the reflectivity of a target offer a tool with which to remotely monitor these winds from tower-, aircraft-, and satellite-based platforms. This paper introduces three current airborne scatterometer systems, and presents data collected by these instruments under low-, moderate-, and high-wind conditions. The paper focuses on airborne scatterometers because of their ability to resolve submesoscale variations in wind fields. Discrepancies between existing theory and the observations are noted and the concerns in measuring low-wind speeds discussed. Finally, the application of using this technology for estimating the surface-wind vector during a hurricane is demonstrated  相似文献   
7.
The increasing use of mobile communications has raised many issues of decision support and resource allocation. A crucial problem is how to solve queries of Reverse Nearest Neighbour (RNN). An RNN query returns all objects that consider the query object as their nearest neighbour. Existing methods mostly rely on a centralised base station. However, mobile P2P systems offer many benefits, including self-organisation, fault-tolerance and load-balancing. In this study, we propose and evaluate 3 distinct P2P algorithms focusing on bichromatic RNN queries, in which mobile query peers and static objects of interest are of two different categories, based on a time-out mechanism and a boundary polygon around the mobile query peers. The Brute-Force Search Algorithm provides a naive approach to exploit shared information among peers whereas two other Boundary Search Algorithms filter a number of peers involved in query processing. The algorithms are evaluated in the MiXiM simulation framework with both real and synthetic datasets. The results show the practical feasibility of the P2P approach for solving bichromatic RNN queries for mobile networks.  相似文献   
8.
Together with advanced positioning and mobile technologies, P2P query processing has attracted a growing interest number of location-aware applications such as answering kNN queries in mobile ad hoc networks. It not only overcomes drawbacks of centralized systems, for example single point of failure and bottleneck issues, but more importantly harnesses power of peers’ collaboration. In this research, we propose a pure mobile P2P query processing scheme which primarily focuses on the search and validation algorithm for kNN queries. The proposed scheme is designed for pure mobile P2P environments with the absence of the base station support. Compared with centralized and hybrid systems, our system can reduce energy consumption more than six times by making use of data sharing from peers in a reasonable mean latency of processing time for networks with high density of moving objects as can be seen in the simulation results.  相似文献   
9.
Clustering is a crucial method for deciphering data structure and producing new information. Due to its significance in revealing fundamental connections between the human brain and events, it is essential to utilize clustering for cognitive research. Dealing with noisy data caused by inaccurate synthesis from several sources or misleading data production processes is one of the most intriguing clustering difficulties. Noisy data can lead to incorrect object recognition and inference. This research aims to innovate a novel clustering approach, named Picture-Neutrosophic Trusted Safe Semi-Supervised Fuzzy Clustering (PNTS3FCM), to solve the clustering problem with noisy data using neutral and refusal degrees in the definition of Picture Fuzzy Set (PFS) and Neutrosophic Set (NS). Our contribution is to propose a new optimization model with four essential components: clustering, outlier removal, safe semi-supervised fuzzy clustering and partitioning with labeled and unlabeled data. The effectiveness and flexibility of the proposed technique are estimated and compared with the state-of-art methods, standard Picture fuzzy clustering (FC-PFS) and Confidence-weighted safe semi-supervised clustering (CS3FCM) on benchmark UCI datasets. The experimental results show that our method is better at least 10/15 datasets than the compared methods in terms of clustering quality and computational time.  相似文献   
10.
In sensor networks, a compromised node can either generate fabricated reports with false votes or inject false votes into real reports, which causes severe damage such as false alarms, energy drain and information loss. An interleaved hop-by-hop authentication (IHA) scheme addresses the former attack by detecting and filtering false reports in a deterministic and hop-by-hop fashion. Unfortunately, in IHA, all en-route nodes must join to verify reports while only a few are necessary to the authentication procedure. In this paper, we propose a fuzzy-based interleaved multi-hop authentication scheme based on IHA. In our scheme, the fuzzy logic system only selects some nodes for verification based on the network characteristics. Moreover, we apply a voting method and a hash-based key assignment mechanism to improve network security. Through performance evaluation, the proposed scheme is found to save up to 13% of the energy consumption and to provide more network protection compared to IHA.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号