首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   352篇
  免费   11篇
电工技术   7篇
化学工业   84篇
金属工艺   8篇
机械仪表   1篇
建筑科学   2篇
能源动力   4篇
轻工业   32篇
水利工程   1篇
无线电   82篇
一般工业技术   59篇
冶金工业   29篇
原子能技术   1篇
自动化技术   53篇
  2024年   2篇
  2023年   3篇
  2022年   20篇
  2021年   14篇
  2020年   25篇
  2019年   18篇
  2018年   14篇
  2017年   19篇
  2016年   14篇
  2015年   15篇
  2014年   11篇
  2013年   22篇
  2012年   12篇
  2011年   13篇
  2010年   10篇
  2009年   14篇
  2008年   9篇
  2007年   7篇
  2006年   9篇
  2005年   9篇
  2004年   8篇
  2003年   8篇
  2002年   5篇
  2001年   7篇
  2000年   3篇
  1998年   6篇
  1997年   10篇
  1996年   8篇
  1995年   5篇
  1994年   7篇
  1993年   5篇
  1992年   5篇
  1991年   1篇
  1990年   2篇
  1989年   1篇
  1988年   1篇
  1986年   1篇
  1983年   2篇
  1981年   4篇
  1979年   4篇
  1978年   1篇
  1977年   2篇
  1976年   3篇
  1975年   1篇
  1974年   2篇
  1973年   1篇
排序方式: 共有363条查询结果,搜索用时 31 毫秒
1.
2.
We derive the outage capacity region of an M-user fading multiple-access channel (MAC) under the assumption that both the transmitters and the receiver have perfect channel side information (CSI). The outage capacity region is implicitly obtained by deriving the outage probability region for a given rate vector. Given a required rate and average power constraint for each user, we find a successive decoding strategy and a power allocation policy that achieves points on the boundary of the outage probability region. We discuss the scenario where an outage must be declared simultaneously for all users (common outage) and when outages can be declared individually (individual outage) for each user.  相似文献   
3.
Multimedia Tools and Applications - Prostate cancer (PCa) has become the second most dreadful cancer in men after lung cancer. Traditional approaches used for treatment of PCa were manual, time...  相似文献   
4.
5.
Microsystem Technologies - Micro-mechanical systems (MEMS) based piezoresistive pressure sensors have significant importance in several pressure sensor devices in real world, i.e., aviation, IoT...  相似文献   
6.
The present study deals with the production of 5‐hydroxymethyl furfural (HMF) from fructose by chemo‐conversion method using chemical catalyst, conventionally achieved by microwave‐assisted dehydration process. Five different chemical catalysts, namely oxalic acid, phosphotungstic acid and mesoporous titanium dioxide nanoparticles (TNPs) were compared at constant conditions of which TNPs yielded a maxima of 33.95%. The optimum temperature and catalyst loading were found to be 200°C and 20%, respectively, at a 5% optimum substrate concentration during 15 min optimum reaction time to yield 61.53% HMF. The efficiency of synthesised TNPs was investigated further through reusability studies. TNPs were properly recycled and the catalytic activity recovery was good even after a 14 batch reactions. The specific surface area of the TNP obtained is about 105.46 m2 /g and its pore‐volume is about 0.42 cm3 /g according to single point adsorption. A large accessible surface area combined with a minimal pore size (15.92 nm) obtained with mesoporous TNPs is desirable for better catalyst loading, high‐yield HMF, retention and reduced diffusion constraints.Inspec keywords: mesoporous materials, recycling, production management, dissociation, nanoparticles, nanotechnologyOther keywords: mesoporous titanium dioxide nanocatalyst, recyclable approach, one‐pot synthesis, 5‐hydroxymethyl furfural production, HMF, chemo‐conversion method, chemical catalyst, microwave‐assisted dehydration process, oxalic acid, phosphotungstic acid, mesoporous titanium dioxide nanoparticles, TNP  相似文献   
7.
There has been an extensive and widespread deployment of wireless local area networks (WLANs) for information access. The transmission, being of a broadcast nature, is vulnerable to security threats and hence, the aspect of security provisioning in these networks has assumed an important dimension. The security of the transmitted data over a wireless channel aims at protecting the data from unauthorized access. The objective is achieved by providing advanced security mechanisms. Implementing strong security mechanisms however, affects the throughput performance and increases the complexity of the communication system. In this paper, we investigate the security performance of a WLAN based on IEEE 802.11b/g/n standards on an experimental testbed in congested and uncongested networks in a single and multi-client environment. Experimental results are obtained for a layered security model encompassing nine security protocols in terms of throughput, response time, and encryption overhead. The performance impact of transmission control protocol and user datagram protocol traffic streams on secure wireless networks has also been studied. Through numerical results obtained from the testbed, we have presented quantitative and realistic findings for both security mechanisms as well as network performance. The tradeoff between the strength of the security protocol and the associated performance is analyzed through computer simulation results. The present real time analysis enables the network designers to make intelligent choices about the implementation of security features and the perceived network performance for a given application scenario.  相似文献   
8.
A novel bacterial foraging technique for edge detection   总被引:2,自引:0,他引:2  
A new approach for edge detection using a combination of bacterial foraging algorithm (BFA) and probabilistic derivative technique derived from Ant Colony Systems, is presented in this paper. The foraging behavior of some species of bacteria like Escherichia coli can be hypothetically modeled as an optimization process. A group of bacteria search for nutrients in a way that maximizes the energy obtained per unit time spent during the foraging. The proposed approach aims at driving the bacteria through the edge pixels. The direction of movement of the bacteria is found using a direction probability matrix, computed using derivatives along the possible directions. Rules defining the derivatives are devised to ensure that the variation of intensity due to noise is discarded. Quantitative analysis of the feasibility of the proposed approach and its comparison with other standard edge detection operators in terms of kappa and entropy are given. The effect of initial values of parameters of BFA on the edge detection is discussed.  相似文献   
9.
A consumer entering a new bookstore can face more than 250,000alternatives. The efficiency of compensatory and noncompensatory decisionrulesfor finding a preferred item depends on the efficiency of their associatedinformation operators. At best, item-by-item information operators lead tolinear computational complexity; set information operators, on the other hand,can lead to constant complexity. We perform an experiment demonstrating thatsubjects are approximately rational in selecting between sublinear and linearrules. Many markets are organized by attributes that enable consumers toemploya set-selection-by-aspect rule using set information operations. In cyberspacedecision rules are encoded as decision aids.  相似文献   
10.
Capacity limits of MIMO channels   总被引:48,自引:0,他引:48  
  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号