首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1977篇
  免费   58篇
  国内免费   9篇
电工技术   38篇
化学工业   319篇
金属工艺   40篇
机械仪表   43篇
建筑科学   31篇
矿业工程   1篇
能源动力   82篇
轻工业   41篇
水利工程   6篇
石油天然气   36篇
无线电   501篇
一般工业技术   360篇
冶金工业   171篇
原子能技术   16篇
自动化技术   359篇
  2023年   16篇
  2022年   76篇
  2021年   47篇
  2020年   40篇
  2019年   43篇
  2018年   63篇
  2017年   57篇
  2016年   51篇
  2015年   58篇
  2014年   63篇
  2013年   145篇
  2012年   78篇
  2011年   74篇
  2010年   84篇
  2009年   65篇
  2008年   65篇
  2007年   66篇
  2006年   61篇
  2005年   61篇
  2004年   48篇
  2003年   44篇
  2002年   53篇
  2001年   30篇
  2000年   45篇
  1999年   36篇
  1998年   66篇
  1997年   51篇
  1996年   31篇
  1995年   39篇
  1994年   39篇
  1993年   36篇
  1992年   22篇
  1991年   33篇
  1990年   27篇
  1989年   22篇
  1988年   19篇
  1987年   17篇
  1986年   19篇
  1985年   25篇
  1984年   12篇
  1983年   9篇
  1982年   14篇
  1981年   8篇
  1980年   13篇
  1979年   10篇
  1978年   7篇
  1977年   10篇
  1976年   8篇
  1974年   9篇
  1973年   9篇
排序方式: 共有2044条查询结果,搜索用时 15 毫秒
1.
2.
Why does it pay to be selfish in a MANET?   总被引:2,自引:0,他引:2  
Routing protocols for a mobile ad hoc network have assumed that all mobile nodes voluntarily participate in forwarding others' packets. This was a reasonable assumption because all MNs in a MANET belonged to a single authority. In the near future, however, a MANET may consist of MNs that belong to many different organizations since numerous civilian applications are expected to crop up. In this situation, some MNs may run independently and purposely decide not to forward packets so as to save their own energy. This could potentially lead to network partitioning and corresponding performance degradation. To minimize such situations in MANETs, many studies have explored the use of both the carrot and the stick approaches by having reputation-based, credit-payment, and game theory schemes. This article summarizes existing schemes, identifies their relative advantages, and projects future directions  相似文献   
3.
Lubricating oil base stocks differ greatly in their chemical composition and consequently in their physical properties and applications. Influence of waxes and various hydrocarbon type constituents viz saturates and aromatic components on the viscosity and shear stress as a function of temperature in different lube oil base stocks has been studied in the present paper.  相似文献   
4.
Multishell Carrier Transport in Multiwalled Carbon Nanotubes   总被引:1,自引:0,他引:1  
Understanding carrier transport in carbon nanotubes (CNTs) and their networks is important for harnessing CNTs for device applications. Here, we report multishell carrier transport in individual multiwalled CNTs, and films of randomly dispersed multiwalled CNTs, as a function of electric field and temperature. Electrical measurements and first-principles density functional theory calculations indicate transport across CNT shells. Intershell conduction occurs across an energy barrier range of 60-250 meV in individual CNTs, and ~ 60 meV in CNT networks. In both cases, the conductance behavior can be explained based upon field-enhanced carrier injection and defect-enhanced transport, as described by the Poole-Frenkel model.  相似文献   
5.
We consider a system comprising of a single bottleneck switch/node that is fed by N independent Markov-modulated fluid sources. There is a fixed propagation delay incurred by the traffic between these sources and the switch. We assume that the switch sends periodic feedback in the form of a single congestion indicator bit. This feedback also incurs a fixed propagation delay in reaching the sources. Upon reaching the sources (or the access controllers associated with the sources), this congestion indicator bit is used to choose between two rates for the excess traffic, high or low, possibly depending on the state of that source. The switch employs a threshold mechanism based on its buffer level to discard excess traffic. We show that the stationary distribution of this system satisfies a set of first-order linear differential equations along with a set of split boundary conditions. We obtain an explicit solution to these using spectral decomposition. To this end we investigate the related eigenvalue problem. Based on these results we investigate the role of delayed feedback vis-a-vis various time-constants and traffic parameters associated with the system. In particular, we identify conditions under which the feedback scheme offers significant improvement over the open-loop scheme  相似文献   
6.
A version control mechanism is proposed that enhances the modularity and extensibility of multiversion concurrency control algorithms. The multiversion algorithms are decoupled into two components: version control and concurrency control. This permits modular development of multiversion protocols and simplifies the task of proving the correctness of these protocols. A set of procedures for version control is described that defines the interface with the version control component. It is shown that the same interface can be used by the database actions of both two-phase locking and time-stamp concurrency control protocols to access multiversion data. An interesting feature of the framework is that the execution of read-only transactions becomes completely independent of the underlying concurrency control implementation. Unlike other multiversion algorithms, read-only transactions in this scheme do not modify any version-related information, and therefore do not interfere with the execution of read-write transactions. The extension of the multiversion algorithms to a distributed environment becomes very simple  相似文献   
7.
8.
Energy minimization and design for testability   总被引:6,自引:0,他引:6  
The problem of fault detection in general combinational circuits is NP-complete. The only previous result on identifying easily testable circuits is due to Fujiwara who gave a polynomial time algorithm for detecting any single stuck fault inK-bounded circuits. Such circuits may only contain logic blocks with no more thanK input lines and the blocks are so connected that there is no reconvergent fanout among them. We introduce a new class of combinational circuits called the (k, K)-circuits and present a polynomial time algorithm to detect any single or multiple stuck fault in such circuits. We represent the circuit as an undirected graphG with a vertex for each gate and an edge between a pair of vertices whenever the corresponding gates have a connection. For a (k, K)-circuit,G is a subgraph of ak-tree, which, by definition, cannot have a clique of size greater thank+1. Basically, this is a restriction on gate interconnections rather than on the function of gates comprising the circuit. The (k, K)-circuits are a generalization of Fujiwara'sK-bounded circuits. Using the bidirectional neural network model of the circuit and the energy function minimization formulation of the fault detection problem, we present a test generation algorithm for single and multiple faults in (k, K)-circuits. This polynomial time aggorithm minimizes the energy function by recursively eliminating the variables.  相似文献   
9.
The paper contains a systematic investigation of practical coding strategies for noncoherent communication over fading channels, guided by explicit comparisons with information-theoretic benchmarks. Noncoherent reception is interpreted as joint data and channel estimation, assuming that the channel is time varying and a priori unknown. We consider iterative decoding for a serial concatenation of a standard binary outer channel code with an inner modulation code amenable to noncoherent detection. For an information rate of about 1/2 bit per channel use, the proposed scheme, using a quaternary phase-shift keying (QPSK) alphabet, provides performance within 1.6-1.7 dB of Shannon capacity for the block fading channel, and is about 2.5-3 dB superior to standard differential demodulation in conjunction with an outer channel code. We also provide capacity computations for noncoherent communication using standard phase-shift keying (PSK) and quadrature amplitude modulation (QAM) alphabets; comparing these with the capacity with unconstrained input provides guidance as to the choice of constellation as a function of the signal-to-noise ratio. These results imply that QPSK suffices to approach the unconstrained capacity for the relatively low information and fading rates considered in our performance evaluations, but that QAM is superior to PSK for higher information or fading rates, motivating further research into efficient noncoherent coded modulation with QAM alphabets.  相似文献   
10.
Designing circuits with partial scan   总被引:1,自引:0,他引:1  
In this scan design methodology, only selected faults are targeted for detection. These faults are those not detected by the designer's functional vectors. The test generator decides exactly which flip-flops should be scanned using one of two methods. In the first method, all possible tests are generated for each target fault, and the set of tests requiring the fewest flip-flops is selected. In the second method, only one test is generated for each fault, and the use of flip-flops is avoided as much as possible during test generation. Examples of actual VLSI circuits show a savings of at least a 40% in full-scan overhead  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号