首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5605篇
  免费   1000篇
  国内免费   636篇
电工技术   308篇
技术理论   1篇
综合类   459篇
化学工业   48篇
金属工艺   17篇
机械仪表   167篇
建筑科学   134篇
矿业工程   83篇
能源动力   33篇
轻工业   26篇
水利工程   72篇
石油天然气   14篇
武器工业   227篇
无线电   2335篇
一般工业技术   121篇
冶金工业   52篇
原子能技术   3篇
自动化技术   3141篇
  2024年   92篇
  2023年   212篇
  2022年   297篇
  2021年   293篇
  2020年   304篇
  2019年   250篇
  2018年   211篇
  2017年   265篇
  2016年   275篇
  2015年   323篇
  2014年   446篇
  2013年   373篇
  2012年   423篇
  2011年   454篇
  2010年   400篇
  2009年   367篇
  2008年   408篇
  2007年   489篇
  2006年   363篇
  2005年   329篇
  2004年   211篇
  2003年   150篇
  2002年   104篇
  2001年   76篇
  2000年   36篇
  1999年   22篇
  1998年   7篇
  1997年   9篇
  1996年   13篇
  1995年   8篇
  1994年   5篇
  1993年   9篇
  1990年   3篇
  1986年   7篇
  1985年   1篇
  1983年   1篇
  1981年   1篇
  1979年   1篇
  1967年   1篇
  1965年   2篇
排序方式: 共有7241条查询结果,搜索用时 31 毫秒
1.
徐浩  吴炜  陈浩  王子康 《电子测试》2020,(10):117-118,27
无人机技术目前的快速发展使得我们国家输电线路自身的巡检能力得到了持续的提升,基于此本文在对无人机技术给予认识的情况下,在了解了输电线路巡检过程中的使用优势之后,还总结了无人机技术在当前我国线路巡检过程中的应用路径以及应用方法;之后使用案例分析的方式分析了无人机技术在当前输电线路巡检过程中的应用方法。  相似文献   
2.
Sleep modes are widely accepted as an effective technique for energy-efficient networking: by adequately putting to sleep and waking up network resources according to traffic demands, a proportionality between energy consumption and network utilization can be approached, with important reductions in energy consumption. Previous studies have investigated and evaluated sleep modes for wireless access networks, computing variable percentages of energy savings. In this paper we characterize the maximum energy saving that can be achieved in a cellular wireless access network under a given performance constraint. In particular, our approach allows the derivation of realistic estimates of the energy-optimal density of base stations corresponding to a given user density, under a fixed performance constraint. Our results allow different sleep mode proposals to be measured against the maximum theoretically achievable improvement. We show, through numerical evaluation, the possible energy savings in today’s networks, and we further demonstrate that even with the development of highly energy-efficient hardware, a holistic approach incorporating system level techniques is essential to achieving maximum energy efficiency.  相似文献   
3.
Information‐Centric Networking (ICN) has been accepted to overcome some weaknesses of the current Internet architecture, showing that “what is being exchanged” is more important than “who are exchanging information.” Given the inadequate considerations on Quality of Service (QoS) and energy saving in ICN routing, we propose in this paper a routing algorithm to enhance the two aspects. At first, on one hand, Cauchy distribution is used as a fuzzy model to evaluate users' QoS requirements, such as bandwidth, delay, and error rate; on the other hand, we formulate energy saving problem to evaluate the green quality of routing algorithm. Then, we design a link selection approach by considering QoS and energy saving, which belongs to a multi‐objective decision problem resolved by intelligent drops algorithm. Finally, we implement the proposed algorithm and compare it with the famous adaptive forwarding mechanism in terms of some significant metrics, and the experimental results reveal that the proposed algorithm is more efficient.  相似文献   
4.
Although previous research has investigated widespread use of social media, especially Facebook, by youth attending college, the conditions under which these media foster adjustment to college remain unclear. This study tested a model illuminating pathways linking social competence to college adjustment via students’ perceptions about the usefulness of Facebook and ways in which they used the medium. Self-report survey data from 321 college students (M age = 20.09; 58% female; 84% Caucasian) attending a major Midwestern university supported the proposed model, indicating that higher social competence could foster or impede college adjustment, depending upon how it was related to beliefs about the usefulness of different Facebook functions and how these perceptions, in turn, were associated with patterns of Facebook use. Findings underscore the importance of considering connections among personal attributes, perception of media effectiveness, and media behaviors in assessing the implications of social media for users’ psychosocial well-being.  相似文献   
5.
Security for ad hoc network environments has received a lot of attention as of today. Previous work has mainly been focussing on secure routing, fairness issues, and malicious node detection. However, the issue of introducing and conserving trust relationships has received considerably less attention. In this article, we present a scalable method for the use of public key certificates and their revocation in mobile ad hoc networks (MANETs). With the LKN-ad hoc security framework (LKN-ASF) a certificate management protocol has been introduced, bringing PKI technology to MANETs. In addition a performance analysis of two different revocation approaches for MANETs will be presented.  相似文献   
6.
This paper addresses the problem of power control in a multihop wireless network supporting multicast traffic. We face the problem of forwarding packet traffic to multicast group members while meeting constraints on the signal-to-interference-plus-noise ratio (SINR) at the intended receivers. First, we present a distributed algorithm which, given the set of multicast senders and their corresponding receivers, provides an optimal solution when it exists, which minimizes the total transmit power. When no optimal solution can be found for the given set of multicast senders and receivers, we introduce a distributed, joint scheduling and power control algorithm which eliminates the weak connections and tries to maximize the number of successful multicast transmissions. The algorithm allows the other senders to solve the power control problem and minimize the total transmit power. We show that our distributed algorithm converges to the optimal solution when it exists, and performs close to centralized, heuristic algorithms that have been proposed to address the joint scheduling and power control problem.  相似文献   
7.
In recent years, constructing a virtual backbone by nodes in a connected dominating set (CDS) has been proposed to improve the performance of ad hoc wireless networks. In general, a dominating set satisfies that every vertex in the graph is either in the set or adjacent to a vertex in the set. A CDS is a dominating set that also induces a connected sub‐graph. However, finding the minimum connected dominating set (MCDS) is a well‐known NP‐hard problem in graph theory. Approximation algorithms for MCDS have been proposed in the literature. Most of these algorithms suffer from a poor approximation ratio, and from high time complexity and message complexity. In this paper, we present a new distributed approximation algorithm that constructs a MCDS for wireless ad hoc networks based on a maximal independent set (MIS). Our algorithm, which is fully localized, has a constant approximation ratio, and O(n) time and O(n) message complexity. In this algorithm, each node only requires the knowledge of its one‐hop neighbours and there is only one shortest path connecting two dominators that are at most three hops away. We not only give theoretical performance analysis for our algorithm, but also conduct extensive simulation to compare our algorithm with other algorithms in the literature. Simulation results and theoretical analysis show that our algorithm has better efficiency and performance than others. Copyright © 2005 John Wiley & Sons, Ltd.  相似文献   
8.
We propose in this paper a self-organized monitoring architecture for mobile ad-hoc networks based on a selective scheme where subsets of nodes are managed. These nodes are determined based on their network behavior in order to favor subsets of well-connected nodes. The key idea is to relax the requirements of the management plane, and to use these manageable subsets to monitor the performance of the overall network. We therefore propose a new performance metric to be monitored, in order to estimate the capability of ad-hoc nodes to communicate end-to-end in the network. Extensive simulations show how different parameters affect this metric.  相似文献   
9.
基于多信道预约可冲突避免的多址接入协议   总被引:3,自引:0,他引:3  
刘凯  李建东 《通信学报》2002,23(10):25-32
本文为多跳分布多无线网络提出了一套灵活而有效的自适应获取冲突避免(AACA)的多址接入协议。在该协议中,各节点竞争公共信道,利用RTS/CTS对话形式来预约各业务信道,成功预约后的分组传输不会受到其他节点的干扰。它使用任意确定数目信道,以异步方式工作,并且使得各节点利用半双工无线电台就可以灵活、简便地实现资源预约。分析和比较结果说明,所提出的多信道预约协议可以有效地解决隐藏终端、暴露终端以及侵入终端的问题。  相似文献   
10.
Dimitris  Georgios   《Ad hoc Networks》2008,6(3):474-482
The paper evaluates the performance effects of exposed terminals in IEEE 802.11 ad hoc networks in finite load conditions. It derives analytical models for the estimation of channel utilization and media access delay for IEEE 802.11 ad hoc networks in finite load conditions with and without exposed terminals. The simulation results show that the analytical estimated channel utilization and media access delay metrics are fairly accurate.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号