首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6368篇
  免费   376篇
  国内免费   19篇
工业技术   6763篇
  2023年   66篇
  2022年   41篇
  2021年   161篇
  2020年   95篇
  2019年   133篇
  2018年   173篇
  2017年   155篇
  2016年   204篇
  2015年   165篇
  2014年   251篇
  2013年   462篇
  2012年   390篇
  2011年   486篇
  2010年   336篇
  2009年   385篇
  2008年   331篇
  2007年   281篇
  2006年   232篇
  2005年   243篇
  2004年   172篇
  2003年   186篇
  2002年   168篇
  2001年   130篇
  2000年   131篇
  1999年   115篇
  1998年   245篇
  1997年   134篇
  1996年   134篇
  1995年   119篇
  1994年   80篇
  1993年   87篇
  1992年   58篇
  1991年   54篇
  1990年   45篇
  1989年   43篇
  1988年   31篇
  1987年   29篇
  1986年   23篇
  1985年   21篇
  1984年   23篇
  1983年   19篇
  1982年   22篇
  1981年   13篇
  1980年   17篇
  1979年   6篇
  1978年   6篇
  1977年   8篇
  1976年   13篇
  1975年   9篇
  1971年   5篇
排序方式: 共有6763条查询结果,搜索用时 197 毫秒
41.
Turbo codes have received tremendous attention and have commenced their practical applications due to their excellent error-correcting capability. Investigation of efficient iterative decoder realizations is of particular interest because the underlying soft-input soft-output decoding algorithms usually lead to highly complicated implementation. This paper describes the architectural design and analysis of sliding-window (SW) Log-MAP decoders in terms of a set of predetermined parameters. The derived mathematical representations can be applied to construct a variety of VLSI architectures for different applications. Based on our development, a SW-Log-MAP decoder complying with the specification of third-generation mobile radio systems is realized to demonstrate the performance tradeoffs among latency, average decoding rate, area/computation complexity, and memory power consumption. This paper thus provides useful and general information on practical implementation of SW-Log-MAP decoders.  相似文献   
42.
There were many studies about the prediction of warpage due to thermal mismatch , . However, cure induced warpage is usually ignored and the results can be inaccurate. To minimize this problem, a thorough understanding of epoxy molding compound (EMC) with pressure-volume-temperature-cure (P-V-T-C) relation is necessary. This paper used the P-V-T-C relation of an encapsulation material to formulate the stress-strain relationship. With the help of finite element method (FEM) and mold flow analysis, warpage predictions combined with P-V-T-C relation were performed and the results show that this approach is practical. For a given P-V-T-C relation, the shrinkage direction is pointing toward the gate and maximum warpage usually occurs at the boundary of an integrated circuit (IC) package. Variation of specific volume difference along the flow direction is larger than that perpendicular to the flow direction. When temperature difference is small in thickness direction, specific volume difference in thickness direction varies only slightly.  相似文献   
43.
In our study, we extracted the market, finance, and government factors determining R&D investment of individual firms in the IT industry in Korea. We collected the financial data of 515 individual firms belonging to IT and non‐IT industries between 1980 and 1999 from the Korea Investors Service's database and investigated the empirical relationship between the factors using an ordinary regression model, a fixed effects model, and a random effects model. The main findings of our study are as follows: i) The Herfindahl Index variable representing the degree of market concentration is statistically insignificant in explaining R&D expenditures in the IT manufacturing industry. ii) Assets, which is used as a proxy variable for firm size, have a positive and statistically significant coefficient. These two results suggest that the Schumpeterian Hypothesis may be only partially applied to the IT manufacturing industry in Korea. iii) The dividend variable has a negative value and is statistically significant, indicating that a tendency of high dividends can restrict the internal cash flow for R&D investment. iv) The sales variable representing growth potential shows a positive coefficient. v) The subsidy as a proxy variable for governmental R&D promotion policies is positively correlated with R&D expenditure. This suggests that government policy has played a significant role in promoting R&D activities of IT firms in Korea since 1980. vi) Using a dummy variable, we verified that firms reduced their R&D investments to secure sufficient liquidity under the restructuring pressure during Korea's 1998 and 1999 economic crisis.  相似文献   
44.
Plastic deformation in a multifunctional Ti-Nb-Ta-Zr-O alloy   总被引:7,自引:0,他引:7  
Mechanisms for plastic deformation in the newly developed Ti-24 at. pct (Ta + Nb + V)-(Zr,Hf)-O alloys (Gum Metal) were investigated in relation to their unique properties. Transmission electron microscopy revealed that the microstructure after deformation was characterized by highly distorted crystal images, which are accompanied by numerous “giant faults.” Such plastic behavior implies that a large amount of elastic stain energy was stored discretely and hierarchically during cold working. Calculated elastic constants of the Ti-X (Nb,Ta,Mo,V) binary systems predicted that Young’s modulus in 〈001〉 and shear moduli along some directions including slip systems in a bcc crystal were extraordinary small. The low modulus not only well explains the highly distorted microstructure observed in the cold-worked specimens, but also signifies that ideal shear strength of the developed alloys is a very small value, which is close to the practical strength required for plastic deformation in the alloy. This implies that the giant faults observed in the deformed specimen were formed without the aid of dislocation glide.  相似文献   
45.
Due to interference, path loss, multipath fading, background noise, and many other factors, wireless communication normally cannot provide a wireless link with both a high data rate and a long transmission range. To address this problem, striping network traffic in parallel over multiple lower-data-rate but longer-transmission-range wireless channels may be used. In this paper, we propose a new striping method and evaluate its performances over multiple IEEE 802.11(b) channels under various conditions. Our extensive simulation results show that this method is quite effective for such an application. S.Y. Wang is an Associate Professor of the Department of Computer Science and Information Engineering at National Chiao Tung University, Taiwan. He received his Master and Ph.D. degree in computer science from Harvard University in 1997 and 1999, respectively. His research interests include wireless networks, Internet technologies, network simulations, and operating systems. He is the author of the NCTUns 2.0 network simulator and emulator, which is being widely used by network and communication researchers. More information about the tool is available at http://NSL.csie.nctu.edu.tw/nctuns.html. C.H. Hwang received his master degree in computer science from NCTU in 2002 and currently is working for a network company. C.L. Chou currently is a third-year Ph.D. student at the Department of Computer Science and Information Engineering, National Chiao TungUniversity (NCTU), Taiwan. He received his master degree in computer science from NCTU in 2002.  相似文献   
46.
47.
Efficient OVSF code assignment and reassignment strategies in UMTS   总被引:1,自引:0,他引:1  
This paper presents an integrated solution for code management, assignment, and reassignment problems in UMTS. We propose a new architecture for code management and, based upon this new architecture, a code assignment strategy, referred to as "crowded-group first strategy". Our system architecture and code assignment strategy represent significant improvements both in the time complexity and the maintenance complexity. Moreover, the code blocking probability of the crowded-group first strategy is competitive to that of the other strategies. In this paper, we also propose a new code reassignment strategy, called the "crowded-branch first strategy". The main objective of this reassignment strategy is to reduce reassigned call probability with low computation overhead and extend this strategy for the general case. In order to systematically analyze the performances of the code assignment strategy, we implement a simulator to analyze the code selection behavior and code blocking probability of each strategy. Moreover, we propose some new performance metrics, named "weighted code blocking", "reassigned call probability", and "ratio of actual code reassignments", in order to precisely measure the performance obtained by different strategies. From the simulation results, we show that our proposed strategies efficiently utilize the OVSF codes with low computation overhead.  相似文献   
48.
Adaptive median filters: new algorithms and results   总被引:39,自引:0,他引:39  
Based on two types of image models corrupted by impulse noise, we propose two new algorithms for adaptive median filters. They have variable window size for removal of impulses while preserving sharpness. The first one, called the ranked-order based adaptive median filter (RAMF), is based on a test for the presence of impulses in the center pixel itself followed by a test for the presence of residual impulses in the median filter output. The second one, called the impulse size based adaptive median filter (SAMF), is based on the detection of the size of the impulse noise. It is shown that the RAMF is superior to the nonlinear mean L(p) filter in removing positive and negative impulses while simultaneously preserving sharpness; the SAMF is superior to Lin's (1988) adaptive scheme because it is simpler with better performance in removing the high density impulsive noise as well as nonimpulsive noise and in preserving the fine details. Simulations on standard images confirm that these algorithms are superior to standard median filters.  相似文献   
49.
We propose a new service for digital mobile communication systems. The service enables two or more users to hold a secure conference. Two requirements must be considered: privacy and authentication. Privacy involves ensuring that an eavesdropper cannot intercept the conversations of the parties holding the conference. Authentication involves ensuring that service is not obtained fraudulently in order to avoid usage charges. We present two new conference key distribution schemes for digital mobile communication systems. In these schemes, a group of users can generate a common secret keg over a public channel so that they may hold a secure conference  相似文献   
50.
We demonstrate and compare two phase-insensitive all-optical transistors (AOT's) based on frequency-degenerate quadratic three-wave interactions. In particular, we demonstrate gain using KTP in a type II geometry. Both AOT's exploit the phase insensitivity inherent to three-wave parametric processes when only two fields are input, providing amplification of a small signal at the operating frequency via the interaction with a second-harmonic wave. The first scheme is based on successive up- and down-conversion (i.e., cascading) while the second relies on parametric down-conversion. We obtain gains of 5 and 160 in the two configurations, respectively, with a significant background and output coherent to the pump in the first case, no background and coherence between output and signal in the second  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号