首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2658篇
  免费   117篇
  国内免费   6篇
工业技术   2781篇
  2023年   31篇
  2022年   158篇
  2021年   183篇
  2020年   66篇
  2019年   69篇
  2018年   89篇
  2017年   79篇
  2016年   81篇
  2015年   74篇
  2014年   123篇
  2013年   178篇
  2012年   119篇
  2011年   191篇
  2010年   140篇
  2009年   128篇
  2008年   130篇
  2007年   119篇
  2006年   95篇
  2005年   75篇
  2004年   71篇
  2003年   65篇
  2002年   62篇
  2001年   40篇
  2000年   31篇
  1999年   34篇
  1998年   53篇
  1997年   39篇
  1996年   40篇
  1995年   24篇
  1994年   26篇
  1993年   22篇
  1992年   12篇
  1991年   6篇
  1990年   6篇
  1989年   10篇
  1988年   6篇
  1987年   5篇
  1985年   7篇
  1984年   15篇
  1983年   9篇
  1982年   8篇
  1981年   5篇
  1980年   4篇
  1979年   7篇
  1978年   4篇
  1977年   7篇
  1976年   6篇
  1974年   4篇
  1967年   4篇
  1966年   4篇
排序方式: 共有2781条查询结果,搜索用时 15 毫秒
1.
Future generation wireless multimediacommunications will require efficient Medium AccessControl (MAC) protocols able to guarantee suitable Qualityof Service (QoS) levels for different traffic classes whileachieving a high utilization of radio resources. This paperproposes a new scheduling technique to be adopted at the MAClevel in wireless access systems, named Dynamic Scheduling-Time DivisionDuplexing (DS-TDD), that efficiently managesvideo, voice, Web and background traffics. A theoretical approachis proposed in this paper to evaluate the DS-TDD performance withvoice and Web traffics. Simulation results have permitted tohighlight the following promising characteristics of the DS-TDDscheme: (i) a high capacity of real-time traffics isattained with a QoS insensitive to Web and background trafficloads; (ii) a high throughput can be guaranteed whilepreserving the QoS levels of the different traffic classes;(iii) heavier downlink traffic loads do not modify the QoSof uplink traffics. Finally, extensive comparisons with differentscheduling schemes proposed in the literature have permitted tohighlight the better performanceof DS-TDD.  相似文献   
2.
In this paper, by applying a non linear model for the electromagnetic inverse scattering, a technique for the dielectric profiling of a planarly layered medium is investigated and applied to void localization and diagnostics inside a homogeneous lossless slab (one-dimensional geometry). Data are collected under plane wave multifrequency normal incidence. Suitable finite dimensional representations for the unknown functions are introduced and their influence on the model is discussed. The resulting functional equation is solved by the method of weighted residuals and the solution algorithm amounts to minimizing a non quadratic function, where particular attention is devoted to reduce the occurrence of local minima. Finally, the inversion algorithm is validated by applications to both simulated and experimental data.  相似文献   
3.
功率转换器的功率密度越来越高,发热问题越来越严重,这种功率转换器的设计对现代大功率半导体技术提出了新的挑战;因而,热问题的优化设计和核实变得比大功率器件的电模型更加重要,本文提出一种新的PSPICE模型,可以利用它计算MOSFET芯片在瞬变过程中的温度。其中的热阻可以从制造商提供的产品使用说明书得到。本文介绍的模型提供发热和电气参数之间的动态关系。它建立了与许可的热环境的关系,例如,栅极驱动电路、负载、以及散热器的分析与优化设计。利用这个模型可以改善散热器的设计。由于决定功率损耗的参数是分布在一定范围内,受生产制造的影响很大,因而散热器的设计往往由于无法预先知道功率损耗而无法进行。  相似文献   
4.
Accelerated reliability tests on thin oxide capacitors can be affected by series resistance effects at high stress conditions. The purpose of this work is to point out such problems both with measurements and simulations. It is shown that breakdown electric field is overestimated. Due to the resulting nonuniform stress, charge to breakdown density is underestimated if the test structure layout is not accurately designed. In any case the series resistance effects can have an undesirable impact on the reliability evaluation of thin dielectrics.  相似文献   
5.
BACKGROUND: Ascites in patients with hepatocellular carcinoma (HCC) is a poorly characterized subgroup of malignancy-related ascites. Not only the underlying liver disease, but also the tumor growth and spread contributes to the ascites formation. The authors differentiated ascites in HCC from other types of ascites. METHODS: The authors analyzed the ascitic fluid of 185 consecutive patients (89 liver cirrhosis, 33 HCC, 31 peritoneal carcinomatosis, 22 liver metastases, 10 spontaneous bacterial peritonitis). RESULTS: Each subgroup showed a typical pattern. Compared with the cirrhotic patients, those with HCC showed a higher frequency of positive cytologic findings (4 of 33 versus 0/89, P < 0.004), elevated fibronectin concentration (10/33 versus 8/89, P < 0.004), and elevated polymorphonuclear cell count (10/33 versus 5/89 P < 0.004). CONCLUSIONS: A significant number of patients with ascites and HCC patients showed signs of peritoneal infiltration with positive cytologic findings and increased concentration of fibronectin. Moreover, neutrocytic ascites without signs of superinfection is relatively common (30%).  相似文献   
6.
In this paper, we consider a class of non‐linear systems in which a set of constant parameters is unknown and some state variables are not available for measurement. For such systems we provide a constructive procedure for the solution of the global adaptive tracking problem with dynamic partial state feedback. We illustrate an application of the control strategy to the adaptive non‐linear friction compensation of a DC motor servomechanism. We improve previous results in tow directions: we allow for a subset of the unmeasurable states to enter in a system non‐linearly; we consider systems which are linearly parametrized with respect to a set of unknown constant parameters. Copyright © 2002 John Wiley & Sons, Ltd.  相似文献   
7.
In this paper, we investigate a packet access scheme that is able to support mixed traffics in the presence of high propagation delays. Referring to a Time‐Code Division Multiple Access air interface, we propose a Medium Access Control (MAC) protocol based on a random access scheme. A successful attempt grants the use of a slot‐code resource. This protocol is named Adaptive Time Code‐Packet Reservation Multiple Access (ATC‐PRMA), since the access parameters are changed, depending on the traffic load conditions, so as to fulfil Quality of Service requirements. Numerical examples are carried out for the Low Earth Orbit (LEO)‐Mobile Satellite System (MSS) scenario, but all these considerations could be applied to High‐Altitude Platform Stations (HAPSs) as well. In both cases, high propagation delays prevent an immediate feedback to users. An analytical approach is proposed to study the stability of our MAC scheme. Accordingly, we define a criterion for optimizing system performance. The predicted ATC‐PRMA behaviour is supported by simulation results. Finally, we show the performance improvement of ATC‐PRMA with respect to a MAC protocol not employing adaptive parameters. Copyright © 2003 John Wiley & Sons, Ltd.  相似文献   
8.
The security of a deterministic quantum scheme for communication, namely the LM05 [1], is studied in presence of a lossy channel under the assumption of imperfect generation and detection of single photons. It is shown that the scheme allows for a rate of distillable secure bits higher than that pertaining to BB84 [2]. We report on a first implementation of LM05 with weak pulses.  相似文献   
9.
A detailed long range restriction map of the region defined by markers D6S149 and D6S193 on chromosome 6q27 has been constructed. This was achieved by YAC cloning and contig assembling of the same region. Seven YAC clones were found to span the almost 1000 Kb region flanked by the two markers which on the genetic map resulted to be 1.9 cM apart. With some of the characterized YAC clones we undertook a molecular cytogenetic analysis of 20 benign ovarian tumors. The rationale for this was the recent mapping to a region of chromosome 6q27, flanked by markers D6281 and D6S133, of a locus for the SV40-mediated immortalization of human cells (SEN6 gene). Noteworthy we found that the the D6S149-D6S193 region (comprised in the larger D6S281-D6S133 physical interval) was altered in all samples analysed adding support to the occurrence of a immortalization step in this type of tumors.  相似文献   
10.
The publish/subscribe model offers a loosely-coupled communication paradigm where applications interact indirectly and asynchronously. Publishers generate events that are sent to interested applications through a network of brokers. Subscribers express their interest by specifying filters that brokers can use for routing the events. Supporting confidentiality of messages being exchanged is still challenging. First of all, it is desirable that any scheme used for protecting the confidentiality of both the events and filters should not require publishers and subscribers to share secret keys. In fact, such a restriction is against the loose-coupling of the model. Moreover, such a scheme should not restrict the expressiveness of filters and should allow the broker to perform event filtering to route the events to the interested parties. Existing solutions do not fully address these issues. In this paper, we provide a novel scheme that supports (i) confidentiality for events and filters; (ii) allows publishers to express further constraints about who can access their events; (iii) filters that can express very complex constraints on events even if brokers are not able to access any information in clear on both events and filters; (iv) and, finally, it does not require publishers and subscribers to share keys. Furthermore, we show how we applied our scheme to a real-world e-health scenario, developed together with a hospital. We also describe the implementation of our solution in Java and the integration with an existing publish/subscribe system.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号