全文获取类型
收费全文 | 382篇 |
免费 | 15篇 |
国内免费 | 3篇 |
学科分类
工业技术 | 400篇 |
出版年
2023年 | 13篇 |
2022年 | 30篇 |
2021年 | 48篇 |
2020年 | 22篇 |
2019年 | 19篇 |
2018年 | 29篇 |
2017年 | 14篇 |
2016年 | 22篇 |
2015年 | 10篇 |
2014年 | 14篇 |
2013年 | 33篇 |
2012年 | 24篇 |
2011年 | 26篇 |
2010年 | 18篇 |
2009年 | 15篇 |
2008年 | 14篇 |
2007年 | 7篇 |
2006年 | 10篇 |
2005年 | 6篇 |
2004年 | 3篇 |
2003年 | 3篇 |
2001年 | 2篇 |
2000年 | 1篇 |
1999年 | 1篇 |
1997年 | 1篇 |
1996年 | 2篇 |
1995年 | 1篇 |
1993年 | 1篇 |
1992年 | 2篇 |
1991年 | 1篇 |
1987年 | 1篇 |
1985年 | 1篇 |
1984年 | 1篇 |
1983年 | 1篇 |
1981年 | 2篇 |
1978年 | 2篇 |
排序方式: 共有400条查询结果,搜索用时 0 毫秒
1.
Recent advances in isotropic conductive adhesives for electronics packaging applications 总被引:4,自引:0,他引:4
Isotropic conductive adhesives (ICAs) have recently received a lot of focus and attention from the researchers in electronics industry as a potential substitute to lead-bearing solders. Numerous studies have shown that ICAs possess many advantages over conventional soldering such as environmental friendliness, finer pitch printing, lower temperature processing and more flexible and simpler processing. However, complete replacement of soldering by ICAs is yet not possible owing to several limitations of ICAs which are mainly related to reliability aspects like limited impact resistance, unstable contact resistance, low adhesion and conductivity etc. Continued efforts for last 15 years have resulted in development of ICAs with improved properties. This review article is aimed at providing a better understanding of ICAs, their principles, performance and significant research and development work addressing the technological utility of ICAs. 相似文献
2.
In this paper, a new class of additive codes which is referred to as ?2 ?2[u]-additive codes is introduced. This is a generalization towards another direction of recently introduced ?2 ?4-additive codes [J. Borges, C. Fernández-Córdoba, J. Pujol, J. Rif´a, and M. Villanueva, ?2 ?4-linear codes: Generator matrices and duality, Designs Codes Cryptogr. 54(2) (2010), pp. 167–179]. ?2 ?4-additive codes have shown to provide a promising class of codes with their algebraic structure and applications such as steganography. The standard generator matrices are established and by introducing orthogonality the parity-check matrices are also obtained. A MacWilliams-type identity that relates the weight enumerator of a code with its dual is proved. Furthermore, a Gray map that maps these codes to binary codes is defined and some examples of optimal codes which are the binary Gray images of ?2 ?2[u]-additive codes are presented. 相似文献
3.
4.
Muhammad Waseem Rizwan Ahmed Muhammad Irfan Shahid Qamar 《Quantum Information Processing》2013,12(12):3649-3664
We present a scheme for the implementation of three-qubit Grover’s algorithm using four-level superconducting quantum interference devices (SQUIDs) coupled to a superconducting resonator. The scheme is based on resonant, off-resonant interaction of the cavity field with SQUIDs and application of classical microwave pulses. We show that adjustment of SQUID level spacings during the gate operations, adiabatic passage, and second-order detuning are not required that leads to faster implementation. We also show that the marked state can be searched with high fidelity even in the presence of unwanted off-resonant interactions, level decay, and cavity dissipation. 相似文献
5.
During the recent years, there has been a tremendous growth in the development and deployment of multimedia based networked applications such as video streaming, IP telephony, interactive games, among others. These applications, in contrast to elastic applications such as email and data sharing, are delay and delay jitter sensitive but can tolerate certain level of packet loss. A vital element of end-to-end delay and delay jitter is the random queueing delays in network switches and routers. Analysis of robust mechanisms for buffer management at network routers needs to be carried out in order to reduce end-to-end delay for traffic generated by multimedia applications. In this context, a threshold based buffer management scheme for accommodating multiple class multimedia traffic in network routers has been analysed. This technique effectively controls the allocation of buffer to various traffic classes according to their delay constraints. The forms of the joint state probabilities, as well as basic performance measures such as blocking probabilities are analytically established at equilibrium. Typical numerical experiments are included to illustrate the credibility of the proposed mechanism in the context of different quality of service (QoS) grades for various network traffic classes. This model, therefore, can be used as a powerful tool to provide a required grade of service to a particular class of multimedia based web traffic in any heterogeneous network. 相似文献
6.
Irfan Ahmad Rather Gulshan Kumar Rahul Saha 《International Journal of Communication Systems》2023,36(9):e5473
In heterogeneous access network, Multiple-Input Multiple-Output (MIMO) radio-over-fiber (RoF) system is an efficient approach for multiple signal transmission with low cost and complexity. The performance of RoF fronthaul system in MIMO system will be varied with different nonlinear effects. By adjusting various transmission parameters, such as the input signal power or the laser bias current, the nonlinear impacts produced by the RoF system can be reduced. In this paper, a novel algorithm Improved Aquila Optimization (IAO) is proposed to optimize transmission circumstances of MIMO RoF system. It determines the appropriate bias current for both lasers and Radio Frequency (RF) signal power in a short period. The input signals are wavelength multiplexed with Intensity Modulation and Direct Detection (IM/DD) applied. The carrier as well as transmission frequency is governed by the MIMO-Long-Term Evolution (LTE) standard. The proposed system is implemented in MATLAB, and the performance is evaluated. The experimental results show that fast convergence and trade-off between noise and nonlinearity are obtained with varying bandwidth. In the experimental scenario, the maximum Error Vector Magnitude (EVM) of 1.88, 3.14, and signal-to-noise ratio (SNR) of 3.204, and 2.698 was attained for both quadrature phase shift keying (QPSK) and quadrature amplitude modulation (QAM) modulation. [Correction added on 24 April 2023, after first online publication: the SNR values were corrected in the preceding sentence.] For 100 iterations, the processing time was reduced to 0.137 s. When compared with the conventional state-of-the-art approaches, the accuracy and computational complexity of the proposed approach are improved. 相似文献
7.
Wireless Personal Communications - Mobile edge computation (MEC) is a potential technology to reduce the energy consumption and task execution delay for tackling computation-intensive tasks on... 相似文献
8.
Rasha Osman Irfan Awan Michael E. Woodward 《Simulation Modelling Practice and Theory》2011,19(1):251-270
Databases form the common component of many software systems. However, performance models specifically targeted at the database design have not been extensively studied. In this paper, we propose QuePED – a queueing network performance evaluation model for database designs. QuePED provides for the performance modelling of database design constructs, including active database rules; thus, deviating from current methods that consider database designs as processing demands on the hardware architecture. We present a formal specification of QuePED and describe its application to database designs. Experimental evaluation has shown the ability of QuePED to capture the steady state performance of an implementation of the TPC-C benchmark. 相似文献
9.
Feng Feng Changxing Li B. Davvaz M. Irfan Ali 《Soft Computing - A Fusion of Foundations, Methodologies and Applications》2010,14(9):899-911
Theories of fuzzy sets and rough sets are powerful mathematical tools for modelling various types of uncertainty. Dubois and
Prade investigated the problem of combining fuzzy sets with rough sets. Soft set theory was proposed by Molodtsov as a general
framework for reasoning about vague concepts. The present paper is devoted to a possible fusion of these distinct but closely
related soft computing approaches. Based on a Pawlak approximation space, the approximation of a soft set is proposed to obtain
a hybrid model called rough soft sets. Alternatively, a soft set instead of an equivalence relation can be used to granulate
the universe. This leads to a deviation of Pawlak approximation space called a soft approximation space, in which soft rough
approximations and soft rough sets can be introduced accordingly. Furthermore, we also consider approximation of a fuzzy set
in a soft approximation space, and initiate a concept called soft–rough fuzzy sets, which extends Dubois and Prade’s rough
fuzzy sets. Further research will be needed to establish whether the notions put forth in this paper may lead to a fruitful
theory. 相似文献
10.
Accurate detection of mediated haptic information in minimally invasive surgery (MIS) is critical for applying appropriate force magnitudes onto soft tissue with the aim of minimising tissue trauma. Force perception in MIS is a dynamic process, with surgeons’ administration of force into tissue revealing information about the remote surgical site which further informs the surgeons’ haptic interactions. The relationship between applied force and material deformation rate provides biomechanical information specifying the deformation distance remaining until a tissue will fail: which is termed distance-to-break (DTB). The current study demonstrates that observers can detect DTB while deforming simulated tissues and stop before reaching the tissues’ failure points. The design of training simulators, control devices and automated robotic systems for applications outside of MIS is discussed.
Practitioner Summary: In MIS, haptic information is critical for applying appropriate forces onto soft tissue to minimise tissue trauma. Observers used force information to detect how far they could deform a virtual tissue before it would break. The design of training simulators, control devices and automated robotic systems is discussed. 相似文献