首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   23788篇
  免费   2363篇
  国内免费   2107篇
电工技术   1768篇
综合类   2966篇
化学工业   1790篇
金属工艺   570篇
机械仪表   1515篇
建筑科学   2045篇
矿业工程   805篇
能源动力   574篇
轻工业   776篇
水利工程   583篇
石油天然气   867篇
武器工业   217篇
无线电   4712篇
一般工业技术   2934篇
冶金工业   612篇
原子能技术   126篇
自动化技术   5398篇
  2024年   82篇
  2023年   327篇
  2022年   397篇
  2021年   557篇
  2020年   634篇
  2019年   611篇
  2018年   536篇
  2017年   748篇
  2016年   750篇
  2015年   834篇
  2014年   1387篇
  2013年   1385篇
  2012年   1676篇
  2011年   1745篇
  2010年   1434篇
  2009年   1625篇
  2008年   1614篇
  2007年   1795篇
  2006年   1640篇
  2005年   1406篇
  2004年   1175篇
  2003年   1031篇
  2002年   861篇
  2001年   706篇
  2000年   624篇
  1999年   477篇
  1998年   361篇
  1997年   341篇
  1996年   267篇
  1995年   232篇
  1994年   213篇
  1993年   151篇
  1992年   110篇
  1991年   120篇
  1990年   90篇
  1989年   99篇
  1988年   48篇
  1987年   26篇
  1986年   17篇
  1985年   20篇
  1984年   18篇
  1983年   11篇
  1982年   12篇
  1981年   12篇
  1980年   8篇
  1979年   7篇
  1978年   6篇
  1977年   4篇
  1976年   6篇
  1974年   4篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
51.
The photonic quantum ring (PQR) laser is a three dimensional whispering gallery (WG) mode laser and has anomalous quantum wire properties, such as microampere to nanoampere range threshold currents and √T‐dependent thermal red shifts. We observed uniform bottom emissions from a 1‐kb smart pixel chip of a 32×32 InGaAs PQR laser array flip‐chip bonded to a 0.35 µm CMOS‐based PQR laser driver. The PQR‐CMOS smart pixel array, now operating at 30 MHz, will be improved to the GHz frequency range through device and circuit optimization.  相似文献   
52.
The paper presents a computational approach and numerical data which facilitate the use of the smeared-tip method for cohesive fracture in large enough structures. In the recently developed K-version of the smeared tip method, the large-size asymptotic profile of the stress intensity factor density along a cohesive crack is considered as a material characteristic, which is uniquely related to the softening stress-displacement law of the cohesive crack. After reviewing the K-version, an accurate and efficient numerical algorithm for the computation of this asymptotic profile is presented. The algorithm is based on solving a singular Abel's integral equation. The profiles corresponding to various typical softening stress-displacement laws of the cohesive crack model are computed, tabulated and plotted. The profiles for a certain range of other typical softening laws can be approximately obtained by interpolation from the tables. Knowing the profile, one can obtain with the smeared-tip method an analytical expression for the large-size solution to fracture problems, including the first two asymptotic terms of the size effect law. Consequently, numerical solutions of the integral equations of the cohesive crack model as well as finite element simulations of the cohesive crack are made superfluous. However, when the fracture process zone is attached to a notch or to the body surface and the cohesive zone ends with a stress jump, the solution is expected to be accurate only for large-enough structures.  相似文献   
53.
压裂后裂缝的导流能力直接关系着压裂缝的渗流能力,是客观评价压裂效果的重要指标之一。文章介绍了基于AT89C52单片机的导流能力测试系统的系统要求、测试原理以及其设计方案,阐述了各个测控通道,给出了测控系统电路方框图。  相似文献   
54.
An introduction to Wu's method for mechanical theorem proving in geometry   总被引:1,自引:0,他引:1  
Wu's algebraic method for mechanically proving geometry theorems is presented at a level as elementary as possible with sufficient examples for further understanding the complete method.The work reported here was supported by NSF Grant DCR-8503498.  相似文献   
55.
Frank G. Pagan 《Software》1988,18(6):509-527
There is an effective and quite general method of manually deriving compilers from programming-language interpreters without dealing directly with machine language. The method is an implementation of the largely theoretical and under-appreciated concept of partial computation, but can be understood on its own terms. It involves the translation of a source program's intermediate form into the interpreter's implementation language. This paper shows how the method can be used to transform both a sample iterative interpreter and a sample recursive interpreter into compilers. The result can be a large gain in program execution speed. Other advantages of the method, including the ease and practicality of applying it, are discussed.  相似文献   
56.
CdSe量子点的制备与荧光特性研究   总被引:2,自引:0,他引:2  
主要讨论了CdSe量子点的制备及荧光特性。CdSe量子点由化学方法制备,通过选择不同的反应时间得到不同尺度的量子点样品。用荧光方法研究了量子点样品在石英衬底和有机溶剂中的荧光特性。实验表明,这些量子点都有良好的荧光特性。还用无限深球方势阱模型分析了量子点样品的电子态,并根据荧光参数估算了量子点的尺度.各样品荧光峰具有一致的半峰宽,表明CdSe量子点的成核过程在反应开始时同时完成。  相似文献   
57.
对基于Visual Basic 6.0开发的自动控制原理考试系统的系统结构做了阐述,并简要介绍了该系统的设计思想、主要功能及实现方法。  相似文献   
58.
1. Introduction Seismic physical modeling technology is an important method for the research on seismic exploration theory and methods. In seismic physical experiments, the earth, mantle or field site are scaled down to physical models according to the similarity principle, and then the seismic field and its variation are observed in the laboratory for the research work on the theories and methods of the earth structure, earthquake forecasting, energy and mineral resource exploration, and engi…  相似文献   
59.
It has recently been shown that authenticated Byzantine agreement, in which more than a third of the parties are corrupted, cannot be securely realized under concurrent or parallel (stateless) composition. This result puts into question any usage of authenticated Byzantine agreement in a setting where many executions take place. In particular, this is true for the whole body of work of secure multi-party protocols in the case that a third or more of the parties are corrupted. This is because these protocols strongly rely on the extensive use of a broadcast channel, which is in turn realized using authenticated Byzantine agreement. We remark that it was accepted folklore that the use of a broadcast channel (or authenticated Byzantine agreement) is actually essential for achieving meaningful secure multi-party computation whenever a third or more of the parties are corrupted. In this paper we show that this folklore is false. We present a mild relaxation of the definition of secure computation allowing abort. Our new definition captures all the central security issues of secure computation, including privacy, correctness and independence of inputs. However, the novelty of the definition is in decoupling the issue of agreement from these issues. We then show that this relaxation suffices for achieving secure computation in a point-to-point network. That is, we show that secure multi-party computation for this definition can be achieved for any number of corrupted parties and without a broadcast channel (or trusted pre-processing phase as required for running authenticated Byzantine agreement). Furthermore, this is achieved by just replacing the broadcast channel in known protocols with a very simple and efficient echo-broadcast protocol. An important corollary of our result is the ability to obtain multi-party protocols that remain secure under composition, without assuming a broadcast channel.  相似文献   
60.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号