首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   420885篇
  免费   4360篇
  国内免费   1267篇
电工技术   7852篇
综合类   312篇
化学工业   62084篇
金属工艺   20605篇
机械仪表   15479篇
建筑科学   10060篇
矿业工程   2721篇
能源动力   9855篇
轻工业   32367篇
水利工程   4726篇
石油天然气   7849篇
武器工业   10篇
无线电   46520篇
一般工业技术   85901篇
冶金工业   71804篇
原子能技术   9390篇
自动化技术   38977篇
  2021年   2756篇
  2019年   2628篇
  2018年   11991篇
  2017年   12554篇
  2016年   8965篇
  2015年   3682篇
  2014年   5534篇
  2013年   15874篇
  2012年   11318篇
  2011年   19969篇
  2010年   17079篇
  2009年   17555篇
  2008年   17466篇
  2007年   19189篇
  2006年   10014篇
  2005年   12435篇
  2004年   10649篇
  2003年   9952篇
  2002年   8751篇
  2001年   8321篇
  2000年   8145篇
  1999年   8326篇
  1998年   20452篇
  1997年   14637篇
  1996年   11372篇
  1995年   8469篇
  1994年   7508篇
  1993年   7275篇
  1992年   5512篇
  1991年   5353篇
  1990年   5028篇
  1989年   5123篇
  1988年   4941篇
  1987年   4281篇
  1986年   4126篇
  1985年   4860篇
  1984年   4458篇
  1983年   4156篇
  1982年   3776篇
  1981年   3924篇
  1980年   3651篇
  1979年   3692篇
  1978年   3684篇
  1977年   4216篇
  1976年   5617篇
  1975年   3215篇
  1974年   3125篇
  1973年   3188篇
  1972年   2648篇
  1971年   2469篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
61.
Mobile devices are vulnerable to theft and loss due to their small size and the characteristics of their common usage environment. Since they allow users to work while away from their desk, they are most useful in public locations and while traveling. Unfortunately, this is also where they are most at risk. Existing schemes for securing data either do not protect the device after it is stolen or require bothersome reauthentication. Transient Authentication lifts the burden of authentication from the user by use of a wearable token that constantly attests to the user's presence. When the user departs, the token and device lose contact and the device secures itself. We show how to leverage this authentication framework to secure all the memory and storage locations on a device into which secrets may creep. Our evaluation shows this is done without inconveniencing the user, while imposing a minimal performance overhead  相似文献   
62.
Starting from a microscopic Hamiltonian defined on a semi-infinite cubic lattice, and employing a mean-field approximation, the surface parameters relevant for wetting in confined ternary mixtures are derived. These are found in terms of the microscopic coupling constants, and yield a physical interpretation of their origins. In comparison with the standard expression for the surface free-energy density, several new terms arising from the derivation are identified. The influence of the surface parameters on a predicted unbinding transition in a mixture of oil, water, and amphiphile demonstrate that existing results are robust to the addition of the extra surface terms.  相似文献   
63.
64.
We have developed a narrow-band controller in the MHz range, based on a field-programmable gate array. It is used to control the probe beam intensity in frequency-modulated spectroscopy experiments with an acoustooptic modulator. The residual amplitude modulation at the modulation frequency (2.5 MHz) is reduced by 50 dB. The first-harmonic detection of the signals is operated in saturation spectroscopy of I/sub 2/ at 514.5 nm and 501.7 nm. A reduction of the background noise and a large increase in the signal-to-noise ratio are obtained.  相似文献   
65.
66.
We introduce dispersion-relation-preserving (DRP) algorithms to minimize the numerical dispersion error in large-scale three-dimensional (3D) finite-difference time-domain (FDTD) simulations. The dispersion error is first expanded in spherical harmonics in terms of the propagation angle and the leading order terms of the series are made equal to zero. Frequency-dependent FDTD coefficients are then obtained and subsequently expanded in a polynomial (Taylor) series in the frequency variable. An inverse Fourier transformation is used to allow for the incorporation of the new coefficients into the FDTD updates. Butterworth or Chebyshev filters are subsequently employed to fine-tune the FDTD coefficients for a given narrowband or broadband range of frequencies of interest. Numerical results are used to compare the proposed 3D DRP-FDTD schemes against traditional high-order FDTD schemes.  相似文献   
67.
68.
The main objective of this present study was to evaluate, for a standard mortar, the drying effect on its mechanical behaviour. Numerous uniaxial compression tests were thus performed with loading-unloading cycles. They were carried out on different samples previously preserved under various conditions of conservation: preserved from desiccation, air drying and rapid drying at 60°C. The obtained results showed significant influences of these conditions on the material behaviour (increase in strength, decrease in Young's modulus and Poisson's ratio) and the necessity of taking into account the coupling effects between mechanical—poromechanical behaviours and drying.  相似文献   
69.
High-performance circular probe-fed stacked patch antenna designs are explored through the use of numerical optimization. New trends are sought to aid understanding and to suggest novel solutions. We describe the optimization technique, present a new design trend relating efficiency and bandwidth to the choice of substrate dielectric, and propose and demonstrate a novel, optimized antenna achieving 33% bandwidth whilst maintaining greater than 80% surface wave efficiency.  相似文献   
70.
Quality of service has become today a major concern for operators of mobile communication networks. The massive development of networks and strong competition between operators has lead to the necessary and daily follow-up of network quality of service, a key factor for its subscriber’s fidelity. This article aims at presenting the optimization methodology and proposes its illustration with a case of RNO (Radio Network Optimisation) software usage, one of the Alcatel optimization toolchain component. After a short presentation of cellular network, the optimization basic principles are described. RNO software and its main functionnalities are then detailed before a last part dedicated to a real case of optimization done with RNO software.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号