首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6415篇
  免费   327篇
  国内免费   20篇
电工技术   77篇
综合类   10篇
化学工业   1179篇
金属工艺   237篇
机械仪表   319篇
建筑科学   122篇
矿业工程   1篇
能源动力   269篇
轻工业   511篇
水利工程   24篇
石油天然气   12篇
无线电   1351篇
一般工业技术   1272篇
冶金工业   501篇
原子能技术   87篇
自动化技术   790篇
  2024年   6篇
  2023年   70篇
  2022年   103篇
  2021年   161篇
  2020年   94篇
  2019年   130篇
  2018年   172篇
  2017年   153篇
  2016年   199篇
  2015年   162篇
  2014年   243篇
  2013年   457篇
  2012年   384篇
  2011年   484篇
  2010年   328篇
  2009年   381篇
  2008年   327篇
  2007年   278篇
  2006年   230篇
  2005年   239篇
  2004年   169篇
  2003年   181篇
  2002年   168篇
  2001年   130篇
  2000年   130篇
  1999年   115篇
  1998年   244篇
  1997年   134篇
  1996年   133篇
  1995年   118篇
  1994年   80篇
  1993年   88篇
  1992年   58篇
  1991年   54篇
  1990年   46篇
  1989年   43篇
  1988年   31篇
  1987年   31篇
  1986年   23篇
  1985年   21篇
  1984年   23篇
  1983年   19篇
  1982年   22篇
  1981年   13篇
  1980年   17篇
  1979年   6篇
  1978年   6篇
  1977年   8篇
  1976年   13篇
  1975年   9篇
排序方式: 共有6762条查询结果,搜索用时 15 毫秒
41.
I. Antonopoulou and S. Papastavridis (1987) published an algorithm for computing the reliability of a circular consecutive-k-out-of-n:F system which claimed O (kn) time. J.S. Wu and R.J. Chen (1993) correctly pointed out that the algorithm achieved only O(kn2) time. The present study shows that the algorithm can be implemented for O(kn) time  相似文献   
42.
A device level transconductance spectroscopy approach is developed for characterizing surface states in metal-semiconductor field-effect transistors. A comparison of the theoretical results and the available experimental observations shows that the model can successfully explain both the surface leakage current dependence of transconductance dispersion magnitude reported by M. Ozeki et al. (1982) and the temperature dependence of transconductance dispersion observed by S.R. Blight et al. (1986)  相似文献   
43.
This study examined the effects of multitasking on persuasion, including comprehension and counterarguing of persuasive messages, which were presented in three different contexts: (a) nonmultitasking with full attention paid to the message, (b) multitasking with primary attention paid to the message, and (c) multitasking with secondary attention paid to the message. Consistent with predictions, the results suggested that multitasking reduced the actual and perceived levels of comprehension and also reduced counterarguing. The implications for research on persuasion are further discussed.  相似文献   
44.
We report on the first successful growth of the quaternary alloy Cd1−yZnySexTe1−x(211) on 3-in. Si(211) substrates using molecular beam epitaxy (MBE). The growth of CdZnSeTe was performed using a compound CdTe effusion source, a compound ZnTe source, and an elemental Se effusion source. The alloy compositions (x and y) of the Cd1−yZnySexTe1−x quaternary compound were controlled through the Se/CdTe and ZnTe/CdTe flux ratios, respectively. Our results indicated that the surface morphology of CdZnSeTe improves as the Zn concentration decreases, which fits well with our previous observation that the surface morphology of CdZnTe/Si is poorer than that of CdSeTe/Si. Although the x-ray full-width at half-maximums (FWHMs) of CdZnSeTe/Si with 4% of Zn + Se remain relatively constant regardless of the individual Zn and Se concentrations, etched-pit density (EPD) measurements exhibit a higher dislocation count on CdZnSeTe/Si layers with about 2% Zn and Se incorporated. The enhancement of threading dislocations in these alloys might be due to an alloy disorder effect between ZnSe and CdTe phases. Our results indicate that the CdZnSeTe/Si quaternary material with low Zn or low Se concentration (less than 1.5%) while maintaining 4% total Zn + Se concentration can be used as lattice-matching composite substrates for long-wavelength infrared (LWIR) HgCdTe as an alternative for CdZnTe/Si or CdSeTe/Si.  相似文献   
45.
We propose two improved scalar multiplication methods on elliptic curves over Fqn where q = 2m using Frobenius expansion. The scalar multiplication of elliptic curves defined over subfield Fq can be sped up by Frobenius expansion. Previous methods are restricted to the case of a small m. However, when m is small, it is hard to find curves having good cryptographic properties. Our methods are suitable for curves defined over medium‐sized fields, that is, 10 ≤ m ≤ 20. These methods are variants of the conventional multiple‐base binary (MBB) method combined with the window method. One of our methods is for a polynomial basis representation with software implementation, and the other is for a normal basis representation with hardware implementation. Our software experiment shows that it is about 10% faster than the MBB method, which also uses Frobenius expansion, and about 20% faster than the Montgomery method, which is the fastest general method in polynomial basis implementation.  相似文献   
46.
Two integrated stereo fully differential filterless class-D amplifiers are presented in this paper. The object is to develop a modulation of a class-D audio amplifier with high power efficiency in this paper. The traditional H-bridge class-D audio amplifier has a shortcoming of large signal distortion which is worse than realized. However, the proposed circuit improves the drawback and provides high power efficiency at the same time. The circuit implements a modified scheme of pulse-width modulation. In this paper, we presented two class-D amplifiers, compared their differences and explained why the efficiency and distortion performance can be modified. The increase in total harmonic distortion (THD) is due to non-linearity in the triangle wave. To overcome this problem, a negative feedback from the output of the switching power stage is adopted to reduce the THD. When a 0.7-VPP and 1 kHz sine wave is used as an input signal, the minimum THD is 0.029 % and the maximum power efficiency is 83 %. The fully differential class-D audio amplifier is implemented with a TSMC 0.35-μm 2P4M CMOS process, and the chip area is 2.57 × 2.57 mm2 (with PADs).  相似文献   
47.
Optical networks with DWDM (Dense Wavelength Division Multiplex) can provide multiple data channels to supply high speed, high capacity to perform bandwidth-intensive multicast transmission service. Light-tree is a popular technique applied to support point-to-multipoint multicast services. Any failure during a multicast session would cause severe service loss or disruptions, especially when the faults occur near the source node. A novel ring-based local fault recovery mechanism, Multiple Ring-based Local Restoration (MRLR), for point-to-multipoint multicast traffic based on the minimum spanning tree (MST) in WDM mesh networks is proposed in this article. The MRLR mechanism dismembers the multicast tree into several disjoint segment-blocks (sub-trees) and reserves preplanned spare capacity to set up multiple protection rings in each segment-block for providing rapid local recovery. The MRLR scheme outperforms other methodologies in terms of the blocking probability, recovery time, and average hop count of protection path per session for different network topologies.  相似文献   
48.
Modern network systems have much trouble in security vulnerabilities such as buffer overflow, bugs in Microsoft Internet, sensor network routing protocol too simple, security flaws of applications, and operating systems. Moreover, wireless devices such as smart phones, personal digital assistants (PDAs), and sensors have become economically feasible because of technological advances in wireless communication and manufacturing of small and low-cost sensors. There are typologies of vulnerabilities to be exploited in these devices. In order to improve securities, many mechanisms are adopted, including authentication, cryptography, access control, and intrusion detection systems (IDS). In general, intrusion detection techniques can be categorized into two groups: misuse detection and anomaly detection. The misuse detection systems use patterns of weB-known attacks or weak spots of the systems to identify intrusions. The weakness of misuse detection systems is unable to detect any future (unknown) intrusion until corresponding attack signatures are intruded into the signature database. Anomaly detection methods try to determine whether the deviation is from the established normal usage patterns or not. The critical success of anomaly detection relies on the model of normal behaviors.  相似文献   
49.
We propose a multi‐strategic concept‐spotting approach for robust spoken language understanding of conversational Korean in a hostile recognition environment such as in‐car navigation and telebanking services. Our concept‐spotting method adopts a partial semantic understanding strategy within a given specific domain since the method tries to directly extract pre‐defined meaning representation slot values from spoken language inputs. In spite of partial understanding, we can efficiently acquire the necessary information to compose interesting applications because the meaning representation slots are properly designed for specific domain‐oriented understanding tasks. We also propose a multi‐strategic method based on this concept‐spotting approach such as a voting method. We present experiments conducted to verify the feasibility of these methods using a variety of spoken Korean data.  相似文献   
50.
An authenticated multiple-key agreement protocol is proposed. The protocol is not only secure against the unknown-key attack but also more efficient than other protocols.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号