全文获取类型
收费全文 | 2236篇 |
免费 | 80篇 |
国内免费 | 13篇 |
专业分类
电工技术 | 29篇 |
综合类 | 4篇 |
化学工业 | 473篇 |
金属工艺 | 72篇 |
机械仪表 | 40篇 |
建筑科学 | 31篇 |
矿业工程 | 6篇 |
能源动力 | 63篇 |
轻工业 | 79篇 |
水利工程 | 5篇 |
石油天然气 | 5篇 |
无线电 | 327篇 |
一般工业技术 | 571篇 |
冶金工业 | 253篇 |
原子能技术 | 19篇 |
自动化技术 | 352篇 |
出版年
2023年 | 28篇 |
2022年 | 41篇 |
2021年 | 63篇 |
2020年 | 51篇 |
2019年 | 60篇 |
2018年 | 75篇 |
2017年 | 78篇 |
2016年 | 87篇 |
2015年 | 57篇 |
2014年 | 71篇 |
2013年 | 140篇 |
2012年 | 86篇 |
2011年 | 112篇 |
2010年 | 89篇 |
2009年 | 105篇 |
2008年 | 91篇 |
2007年 | 79篇 |
2006年 | 59篇 |
2005年 | 40篇 |
2004年 | 47篇 |
2003年 | 57篇 |
2002年 | 53篇 |
2001年 | 37篇 |
2000年 | 35篇 |
1999年 | 37篇 |
1998年 | 58篇 |
1997年 | 33篇 |
1996年 | 51篇 |
1995年 | 35篇 |
1994年 | 44篇 |
1993年 | 33篇 |
1992年 | 26篇 |
1991年 | 22篇 |
1990年 | 23篇 |
1989年 | 17篇 |
1988年 | 25篇 |
1987年 | 23篇 |
1986年 | 24篇 |
1985年 | 28篇 |
1984年 | 27篇 |
1983年 | 22篇 |
1982年 | 13篇 |
1981年 | 19篇 |
1980年 | 15篇 |
1979年 | 14篇 |
1978年 | 17篇 |
1977年 | 20篇 |
1976年 | 10篇 |
1973年 | 7篇 |
1972年 | 7篇 |
排序方式: 共有2329条查询结果,搜索用时 14 毫秒
31.
Thin films of PbSe having both nano- and microstructures have been deposited on transparent conducting oxide (TCO)-coated glass substrates electrochemically, from an aqueous solution of Pb(OAc)2, ethylenediamine tetraacetic acid (EDTA), and SeO2. A Pb strip acted as the sacrificial anode, while the TCO glass was the cathode. No external bias was applied. The formation of PbSe was pH sensitive, and pH ~3 was found to be optimum for film deposition. Films grown at room temperature (25°C) were nanocrystalline (~25 nm), while those deposited at 80°C were microcrystalline (~150 nm). Films were characterized by x-ray diffraction studies, field-emission scanning electron microscope image analysis, infrared spectral analysis, and by both alternating-current (a.c.) and direct-current (d.c.) electrical measurements. A blue-shift was observed for the nanocrystalline films. Film resistivity and junction properties were obtained from electrical measurements. 相似文献
32.
Fair queueing with service envelopes (FQSE): a cousin-fair hierarchical scheduler for subscriber access networks 总被引:2,自引:0,他引:2
Kramer G. Banerjee A. Singhal N.K. Mukherjee B. Sudhir Dixit Yinghua Ye 《Selected Areas in Communications, IEEE Journal on》2004,22(8):1497-1513
In this paper, we propose and investigate the characteristics of a fair queueing with service envelopes (FQSE) algorithm-a hierarchical fair-share scheduling algorithm for access networks based on a remote scheduling system such as Ethernet passive optical networks (EPON) or cable TV network. FQSE is designed to overcome the limiting factors of a typical remote scheduling system such as large control-plane delay, limited control-plane bandwidth, and significant queue switch-over overhead. The algorithm is based on a concept of service envelope-a function representing the fair allocation of resources based on a global network condition called satisfiability parameter (SP). We define properties of cousin-fairness and sibling-fairness and show the FQSE to be cousin-fair. FQSE is unique in that it is the only hierarchical algorithm that is simultaneously cousin-fair. Furthermore, we show the necessary techniques to adapt FQSE to variable-sized packet-based networks. We analyze FQSE performance in EPON serving 1024 independent queues and demonstrate FQSE's ability to provide guaranteed bandwidth to each queue and to share the excess bandwidth fairly. 相似文献
33.
Survivable WDM mesh networks 总被引:9,自引:0,他引:9
In a wavelength-division-multiplexing (WDM) optical network, the failure of network elements (e.g., fiber links and cross connects) may cause the failure of several optical channels, thereby leading to large data losses. This study examines different approaches to protect a mesh-based WDM optical network from such failures. These approaches are based on two survivability paradigms: 1) path protection/restoration and 2) link protection/restoration. The study examines the wavelength capacity requirements, and routing and wavelength assignment of primary and backup paths for path and link protection and proposes distributed protocols for path and link restoration. The study also examines the protection-switching time and the restoration time for each of these schemes, and the susceptibility of these schemes to multiple link failures. The numerical results obtained for a representative network topology with random traffic demands demonstrate that there is a tradeoff between the capacity utilization and the susceptibility to multiple link failures. We find that, on one hand, path protection provides significant capacity savings over link protection, and shared protection provides significant savings over dedicated protection; while on the other hand, path protection is more susceptible to multiple link failures than link protection, and shared protection is more susceptible to multiple link failures than dedicated protection. We formulate a model of protection-switching times for the different protection schemes based on a fully distributed control network. We propose distributed control protocols for path and link restoration. Numerical results obtained by simulating these protocols indicate that, for a representative network topology, path restoration has a better restoration efficiency than link restoration, and link restoration has a faster restoration time compared with path restoration. 相似文献
34.
WDM optical communication networks: progress and challenges 总被引:25,自引:0,他引:25
While optical-transmission techniques have been researched for quite some time, optical "networking" studies have been conducted only over the past dozen years or so. The field has matured enormously over this time: many papers and Ph.D. dissertations have been produced, a number of prototypes and testbeds have been built, several books have been written, a large number of startups have been formed, and optical WDM technology is being deployed in the marketplace at a very rapid rate. The objective of this paper is to summarize the basic optical networking approaches, report on the WDM deployment strategies of two major US carriers, and outline the current research and development trends on WDM optical networks. 相似文献
35.
We present a graph-theoretic interpretation of convergence of fractal encoding based on partial iterated function system (PIFS). First we have considered a special circumstance, where no spatial contraction has been allowed in the encoding process. The concept leads to the development of a linear time fast decoding algorithm from the compressed image. This concept is extended for the general scheme of fractal compression allowing spatial contraction (on averaging) from larger domains to smaller ranges. A linear time fast decoding algorithm is also proposed in this situation, which produces a decoded image very close to the result obtained by an ordinary iterative decompression algorithm. 相似文献
36.
Ivan Damgård Sebastian Faust Pratyay Mukherjee Daniele Venturi 《Journal of Cryptology》2017,30(1):152-190
Related key attacks (RKAs) are powerful cryptanalytic attacks where an adversary can change the secret key and observe the effect of such changes at the output. The state of the art in RKA security protects against an a-priori unbounded number of certain algebraic induced key relations, e.g., affine functions or polynomials of bounded degree. In this work, we show that it is possible to go beyond the algebraic barrier and achieve security against arbitrary key relations, by restricting the number of tampering queries the adversary is allowed to ask for. The latter restriction is necessary in case of arbitrary key relations, as otherwise a generic attack of Gennaro et al. (TCC 2004) shows how to recover the key of almost any cryptographic primitive. We describe our contributions in more detail below. (1) We show that standard ID and signature schemes constructed from a large class of \(\Sigma \)-protocols (including the Okamoto scheme, for instance) are secure even if the adversary can arbitrarily tamper with the prover’s state a bounded number of times and obtain some bounded amount of leakage. Interestingly, for the Okamoto scheme we can allow also independent tampering with the public parameters. (2) We show a bounded tamper and leakage resilient CCA-secure public key cryptosystem based on the DDH assumption. We first define a weaker CCA-like security notion that we can instantiate based on DDH, and then we give a general compiler that yields CCA security with tamper and leakage resilience. This requires a public tamper-proof common reference string. (3) Finally, we explain how to boost bounded tampering and leakage resilience [as in (1) and (2) above] to continuous tampering and leakage resilience, in the so-called floppy model where each user has a personal hardware token (containing leak- and tamper-free information) which can be used to refresh the secret key. We believe that bounded tampering is a meaningful and interesting alternative to avoid known impossibility results and can provide important insights into the security of existing standard cryptographic schemes. 相似文献
37.
In this paper we give sharp bounds on the reliability of discrete IFR, IFRA, NBU, DFR, DFRA and NWU classes, based on one known moment. Subsequently the discrete analogues of several continuous-time results related to maintained systems are also presented. 相似文献
38.
Fabrication of microrods from multi-quantum well (MQW) PbSe–PbSrSe structure grown in molecular beam epitaxy (MBE) followed by its morphological as well as optical characterizations are described. Pulsed PL intensity is increased by 64 times per unit surface area from a free-standing MQW microrod mounted on copper heat sink compared with the bulk sample. Enhancement in side emission power due to the higher optical confinement effect during pulsed photoluminescence (PL) from MQW semiconductor microtube inserted in hollow quartz optical fiber signifies that these microstructures are robust in nature and crucial contenders for portable mid-infrared optoelectronic devices to be used in the field of industrial trace-gas sensing. 相似文献
39.
Suman Mukherjee John Federici Paulo Lopes Miguel Cabral 《Journal of Infrared, Millimeter and Terahertz Waves》2013,34(9):539-555
For the past few decades there has been tremendous innovation and development of Terahertz (THz) science and imaging. In particular, the technique of 3-D computed tomography has been adapted from the X-Ray to the THz range. However, the finite refractive index of materials in the THz range can severally refract probing THz beams during the acquisition of tomography data. Due to Fresnel reflection power losses at the boundaries as well as steering of the THz beam through the sample, refractive effects lead to anomalously high local attenuation coefficients near the material boundaries of a reconstructed image. These boundary phenomena can dominate the reconstructed THz-CT images making it difficult to distinguish structural defect(s) inside the material. In this paper an algorithm has been developed to remove the effects of refraction in THz-CT reconstructed images. The algorithm is successfully implemented on cylindrical shaped objects. 相似文献
40.
In this paper, a fast yet accurate CMOS analog circuit sizing method, referred to as Iterative Sequential Geometric Programming (ISGP), has been proposed. In this methodology, a correction factor has been introduced for each parameter of the geometric programming (GP) compatible device and performance model. These correction factors are updated using a SPICE simulation after every iteration of a sequential geometric programming (SGP) optimization. The proposed methodology takes advantage of SGP based optimization, namely, fast convergence and effectively optimum design and at the same time it uses SPICE simulation to fine tune the design point by rectifying inaccuracy that may exists in the GP compatible device and performance models. In addition, the ISGP considers the requirement of common centroid layout and yield aware design centering for robust final design point specifying the number of fingers and finger widths for each transistor which makes the design point ready for layout. 相似文献