首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   10285篇
  免费   341篇
  国内免费   109篇
电工技术   236篇
综合类   193篇
化学工业   1984篇
金属工艺   381篇
机械仪表   374篇
建筑科学   366篇
矿业工程   104篇
能源动力   407篇
轻工业   645篇
水利工程   123篇
石油天然气   157篇
武器工业   16篇
无线电   1135篇
一般工业技术   2331篇
冶金工业   1163篇
原子能技术   113篇
自动化技术   1007篇
  2023年   101篇
  2022年   197篇
  2021年   250篇
  2020年   203篇
  2019年   164篇
  2018年   269篇
  2017年   226篇
  2016年   233篇
  2015年   218篇
  2014年   296篇
  2013年   632篇
  2012年   415篇
  2011年   488篇
  2010年   418篇
  2009年   399篇
  2008年   381篇
  2007年   360篇
  2006年   327篇
  2005年   277篇
  2004年   248篇
  2003年   226篇
  2002年   210篇
  2001年   175篇
  2000年   223篇
  1999年   232篇
  1998年   309篇
  1997年   269篇
  1996年   246篇
  1995年   199篇
  1994年   187篇
  1993年   178篇
  1992年   154篇
  1991年   155篇
  1990年   104篇
  1989年   112篇
  1988年   113篇
  1987年   114篇
  1986年   92篇
  1985年   132篇
  1984年   128篇
  1983年   138篇
  1982年   101篇
  1981年   97篇
  1980年   88篇
  1979年   94篇
  1978年   76篇
  1977年   67篇
  1976年   76篇
  1975年   59篇
  1974年   54篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
31.
The computation of a six-dimensional density matrix is the crucial step for the evaluation of kinetic energy in electronic structure calculations. For molecules with heavy nuclei, one has to consider a very refined mesh in order to deal with the nuclear cusps. This leads to high computational time and needs huge memory for the computation of the density matrix. To reduce the computational complexity and avoid discretization errors in the approximation, we use mesh-free canonical tensor products in electronic structure calculations. In this paper, we approximate the six-dimensional density matrix in an efficient way and then compute the kinetic energy. Accuracy is examined by comparing our computed kinetic energy with the exact computation of the kinetic energy.  相似文献   
32.
33.
34.
视频在无线传感器网络传输,由于网络的不稳定,可能使视频质量受到一定的影响。在人类视觉模型的基础上,提出一个改进的无参考质量评估算法,直接通过收到的图像,判断视频质量的好坏。较之当前广泛使用的视频评估算法一媒体延迟指标而言,大大提高在网络丢包时,对于视频质量评估的准确性。评估结果接近人眼观察的效果,并且可以大规模投入使用,具有较强现实意义和商业使用价值。  相似文献   
35.
36.
37.
Journal of Electronic Testing - Error-Tolerant applications regularly accomplish more data adaption. Approximate computing is one of the optimum strategies for data manipulation in several...  相似文献   
38.
Developing light weight polymer based composites dispersed with novel reinforcements which can function well in the presence of aggressive environments is an active research field in the materials engineering. Hence, in the current work, halloysite nanotubes (1 %, 2 %, 4 %, 6 %, 8 % and 10 % by weight) were reinforced into acrylonitrile butadiene styrene/polycarbonate blend and the role of reinforcing phases on the mechanical performance under aggressive environmental conditions has been evaluated. Hardness was measured as gradually increased in the composites with the increased content of the reinforcements. Impact strength of the composites was observed as increased in the composites up to 4 % reinforcement and further decreased. Increased strength was measured for the composite up to 2 % reinforcement. Ductility of the composites was decreased as reflected form the decreased % of elongation with the higher fraction of reinforcements due to induced brittleness. The composites were exposed to diluted sulfuric acid for 3 h and 6 h at 60 °C and then subjected to tensile loading. With the increased time of exposure, composites with 1 % and 2 % reinforcement exhibited relatively better performance.  相似文献   
39.
Defense frontier analysis of quantum cryptographic systems   总被引:1,自引:0,他引:1  
Slutsky B  Rao R  Sun PC  Tancevski L  Fainman S 《Applied optics》1998,37(14):2869-2878
When a quantum cryptographic system operates in the presence of background noise, security of the key can be recovered by a procedure called key distillation. A key-distillation scheme effective against so-called individual (bitwise-independent) eavesdropping attacks involves sacrifice of some of the data through privacy amplification. We derive the amount of data sacrifice sufficient to defend against individual eavesdropping attacks in both BB84 and B92 protocols and show in what sense the communication becomes secure as a result. We also compare the secrecy capacity of various quantum cryptosystems, taking into account data sacrifice during key distillation, and conclude that the BB84 protocol may offer better performance characteristics than the B92.  相似文献   
40.
Critical current densities of the superconducting Y-Ba-Cu-O (YBCO) films have been observed to decrease with the increase of power of microwave radiation. Presence of Josephson type of junctions in the microbridges has been established from the microwave irradiation and magnetic field studies. BCS energy gap parameter (2/kT c ) has been calculated from thedI/dV characteristics and found to be 3.7 at 13 K.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号