首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   765238篇
  免费   11052篇
  国内免费   2765篇
电工技术   14527篇
技术理论   5篇
综合类   1726篇
化学工业   123380篇
金属工艺   30831篇
机械仪表   23988篇
建筑科学   18296篇
矿业工程   5439篇
能源动力   19081篇
轻工业   67817篇
水利工程   8956篇
石油天然气   18152篇
武器工业   280篇
无线电   80067篇
一般工业技术   151219篇
冶金工业   132657篇
原子能技术   17621篇
自动化技术   65013篇
  2021年   8140篇
  2020年   5844篇
  2019年   7314篇
  2018年   12206篇
  2017年   12297篇
  2016年   13025篇
  2015年   8846篇
  2014年   14171篇
  2013年   36123篇
  2012年   22490篇
  2011年   29526篇
  2010年   23704篇
  2009年   25801篇
  2008年   26468篇
  2007年   26223篇
  2006年   22872篇
  2005年   20345篇
  2004年   18891篇
  2003年   18343篇
  2002年   17760篇
  2001年   17287篇
  2000年   16450篇
  1999年   16260篇
  1998年   37916篇
  1997年   27469篇
  1996年   21265篇
  1995年   16138篇
  1994年   14693篇
  1993年   14252篇
  1992年   11060篇
  1991年   10649篇
  1990年   10548篇
  1989年   10338篇
  1988年   9795篇
  1987年   8795篇
  1986年   8601篇
  1985年   9725篇
  1984年   8994篇
  1983年   8501篇
  1982年   7643篇
  1981年   7905篇
  1980年   7415篇
  1979年   7622篇
  1978年   7456篇
  1977年   8175篇
  1976年   10405篇
  1975年   6743篇
  1974年   6431篇
  1973年   6510篇
  1972年   5513篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
81.
Self-organized public-key management for mobile ad hoc networks   总被引:6,自引:0,他引:6  
In contrast with conventional networks, mobile ad hoc networks usually do not provide online access to trusted authorities or to centralized servers, and they exhibit frequent partitioning due to link and node failures and to node mobility. For these reasons, traditional security solutions that require online trusted authorities or certificate repositories are not well-suited for securing ad hoc networks. We propose a fully self-organized public-key management system that allows users to generate their public-private key pairs, to issue certificates, and to perform authentication regardless of the network partitions and without any centralized services. Furthermore, our approach does not require any trusted authority, not even in the system initialization phase.  相似文献   
82.
83.
A series of small–capacity units has recently been constructed in regions of oil field development and crude oil and gas condensate production to satisfy the requirements for such petroleum products as naphtha, diesel fuel, kerosene, and boiler fuel and to reduce costs for delivery of these products. There are almost no data in the technical literature, particularly in periodicals, on the construction and operation of small–capacity units. We attempt to generalize the experience of Orgeneftekhimzavody Trust in this area. We hope that this experience will be useful to specialists in the development and management of small–capacity plants.  相似文献   
84.
The interference issues related to ultrawideband (UWB) radio pose tight restrictions on the maximum data rate of UWB radio telecommunication systems. A possible solution is to reduce the required signal to interference ratio (SIR) that gives satisfactory performance to the UWB system. In this letter, we propose coded M-ary UWB radio communication systems. Two classes of convolutional codes, namely, low-rate superorthogonal codes and high-rate punctured codes are considered for this purpose. Simulation results on the bit error rate of the proposed system indicates that the system is capable to work in lower SIR's and therefore supports higher data transmission rates in a real interference environment compared to the previously proposed UWB communication systems.  相似文献   
85.
Reducible rank codes and their applications to cryptography   总被引:2,自引:0,他引:2  
We present a new family of so-called reducible rank codes which are a generalization of rank product codes . This family includes maximal rank distance (MRD) codes for lengths n>N in the field F/sub N/. We give methods for encoding and decoding reducible rank codes. A public key cryptosystem based on these codes and on the idea of a column scrambler is proposed. The column scrambler "mixes" columns of a generator (parity-check) matrix of a code. It makes the system more resistant to structural attacks such as Gibson's attacks. Possible attacks on the system are thoroughly studied. The system is found to be secure against known attacks for public keys of about 16 kbits and greater.  相似文献   
86.
This paper presents a method to obtain an electric model for transformers and inductors, including both frequency and geometry effects in the windings, which can be linked with existing core models. One-dimensional distributions for magnetic and electric fields are assumed, and from Maxwell's equations an equivalent electric circuit is easily obtained. This equivalent circuit has been included in analog simulators (Spice, AnalogWorkBench, Saber ...), and comparisons between measured and simulated results are shown, both in time domain and in AC sweep, which verify the model accuracy. The model described in this paper allows designers to deal with key issues in the design of high-frequency magnetic components (copper losses, leakage inductance, skin and proximity effects) by using analog simulators, which are usually more familiar to them than finite-element analysis tools.  相似文献   
87.
88.
This study examined reciprocal relationships between collective efficacy and team performance over a season of competition in women's intercollegiate ice hockey within weekends where the opponent was constant for 2 games. Collective efficacy beliefs within 12 teams were assessed prior to both games for at least 7 weekends. Team performance indexes produced an overall measure of performance for each game. The average influence of Saturday collective efficacy on Saturday performance was moderate and positive after controlling for Friday performance. The average influence of Friday performance on Saturday collective efficacy was small and positive after removing the influence of Friday collective efficacy from Friday performance. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
89.
The authors examined heterogeneity in symptom trajectories among youths following psychiatric crises as well as the psychosocial correlates and placement outcomes associated with identified trajectories. Using semiparametric mixture modeling with 156 youths approved for psychiatric hospitalization, the authors identified 5 trajectories based on symptoms over the 16 months following crisis: high improved, high unimproved, borderline improved, borderline unimproved, and subclinical. Membership in unimproved symptom groups was associated with less suicidality, younger age, more youth hopelessness, and more caregiver empowerment. Improved symptom group membership predicted long-term decreases in days in out-of-home placements. More important, and in contrast with general impressions from the existing literature, findings suggest that a substantive proportion of youths with serious emotional disturbance sustain high levels of symptomatology following intensive mental health services. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
90.
In this paper, we describe a method for increasing the external efficiency of polymer light‐emitting diodes (LEDs) by coupling out waveguided light with Bragg gratings. We numerically model the waveguide modes in a typical LED structure and demonstrate how optimizing layer thicknesses and reducing waveguide absorption can enhance the grating outcoupling. The gratings were created by a soft‐lithography technique that minimizes changes to the conventional LED structure. Using one‐dimensional and two‐dimensional gratings, we were able to increase the forward‐directed emission by 47 % and 70 %, respectively, and the external quantum efficiency by 15 % and 25 %.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号