全文获取类型
收费全文 | 2842篇 |
免费 | 150篇 |
国内免费 | 8篇 |
专业分类
电工技术 | 37篇 |
综合类 | 4篇 |
化学工业 | 564篇 |
金属工艺 | 49篇 |
机械仪表 | 98篇 |
建筑科学 | 145篇 |
矿业工程 | 4篇 |
能源动力 | 277篇 |
轻工业 | 409篇 |
水利工程 | 21篇 |
石油天然气 | 9篇 |
无线电 | 227篇 |
一般工业技术 | 556篇 |
冶金工业 | 98篇 |
原子能技术 | 15篇 |
自动化技术 | 487篇 |
出版年
2024年 | 9篇 |
2023年 | 31篇 |
2022年 | 64篇 |
2021年 | 115篇 |
2020年 | 100篇 |
2019年 | 103篇 |
2018年 | 126篇 |
2017年 | 118篇 |
2016年 | 155篇 |
2015年 | 94篇 |
2014年 | 131篇 |
2013年 | 287篇 |
2012年 | 182篇 |
2011年 | 229篇 |
2010年 | 164篇 |
2009年 | 215篇 |
2008年 | 185篇 |
2007年 | 154篇 |
2006年 | 103篇 |
2005年 | 74篇 |
2004年 | 74篇 |
2003年 | 53篇 |
2002年 | 51篇 |
2001年 | 20篇 |
2000年 | 17篇 |
1999年 | 29篇 |
1998年 | 25篇 |
1997年 | 14篇 |
1996年 | 21篇 |
1995年 | 6篇 |
1994年 | 3篇 |
1993年 | 4篇 |
1992年 | 5篇 |
1991年 | 8篇 |
1990年 | 3篇 |
1989年 | 2篇 |
1988年 | 5篇 |
1987年 | 4篇 |
1986年 | 4篇 |
1985年 | 2篇 |
1984年 | 4篇 |
1982年 | 1篇 |
1981年 | 1篇 |
1977年 | 1篇 |
1976年 | 1篇 |
1974年 | 1篇 |
1972年 | 1篇 |
1970年 | 1篇 |
排序方式: 共有3000条查询结果,搜索用时 15 毫秒
41.
Conjugate heat transfer by mixed convection and conduction in lid-driven enclosures with thick bottom wall has been studied by a numerical method. The enclosure is heated from the bottom wall isothermally. Temperature of the top moving wall, which has constant flow speed, is lower than that of the outside of bottom wall. Vertical walls of the enclosure are adiabatic. Governing parameters are solved for a wide range of Richardson numbers (0.1 ≤ Ri ≤ 10), ratio of height of bottom wall to enclosure height (0.1 ≤ h/H ≤ 0.5) and thermal conductivity ratio (0.01 ≤ λf/λs ≤ 10). Obtained results showed that heat transfer decreases with increasing of λf/λs ratio, Richardson number and thickness ratio of the wall. Flow strength is affected for only higher values of λf/λs ratio. 相似文献
42.
Yasin Varol Hakan F. Oztop Moghtada Mobedi Ioan Pop 《International Journal of Heat and Mass Transfer》2008,51(21-22):5040-5051
Natural convection heat transfer in a porous media filled and non-isothermally heated from the bottom wall of triangular enclosure is analyzed using finite difference technique. Darcy law was used to write equations of porous media. Dimensionless heatfunction was used to visualize the heat transport due to buoyancy forces. Three different boundary conditions were applied for the vertical and inclined boundaries of triangular enclosures as Case I; both vertical and inclined walls were isothermal, Case II; vertical wall was adiabatic and inclined one was isothermal, Case III; vertical wall is isothermal and inclined one is adiabatic. A cosine function was utilized to get non-isothermal wall condition. The study was performed for different aspect ratios (0.25 ? AR ? 1.0) and Darcy-modified Rayleigh numbers (100 ? Ra ? 1000). It was observed that heat transfer enhancement was formed when vertical and inclined walls were isothermal while bottom wall was at non-uniform temperature. Heat transfer from bottom wall did not vary when the value of aspect ratio was higher than 0.50. In addition, heatline visualization technique was a useful technique for non-isothermally heated and porous media filled triangular enclosures. 相似文献
43.
Serdar Menekay Rıza Can Tarcan Hakan Kuntman 《Analog Integrated Circuits and Signal Processing》2009,60(3):237-248
In this paper, a method to reduce the second order effects on the circuit performances caused by the small sized MOS transistors
is proposed. A current mode square-root circuit, a squarer/divider circuit and a multiplier/divider circuit are designed using
this method. Proposed circuits have been simulated with SPICE simulator using 0.35 μm CMOS technology parameters. The main
advantages of the proposed circuit are reduced errors of the output current function, a smaller area on the chip, possibility
of controlling the output current with the control voltage, operation at higher frequencies and more efficient power consumption.
As a result, it can be considered as a useful building block for IC designer. 相似文献
44.
45.
Emine Kaya Nurbek Kakenov Hakan Altan Coskun Kocabas Okan Esenturk 《Journal of Infrared, Millimeter and Terahertz Waves》2018,39(5):483-491
Fabrication of terahertz modulators as simple devices with high modulation depth across a broad bandwidth is still very challenging. In this study, four different chemical vapor deposition grown multilayer graphene (MLG) modulators based on MLG/ionic liquid/gold sandwich structures have been investigated. Flexible substrates (PVC and PE) were chosen as host materials, and devices were fabricated with three different thicknesses. The resultant MLG devices can be operated at low voltages between 0 and 3.4 V providing nearly complete modulation between 0.2 and 1.5 THz with low insertion losses. Even with such low gate voltages, the devices have been doped significantly inducing 7–11-fold improvement in their sheet conductivities depending on device thickness. In addition, sheet conductivity has been improved more than three times as the graphene layer number increased from 30 to 100. With the demonstration of promising device performances, the proposed modulators can be potential candidates for applications in terahertz and related optoelectronic technologies. 相似文献
46.
Hakan A. Cirpan Osman N. Ucan 《International Journal of Satellite Communications and Networking》2001,19(2):159-168
In this paper, a blind maximum‐likelihood channel estimation algorithm is developed for quadrature partial response‐trellis coded modulated (QPR‐TCM) signals propagating through a Rician fading environment. A hidden Markov model (HMM) formulation of the problem is introduced and the Baum–Welch parameter estimation algorithm is modified to provide a computationally efficient solution to the resulting optimization problem. Performance analysis of the proposed method is carried out through the evaluation of bit‐error probability upper bound for Rician fading channels. Also, some illustrative simulations are presented. Copyright © 2001 John Wiley & Sons, Ltd. 相似文献
47.
This paper proposed a method, namely resistively loaded lines (RLL), to compensate the effects of the DC bias lines after investigating its effects on several types of antennas for terahertz photomixers. The RLL is formed by placing lumped resistances periodically on the DC bias line in order to cease the leakage current virtually, which cause a significant amount of distortion on the antenna performance. The simulation results of the dipole, folded dipole, log-periodic, and spiral antennas show that RLL almost removes the effects of the bias lines and improves the antenna radiation resistance and radiation pattern notably compared with that of the commonly used bias line types, such as coplanar stripline and photonic bandgap type bias lines. 相似文献
48.
Ümit Ayglü Mehmet E. elebi 《AEUE-International Journal of Electronics and Communications》2004,58(4):268-273
In this paper, 4-state and 8-state space-time trellis codes with full rate, full diversity and high coding gain are proposed for MSK modulation, based on a technique similar to the super-orthogonal space-time trellis code (SOSTTC) design. Since the phase continuity requirement of MSK is the main constraint in space-time MSK code design not all the signal matrices corresponding to the trellis branches are orthogonal. The paper shows that the SOSTTC design technique can be extended to nonorthogonal coding structures. The new space-time MSK codes have frame error performances very close to those of their space-time QPSK counterparts given in [1] 相似文献
49.
Süleyman Karda Serkan elik Muhammed Ali Bingl Mehmet Sabir Kiraz Hüseyin Demirci Albert Levi 《Wireless Communications and Mobile Computing》2015,15(18):2150-2166
This paper examines Vaudenay's privacy model, which is one of the first and most complete privacy models that featured the notion of different privacy classes. We enhance this model by introducing two new generic adversary classes, k‐strong and k‐forward adversaries where the adversary is allowed to corrupt a tag at most k times. Moreover, we introduce an extended privacy definition that also covers all privacy classes of Vaudenay's model. In order to achieve highest privacy level, we study low cost primitives such as physically unclonable functions (PUFs). The common assumption of PUFs is that their physical structure is destroyed once tampered. This is an ideal assumption because the tamper resistance depends on the ability of the attacker and the quality of the PUF circuits. In this paper, we have weakened this assumption by introducing a new definition k‐resistant PUFs. k‐PUFs are tamper resistant against at most k attacks; that is, their physical structure remains still functional and correct until at most kth physical attack. Furthermore, we prove that strong privacy can be achieved without public‐key cryptography using k PUF‐based authentication. We finally prove that our extended proposal achieves both reader authentication and k‐strong privacy. Copyright © 2014 John Wiley & Sons, Ltd. 相似文献
50.
In this paper, a new joint multilevel data encryption and channel coding mechanism is proposed, which is called ??multilevel/advanced encryption standard?Csystematic distance 4?Ccontinuous phase frequency shift keying?? (ML/AES-SD4-CPFSK). In the proposed scheme, we have not only taken advantage of spatial diversity gains but also optimally allocated energy and bandwidth resources among sensor nodes as well as providing high level of security and error protection for cooperative communications in wireless sensor networks. Relay protocols of cooperative communications, such as amplify-and-forward and decode-and-forward with/without adversary nodes, have been studied for 4CPFSK, 8CPFSK, and 16CPFSK of ML/AES-SD4-CPFSK. We have evaluated the error performances of multilevel AES for data encryption, multilevel SD-4 for channel coding, and various CPFSK types for modulation utilizing cooperative communications in wireless sensor networks. According to computer simulation results, significant diversity gain and coding gain have been achieved. As an example, bit error rate (BER) performance of 10?5 value has been obtained at a signal-to-noise ratio (SNR) of ?6?dB for SD-4-CPFSK scheme in a compared related journal paper, whereas in our proposed system, we have reached the same BER value at a SNR of ?23?dB with amplify-and-forward with direct path signal protocol in 16-level AES, two-level SD-4 coded 16CPFSK, and at the same time, we have reached the same BER value at a SNR of ?22?dB with amplify-and-forward without direct path signal protocol in 16-level AES, two-level SD-4 coded 16CPFSK. 相似文献