全文获取类型
收费全文 | 6689篇 |
免费 | 359篇 |
国内免费 | 4篇 |
专业分类
电工技术 | 64篇 |
综合类 | 6篇 |
化学工业 | 1884篇 |
金属工艺 | 122篇 |
机械仪表 | 200篇 |
建筑科学 | 278篇 |
矿业工程 | 15篇 |
能源动力 | 248篇 |
轻工业 | 1197篇 |
水利工程 | 44篇 |
石油天然气 | 30篇 |
无线电 | 381篇 |
一般工业技术 | 1039篇 |
冶金工业 | 355篇 |
原子能技术 | 61篇 |
自动化技术 | 1128篇 |
出版年
2024年 | 17篇 |
2023年 | 58篇 |
2022年 | 313篇 |
2021年 | 339篇 |
2020年 | 169篇 |
2019年 | 189篇 |
2018年 | 232篇 |
2017年 | 249篇 |
2016年 | 274篇 |
2015年 | 185篇 |
2014年 | 269篇 |
2013年 | 505篇 |
2012年 | 468篇 |
2011年 | 510篇 |
2010年 | 364篇 |
2009年 | 372篇 |
2008年 | 354篇 |
2007年 | 300篇 |
2006年 | 276篇 |
2005年 | 217篇 |
2004年 | 164篇 |
2003年 | 151篇 |
2002年 | 117篇 |
2001年 | 97篇 |
2000年 | 80篇 |
1999年 | 73篇 |
1998年 | 123篇 |
1997年 | 73篇 |
1996年 | 73篇 |
1995年 | 71篇 |
1994年 | 42篇 |
1993年 | 45篇 |
1992年 | 24篇 |
1991年 | 28篇 |
1990年 | 13篇 |
1989年 | 17篇 |
1988年 | 21篇 |
1987年 | 10篇 |
1986年 | 16篇 |
1985年 | 15篇 |
1984年 | 16篇 |
1983年 | 11篇 |
1982年 | 22篇 |
1981年 | 15篇 |
1980年 | 14篇 |
1979年 | 12篇 |
1978年 | 9篇 |
1977年 | 7篇 |
1976年 | 13篇 |
1973年 | 4篇 |
排序方式: 共有7052条查询结果,搜索用时 140 毫秒
51.
Silicon Nitride Derived from an Organometallic Polymeric Precursor: Preparation and Characterization 总被引:1,自引:0,他引:1
Wayde R. Schmidt Vijay Sukumar William J. Hurley Jr. Roberto Garcia Robert H. Doremus Leonard V. Interrante Gary M. Renlund 《Journal of the American Ceramic Society》1990,73(8):2412-2418
Partially crystalline Si3 N4 , with nanosized crystals and a specific surface area greater than 200 m2 /g, is obtained by pyrolysis of a commercially available vinylic polysilane in a stream of anhydrous NH3 to 1000°C. This polymer does not contain N initially. Crystallization to high-purity α-Si3 N4 proceeds with additional heating above 1400°C under N2 . The changes in crystallinity, powder morphology, infrared spectra, and elemental compositions, for samples annealed from 1000° to 1600°C under N2 , are consistent with an amorphous-to-crystalline transformation. Although macroscopic consolidation and local densification occur at 1400°C, volatilization and accompanying weight loss limit bulk densification. The effect of temperature on specific surface area is examined and related to the sintering process. These results are applicable to pyrolysis, decomposition, and crystallization studies of ceramics synthesized by polymeric precursor routes. 相似文献
52.
Marco Roberto Cavallari Vinicius Ramos Zanchin Mariana Pojar Antonio Carlos Seabra Marcelo de Assumpção Pereira-da-Silva Fernando Josepetti Fonseca Adnei Melges de Andrade 《Journal of Electronic Materials》2014,43(5):1317-1325
A low-cost patterning of electrodes was investigated looking forward to replacing conventional photolithography for the processing of low-operating voltage polymeric thin-film transistors. Hard silicon, etched by sulfur hexafluoride and oxygen gas mixture, and flexible polydimethylsiloxane imprinting molds were studied through atomic force microscopy (AFM) and field emission gun scanning electron microscopy. The higher the concentration of oxygen in reactive ion etching, the lower the etch rate, sidewall angle, and surface roughness. A concentration around 30 % at 100 mTorr, 65 W and 70 sccm was demonstrated as adequate for submicrometric channels, presenting a reduced etch rate of 176 nm/min. Imprinting with positive photoresist AZ1518 was compared to negative SU-8 2002 by optical microscopy and AFM. Conformal results were obtained only with the last resist by hot embossing at 120 °C and 1 kgf/cm2 for 2 min, followed by a 10 min post-baking at 100 °C. The patterning procedure was applied to define gold source and drain electrodes on oxide-covered substrates to produce bottom-gate bottom-contact transistors. Poly(3-hexylthiophene) (P3HT) devices were processed on high-κ titanium oxynitride (TiO x N y ) deposited by radiofrequency magnetron sputtering over indium tin oxide-covered glass to achieve low-voltage operation. Hole mobility on micrometric imprinted channels may approach amorphous silicon (~0.01 cm2/V s) and, since these devices operated at less than 5 V, they are not only suitable for electronic applications but also as sensors in aqueous media. 相似文献
53.
A Competitive Mean-Squared Error Approach to Beamforming 总被引:1,自引:0,他引:1
We treat the problem of beamforming for signal estimation where the goal is to estimate a signal amplitude from a set of array observations. Conventional beamforming methods typically aim at maximizing the signal-to-interference-plus-noise ratio (SINR). However, this does not guarantee a small mean-squared error (MSE), so that on average the resulting signal estimate can be far from the true signal. Here, we consider strategies that attempt to minimize the MSE between the estimated and unknown signal waveforms. The methods we suggest all maximize the SINR but at the same time are designed to have good MSE performance. Since the MSE depends on the signal power, which is unknown, we develop competitive beamforming approaches that minimize a robust MSE measure. Two design strategies are proposed: minimax MSE and minimax regret. We demonstrate through numerical examples that the suggested minimax beamformers can outperform several existing standard and robust methods, over a wide range of signal-to-noise ratio (SNR) values. Finally, we apply our techniques to subband beamforming and illustrate their advantage in estimating a wideband signal. 相似文献
54.
Artifact removal in magnetoencephalogram background activity with independent component analysis 总被引:2,自引:0,他引:2
Escudero J Hornero R Abásolo D Fernández A López-Coronado M 《IEEE transactions on bio-medical engineering》2007,54(11):1965-1973
The aim of this study was to assess whether independent component analysis (ICA) could be valuable to remove power line noise, cardiac, and ocular artifacts from magnetoencephalogram (MEG) background activity. The MEGs were recorded from 11 subjects with a 148-channel whole-head magnetometer. We used a statistical criterion to estimate the number of independent components. Then, a robust ICA algorithm decomposed the MEG epochs and several methods were applied to detect those artifacts. The whole process had been previously tested on synthetic data. We found that the line noise components could be easily detected by their frequency spectrum. In addition, the ocular artifacts could be identified by their frequency characteristics and scalp topography. Moreover, the cardiac artifact was better recognized by its skewness value than by its kurtosis one. Finally, the MEG signals were compared before and after artifact rejection to evaluate our method. 相似文献
55.
Roberto Caldelli Francesco Filippini Mauro Barni 《Signal Processing: Image Communication》2006,21(10):890-903
A system is presented to jointly achieve image watermarking and compression. The watermark is a fragile one being intended for authentication purposes. The watermarked and compressed images are fully compliant with the JPEG-LS standard, the only price to pay being a slight reduction of compression efficiency and an additional distortion that can be anyway tuned to grant a maximum preset error. Watermark detection is possible both in the compressed and in the pixel domain, thus increasing the flexibility and usability of the system. The system is expressly designed to be used in remote sensing and telemedicine applications, hence we designed it in such a way that the maximum compression and watermarking error can be strictly controlled (near-lossless compression and watermarking). Experimental results show the ability of the system to detect tampering and to limit the peak error between the original and the processed images. 相似文献
56.
Performance Evaluation of a Bluetooth-Based WLAN Adopting a Polling Protocol Under Realistic Channel Conditions 总被引:2,自引:0,他引:2
Pasolini Gianni Chiani Marco Verdone Roberto 《International Journal of Wireless Information Networks》2002,9(2):141-153
Even if Bluetooth has not been specifically designated for WLANs (Wireless Local Area Networks) and the interconnection of computers, the possibility of establishing low-cost wireless connections makes this technology attractive for this kind of context also. In this paper we assess, by means of a simulative approach that takes the complete physical and MAC level aspects into account, the performance of a Bluetooth-based WLAN adopting a roll-call polling protocol under realistic channel conditions, that is, in the presence of the typical impairments of indoor wireless communications (fading, etc); moreover, we propose an analytical formulation to derive the maximum throughput offered by a Bluetooth link and we suggest a call admission control technique based on the previous analytical considerations. 相似文献
57.
Clinical information on tumor growth is often limited to a few determinations of the size of the tumor burden taken at variable time. As a consequence, fitting of growth equations to clinical data is hampered by the small number of available data. On the other hand, characterising the tumor growth kinetics in terms of clinically relevant parameters, such as the doubling time of the tumors, is increasingly required to optimize and personalise treatments. A computational method is presented which can estimate the growth kinetics of tumors from as few as two determinations of its size taken at two successive time points, provided the size at which tumor growth saturates is known. The method is studied by using experimental data obtained in vitro with multicell tumor spheroids and in vivo with tumors grown in mice, and its outputs are compared to those obtained by fitting of experimental data with the Gompertz growth equation. Under certain assumptions and limitations the method provides comparable estimates of the doubling time of tumors with respect to the classical nonlinear fitting approach. The method is then tested against simulated tumor growth trajectories spanning the range of tumor sizes observed in the clinics. The simulations show that a relative classification of tumors on the basis of their growth kinetics can be obtained even if the size at which tumor growth saturates is not known. This result opens the possibility to classify patients bearing fast or slow growing tumors and, hence, to adapt therapeutic regimens under a more rationale basis. 相似文献
58.
Sperandio M Guermandi M Guerrieri R 《IEEE transactions on bio-medical engineering》2012,59(2):383-389
A four-shell head phantom has been built and characterized. Its structure is similar to that of nonhomogeneous concentric shell domains used by numerical solvers that better approximate current distribution than phantoms currently used to validate electrical impedance tomography systems. Each shell represents a head tissue, namely, skin, skull, cerebrospinal fluid, and brain. A novel technique, which employs a volume conductive impermeable film, has been implemented to prevent ion diffusion between different agar regions without affecting current distribution inside the phantom. Comparisons between simulations and phantom measurements performed over four days are given to prove both the adherence to the model in the frequency range between 10 kHz and 1 MHz and its long-term stability. 相似文献
59.
The effects of penetration are included in the formulas for the prediction of the resolution of pinhole collimators through the use of effective diameters. Expressions of the resolution-effective diameter for pinholes with a double-knife-edge (DKE) profile are available in the literature. In this paper the expressions applicable to asymmetric-knife-edge (AKE) profiles, which include the important case of the single-knife-edge (SKE), are presented. Results indicate that the simplest methods that are still accurate in the calculation of DKE effective diameters do not produce in general formulas with similar accuracy for AKE profiles, due to increased susceptibility to penetration. Especially at high energy (365 keV), for the SKE case more advanced formulas are necessary and were, therefore, derived. 相似文献
60.
Multipath routing in ad hoc networks increases the resiliency against security attacks of collaborating malicious nodes, by maximizing the number of nodes that an adversary must compromise in order to take control of the communication. In this paper, we identify several attacks that render multipath routing protocols vulnerable to collaborating malicious nodes. We propose an on-demand multipath routing protocol, the secure multipath routing protocol (SecMR), and we analyze its security properties. Finally, through simulations, we evaluate the performance of the SecMR protocol in comparison with existing secure multipath routing protocols. 相似文献