全文获取类型
收费全文 | 179762篇 |
免费 | 15724篇 |
国内免费 | 8458篇 |
专业分类
电工技术 | 11420篇 |
技术理论 | 13篇 |
综合类 | 11675篇 |
化学工业 | 29386篇 |
金属工艺 | 9939篇 |
机械仪表 | 11326篇 |
建筑科学 | 13823篇 |
矿业工程 | 5441篇 |
能源动力 | 5312篇 |
轻工业 | 12491篇 |
水利工程 | 3276篇 |
石油天然气 | 10737篇 |
武器工业 | 1403篇 |
无线电 | 21574篇 |
一般工业技术 | 21552篇 |
冶金工业 | 8751篇 |
原子能技术 | 1930篇 |
自动化技术 | 23895篇 |
出版年
2024年 | 915篇 |
2023年 | 3443篇 |
2022年 | 6394篇 |
2021年 | 8558篇 |
2020年 | 6431篇 |
2019年 | 5082篇 |
2018年 | 5744篇 |
2017年 | 6418篇 |
2016年 | 5726篇 |
2015年 | 7619篇 |
2014年 | 9426篇 |
2013年 | 11272篇 |
2012年 | 12265篇 |
2011年 | 12908篇 |
2010年 | 11011篇 |
2009年 | 10391篇 |
2008年 | 9919篇 |
2007年 | 9138篇 |
2006年 | 9320篇 |
2005年 | 7982篇 |
2004年 | 5326篇 |
2003年 | 4480篇 |
2002年 | 4008篇 |
2001年 | 3609篇 |
2000年 | 3537篇 |
1999年 | 4152篇 |
1998年 | 3464篇 |
1997年 | 2941篇 |
1996年 | 2745篇 |
1995年 | 2216篇 |
1994年 | 1802篇 |
1993年 | 1300篇 |
1992年 | 1046篇 |
1991年 | 785篇 |
1990年 | 569篇 |
1989年 | 465篇 |
1988年 | 367篇 |
1987年 | 252篇 |
1986年 | 209篇 |
1985年 | 129篇 |
1984年 | 116篇 |
1983年 | 86篇 |
1982年 | 87篇 |
1981年 | 68篇 |
1980年 | 62篇 |
1979年 | 29篇 |
1978年 | 25篇 |
1977年 | 24篇 |
1976年 | 26篇 |
1975年 | 16篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
31.
Gang Chen Zhonghua Yang Chor Ping Low 《Industrial Informatics, IEEE Transactions on》2006,2(4):269-280
In this paper, we address agent coordination from a dynamic systems perspective and propose a dynamic coordination model, which is inspired by biological metabolic systems. A new coordination mechanism through dynamic local adjustment (CDLA) is presented, and coordination is achieved when every agent utilizes explicitly the global system dynamics and performs iteratively a dynamic local adjustment procedure. The CDLA mechanism is investigated in an example multiagent shop floor system. The results show that the example manufacturing process is well-coordinated and the coordination approach is practically applicable and effective 相似文献
32.
Yu Yang Hugo Bender Kai Arstila Bart Swinnen Bert Verlinden Ingrid De Wolf 《Microelectronics Reliability》2008,48(8-9):1517-1520
Focused ion beam (FIB) and nano-probing were applied for failure analysis of three-dimensional stacked circuits with copper through-silicon-vias between the stacked chips. The failure analysis was done after high temperature storage and thermal cycling tests. Passive voltage contrast in FIB allowed to pinpoint the open sites. FIB cross-sections showed the presence of opens at the bottom of the copper vias. The failure cause was suspected to be an interlayer particle, which was confirmed by optical profilometry. Nano-probing was used on another sample to pinpoint the failure location through the measurement of the local resistance within the daisy chains. The failure was traced out to be related with surface contamination. 相似文献
33.
La doping effects on intergrowth Bi2WO6–Bi3TiNbO9 ferroelectric ceramics were studied by X-ray diffraction, electron probe microanalysis and dielectric spectroscopy. It was found that the La3+ distribution, ferroelectric phase transition and dielectric relaxation behavior are apparently affected by La doping. With increasing La3+ content, the site of dopant ion varies, the grain growth of Bi5TiNbWO15 is restrained, the Curie temperature is reduced and broadened. Furthermore, two dielectric relaxation loss peaks were observed both in temperature and frequency spectra. The calculated relaxation parameters revealed the oxygen vacancy related to the relaxation process. 相似文献
34.
35.
Jiashi Yang 《International Journal of Fracture》2004,127(1):L111-L116
An anti-plane, semi-infinite crack in polarized ceramics is analyzed using the theory of elastic dielectrics with electric
field gradient. The effects of electric field gradient on electromechanical fields around the crack is examined. 相似文献
36.
Lianshan Yan Yeh C. Yang G. Lin L. Chen Z. Shi Y.Q. Willner A.E. Yao X.S. 《Lightwave Technology, Journal of》2003,21(7):1676-1684
We demonstrate the first programmable group-delay module based on polarization switching. With a unique binary tuning mechanism, the device can generate any differential group delay value from -45 to +45 ps with a resolution of 1.40 ps, or any true-time-delay value from 0 to 45 ps with a resolution of 0.7 ps. The delay varying speeds for both applications are under 1 ms and can be as fast as 0.1 ms. We evaluate both the dynamic and static performances of the device while paying special attention to its dynamic figures of merit for polarization-mode dispersion emulation and compensation applications. Our experiment shows that the device exhibits a negligible transient-effect induced power penalty (<0.2 dB) in a 10-Gb/s nonreturn-to-zero system. 相似文献
37.
The cellular neural network (CNN) architecture combines the best features from traditional fully-connected analog neural networks and digital cellular automata. The network can rapidly process continuous-valued (gray-scale) input signals (such as images) and perform many computation functions which traditionally were implemented in digital form. Here, we briefly introduce the the theory of CNN circuits, provide some examples of CNN applications to image processing, and discuss work toward a CNN implementation in custom CMOS VLSI. The role of analog computer-aided design (CAD) will be briefly presented as it relates to analog neural network implementation.This work is supported in part by the Office of Naval Research under Contract N00014-89-J1402, and the National Science Foundation under grant MIP-8912639. 相似文献
38.
Jiashi Yang 《IEEE transactions on ultrasonics, ferroelectrics, and frequency control》2007,54(4):699-700
This letter discusses the difference between piezoelectric constitutive relations for the case of one-dimensional stress and the case of one-dimensional strain, and its implications in the modeling of Rosen piezoelectric transformers. 相似文献
39.
We propose a new service for digital mobile communication systems. The service enables two or more users to hold a secure conference. Two requirements must be considered: privacy and authentication. Privacy involves ensuring that an eavesdropper cannot intercept the conversations of the parties holding the conference. Authentication involves ensuring that service is not obtained fraudulently in order to avoid usage charges. We present two new conference key distribution schemes for digital mobile communication systems. In these schemes, a group of users can generate a common secret keg over a public channel so that they may hold a secure conference 相似文献
40.