首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   359204篇
  免费   5237篇
  国内免费   1242篇
电工技术   6183篇
综合类   2690篇
化学工业   52102篇
金属工艺   15376篇
机械仪表   11873篇
建筑科学   9088篇
矿业工程   1746篇
能源动力   7791篇
轻工业   28955篇
水利工程   3906篇
石油天然气   4275篇
武器工业   68篇
无线电   44845篇
一般工业技术   70393篇
冶金工业   50032篇
原子能技术   5816篇
自动化技术   50544篇
  2021年   2446篇
  2020年   1901篇
  2019年   2355篇
  2018年   18059篇
  2017年   17077篇
  2016年   14081篇
  2015年   3521篇
  2014年   5052篇
  2013年   12990篇
  2012年   10487篇
  2011年   18989篇
  2010年   15835篇
  2009年   13996篇
  2008年   16092篇
  2007年   16911篇
  2006年   8576篇
  2005年   8826篇
  2004年   8394篇
  2003年   8289篇
  2002年   7362篇
  2001年   6919篇
  2000年   6663篇
  1999年   6556篇
  1998年   14653篇
  1997年   10581篇
  1996年   8369篇
  1995年   6636篇
  1994年   5895篇
  1993年   5751篇
  1992年   4686篇
  1991年   4342篇
  1990年   4141篇
  1989年   3864篇
  1988年   3715篇
  1987年   3264篇
  1986年   3133篇
  1985年   3754篇
  1984年   3551篇
  1983年   3135篇
  1982年   2961篇
  1981年   3083篇
  1980年   2869篇
  1979年   2731篇
  1978年   2582篇
  1977年   3022篇
  1976年   3667篇
  1975年   2404篇
  1974年   2384篇
  1973年   2381篇
  1972年   1884篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
51.
52.
Mobile devices are vulnerable to theft and loss due to their small size and the characteristics of their common usage environment. Since they allow users to work while away from their desk, they are most useful in public locations and while traveling. Unfortunately, this is also where they are most at risk. Existing schemes for securing data either do not protect the device after it is stolen or require bothersome reauthentication. Transient Authentication lifts the burden of authentication from the user by use of a wearable token that constantly attests to the user's presence. When the user departs, the token and device lose contact and the device secures itself. We show how to leverage this authentication framework to secure all the memory and storage locations on a device into which secrets may creep. Our evaluation shows this is done without inconveniencing the user, while imposing a minimal performance overhead  相似文献   
53.
High-performance circular probe-fed stacked patch antenna designs are explored through the use of numerical optimization. New trends are sought to aid understanding and to suggest novel solutions. We describe the optimization technique, present a new design trend relating efficiency and bandwidth to the choice of substrate dielectric, and propose and demonstrate a novel, optimized antenna achieving 33% bandwidth whilst maintaining greater than 80% surface wave efficiency.  相似文献   
54.
On the capacities of bipartite Hamiltonians and unitary gates   总被引:2,自引:0,他引:2  
We consider interactions as bidirectional channels. We investigate the capacities for interaction Hamiltonians and nonlocal unitary gates to generate entanglement and transmit classical information. We give analytic expressions for the entanglement generating capacity and entanglement-assisted one-way classical communication capacity of interactions, and show that these quantities are additive, so that the asymptotic capacities equal the corresponding 1-shot capacities. We give general bounds on other capacities, discuss some examples, and conclude with some open questions.  相似文献   
55.
Membrane separation technology represents an alternative way to achieve biomass retention in anaerobic bioreactors for wastewater treatment. Due to high biomass concentrations of anaerobic reactors, cake formation is likely to represent a major cause of flux decline. In the presented research, experiments are performed on the effect of biomass concentration and level of gas sparging on the hydraulic capacity of a submerged anaerobic membrane bioreactor. Both parameters significantly affected the hydraulic capacity, with biomass exerting the most pronounced effect. After 50 days of continuous operation the critical flux remained virtually unchanged, despite an increase in membrane resistance, suggesting that biomass characteristics and hydraulic conditions determine the bio-layer formation rather than the membrane's fouling level. The concept of bio-layer management is introduced to describe the programmed combination of actions performed in order to control the formation of biomass layer over membranes.  相似文献   
56.
Recent studies revealed that organic acids such as citric and oxalic acids seemed to be more promising as chemical extracting agents for removal of heavy metals from contaminated sludge, since they are biodegradable and can attain a higher metal extraction efficiency at mildly acidic pH compared to other extracting agents. Results of a lab-scale study on the efficiency of citric acid in the extraction of chromium (Cr), copper (Cu), lead (Pb), nickel (Ni) and zinc (Zn) from anaerobically digested sludge, revealed that citric acid seemed to be highly effective in extracting Cr (at 100%), Cu (at 88%), Ni (at 98%) and Zn (at 100%) at pH 2.33, mostly at 5 days leaching time except for Cu and Zn, which are at 1 day and 2 h contact times respectively. Lead removal at the same pH was also high at 95% but at a longer leaching time of 11 days. At pH 3, citric acid seemed to be highly effective in extracting Pb (at 100%) at 1 day leaching time, although higher removals were also attained for Ni (70%) and Zn (80%) at only 2 h leaching time. Chemical speciation studies showed that Cr, Cu and Ni in the sludge sample seem to predominate in residual fractions, while Pb and Zn were found mostly bound to organic and inorganic matter forms, hence the potential of the sludge for land application.  相似文献   
57.
Robust programming aims to prevent abnormal termination or unexpected actions and requires code to handle bad (invalid or absurd) inputs in a way that is consistent with the developer's intent. For example, if an internal error occurs, the program might terminate gracefully rather than simply failing, providing enough information for the programmer to debug the program and avoiding giving the user additional access or information. This article focuses on teaching these principles.  相似文献   
58.
In this letter, the concept of pseudorandom active reflector, based on the ultra-wideband (UWB) technology, is introduced. It consists of a simple device that repeats a slightly delayed version of the received UWB signal only in certain time intervals according to a suitable pseudorandom time-hopping sequence. An example of application of this device for accurate ranging in precise location systems is given. The advantages of this solution are in the hardware simplicity (only the analog section is present), in the low power consumption of the reflector and in the low timing constraint regarding the relative transmitter and reflector clock rates.  相似文献   
59.
An overview over past and present activities and future developments at the Toulouse pulsed magnetic field facility is given, both as far as technical developments of the infrastructure, as well as low temperature physics performed at the LNCMP are concerned.  相似文献   
60.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号