首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5241篇
  免费   190篇
  国内免费   11篇
电工技术   86篇
综合类   6篇
化学工业   960篇
金属工艺   150篇
机械仪表   121篇
建筑科学   271篇
矿业工程   16篇
能源动力   99篇
轻工业   638篇
水利工程   27篇
石油天然气   11篇
武器工业   1篇
无线电   341篇
一般工业技术   1059篇
冶金工业   943篇
原子能技术   36篇
自动化技术   677篇
  2023年   51篇
  2022年   27篇
  2021年   83篇
  2020年   73篇
  2019年   57篇
  2018年   130篇
  2017年   125篇
  2016年   132篇
  2015年   127篇
  2014年   176篇
  2013年   302篇
  2012年   259篇
  2011年   282篇
  2010年   221篇
  2009年   208篇
  2008年   223篇
  2007年   202篇
  2006年   168篇
  2005年   180篇
  2004年   136篇
  2003年   130篇
  2002年   141篇
  2001年   99篇
  2000年   95篇
  1999年   86篇
  1998年   290篇
  1997年   188篇
  1996年   144篇
  1995年   109篇
  1994年   88篇
  1993年   76篇
  1992年   52篇
  1991年   46篇
  1990年   36篇
  1989年   31篇
  1988年   35篇
  1987年   41篇
  1986年   33篇
  1985年   43篇
  1984年   41篇
  1983年   26篇
  1982年   33篇
  1981年   32篇
  1980年   32篇
  1979年   20篇
  1978年   17篇
  1977年   26篇
  1976年   80篇
  1975年   33篇
  1974年   20篇
排序方式: 共有5442条查询结果,搜索用时 15 毫秒
31.
A large effort is devoted to the research of new computing paradigms associated with innovative nanotechnologies that should complement and/or propose alternative solutions to the classical Von Neumann/CMOS (complementary metal oxide semiconductor) association. Among various propositions, spiking neural network (SNN) seems a valid candidate. i) In terms of functions, SNN using relative spike timing for information coding are deemed to be the most effective at taking inspiration from the brain to allow fast and efficient processing of information for complex tasks in recognition or classification. ii) In terms of technology, SNN may be able to benefit the most from nanodevices because SNN architectures are intrinsically tolerant to defective devices and performance variability. Here, spike‐timing‐dependent plasticity (STDP), a basic and primordial learning function in the brain, is demonstrated with a new class of synapstor (synapse‐transistor), called nanoparticle organic memory field‐effect transistor (NOMFET). This learning function is obtained with a simple hybrid material made of the self‐assembly of gold nanoparticles and organic semiconductor thin films. Beyond mimicking biological synapses, it is also demonstrated how the shape of the applied spikes can tailor the STDP learning function. Moreover, the experiments and modeling show that this synapstor is a memristive device. Finally, these synapstors are successfully coupled with a CMOS platform emulating the pre‐ and postsynaptic neurons, and a behavioral macromodel is developed on usual device simulator.  相似文献   
32.
We describe the efficient algebraic reconstruction (EAR) method, which applies to cone-beam tomographic reconstruction problems with a circular symmetry. Three independant steps/stages are presented, which use two symmetries and a factorization of the point spread functions (PSFs), each reducing computing times and eventually storage in memory or hard drive. In the case of pinhole single photon emission computed tomography (SPECT), we show how the EAR method can incorporate most of the physical and geometrical effects which change the PSF compared to the Dirac function assumed in analytical methods, thus showing improvements on reconstructed images. We also compare results obtained by the EAR method with a cubic grid implementation of an algebraic method and modeling of the PSF and we show that there is no significant loss of quality, despite the use of a noncubic grid for voxels in the EAR method. Data from a phantom, reconstructed with the EAR method, demonstrate 1.08-mm spatial tomographic resolution despite the use of a 1.5-mm pinhole SPECT device and several applications in rat and mouse imaging are shown. Finally, we discuss the conditions of application of the method when symmetries are broken, by considering the different parameters of the calibration and nonsymmetric physical effects such as attenuation.  相似文献   
33.
34.
A new method of measuring the high frequency self-impedance and transfer impedance of a microprocessor's power supply loop is proposed. The method is based on measurement of the on-chip voltage in response to a predetermined stimulus. Two methods of the stimulus current generation are presented: running a set of computer instructions and toggling clock frequency while the system is in reset.  相似文献   
35.
准方波谐振转换器也称作准谐振(QR)转换器,使反激式开关电源(SMPS)设计的信号电磁干扰(EMI)更低及满载能效更高。然而,由于负载下降时开关频率升高,必须限制频率漂移,避免额外的开关损耗。  相似文献   
36.
This article treats pickup and scattering by a single wire in free space or over a ground plane. The wire may be uniform or nonuniform and infinite or finite. We only treat the case where wire radius is so small compared to a wavelength and the other problem dimensions that scattering by the wire is independent of azimuth. Solutions based directly on Maxwell's equations are compared with solutions based on the telegrapher's equations; for 1 mm radius Cu wire at 1 GHz, equilibrium CW currents as computed from the two models, for a uniform, infinite wire, differ by 6 dB. In general, the wire-current solutions are separated into a homogeneous part and a particular or driven part. The driven part couples and scatters fields, while,at least on an infinite wire in the far field, the homogeneous part does not  相似文献   
37.
Related key attacks (RKAs) are powerful cryptanalytic attacks where an adversary can change the secret key and observe the effect of such changes at the output. The state of the art in RKA security protects against an a-priori unbounded number of certain algebraic induced key relations, e.g., affine functions or polynomials of bounded degree. In this work, we show that it is possible to go beyond the algebraic barrier and achieve security against arbitrary key relations, by restricting the number of tampering queries the adversary is allowed to ask for. The latter restriction is necessary in case of arbitrary key relations, as otherwise a generic attack of Gennaro et al. (TCC 2004) shows how to recover the key of almost any cryptographic primitive. We describe our contributions in more detail below. (1) We show that standard ID and signature schemes constructed from a large class of \(\Sigma \)-protocols (including the Okamoto scheme, for instance) are secure even if the adversary can arbitrarily tamper with the prover’s state a bounded number of times and obtain some bounded amount of leakage. Interestingly, for the Okamoto scheme we can allow also independent tampering with the public parameters. (2) We show a bounded tamper and leakage resilient CCA-secure public key cryptosystem based on the DDH assumption. We first define a weaker CCA-like security notion that we can instantiate based on DDH, and then we give a general compiler that yields CCA security with tamper and leakage resilience. This requires a public tamper-proof common reference string. (3) Finally, we explain how to boost bounded tampering and leakage resilience [as in (1) and (2) above] to continuous tampering and leakage resilience, in the so-called floppy model where each user has a personal hardware token (containing leak- and tamper-free information) which can be used to refresh the secret key. We believe that bounded tampering is a meaningful and interesting alternative to avoid known impossibility results and can provide important insights into the security of existing standard cryptographic schemes.  相似文献   
38.
In this paper we show that thiolated self-assembled monolayers (SAMs) can be used to anchor source–drain gold electrodes on the substrate, leading to excellent electrical performances of the organic field-effect transistor (OFET) on a par with those using a standard electrode process. Using an amorphous semiconductor and a gate dielectric functionalized with SAMs bearing different dipole moments, we demonstrate that we can tune the threshold voltage alone, while keeping nearly unchanged the other electrical properties (hole carrier mobility, Ion/Ioff ratio, subthreshold swing). This differs from previous studies for which SAMs functionalization induced significant changes in all the OFET electrical performances. This result opens doors to design organic circuits using reproducible amorphous semiconductor based OFETs for which only the threshold voltage can be tuned on demand.  相似文献   
39.
Pulsed Nd:YAG lasers have been developed to achieve high peak power and high pulse repetition rate. These systems are being used as drivers for laser-produced plasmas which efficiently convert the 1064-nm laser output to extreme ultraviolet (EUV) light at 13.5 nm for future microlithography systems. The requirements for laser-produced plasma EUV light sources and their integration in lithography tools for high-volume manufacturing are reviewed to establish the key design issues for high-power lasers and plasma targets. Xenon has been identified as a leading target material to realize the goals of intense EUV emission and clean operation. Recent progress in high-power diode-pumped Nd:YAG lasers and xenon targets for EUV generation is reviewed, showing that laser-produced plasma sources meet the needs for current EUV lithography development tools. Future directions to meet EUV source requirements for high-volume manufacturing tools are discussed.  相似文献   
40.
This paper presents two novel frameworks for session admission control and resource reservation in the context of next generation mobile and cellular networks. We also devised a special scheme that avoids per-user reservation signaling overhead in order to meet scalability requirements needed for next generation multi-access networks. The first proposal, Distributed Call Admission Control with Aggregate Resource Reservation (VR), uses mobility prediction based on mobile positioning system location information and takes into account the expected bandwidth to be used by calls handing off to and from neighboring cells within a configurable estimation time window. In conjunction, a novel concept called virtual reservation has been devised to prevent per-user reservation. Our second proposal, Local Call Admission Control and Time Series-based Resource Reservation, takes into account the expected bandwidth to be used by calls handed off from neighboring cells based only on local information stored into the current cell a user is seeking admission to. To this end, we suggest the use of two time series-based models for predicting handoff load: the Trigg and Leach (TL), which is an adaptive exponential smoothing technique, and Autoregressive Integrated Moving Average (ARIMA) that uses the Box and Jenkins methodology. It is worth to emphasize that the use of bandwidth prediction based on ARIMA technique still exist for wireless networks. The novelty of our approach is to build an adaptive framework based on ARIMA technique that takes into account the measured handoff dropping probability in order to tuning the prediction time window size so increasing the prediction accuracy. The proposed schemes are compared through simulations with the fixed guard channel (GC) and other optimized dynamic reservation-based proposals present in the literature. The results show that our schemes outperform many others and that the simpler local proposal based on TL can grant nearly similar levels of handoff dropping probability as compared to those from more the complex distributed approach.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号