全文获取类型
收费全文 | 5241篇 |
免费 | 190篇 |
国内免费 | 11篇 |
专业分类
电工技术 | 86篇 |
综合类 | 6篇 |
化学工业 | 960篇 |
金属工艺 | 150篇 |
机械仪表 | 121篇 |
建筑科学 | 271篇 |
矿业工程 | 16篇 |
能源动力 | 99篇 |
轻工业 | 638篇 |
水利工程 | 27篇 |
石油天然气 | 11篇 |
武器工业 | 1篇 |
无线电 | 341篇 |
一般工业技术 | 1059篇 |
冶金工业 | 943篇 |
原子能技术 | 36篇 |
自动化技术 | 677篇 |
出版年
2023年 | 51篇 |
2022年 | 27篇 |
2021年 | 83篇 |
2020年 | 73篇 |
2019年 | 57篇 |
2018年 | 130篇 |
2017年 | 125篇 |
2016年 | 132篇 |
2015年 | 127篇 |
2014年 | 176篇 |
2013年 | 302篇 |
2012年 | 259篇 |
2011年 | 282篇 |
2010年 | 221篇 |
2009年 | 208篇 |
2008年 | 223篇 |
2007年 | 202篇 |
2006年 | 168篇 |
2005年 | 180篇 |
2004年 | 136篇 |
2003年 | 130篇 |
2002年 | 141篇 |
2001年 | 99篇 |
2000年 | 95篇 |
1999年 | 86篇 |
1998年 | 290篇 |
1997年 | 188篇 |
1996年 | 144篇 |
1995年 | 109篇 |
1994年 | 88篇 |
1993年 | 76篇 |
1992年 | 52篇 |
1991年 | 46篇 |
1990年 | 36篇 |
1989年 | 31篇 |
1988年 | 35篇 |
1987年 | 41篇 |
1986年 | 33篇 |
1985年 | 43篇 |
1984年 | 41篇 |
1983年 | 26篇 |
1982年 | 33篇 |
1981年 | 32篇 |
1980年 | 32篇 |
1979年 | 20篇 |
1978年 | 17篇 |
1977年 | 26篇 |
1976年 | 80篇 |
1975年 | 33篇 |
1974年 | 20篇 |
排序方式: 共有5442条查询结果,搜索用时 15 毫秒
31.
Fabien Alibart Stéphane Pleutin Olivier Bichler Christian Gamrat Teresa Serrano‐Gotarredona Bernabe Linares‐Barranco Dominique Vuillaume 《Advanced functional materials》2012,22(3):609-616
A large effort is devoted to the research of new computing paradigms associated with innovative nanotechnologies that should complement and/or propose alternative solutions to the classical Von Neumann/CMOS (complementary metal oxide semiconductor) association. Among various propositions, spiking neural network (SNN) seems a valid candidate. i) In terms of functions, SNN using relative spike timing for information coding are deemed to be the most effective at taking inspiration from the brain to allow fast and efficient processing of information for complex tasks in recognition or classification. ii) In terms of technology, SNN may be able to benefit the most from nanodevices because SNN architectures are intrinsically tolerant to defective devices and performance variability. Here, spike‐timing‐dependent plasticity (STDP), a basic and primordial learning function in the brain, is demonstrated with a new class of synapstor (synapse‐transistor), called nanoparticle organic memory field‐effect transistor (NOMFET). This learning function is obtained with a simple hybrid material made of the self‐assembly of gold nanoparticles and organic semiconductor thin films. Beyond mimicking biological synapses, it is also demonstrated how the shape of the applied spikes can tailor the STDP learning function. Moreover, the experiments and modeling show that this synapstor is a memristive device. Finally, these synapstors are successfully coupled with a CMOS platform emulating the pre‐ and postsynaptic neurons, and a behavioral macromodel is developed on usual device simulator. 相似文献
32.
Israel-Jost V Choquet P Salmon S Blondet C Sonnendrücker E Constantinesco A 《IEEE transactions on medical imaging》2006,25(2):158-167
We describe the efficient algebraic reconstruction (EAR) method, which applies to cone-beam tomographic reconstruction problems with a circular symmetry. Three independant steps/stages are presented, which use two symmetries and a factorization of the point spread functions (PSFs), each reducing computing times and eventually storage in memory or hard drive. In the case of pinhole single photon emission computed tomography (SPECT), we show how the EAR method can incorporate most of the physical and geometrical effects which change the PSF compared to the Dirac function assumed in analytical methods, thus showing improvements on reconstructed images. We also compare results obtained by the EAR method with a cubic grid implementation of an algebraic method and modeling of the PSF and we show that there is no significant loss of quality, despite the use of a noncubic grid for voxels in the EAR method. Data from a phantom, reconstructed with the EAR method, demonstrate 1.08-mm spatial tomographic resolution despite the use of a 1.5-mm pinhole SPECT device and several applications in rat and mouse imaging are shown. Finally, we discuss the conditions of application of the method when symmetries are broken, by considering the different parameters of the calibration and nonsymmetric physical effects such as attenuation. 相似文献
33.
34.
Kantorovich I. Houghton C. Root S. St Laurent J. 《Advanced Packaging, IEEE Transactions on》2004,27(1):10-14
A new method of measuring the high frequency self-impedance and transfer impedance of a microprocessor's power supply loop is proposed. The method is based on measurement of the on-chip voltage in response to a predetermined stimulus. Two methods of the stimulus current generation are presented: running a set of computer instructions and toggling clock frequency while the system is in reset. 相似文献
35.
St phanie Cannenterre 《电子设计技术》2011,18(6):57+59
准方波谐振转换器也称作准谐振(QR)转换器,使反激式开关电源(SMPS)设计的信号电磁干扰(EMI)更低及满载能效更高。然而,由于负载下降时开关频率升高,必须限制频率漂移,避免额外的开关损耗。 相似文献
36.
This article treats pickup and scattering by a single wire in free space or over a ground plane. The wire may be uniform or nonuniform and infinite or finite. We only treat the case where wire radius is so small compared to a wavelength and the other problem dimensions that scattering by the wire is independent of azimuth. Solutions based directly on Maxwell's equations are compared with solutions based on the telegrapher's equations; for 1 mm radius Cu wire at 1 GHz, equilibrium CW currents as computed from the two models, for a uniform, infinite wire, differ by 6 dB. In general, the wire-current solutions are separated into a homogeneous part and a particular or driven part. The driven part couples and scatters fields, while,at least on an infinite wire in the far field, the homogeneous part does not 相似文献
37.
Ivan Damgård Sebastian Faust Pratyay Mukherjee Daniele Venturi 《Journal of Cryptology》2017,30(1):152-190
Related key attacks (RKAs) are powerful cryptanalytic attacks where an adversary can change the secret key and observe the effect of such changes at the output. The state of the art in RKA security protects against an a-priori unbounded number of certain algebraic induced key relations, e.g., affine functions or polynomials of bounded degree. In this work, we show that it is possible to go beyond the algebraic barrier and achieve security against arbitrary key relations, by restricting the number of tampering queries the adversary is allowed to ask for. The latter restriction is necessary in case of arbitrary key relations, as otherwise a generic attack of Gennaro et al. (TCC 2004) shows how to recover the key of almost any cryptographic primitive. We describe our contributions in more detail below. (1) We show that standard ID and signature schemes constructed from a large class of \(\Sigma \)-protocols (including the Okamoto scheme, for instance) are secure even if the adversary can arbitrarily tamper with the prover’s state a bounded number of times and obtain some bounded amount of leakage. Interestingly, for the Okamoto scheme we can allow also independent tampering with the public parameters. (2) We show a bounded tamper and leakage resilient CCA-secure public key cryptosystem based on the DDH assumption. We first define a weaker CCA-like security notion that we can instantiate based on DDH, and then we give a general compiler that yields CCA security with tamper and leakage resilience. This requires a public tamper-proof common reference string. (3) Finally, we explain how to boost bounded tampering and leakage resilience [as in (1) and (2) above] to continuous tampering and leakage resilience, in the so-called floppy model where each user has a personal hardware token (containing leak- and tamper-free information) which can be used to refresh the secret key. We believe that bounded tampering is a meaningful and interesting alternative to avoid known impossibility results and can provide important insights into the security of existing standard cryptographic schemes. 相似文献
38.
Caroline Celle Clément Suspène Jean-Pierre Simonato Stéphane Lenfant Marc Ternisien Dominique Vuillaume 《Organic Electronics》2009,10(1):119-126
In this paper we show that thiolated self-assembled monolayers (SAMs) can be used to anchor source–drain gold electrodes on the substrate, leading to excellent electrical performances of the organic field-effect transistor (OFET) on a par with those using a standard electrode process. Using an amorphous semiconductor and a gate dielectric functionalized with SAMs bearing different dipole moments, we demonstrate that we can tune the threshold voltage alone, while keeping nearly unchanged the other electrical properties (hole carrier mobility, Ion/Ioff ratio, subthreshold swing). This differs from previous studies for which SAMs functionalization induced significant changes in all the OFET electrical performances. This result opens doors to design organic circuits using reproducible amorphous semiconductor based OFETs for which only the threshold voltage can be tuned on demand. 相似文献
39.
Shields H. Fornaca S.W. Petach M.B. Orsini R.A. Moyer R.H. St Pierre R.J. 《Proceedings of the IEEE. Institute of Electrical and Electronics Engineers》2002,90(10):1689-1695
Pulsed Nd:YAG lasers have been developed to achieve high peak power and high pulse repetition rate. These systems are being used as drivers for laser-produced plasmas which efficiently convert the 1064-nm laser output to extreme ultraviolet (EUV) light at 13.5 nm for future microlithography systems. The requirements for laser-produced plasma EUV light sources and their integration in lithography tools for high-volume manufacturing are reviewed to establish the key design issues for high-power lasers and plasma targets. Xenon has been identified as a leading target material to realize the goals of intense EUV emission and clean operation. Recent progress in high-power diode-pumped Nd:YAG lasers and xenon targets for EUV generation is reviewed, showing that laser-produced plasma sources meet the needs for current EUV lithography development tools. Future directions to meet EUV source requirements for high-volume manufacturing tools are discussed. 相似文献
40.
Kelvin L. Dias Djamel F. H. Sadok Stênio F. L. Fernandes Judith Kelner 《Wireless Networks》2010,16(1):39-56
This paper presents two novel frameworks for session admission control and resource reservation in the context of next generation mobile and cellular networks. We also devised a special scheme that avoids per-user reservation signaling overhead in order to meet scalability requirements needed for next generation multi-access networks. The first proposal, Distributed Call Admission Control with Aggregate Resource Reservation (VR), uses mobility prediction based on mobile positioning system location information and takes into account the expected bandwidth to be used by calls handing off to and from neighboring cells within a configurable estimation time window. In conjunction, a novel concept called virtual reservation has been devised to prevent per-user reservation. Our second proposal, Local Call Admission Control and Time Series-based Resource Reservation, takes into account the expected bandwidth to be used by calls handed off from neighboring cells based only on local information stored into the current cell a user is seeking admission to. To this end, we suggest the use of two time series-based models for predicting handoff load: the Trigg and Leach (TL), which is an adaptive exponential smoothing technique, and Autoregressive Integrated Moving Average (ARIMA) that uses the Box and Jenkins methodology. It is worth to emphasize that the use of bandwidth prediction based on ARIMA technique still exist for wireless networks. The novelty of our approach is to build an adaptive framework based on ARIMA technique that takes into account the measured handoff dropping probability in order to tuning the prediction time window size so increasing the prediction accuracy. The proposed schemes are compared through simulations with the fixed guard channel (GC) and other optimized dynamic reservation-based proposals present in the literature. The results show that our schemes outperform many others and that the simpler local proposal based on TL can grant nearly similar levels of handoff dropping probability as compared to those from more the complex distributed approach. 相似文献