首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   543235篇
  免费   6056篇
  国内免费   1669篇
电工技术   9277篇
综合类   2749篇
化学工业   81773篇
金属工艺   22180篇
机械仪表   16903篇
建筑科学   13037篇
矿业工程   2708篇
能源动力   12858篇
轻工业   45726篇
水利工程   5601篇
石油天然气   8042篇
武器工业   47篇
无线电   64095篇
一般工业技术   103482篇
冶金工业   91485篇
原子能技术   10330篇
自动化技术   60667篇
  2021年   3975篇
  2020年   2887篇
  2019年   3674篇
  2018年   19979篇
  2017年   18871篇
  2016年   16086篇
  2015年   4746篇
  2014年   7507篇
  2013年   20740篇
  2012年   14452篇
  2011年   24701篇
  2010年   20421篇
  2009年   19428篇
  2008年   21352篇
  2007年   22281篇
  2006年   13457篇
  2005年   12832篇
  2004年   12361篇
  2003年   12451篇
  2002年   11498篇
  2001年   11384篇
  2000年   10757篇
  1999年   10977篇
  1998年   27433篇
  1997年   19221篇
  1996年   14823篇
  1995年   11287篇
  1994年   10049篇
  1993年   9938篇
  1992年   7325篇
  1991年   6977篇
  1990年   7010篇
  1989年   6691篇
  1988年   6405篇
  1987年   5584篇
  1986年   5552篇
  1985年   6208篇
  1984年   5808篇
  1983年   5429篇
  1982年   5102篇
  1981年   5078篇
  1980年   4911篇
  1979年   4693篇
  1978年   4497篇
  1977年   5245篇
  1976年   7022篇
  1975年   3868篇
  1974年   3746篇
  1973年   3805篇
  1972年   3241篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
51.
Routing Correlated Data with Fusion Cost in Wireless Sensor Networks   总被引:1,自引:0,他引:1  
In this paper, we propose a routing algorithm called minimum fusion Steiner tree (MFST) for energy efficient data gathering with aggregation (fusion) in wireless sensor networks. Different from existing schemes, MFST not only optimizes over the data transmission cost, but also incorporates the cost for data fusion, which can be significant for emerging sensor networks with vectorial data and/or security requirements. By employing a randomized algorithm that allows fusion points to be chosen according to the nodes' data amounts, MFST achieves an approximation ratio of 5/4log(k + 1), where k denotes the number of source nodes, to the optimal solution for extremely general system setups, provided that fusion cost and data aggregation are nondecreasing against the total input data. Consequently, in contrast to algorithms that only excel in full or nonaggregation scenarios without considering fusion cost, MFST can thrive in a wide range of applications  相似文献   
52.
The present work deals with the modelling of damage behaviour for sheet moulding compound (SMC) composite materials using a finite element analysis package. Specifically, a comparison is made between the results obtained experimentally for a three-point bending test, and those obtained from numerical simulation using a material model already implemented. The simulation has been performed for the material models available within the PAM-CRASH software. The simulation results are compared and validated with respect to experimentation.  相似文献   
53.
Mössbauer effect measurements and physicochemical analysis demonstrate that annealing of amorphous Fe–P–Mn alloys leads to the formation of a nanocrystalline structure.  相似文献   
54.
The oxidation/sulphidation behaviour of a Ti‐46.7Al‐1.9W‐0.5Si alloy with a TiAl3 diffusion coating was studied in an environment of H2/H2S/H2O at 850oC. The kinetic results demonstrate that the TiAl3 coating significantly increased the high temperature corrosion resistance of Ti‐46.7Al‐1.9W‐0.5Si. The SEM, EDX, XRD and TEM analysis reveals that the formation of an Al2O3 scale on the surface of the TiAl3‐coated sample was responsible for the enhancement of the corroison resistance. The Ti‐46.7Al‐1.9W‐0.5Si alloy was also modified by Nb ion implantation. The Nb ion implanted and as received sampels were subjected to cyclic oxidation in an open air at 800oC. The Nb ion implantation not only increased the oxidation resistance but also substantially improved the adhesion of scale to the substrate.  相似文献   
55.
56.
Reducible rank codes and their applications to cryptography   总被引:2,自引:0,他引:2  
We present a new family of so-called reducible rank codes which are a generalization of rank product codes . This family includes maximal rank distance (MRD) codes for lengths n>N in the field F/sub N/. We give methods for encoding and decoding reducible rank codes. A public key cryptosystem based on these codes and on the idea of a column scrambler is proposed. The column scrambler "mixes" columns of a generator (parity-check) matrix of a code. It makes the system more resistant to structural attacks such as Gibson's attacks. Possible attacks on the system are thoroughly studied. The system is found to be secure against known attacks for public keys of about 16 kbits and greater.  相似文献   
57.
This article presents a graph-theoretic method for constructing low-density parity-check (LDPC) codes from connected graphs without the requirement of large girth. This method is based on finding a set of paths in a connected graph, which satisfies the constraint that any two paths in the set are either disjoint or cross each other at one and only one vertex. Two trellis-based algorithms for finding these paths are devised. Good LDPC codes of practical lengths are constructed and they perform well with iterative decoding.  相似文献   
58.
In this paper, we describe a method for increasing the external efficiency of polymer light‐emitting diodes (LEDs) by coupling out waveguided light with Bragg gratings. We numerically model the waveguide modes in a typical LED structure and demonstrate how optimizing layer thicknesses and reducing waveguide absorption can enhance the grating outcoupling. The gratings were created by a soft‐lithography technique that minimizes changes to the conventional LED structure. Using one‐dimensional and two‐dimensional gratings, we were able to increase the forward‐directed emission by 47 % and 70 %, respectively, and the external quantum efficiency by 15 % and 25 %.  相似文献   
59.
By exploiting a general cyclostationary (CS) statistics-based framework, this letter develops a rigorous and unified asymptotic (large sample) performance analysis setup for a class of blind feedforward timing epoch estimators for linear modulations transmitted through time nonselective flat-fading channels. Within the proposed CS framework, it is shown that several estimators proposed in the literature can be asymptotically interpreted as maximum likelihood (ML) estimators applied on a (sub)set of the second- (and/or higher) order statistics of the received signal. The asymptotic variance of these ML estimators is established in closed-form expression and compared with the modified Crame/spl acute/r-Rao bound. It is shown that the timing estimator proposed by Oerder and Meyr achieves asymptotically the best performance in the class of estimators which exploit all the second-order statistics of the received signal, and its performance is insensitive to oversampling rates P as long as P/spl ges/3. Further, an asymptotically best consistent estimator, which achieves the lowest asymptotic variance among all the possible estimators that can be derived by exploiting jointly the second- and fourth-order statistics of the received signal, is also proposed.  相似文献   
60.
Passivated single damascene copper SiO2 damascene lines were evaluated in combination with TiSiN and Ta(N)/Ta diffusion barriers. Leakage current, breakdown and time-dependent dielectric breakdown properties were investigated on a wafer level basis for temperatures ranging between room temperature and 150 °C. It is found that the leakage performance of the wafers with a TiSiN barrier is better at room temperature, but at 150 °C the performance levels out with Ta(N)/Ta. Time-dependent dielectric breakdown measurements at 150 °C show that the lifetime of the interconnect is higher with the selected Ta(N)/Ta barrier than for TiSiN.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号