首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   480723篇
  免费   6963篇
  国内免费   2432篇
电工技术   9751篇
技术理论   5篇
综合类   1490篇
化学工业   73579篇
金属工艺   19401篇
机械仪表   14803篇
建筑科学   12017篇
矿业工程   2622篇
能源动力   11212篇
轻工业   43532篇
水利工程   5075篇
石油天然气   9099篇
武器工业   311篇
无线电   56643篇
一般工业技术   90832篇
冶金工业   88428篇
原子能技术   9857篇
自动化技术   41461篇
  2021年   4169篇
  2019年   3786篇
  2018年   6253篇
  2017年   6283篇
  2016年   6739篇
  2015年   4770篇
  2014年   7901篇
  2013年   21111篇
  2012年   13072篇
  2011年   17515篇
  2010年   13996篇
  2009年   15273篇
  2008年   16652篇
  2007年   16766篇
  2006年   14983篇
  2005年   13317篇
  2004年   12362篇
  2003年   11852篇
  2002年   11518篇
  2001年   11630篇
  2000年   11018篇
  1999年   11120篇
  1998年   25277篇
  1997年   18415篇
  1996年   14374篇
  1995年   11060篇
  1994年   9955篇
  1993年   9776篇
  1992年   7763篇
  1991年   7224篇
  1990年   7196篇
  1989年   6883篇
  1988年   6556篇
  1987年   5736篇
  1986年   5632篇
  1985年   6524篇
  1984年   6161篇
  1983年   5656篇
  1982年   5151篇
  1981年   5451篇
  1980年   5067篇
  1979年   5087篇
  1978年   4859篇
  1977年   5423篇
  1976年   6847篇
  1975年   4406篇
  1974年   4259篇
  1973年   4300篇
  1972年   3558篇
  1971年   3286篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
71.
72.
Mobile devices are vulnerable to theft and loss due to their small size and the characteristics of their common usage environment. Since they allow users to work while away from their desk, they are most useful in public locations and while traveling. Unfortunately, this is also where they are most at risk. Existing schemes for securing data either do not protect the device after it is stolen or require bothersome reauthentication. Transient Authentication lifts the burden of authentication from the user by use of a wearable token that constantly attests to the user's presence. When the user departs, the token and device lose contact and the device secures itself. We show how to leverage this authentication framework to secure all the memory and storage locations on a device into which secrets may creep. Our evaluation shows this is done without inconveniencing the user, while imposing a minimal performance overhead  相似文献   
73.
This work considers space-time channel coding for systems with multiple-transmit and a single-receive antenna, over space uncorrelated block-fading (quasi-static) channels. Analysis of the outage probability over such channels reveals the existence of a threshold phenomenon. The outage probability can be made arbitrary small by increasing the number of transmit antennas, only if the E/sub b//N/sub 0/ is above a threshold which depends on the coding rate. Furthermore, it is shown that when the number of transmit antennas is increased, the /spl epsi/-capacity of a block-fading Rayleigh channel tends to the Shannon capacity of an additive white Gaussian noise channel. This paper also presents space-time codes constructed as a serial concatenation of component convolutional codes separated by an interleaver. These schemes provide full transmit diversity and are suitable for iterative decoding. The rate of these schemes is less than 1 bit/s/Hz, but can be made arbitrary close to 1 bit/s/Hz by the use of Wyner-Ash codes as outer components. Comparison of these schemes with structures from literature shows that performance gains can be obtained at the expense of a small decrease in rate. Computer simulation results over block-fading Rayleigh channels show that the frame-error rate of several of these schemes is within 2-3 dB from the theoretical outage probability.  相似文献   
74.

Various fit indices exist in structural equation models. Most of these indices are related to the noncentrality parameter (NCP) of the chi-square distribution that the involved test statistic is implicitly assumed to follow. Existing literature suggests that few statistics can be well approximated by chi-square distributions. The meaning of the NCP is not clear when the behavior of the statistic cannot be described by a chi-square distribution. In this paper we define a new measure of model misfit (MMM) as the difference between the expected values of a statistic under the alternative and null hypotheses. This definition does not need to assume that the population covariance matrix is in the vicinity of the proposed model, nor does it need for the test statistic to follow any distribution of a known form. The MMM does not necessarily equal the discrepancy between the model and the population covariance matrix as has been assumed in existing literature. Bootstrap approaches to estimating the MMM and a related quantity are developed. An algorithm for obtaining bootstrap confidence intervals of the MMM is constructed. Examples with practical data sets contrast several measures of model misfit. The quantile-quantile plot is used to illustrate the unrealistic nature of chi-square distribution assumptions under either the null or an alternative hypothesis in practice.

  相似文献   
75.
First-order polarization-mode dispersion (PMD) compensation by means of a polarization controller and a differential delay line is not sufficient to guarantee error-free transmission for 40-Gb/s channels when higher order effects severely increase signal distortion. Higher order mitigation is possible by cascading more than one first-order block. However, only two-stage or three-stage devices remain simple enough to be actually controlled. The performance of such higher order PMD compensators is evaluated by means of numerical simulations. Two different feedback signals have been used, demonstrating that first-order and higher order PMD distortion of nonreturn-to-zero (NRZ) pulses at 40 Gb/s can be strongly mitigated for instantaneous values of the differential group delay (DGD) up to the bit slot, when the compensator is properly controlled.  相似文献   
76.
We introduce dispersion-relation-preserving (DRP) algorithms to minimize the numerical dispersion error in large-scale three-dimensional (3D) finite-difference time-domain (FDTD) simulations. The dispersion error is first expanded in spherical harmonics in terms of the propagation angle and the leading order terms of the series are made equal to zero. Frequency-dependent FDTD coefficients are then obtained and subsequently expanded in a polynomial (Taylor) series in the frequency variable. An inverse Fourier transformation is used to allow for the incorporation of the new coefficients into the FDTD updates. Butterworth or Chebyshev filters are subsequently employed to fine-tune the FDTD coefficients for a given narrowband or broadband range of frequencies of interest. Numerical results are used to compare the proposed 3D DRP-FDTD schemes against traditional high-order FDTD schemes.  相似文献   
77.
Modeling aviation baggage screening security systems: a case study   总被引:1,自引:0,他引:1  
Aviation security protects vital national interests, as well as passengers and aircraft. Key components of an aviation security system include baggage and passenger screening devices and operations. Determining how and where to assign (deploy) such devices can be quite challenging. Moreover, even after such systems are in place, it can be difficult to measure their effectiveness. This paper describes how discrete optimization models can be used to address these questions, based on three performance measures that quantify the effectiveness of airport baggage screening security device systems. These models are used to solve for optimal airport baggage screening security device deployments considering the number of passengers on a set of flights who have not been cleared using a security risk assessment system in use by the Federal Aviation Administration (i.e., passengers whose baggage is subjected to screening), the number of flights in this set, and the size of the aircraft for such flights. Several examples are provided to illustrate these results, including an example that uses data available from the Official Airline Guide.  相似文献   
78.
High-performance circular probe-fed stacked patch antenna designs are explored through the use of numerical optimization. New trends are sought to aid understanding and to suggest novel solutions. We describe the optimization technique, present a new design trend relating efficiency and bandwidth to the choice of substrate dielectric, and propose and demonstrate a novel, optimized antenna achieving 33% bandwidth whilst maintaining greater than 80% surface wave efficiency.  相似文献   
79.
On the capacities of bipartite Hamiltonians and unitary gates   总被引:2,自引:0,他引:2  
We consider interactions as bidirectional channels. We investigate the capacities for interaction Hamiltonians and nonlocal unitary gates to generate entanglement and transmit classical information. We give analytic expressions for the entanglement generating capacity and entanglement-assisted one-way classical communication capacity of interactions, and show that these quantities are additive, so that the asymptotic capacities equal the corresponding 1-shot capacities. We give general bounds on other capacities, discuss some examples, and conclude with some open questions.  相似文献   
80.
Small Ag particles or clusters dispersed mesoporous SiO2 composite films were prepared by a new method: First the matrix SiO2 films were prepared by sol-gel process combined with the dip-coating technique, then they were soaked in AgNO3 solutions followed by irradiation of γ-ray at room temperature and in ambient pressure. The structures of these films were examined by X-ray diffraction (XRD), high-resolution transmission electron microscope (HRTEM), and optical absorption spectroscopy. It has been shown that the Ag particles grown within the porous SiO2 films are very small, and they are isolated and dispersed from each other with very narrow size distributions. With increasing the soaking concentration and an additional annealing, an opposite peakshift effect of the surface plasmon resonance (SPR) was observed in the optical absorption measurements.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号