全文获取类型
收费全文 | 101389篇 |
免费 | 1773篇 |
国内免费 | 541篇 |
专业分类
电工技术 | 1072篇 |
综合类 | 2347篇 |
化学工业 | 15507篇 |
金属工艺 | 5298篇 |
机械仪表 | 3616篇 |
建筑科学 | 2515篇 |
矿业工程 | 599篇 |
能源动力 | 2461篇 |
轻工业 | 4702篇 |
水利工程 | 1388篇 |
石油天然气 | 427篇 |
武器工业 | 1篇 |
无线电 | 11394篇 |
一般工业技术 | 20166篇 |
冶金工业 | 3947篇 |
原子能技术 | 429篇 |
自动化技术 | 27834篇 |
出版年
2024年 | 101篇 |
2023年 | 422篇 |
2022年 | 1003篇 |
2021年 | 1163篇 |
2020年 | 925篇 |
2019年 | 944篇 |
2018年 | 15272篇 |
2017年 | 14032篇 |
2016年 | 10696篇 |
2015年 | 1192篇 |
2014年 | 1073篇 |
2013年 | 1709篇 |
2012年 | 4006篇 |
2011年 | 10324篇 |
2010年 | 9017篇 |
2009年 | 6286篇 |
2008年 | 7419篇 |
2007年 | 8261篇 |
2006年 | 585篇 |
2005年 | 1557篇 |
2004年 | 1387篇 |
2003年 | 1394篇 |
2002年 | 723篇 |
2001年 | 275篇 |
2000年 | 347篇 |
1999年 | 232篇 |
1998年 | 348篇 |
1997年 | 269篇 |
1996年 | 263篇 |
1995年 | 179篇 |
1994年 | 173篇 |
1993年 | 164篇 |
1992年 | 115篇 |
1991年 | 155篇 |
1990年 | 103篇 |
1989年 | 98篇 |
1988年 | 95篇 |
1987年 | 93篇 |
1986年 | 78篇 |
1985年 | 88篇 |
1984年 | 78篇 |
1983年 | 75篇 |
1982年 | 63篇 |
1981年 | 71篇 |
1980年 | 50篇 |
1968年 | 46篇 |
1966年 | 43篇 |
1965年 | 46篇 |
1955年 | 63篇 |
1954年 | 68篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
Quanlong Yang Sergey Kruk Yuehong Xu Qingwei Wang Yogesh Kumar Srivastava Kirill Koshelev Ivan Kravchenko Ranjan Singh Jiaguang Han Yuri Kivshar Ilya Shadrivov 《Advanced functional materials》2020,30(4)
All‐dielectric metasurfaces have become a new paradigm for flat optics as they allow flexible engineering of the electromagnetic space of propagating waves. Such metasurfaces are usually composed of individual subwavelength elements embedded into a host medium or placed on a substrate, which often diminishes the quality of the resonances. The substrate imposes limitations on the metasurface functionalities, especially for infrared and terahertz frequencies. Here a novel concept of membrane Huygens' metasurfaces is introduced. The metasurfaces feature an inverted design, and they consist of arrays of holes made in a thin membrane of high‐index dielectric material, with the response governed by the electric and magnetic Mie resonances excited within dielectric domains of the membrane. Highly efficient transmission combined with the 2π phase coverage in the freestanding membranes is demonstrated. Several functional metadevices for wavefront control are designed, including beam deflector, a lens, and an axicon. Such membrane metasurfaces provide novel opportunities for efficient large‐area metadevices, whose advanced functionality is defined by structuring rather than by chemical composition. 相似文献
992.
993.
Gong Shengrong Guo Li Cui Zhiming 《电子科学学刊(英文版)》2007,24(6):815-820
Block matching has been used for motion estimation and motion compensation in the Audio and Video Standard (AVS) for years. While having an acceptable performance in describing motion between frames, it requires quite a few bits to represent the motion vectors. In certain circumstances, the use of global motion estimation and compensation would perform equally well or even better than the block matching in terms of motion accuracy, while it results in the coding of global motion model parameters. In this letter, we modify an AVS coder by adding (1) six global motion model parameters to the frame header, and (2) mode selection among INTRA, SKIP, INTER-16×16, INTER-16×8, INTER-8×16, INTER-8×8, and Global Motion Compensation (GMC) modes by Lagrange optimal rate-distortion criteria. Simulation results demonstrate that over 0.1dB improvement in PSNR is obtained compared to the AVS coder for an average coded P-frame with the same bitrate. 相似文献
994.
Hsin-Wen Ting Cheng-Wu Lin Bin-Da Liu Soon-Jyh Chang 《Journal of Electronic Testing》2007,23(6):549-558
In order to perform an on-chip test for characterizing both static and transmission parameters of embedded analog-to-digital
converters (ADCs), this paper presents an oscillator-based reconfigurable sinusoidal signal generator which can produce both
high and low frequency sinusoidal signals by switching the oscillator into different modes. Analog and digital signals can
additionally be produced concurrently in both modes to provide not only test stimuli, but also reference responses for the
ADC built-in self-test. The generated oscillation signal amplitude and frequency can be easily and precisely controlled by
simply setting the oscillator clock frequency and initial condition coefficients. Except for a 1-bit digital-to-analog converter
and smoothing filter, this proposed generator is constructed entirely by digital circuits, and hence easily integrates this
silicon function and verifies itself before testing the ADCs.
相似文献
Hsin-Wen TingEmail: |
995.
M. Kamruzzaman Chaoping Liu A. K. M. Farid Ul Islam J. A. Zapien 《Semiconductors》2017,51(12):1615-1624
The thin film of Sb2Se3 was deposited by thermal evaporation method and the film was annealed in N2 flow in a three zone furnace at a temperature of 290°С for 30 min. The structural properties were characterized by scanning electron microscopy (SEM), transmission electron microscopy (ТЕМ), X-ray diffraction (XRD) and Raman spectroscopy, respectively. It is seen that the as-deposited film is amorphous and the annealed film is polycrystalline in nature. The surface of Sb2Se3 film is oxidized with a thickness of 1.15 nm investigated by X-ray photolecetron spectroscopy (XPS) measurement. Spectroscopic ellipsometry (SE) and UV–vis spectroscopy measurements were carried out to study the optical properties of Sb2Se3 film. In addition, the first principles calculations were applied to study the electronic and optical properties of Sb2Se3. From the theoretical calculation it is seen that Sb2Se3 is intrinsically an indirect band gap semiconductor. Importantly, the experimental band gap is in good agreement with the theoretical band gap. Furthermore, the experimental values of n, k, ε1, and ε2 are much closer to the theoretical results. However, the obtained large dielectric constants and refractive index values suggest that exciton binding energy in Sb2Se3 should be relatively small and an antireflective coating is recommended to enhance the light absorption of Sb2Se3 for thin film solar cells application. 相似文献
996.
Andreas Winter 《Journal of Cryptology》2017,30(1):1-21
We show that it is possible for the so-called weak locking capacity of a quantum channel (Guha et al. in Phys Rev X 4:011016, 2014) to be much larger than its private capacity. Both reflect different ways of capturing the notion of reliable communication via a quantum system while leaking almost no information to an eavesdropper; the difference is that the latter imposes an intrinsically quantum security criterion whereas the former requires only a weaker, classical condition. The channels for which this separation is most straightforward to establish are the complementary channels of classical-quantum (cq-)channels and, hence, a subclass of Hadamard channels. We also prove that certain symmetric channels (related to photon number splitting) have positive weak locking capacity in the presence of a vanishingly small pre-shared secret, whereas their private capacity is zero. These findings are powerful illustrations of the difference between two apparently natural notions of privacy in quantum systems, relevant also to quantum key distribution: the older, naïve one based on accessible information, contrasting with the new, composable one embracing the quantum nature of the eavesdropper’s information. Assuming an additivity conjecture for constrained minimum output Rényi entropies, the techniques of the first part demonstrate a single-letter formula for the weak locking capacity of complements to cq-channels, coinciding with a general upper bound of Guha et al. for these channels. Furthermore, still assuming this additivity conjecture, this upper bound is given an operational interpretation for general channels as the maximum weak locking capacity of the channel activated by a suitable noiseless channel. 相似文献
997.
A computational secret-sharing scheme is a method that enables a dealer, that has a secret, to distribute this secret among a set of parties such that a “qualified” subset of parties can efficiently reconstruct the secret while any “unqualified” subset of parties cannot efficiently learn anything about the secret. The collection of “qualified” subsets is defined by a monotone Boolean function. It has been a major open problem to understand which (monotone) functions can be realized by a computational secret-sharing scheme. Yao suggested a method for secret-sharing for any function that has a polynomial-size monotone circuit (a class which is strictly smaller than the class of monotone functions in \({\mathsf {P}}\)). Around 1990 Rudich raised the possibility of obtaining secret-sharing for all monotone functions in \({\mathsf {NP}}\): in order to reconstruct the secret a set of parties must be “qualified” and provide a witness attesting to this fact. Recently, Garg et al. (Symposium on theory of computing conference, STOC, pp 467–476, 2013) put forward the concept of witness encryption, where the goal is to encrypt a message relative to a statement \(x\in L\) for a language \(L\in {\mathsf {NP}}\) such that anyone holding a witness to the statement can decrypt the message; however, if \(x\notin L\), then it is computationally hard to decrypt. Garg et al. showed how to construct several cryptographic primitives from witness encryption and gave a candidate construction. One can show that computational secret-sharing implies witness encryption for the same language. Our main result is the converse: we give a construction of a computational secret-sharing scheme for any monotone function in \({\mathsf {NP}}\) assuming witness encryption for \({\mathsf {NP}}\) and one-way functions. As a consequence we get a completeness theorem for secret-sharing: computational secret-sharing scheme for any single monotone \({\mathsf {NP}}\)-complete function implies a computational secret-sharing scheme for every monotone function in \({\mathsf {NP}}\). 相似文献
998.
Marija Denkovska Pero Latkoski Liljana Gavrilovska 《Wireless Personal Communications》2016,87(3):713-730
This paper investigates the possible coexistence issues between the digital video broadcasting-terrestrial (DVB-T) system and the long term evolution (LTE) that operate in adjacent frequency bands. The proposed methodology for interference assessment evaluates the DVB-T performance degradation in presence of aggregate LTE-800 interference targeting the territory of Macedonia as evaluation area. The simulation analysis quantifies the percentage of interference degraded pixels and obtains the probability of pixel DVB-T service degradation. Furthermore, a measurement trial complements the simulation analysis through the evaluation of the influence of active antenna usage by the DVB-T receivers. The simulation and measurement results in this particular case confirm that the alignment of the active DVB-T receiving antenna towards the LTE-800 base station can substantially increase the degradation whereas aligning of the active DVB-T receiving antenna towards the DVB-T transmitter maintains the efficient TV reception. Finally, this paper proposes a simple algorithm for optimal LTE frequency arrangement, resulting in significant reduction of the LTE interference towards the DVB-T system. 相似文献
999.
Eui-Hak Lee Hwan-Jun Choi Jong-Ho Paik Dong-Sun Kim Hyoung-Kyu Song 《Wireless Personal Communications》2016,88(4):1015-1025
In this paper, the hierarchical space time cyclic delay diversity (H-STCDD) scheme is proposed. Proposed scheme uses hierarchical modulation and achieves approximately full rate. It also uses a cyclic delay diversity scheme, which improves the benefit of channel coding particularly in high SNR environment between source to relay and source to destination. According to simulation result, proposed scheme has up to 2.2 dB better BER performance than conventional cooperative scheme at BER of 10?3 and has similar BER performance with the STCDD scheme particularly in high SNR environment between source to relay and source to destination. Throughput of the proposed scheme is better than those of other cooperative schemes. Therefore proposed scheme is more efficient than other cooperative scheme and can be efficiently used in high SNR environment between source to relay and source to destination. 相似文献
1000.
Hsin-Hung Cho Chin-Feng Lai Timothy K. Shih Han-Chieh Chao 《Mobile Networks and Applications》2016,21(5):846-855
A mature cloud system needs a complete resource allocation policy which includes internal and external allocation. They not only enable users to have better experiences, but also allows the cloud provider to cut costs. In the other words, internal and external allocation are indispensable since a combination of them is only a total solution for whole cloud system. In this paper, we clearly explain the difference between internal allocation (IA) and external allocation (EA) as well as defining the explicit IA and EA problem for the follow up research. Although many researchers have proposed resource allocation methods, they are just based on subjective observations which lead to an imbalance of the overall cloud architecture, and cloud computing resources to operate se-quentially. In order to avoid an imbalanced situation, in previous work, we proposed Data Envelopment Analysis (DEA) to solve this problem; it considers all of a user’s demands to evaluate the overall cloud parameters. However, although DEA can provide a higher quality solution, it requires more time. So we use the Q-learning and Data Envelopment Analysis (DEA) to solve the imbalance problem and reduce computing time. As our simulation results show, the proposed DEA+Qlearning will provide almost best quality but too much calculating time. 相似文献