首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   101389篇
  免费   1773篇
  国内免费   541篇
电工技术   1072篇
综合类   2347篇
化学工业   15507篇
金属工艺   5298篇
机械仪表   3616篇
建筑科学   2515篇
矿业工程   599篇
能源动力   2461篇
轻工业   4702篇
水利工程   1388篇
石油天然气   427篇
武器工业   1篇
无线电   11394篇
一般工业技术   20166篇
冶金工业   3947篇
原子能技术   429篇
自动化技术   27834篇
  2024年   101篇
  2023年   422篇
  2022年   1003篇
  2021年   1163篇
  2020年   925篇
  2019年   944篇
  2018年   15272篇
  2017年   14032篇
  2016年   10696篇
  2015年   1192篇
  2014年   1073篇
  2013年   1709篇
  2012年   4006篇
  2011年   10324篇
  2010年   9017篇
  2009年   6286篇
  2008年   7419篇
  2007年   8261篇
  2006年   585篇
  2005年   1557篇
  2004年   1387篇
  2003年   1394篇
  2002年   723篇
  2001年   275篇
  2000年   347篇
  1999年   232篇
  1998年   348篇
  1997年   269篇
  1996年   263篇
  1995年   179篇
  1994年   173篇
  1993年   164篇
  1992年   115篇
  1991年   155篇
  1990年   103篇
  1989年   98篇
  1988年   95篇
  1987年   93篇
  1986年   78篇
  1985年   88篇
  1984年   78篇
  1983年   75篇
  1982年   63篇
  1981年   71篇
  1980年   50篇
  1968年   46篇
  1966年   43篇
  1965年   46篇
  1955年   63篇
  1954年   68篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
All‐dielectric metasurfaces have become a new paradigm for flat optics as they allow flexible engineering of the electromagnetic space of propagating waves. Such metasurfaces are usually composed of individual subwavelength elements embedded into a host medium or placed on a substrate, which often diminishes the quality of the resonances. The substrate imposes limitations on the metasurface functionalities, especially for infrared and terahertz frequencies. Here a novel concept of membrane Huygens' metasurfaces is introduced. The metasurfaces feature an inverted design, and they consist of arrays of holes made in a thin membrane of high‐index dielectric material, with the response governed by the electric and magnetic Mie resonances excited within dielectric domains of the membrane. Highly efficient transmission combined with the 2π phase coverage in the freestanding membranes is demonstrated. Several functional metadevices for wavefront control are designed, including beam deflector, a lens, and an axicon. Such membrane metasurfaces provide novel opportunities for efficient large‐area metadevices, whose advanced functionality is defined by structuring rather than by chemical composition.  相似文献   
992.
993.
Block matching has been used for motion estimation and motion compensation in the Audio and Video Standard (AVS) for years. While having an acceptable performance in describing motion between frames, it requires quite a few bits to represent the motion vectors. In certain circumstances, the use of global motion estimation and compensation would perform equally well or even better than the block matching in terms of motion accuracy, while it results in the coding of global motion model parameters. In this letter, we modify an AVS coder by adding (1) six global motion model parameters to the frame header, and (2) mode selection among INTRA, SKIP, INTER-16×16, INTER-16×8, INTER-8×16, INTER-8×8, and Global Motion Compensation (GMC) modes by Lagrange optimal rate-distortion criteria. Simulation results demonstrate that over 0.1dB improvement in PSNR is obtained compared to the AVS coder for an average coded P-frame with the same bitrate.  相似文献   
994.
In order to perform an on-chip test for characterizing both static and transmission parameters of embedded analog-to-digital converters (ADCs), this paper presents an oscillator-based reconfigurable sinusoidal signal generator which can produce both high and low frequency sinusoidal signals by switching the oscillator into different modes. Analog and digital signals can additionally be produced concurrently in both modes to provide not only test stimuli, but also reference responses for the ADC built-in self-test. The generated oscillation signal amplitude and frequency can be easily and precisely controlled by simply setting the oscillator clock frequency and initial condition coefficients. Except for a 1-bit digital-to-analog converter and smoothing filter, this proposed generator is constructed entirely by digital circuits, and hence easily integrates this silicon function and verifies itself before testing the ADCs.
Hsin-Wen TingEmail:
  相似文献   
995.
The thin film of Sb2Se3 was deposited by thermal evaporation method and the film was annealed in N2 flow in a three zone furnace at a temperature of 290°С for 30 min. The structural properties were characterized by scanning electron microscopy (SEM), transmission electron microscopy (ТЕМ), X-ray diffraction (XRD) and Raman spectroscopy, respectively. It is seen that the as-deposited film is amorphous and the annealed film is polycrystalline in nature. The surface of Sb2Se3 film is oxidized with a thickness of 1.15 nm investigated by X-ray photolecetron spectroscopy (XPS) measurement. Spectroscopic ellipsometry (SE) and UV–vis spectroscopy measurements were carried out to study the optical properties of Sb2Se3 film. In addition, the first principles calculations were applied to study the electronic and optical properties of Sb2Se3. From the theoretical calculation it is seen that Sb2Se3 is intrinsically an indirect band gap semiconductor. Importantly, the experimental band gap is in good agreement with the theoretical band gap. Furthermore, the experimental values of n, k, ε1, and ε2 are much closer to the theoretical results. However, the obtained large dielectric constants and refractive index values suggest that exciton binding energy in Sb2Se3 should be relatively small and an antireflective coating is recommended to enhance the light absorption of Sb2Se3 for thin film solar cells application.  相似文献   
996.
We show that it is possible for the so-called weak locking capacity of a quantum channel (Guha et al. in Phys Rev X 4:011016, 2014) to be much larger than its private capacity. Both reflect different ways of capturing the notion of reliable communication via a quantum system while leaking almost no information to an eavesdropper; the difference is that the latter imposes an intrinsically quantum security criterion whereas the former requires only a weaker, classical condition. The channels for which this separation is most straightforward to establish are the complementary channels of classical-quantum (cq-)channels and, hence, a subclass of Hadamard channels. We also prove that certain symmetric channels (related to photon number splitting) have positive weak locking capacity in the presence of a vanishingly small pre-shared secret, whereas their private capacity is zero. These findings are powerful illustrations of the difference between two apparently natural notions of privacy in quantum systems, relevant also to quantum key distribution: the older, naïve one based on accessible information, contrasting with the new, composable one embracing the quantum nature of the eavesdropper’s information. Assuming an additivity conjecture for constrained minimum output Rényi entropies, the techniques of the first part demonstrate a single-letter formula for the weak locking capacity of complements to cq-channels, coinciding with a general upper bound of Guha et al. for these channels. Furthermore, still assuming this additivity conjecture, this upper bound is given an operational interpretation for general channels as the maximum weak locking capacity of the channel activated by a suitable noiseless channel.  相似文献   
997.
A computational secret-sharing scheme is a method that enables a dealer, that has a secret, to distribute this secret among a set of parties such that a “qualified” subset of parties can efficiently reconstruct the secret while any “unqualified” subset of parties cannot efficiently learn anything about the secret. The collection of “qualified” subsets is defined by a monotone Boolean function. It has been a major open problem to understand which (monotone) functions can be realized by a computational secret-sharing scheme. Yao suggested a method for secret-sharing for any function that has a polynomial-size monotone circuit (a class which is strictly smaller than the class of monotone functions in \({\mathsf {P}}\)). Around 1990 Rudich raised the possibility of obtaining secret-sharing for all monotone functions in \({\mathsf {NP}}\): in order to reconstruct the secret a set of parties must be “qualified” and provide a witness attesting to this fact. Recently, Garg et al. (Symposium on theory of computing conference, STOC, pp 467–476, 2013) put forward the concept of witness encryption, where the goal is to encrypt a message relative to a statement \(x\in L\) for a language \(L\in {\mathsf {NP}}\) such that anyone holding a witness to the statement can decrypt the message; however, if \(x\notin L\), then it is computationally hard to decrypt. Garg et al. showed how to construct several cryptographic primitives from witness encryption and gave a candidate construction. One can show that computational secret-sharing implies witness encryption for the same language. Our main result is the converse: we give a construction of a computational secret-sharing scheme for any monotone function in \({\mathsf {NP}}\) assuming witness encryption for \({\mathsf {NP}}\) and one-way functions. As a consequence we get a completeness theorem for secret-sharing: computational secret-sharing scheme for any single monotone \({\mathsf {NP}}\)-complete function implies a computational secret-sharing scheme for every monotone function in \({\mathsf {NP}}\).  相似文献   
998.
This paper investigates the possible coexistence issues between the digital video broadcasting-terrestrial (DVB-T) system and the long term evolution (LTE) that operate in adjacent frequency bands. The proposed methodology for interference assessment evaluates the DVB-T performance degradation in presence of aggregate LTE-800 interference targeting the territory of Macedonia as evaluation area. The simulation analysis quantifies the percentage of interference degraded pixels and obtains the probability of pixel DVB-T service degradation. Furthermore, a measurement trial complements the simulation analysis through the evaluation of the influence of active antenna usage by the DVB-T receivers. The simulation and measurement results in this particular case confirm that the alignment of the active DVB-T receiving antenna towards the LTE-800 base station can substantially increase the degradation whereas aligning of the active DVB-T receiving antenna towards the DVB-T transmitter maintains the efficient TV reception. Finally, this paper proposes a simple algorithm for optimal LTE frequency arrangement, resulting in significant reduction of the LTE interference towards the DVB-T system.  相似文献   
999.
In this paper, the hierarchical space time cyclic delay diversity (H-STCDD) scheme is proposed. Proposed scheme uses hierarchical modulation and achieves approximately full rate. It also uses a cyclic delay diversity scheme, which improves the benefit of channel coding particularly in high SNR environment between source to relay and source to destination. According to simulation result, proposed scheme has up to 2.2 dB better BER performance than conventional cooperative scheme at BER of 10?3 and has similar BER performance with the STCDD scheme particularly in high SNR environment between source to relay and source to destination. Throughput of the proposed scheme is better than those of other cooperative schemes. Therefore proposed scheme is more efficient than other cooperative scheme and can be efficiently used in high SNR environment between source to relay and source to destination.  相似文献   
1000.
A mature cloud system needs a complete resource allocation policy which includes internal and external allocation. They not only enable users to have better experiences, but also allows the cloud provider to cut costs. In the other words, internal and external allocation are indispensable since a combination of them is only a total solution for whole cloud system. In this paper, we clearly explain the difference between internal allocation (IA) and external allocation (EA) as well as defining the explicit IA and EA problem for the follow up research. Although many researchers have proposed resource allocation methods, they are just based on subjective observations which lead to an imbalance of the overall cloud architecture, and cloud computing resources to operate se-quentially. In order to avoid an imbalanced situation, in previous work, we proposed Data Envelopment Analysis (DEA) to solve this problem; it considers all of a user’s demands to evaluate the overall cloud parameters. However, although DEA can provide a higher quality solution, it requires more time. So we use the Q-learning and Data Envelopment Analysis (DEA) to solve the imbalance problem and reduce computing time. As our simulation results show, the proposed DEA+Qlearning will provide almost best quality but too much calculating time.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号