首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   470149篇
  免费   4636篇
  国内免费   1043篇
电工技术   8434篇
综合类   415篇
化学工业   71349篇
金属工艺   23230篇
机械仪表   16635篇
建筑科学   9768篇
矿业工程   4446篇
能源动力   9692篇
轻工业   30914篇
水利工程   6138篇
石油天然气   14912篇
武器工业   91篇
无线电   50590篇
一般工业技术   103653篇
冶金工业   73459篇
原子能技术   14673篇
自动化技术   37429篇
  2021年   4203篇
  2019年   4174篇
  2018年   7791篇
  2017年   8075篇
  2016年   8529篇
  2015年   4819篇
  2014年   8340篇
  2013年   19653篇
  2012年   12524篇
  2011年   16310篇
  2010年   13062篇
  2009年   14608篇
  2008年   15453篇
  2007年   15180篇
  2006年   13048篇
  2005年   11764篇
  2004年   11418篇
  2003年   11207篇
  2002年   10724篇
  2001年   10626篇
  2000年   10342篇
  1999年   9859篇
  1998年   20257篇
  1997年   15239篇
  1996年   11930篇
  1995年   9552篇
  1994年   8666篇
  1993年   8718篇
  1992年   7274篇
  1991年   7078篇
  1990年   7036篇
  1989年   6714篇
  1988年   6447篇
  1987年   6028篇
  1986年   5878篇
  1985年   6485篇
  1984年   6218篇
  1983年   5756篇
  1982年   5453篇
  1981年   5567篇
  1980年   5404篇
  1979年   5486篇
  1978年   5542篇
  1977年   5910篇
  1976年   6959篇
  1975年   5105篇
  1974年   5147篇
  1973年   5229篇
  1972年   4467篇
  1971年   4108篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
81.
82.
Mobile devices are vulnerable to theft and loss due to their small size and the characteristics of their common usage environment. Since they allow users to work while away from their desk, they are most useful in public locations and while traveling. Unfortunately, this is also where they are most at risk. Existing schemes for securing data either do not protect the device after it is stolen or require bothersome reauthentication. Transient Authentication lifts the burden of authentication from the user by use of a wearable token that constantly attests to the user's presence. When the user departs, the token and device lose contact and the device secures itself. We show how to leverage this authentication framework to secure all the memory and storage locations on a device into which secrets may creep. Our evaluation shows this is done without inconveniencing the user, while imposing a minimal performance overhead  相似文献   
83.
Relations for determining a motive force in a complex model of mass transfer as applied to concurrent, countercurrent, and cross motion of the vapor and liquid phases have been introduced. These forces have been compared for different forms of organization of the flow, and their comparison with similar quantities from the known Murphree and Hausen models is presented.  相似文献   
84.
High-performance circular probe-fed stacked patch antenna designs are explored through the use of numerical optimization. New trends are sought to aid understanding and to suggest novel solutions. We describe the optimization technique, present a new design trend relating efficiency and bandwidth to the choice of substrate dielectric, and propose and demonstrate a novel, optimized antenna achieving 33% bandwidth whilst maintaining greater than 80% surface wave efficiency.  相似文献   
85.
On the capacities of bipartite Hamiltonians and unitary gates   总被引:2,自引:0,他引:2  
We consider interactions as bidirectional channels. We investigate the capacities for interaction Hamiltonians and nonlocal unitary gates to generate entanglement and transmit classical information. We give analytic expressions for the entanglement generating capacity and entanglement-assisted one-way classical communication capacity of interactions, and show that these quantities are additive, so that the asymptotic capacities equal the corresponding 1-shot capacities. We give general bounds on other capacities, discuss some examples, and conclude with some open questions.  相似文献   
86.
Membrane separation technology represents an alternative way to achieve biomass retention in anaerobic bioreactors for wastewater treatment. Due to high biomass concentrations of anaerobic reactors, cake formation is likely to represent a major cause of flux decline. In the presented research, experiments are performed on the effect of biomass concentration and level of gas sparging on the hydraulic capacity of a submerged anaerobic membrane bioreactor. Both parameters significantly affected the hydraulic capacity, with biomass exerting the most pronounced effect. After 50 days of continuous operation the critical flux remained virtually unchanged, despite an increase in membrane resistance, suggesting that biomass characteristics and hydraulic conditions determine the bio-layer formation rather than the membrane's fouling level. The concept of bio-layer management is introduced to describe the programmed combination of actions performed in order to control the formation of biomass layer over membranes.  相似文献   
87.
Recent studies revealed that organic acids such as citric and oxalic acids seemed to be more promising as chemical extracting agents for removal of heavy metals from contaminated sludge, since they are biodegradable and can attain a higher metal extraction efficiency at mildly acidic pH compared to other extracting agents. Results of a lab-scale study on the efficiency of citric acid in the extraction of chromium (Cr), copper (Cu), lead (Pb), nickel (Ni) and zinc (Zn) from anaerobically digested sludge, revealed that citric acid seemed to be highly effective in extracting Cr (at 100%), Cu (at 88%), Ni (at 98%) and Zn (at 100%) at pH 2.33, mostly at 5 days leaching time except for Cu and Zn, which are at 1 day and 2 h contact times respectively. Lead removal at the same pH was also high at 95% but at a longer leaching time of 11 days. At pH 3, citric acid seemed to be highly effective in extracting Pb (at 100%) at 1 day leaching time, although higher removals were also attained for Ni (70%) and Zn (80%) at only 2 h leaching time. Chemical speciation studies showed that Cr, Cu and Ni in the sludge sample seem to predominate in residual fractions, while Pb and Zn were found mostly bound to organic and inorganic matter forms, hence the potential of the sludge for land application.  相似文献   
88.
Robust programming aims to prevent abnormal termination or unexpected actions and requires code to handle bad (invalid or absurd) inputs in a way that is consistent with the developer's intent. For example, if an internal error occurs, the program might terminate gracefully rather than simply failing, providing enough information for the programmer to debug the program and avoiding giving the user additional access or information. This article focuses on teaching these principles.  相似文献   
89.
In this letter, the concept of pseudorandom active reflector, based on the ultra-wideband (UWB) technology, is introduced. It consists of a simple device that repeats a slightly delayed version of the received UWB signal only in certain time intervals according to a suitable pseudorandom time-hopping sequence. An example of application of this device for accurate ranging in precise location systems is given. The advantages of this solution are in the hardware simplicity (only the analog section is present), in the low power consumption of the reflector and in the low timing constraint regarding the relative transmitter and reflector clock rates.  相似文献   
90.
An overview over past and present activities and future developments at the Toulouse pulsed magnetic field facility is given, both as far as technical developments of the infrastructure, as well as low temperature physics performed at the LNCMP are concerned.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号