首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4381篇
  免费   324篇
  国内免费   30篇
电工技术   55篇
综合类   27篇
化学工业   1188篇
金属工艺   139篇
机械仪表   225篇
建筑科学   170篇
矿业工程   11篇
能源动力   235篇
轻工业   345篇
水利工程   98篇
石油天然气   66篇
武器工业   3篇
无线电   372篇
一般工业技术   751篇
冶金工业   152篇
原子能技术   38篇
自动化技术   860篇
  2024年   17篇
  2023年   62篇
  2022年   94篇
  2021年   221篇
  2020年   244篇
  2019年   292篇
  2018年   378篇
  2017年   335篇
  2016年   304篇
  2015年   193篇
  2014年   335篇
  2013年   531篇
  2012年   374篇
  2011年   358篇
  2010年   235篇
  2009年   222篇
  2008年   122篇
  2007年   103篇
  2006年   64篇
  2005年   37篇
  2004年   30篇
  2003年   21篇
  2002年   21篇
  2001年   14篇
  2000年   14篇
  1999年   18篇
  1998年   8篇
  1997年   9篇
  1996年   8篇
  1995年   16篇
  1994年   4篇
  1993年   10篇
  1992年   7篇
  1991年   5篇
  1990年   4篇
  1989年   4篇
  1988年   2篇
  1986年   2篇
  1985年   1篇
  1984年   6篇
  1982年   5篇
  1980年   1篇
  1979年   1篇
  1978年   1篇
  1974年   1篇
  1967年   1篇
排序方式: 共有4735条查询结果,搜索用时 15 毫秒
51.
A multisecret sharing (MSS) is a method for sharing a set of secrets among some participants. They can recover each of these secrets without endangering the other secrets. Two kinds of security models have been proposed for MSS schemes. These models are categorized into 2 types. The first security model is unconditional security. This approach decreases the efficiency of MSS schemes. Therefore, the second type of security, which is more relaxed, appeared. This approach is called computational security. In this paper, with 2 examples, we will show that the current definition of computational security does not satisfy all of our expectations from a secure MSS scheme. In fact, in these examples, recovering a secret leaks information to the other secrets while these schemes are considered secure in view of the computational security. After determining the shortcomings of the current security definition, we propose a new definition for computational security and present an MSS scheme that enjoys rigorous proof of security in terms of the new definition. In addition, a complete comparison in terms of share size, number of public values, and required operations for recovering a secret between our scheme and previous schemes indicates that the presented scheme is efficient.  相似文献   
52.
In this paper an all-optical half-adder was proposed by using self-collimation effect in two-dimensional photonic crystals. Self-collimation effect was obtained in XM direction for wavelength 1500 nm by using square lattice rod-type photonic crystal structure. Plane wave expansion and finite-difference time-domain methods were used to obtain the band structure diagram and simulate the optical behavior of the proposed structure, respectively. The maximum delay time and required input intensity are 1 ps and 54 mW/μm2, respectively. The normalized power-level margins for logics 0 and 1 were obtained to be about 20 and 70%, respectively. The total footprint of the structure is about 75 μm2, which is suitable for all optical integrated circuits.  相似文献   
53.
Estimation of locations of sudden changes in a steplike signal has many signal processing applications; e.g., well-log signal segmentation, ionic-channel signal classification, edge detection, and segmentation of images. In this work, the Cramer-Rao lower bound (CRLB) on locations of steps in one-dimensional (1-D) steplike signals is calculated. The calculation is based on the use of a sigmoidal function to model a sudden-change (step) in the signal. The introduced model has an adjustable parameter that can be used to fit the CRLB calculation to a particular class of steplike signals  相似文献   
54.
This work presents a framework for future studies to better understand the appropriate time to include chemical inhibitors at different stages of asphaltene aggregation in the oil. For this purpose, molecular dynamics (MD) simulations were performed to study the aggregation of asphaltene molecules in heptane, in terms of strength, dynamics, and the occurrence time of each stage of aggregation from single molecules to a large flocculate. Results indicate that the nucleation of nanoaggregates begins prior to 10?ns, clusters start forming at 98?ns, and flocculation happens after 120?ns. It was also observed that the final flocculate had a globular shape.  相似文献   
55.
This study proposes a versatile criterion for estimating quality of images in electrical impedance tomography. The point spread function (PSF) is calculated throughout the domain based on the scattering of energy as responses to a small anomaly spirally moved from the centre to the boundary. The proposed PSF is a measure of weighted spatial variance (WSV) of the conductivity over the whole domain. For each element, the weighting factor is a normalized multiplication of the area of that element by its square intensity. The WSV collectively incorporates all image attributes, i.e., spatial resolution, artifact, amplitude response, positioning error and shape deformation. The location of artifacts, which significantly influences reconstructed images in reality, is taken into account as well. The results illustrate that the proposed measure is more tolerant than existing criteria in evaluating performance of EIT systems in both theory and practice.  相似文献   
56.
Wireless Personal Communications - Software Defined Networks (SDNs) have accelerated and simplified the management, configuration and error detection in today’s networking systems. However,...  相似文献   
57.
In this paper, the context of modeling of the impact of mismatch and statistical variations on analogue circuit building blocks is emphasized. The aim is to develop a new algorithm which predicts the statistical behavior of important parameters of an amplifier including output resistance, voltage gain and trans-conductance. The relative error of standard deviation of statistical parameters will remain less than 5% compared with the most accurate Monte-Carlo (MC) simulations using atomistic library model-cards. In comparison with other models which are based on the normal distribution of parameters, the proposed model does not need this limiting presumption. On the other hand, the proposed algorithm is more efficient compared with time consuming MC atomistic simulations.  相似文献   
58.
Wireless Personal Communications - Software-Defined Networks (SDNs) are developed to compensate the complicated function of the controlling parts of the given network elements and making the...  相似文献   
59.
Wireless Networks - The original version of this article unfortunately contained a mistake in the title. The correct title has been published with this erratum.  相似文献   
60.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号