首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9592篇
  免费   452篇
  国内免费   20篇
电工技术   98篇
综合类   4篇
化学工业   1958篇
金属工艺   140篇
机械仪表   188篇
建筑科学   620篇
矿业工程   21篇
能源动力   317篇
轻工业   847篇
水利工程   108篇
石油天然气   28篇
无线电   697篇
一般工业技术   1986篇
冶金工业   1245篇
原子能技术   36篇
自动化技术   1771篇
  2023年   70篇
  2022年   135篇
  2021年   215篇
  2020年   175篇
  2019年   211篇
  2018年   233篇
  2017年   233篇
  2016年   254篇
  2015年   227篇
  2014年   335篇
  2013年   679篇
  2012年   555篇
  2011年   786篇
  2010年   502篇
  2009年   472篇
  2008年   589篇
  2007年   514篇
  2006年   438篇
  2005年   388篇
  2004年   329篇
  2003年   307篇
  2002年   281篇
  2001年   147篇
  2000年   156篇
  1999年   133篇
  1998年   135篇
  1997年   143篇
  1996年   135篇
  1995年   115篇
  1994年   88篇
  1993年   84篇
  1992年   79篇
  1991年   62篇
  1990年   75篇
  1989年   63篇
  1988年   42篇
  1987年   60篇
  1986年   52篇
  1985年   57篇
  1984年   52篇
  1983年   67篇
  1982年   49篇
  1981年   40篇
  1980年   36篇
  1979年   39篇
  1978年   29篇
  1977年   26篇
  1976年   23篇
  1975年   22篇
  1974年   14篇
排序方式: 共有10000条查询结果,搜索用时 12 毫秒
71.
We conducted a content analysis of news articles (N = 540) to examine whether news coverage of media violence accurately reflects scientific knowledge about exposure to media violence and its effects on viewer aggression. The analysis revealed that over the past 30 years, news articles generally suggested that a link between media violence and aggression exists. However, the tone shifted sharply back toward a neutral conclusion since 2000. This shift may be attributable to the type of medium discussed (e.g., television vs. video games), the number of unaffiliated sources that are cited in the news article, and the sex of the journalist. Implications for how this news coverage may influence news readers are discussed.  相似文献   
72.
The gallium sulphide cubane compounds [(Me2EtC)GaS]4 and [(Et2MeC)GaS]4, have been synthesised, and their potential as MOCVD precursors for GaS is discussed. The molecular structure of [(Et2MeC)GaS]4 has been determined by X-ray diffraction. In addition, the vapour phase structure of the GaSe precursor, [(tBu)GaSe]4 has been determined by gas phase electron diffraction and is compared with that previously determined in the solid state by X-ray diffraction.  相似文献   
73.
下扬子地区中上二叠统发育一套海陆过渡相页岩,其显微组成与海相页岩存在明显的差异,为了研究该套页岩有机孔的发育特征及影响因素,开展了有机岩石学、扫描电镜、氩离子抛光扫描电镜、气测孔隙度和压汞等相关分析。研究表明,中上二叠统页岩中有机孔整体发育较好,但不同有机质组分中孔隙的发育存在明显的差别,具体表现为镜质体内孔隙发育差,固体沥青内发育少量孤立的孔隙,腐泥质内具有丰富的孔隙。黄铁矿或黏土矿物常与有机质形成有机/矿物复合体,复合体内有机孔普遍发育较好,可能与黄铁矿或黏土矿物促进有机质生烃和分解有关。中上二叠统页岩TOC含量与比表面积之间存在明显的线性正相关性,但与孔隙度之间具有复杂的关系,当w(TOC)<6.16%时,孔隙度随TOC含量的增加而增加,而当w(TOC)>6.16%时,孔隙度普遍较低且与TOC含量之间存在微弱的负相关性。孔径分布特征也揭示高TOC页岩的中—大孔体积明显低于低TOC页岩。页岩孔隙结构发育特征表明,TOC含量越高、固体沥青组分以及贫氢组分的含量越高,这些组分占据的矿物孔隙越多,降低了页岩总的孔隙空间,且TOC含量越高,页岩越易被压实,造成中大孔塌陷,进一步降低了页岩的孔隙度。  相似文献   
74.
The negative‐tone epoxy photoresist, SU‐8, expands ≈1% by volume after postexposure baking. However, if the maximum optical fluence is comparable to that at the insolubility threshold, as in a holographic exposure, the developed resist shrinks (≈35% by volume) due to the removal of light oligomers not incorporated into the polymeric network. IR spectroscopy shows that, at this level of exposure, only 15% of the epoxy groups in the insoluble polymer have reacted; consequently microstructural elements soften and collapse at >100 °C. When the light oligomers are removed, the sensitivity of the resist is unchanged, provided that 5% (w/w) of a high‐molecular‐weight reactive plasticizer (glycidoxy‐terminated polyethylene glycol) is added, but it shrinks less on development and, when used as a photonic crystal template, shows improved uniformity with less cracking and buckling. Reinforcing the polymer network by reaction with the polyfunctional amine (bis‐N,N′‐(3‐aminopropyl)ethylenediamine) increases the extent of cross‐linking and the thermal stability, allowing inverse replicas of photonic crystal templates to be fabricated from both Al:ZnO and Zr3N4 using atomic layer deposition at temperatures up to 200 °C.  相似文献   
75.
FULL-RCMA: a high utilization EPON   总被引:3,自引:0,他引:3  
This paper proposes an alternate solution for Ethernet passive optical networks. Our solution uses a novel protocol named full utilization local loop request contention multiple-access protocol to efficiently provide communications in passive optical networks. We study the physical layer implementation, as well as medium access control (MAC) layer protocol performance to illustrate the feasibility and benefit of our solution. The performance studies show that the MAC protocol is capable of offering 95% channel utilization under heavy load conditions. The performance results also indicate that delivery of multimedia traffic with a high quality-of-service can be achieved with our solution.  相似文献   
76.
Parasitic analog-digital noise coupling has been identified as a key issue facing designers of mixed-signal integrated circuits. In particular, signal crosstalk through the common chip substrate has become increasingly problematic. This paper demonstrates a methodology for developing simulation, synthesis, and verification models to analyze the global electrical behavior of the non-ideal semiconductor substrate. First, a triangular discretization method is employed to generate RC equivalent-circuit substrate models which are far less complex than those formulated by conventional techniques. The networks are then accurately approximated for subsequent analysis by an efficient reduction algorithm which uses a well-conditioned Lanczos moment-matching process. Through congruence transformations, the network admittance matrices are transformed to reduced equivalents which are easily post-processed to derive passive, SPICE-compatible netlist representations of the reduced models. The pure-RC properties of the extracted substrate networks are fully exploited to formulate an efficient overall algorithm. For validation, the strategy has been successfully applied to several mixed-signal circuit examples.  相似文献   
77.
Knowledge extraction is a fundamental notion, modeling machine possession of values (witnesses) in a computational complexity sense and enabling one to argue about the internal state of a party in a protocol without probing its internal secret state. However, when transactions are concurrent, say over the Internet, with players possessing public keys (as is common in cryptography), assuring that entities “know” what they claim to know, where adversaries may be well coordinated across different transactions, turns out to be much more subtle and in need of re-examination. In such settings, mixing the public-key structure as part of the language and statements is a natural adversarial strategy. Here, we investigate how to formally treat knowledge possession by parties interacting concurrently in the public-key model. More technically, we look into the relative power of the notion of “concurrent knowledge extraction” (CKE) for concurrent zero knowledge (CZK) in the bare public-key (BPK) model, where the language and statements being proved can be dynamically and adaptively chosen by the prover and may be possibly based on verifiers’ public keys. By concrete attacks against some existing natural protocols, we first show that concurrent soundness and normal arguments of knowledge do not guarantee concurrent verifier security in the public-key setting. Here, roughly speaking, concurrent verifier security says that the malicious concurrent prover should “know" all the witnesses to all the possibly public-key-related statements adaptively chosen and successfully proved in the concurrent sessions. These concrete attacks serve as a good motivation for understanding “possession of knowledge” for concurrent transactions with registered public keys, i.e., the subtleties of concurrent knowledge extraction in the public-key model. This motivates us to introduce and formalize the notion of CKE, along with clarifications of various subtleties. Two implementations are then presented for constant-round concurrently knowledge extractable concurrent zero-knowledge (CZK–CKE) argument for \(\mathcal {NP}\) in the BPK model: One protocol is generic and based on standard polynomial-time assumptions, whereas the other protocol is computationally efficient and employs complexity leveraging in a novel way. Both protocols can be practically instantiated for some specific number-theoretic languages without going through general \(\mathcal {NP}\)-reductions. Of independent interest are the discussions about the subtleties surrounding the fundamental structure of Feige–Shamir zero knowledge in the BPK model.  相似文献   
78.
The increasing threat of multidrug‐resistant bacterial strains against conventional antibiotic therapies represents a significant worldwide health risk and intensifies the need for novel antibacterial treatments. In this work, an effective strategy to target and kill bacteria using silver‐coated magnetic nanocoils is reported. The coil palladium (Pd) nanostructures are obtained by electrodeposition and selective dealloying, and subsequently coated with nickel (Ni) and silver (Ag) for magnetic manipulation and antibacterial properties, respectively. The efficiency of the nanocoils is tested in the treatment of Gram‐negative Escherichia coli (E. coli) and Gram‐positive methicillin‐resistant Staphylococcus aureus (S. aureus), both of which represent the leading multidrug‐resistant bacterial pathogens. The nanocoils show highly effective bacterial killing activity at low concentrations and in relatively short durations of treatment time. Three different investigation techniques, LIVE/DEAD assay, colony‐forming unit counting, and scanning electron microscope, reveal that the antibacterial activity is a result of bacterial membrane damage caused by direct contact with the nanocoil. The low cytotoxicity toward fibroblast cells along with the capability of precise magnetic locomotion makes the proposed nanocoil an ideal candidate to combat multidrug‐resistant bacteria in the field of biomedical and environmental applications.  相似文献   
79.
The high demand for wireless Internet connectivity has driven the development of highly efficient radio link technologies. However, their performance can be compromised by inadvertent interactions with the higher-layer TCP flow control protocol. Maximizing the performance of wireless links requires that mechanisms operating at every layer of the protocol stack interact efficiently. This article provides a brief tutorial of some of these radio link enhancements. It then outlines how higher-layer flow control protocols should behave, and provides techniques for taming the behavior of TCP, to ensure that the performance of lower-layer enhancements is not compromised.  相似文献   
80.
A fast, accurate and fully automatic method of segmenting magnetic resonance images of the human brain is introduced. The approach scales well allowing fast segmentations of fine resolution images. The approach is based on modifications of the soft clustering algorithm, fuzzy c-means, that enable it to scale to large data sets. Two types of modifications to create incremental versions of fuzzy c-means are discussed. They are much faster when compared to fuzzy c-means for medium to extremely large data sets because they work on successive subsets of the data. They are comparable in quality to application of fuzzy c-means to all of the data. The clustering algorithms coupled with inhomogeneity correction and smoothing are used to create a framework for automatically segmenting magnetic resonance images of the human brain. The framework is applied to a set of normal human brain volumes acquired from different magnetic resonance scanners using different head coils, acquisition parameters and field strengths. Results are compared to those from two widely used magnetic resonance image segmentation programs, Statistical Parametric Mapping and the FMRIB Software Library (FSL). The results are comparable to FSL while providing significant speed-up and better scalability to larger volumes of data.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号