全文获取类型
收费全文 | 794篇 |
免费 | 36篇 |
专业分类
电工技术 | 10篇 |
综合类 | 1篇 |
化学工业 | 232篇 |
金属工艺 | 16篇 |
机械仪表 | 18篇 |
建筑科学 | 12篇 |
能源动力 | 15篇 |
轻工业 | 55篇 |
水利工程 | 4篇 |
石油天然气 | 14篇 |
无线电 | 89篇 |
一般工业技术 | 141篇 |
冶金工业 | 97篇 |
自动化技术 | 126篇 |
出版年
2024年 | 3篇 |
2023年 | 9篇 |
2022年 | 12篇 |
2021年 | 19篇 |
2020年 | 20篇 |
2019年 | 32篇 |
2018年 | 18篇 |
2017年 | 22篇 |
2016年 | 19篇 |
2015年 | 20篇 |
2014年 | 30篇 |
2013年 | 28篇 |
2012年 | 32篇 |
2011年 | 48篇 |
2010年 | 33篇 |
2009年 | 22篇 |
2008年 | 47篇 |
2007年 | 47篇 |
2006年 | 39篇 |
2005年 | 24篇 |
2004年 | 20篇 |
2003年 | 23篇 |
2002年 | 18篇 |
2001年 | 10篇 |
2000年 | 4篇 |
1999年 | 16篇 |
1998年 | 20篇 |
1997年 | 24篇 |
1996年 | 14篇 |
1995年 | 8篇 |
1994年 | 10篇 |
1993年 | 14篇 |
1992年 | 9篇 |
1991年 | 8篇 |
1990年 | 4篇 |
1989年 | 7篇 |
1988年 | 6篇 |
1987年 | 6篇 |
1986年 | 4篇 |
1985年 | 6篇 |
1984年 | 6篇 |
1983年 | 8篇 |
1982年 | 6篇 |
1980年 | 3篇 |
1979年 | 7篇 |
1978年 | 3篇 |
1977年 | 5篇 |
1975年 | 4篇 |
1974年 | 3篇 |
1971年 | 3篇 |
排序方式: 共有830条查询结果,搜索用时 12 毫秒
731.
Galzerano G. Sani E. Toncelli A. Tonelli M. Svelto C. Laporta P. 《IEEE transactions on instrumentation and measurement》2006,55(1):128-131
The measurement of the frequency and intensity noise in a novel single-mode 2-/spl mu/m Tm-Ho:KYF laser is presented. The laser frequency noise is measured by exploiting the fringe side of the transmission of a Fabry-Pe/spl acute/rot interferometer. The measured power spectral density of the frequency noise is principally characterized by a random-walk noise contribution, which sets an emission linewidth of /spl sim/ 600 kHz for the 2-/spl mu/m radiation. The relative intensity noise (RIN) reaches the quantum limit of -155 dB/Hz for Fourier frequencies above 1 MHz and shows a maximum level of -90 dB/Hz at the relaxation-oscillation frequency of 20 kHz. 相似文献
732.
The exceptional fluorescence properties of single CdSe quantum rods (QRs) arising from internal and external electric fields are studied. Reversible external field induced switching of the emission in single QRs is reported for the first time. This effect was correlated with local field induced emission intensity reduction and newly observed darkening mechanism. Bimodal spectral jumps under a zero field were also observed and assigned to charged exciton emission, a phenomenon that was likewise directly controlled through an external field. These phenomena point to the use of single QRs as spectrally tunable charge sensitive fluorophores with polarized emission in fluorescence tagging and optical switching applications. 相似文献
733.
The several reports and papers of the past decade suggesting paradigm shifts in engineering education are shown to reveal a common theme, to wit: engineering is an integrative process and thus engineering education, particularly at the baccalaureate level, should be designed toward that end. Suggesting a change in intellectual culture, the roots of contemporary collegiate education in the United States are traced to their origin and attention is given to discussing the current emphasis on reductionism vis-à-vis integration or, said another way, a course-focused education compared to a more holistic approach in which process and knowledge are woven throughout the curriculum. A new construct for systemic change in baccalaureate engineering education is suggested in terms of a taxonomy of intellectual components connected holistically with a core focus on developing human potential, as opposed to the present system in which students are passed serially through course filters. 相似文献
734.
Resistive Random Access Memory Cells with a Bilayer TiO2/SiOX Insulating Stack for Simultaneous Filamentary and Distributed Resistive Switching 下载免费PDF全文
Na Xiao Marco A. Villena Bin Yuan Shaochuan Chen Bingru Wang Marek Eliáš Yuanyuan Shi Fei Hui Xu Jing Andrew Scheuermann Kechao Tang Paul C. McIntyre Mario Lanza 《Advanced functional materials》2017,27(33)
In order to fulfill the information storage needs of modern societies, the performance of electronic nonvolatile memories (NVMs) should be continuously improved. In the past few years, resistive random access memories (RRAM) have raised as one of the most promising technologies for future information storage due to their excellent performance and easy fabrication. In this work, a novel strategy is presented to further extend the performance of RRAMs. By using only cheap and industry friendly materials (Ti, TiO2, SiOX, and n++Si), memory cells are developed that show both filamentary and distributed resistive switching simultaneously (i.e., in the same I–V curve). The devices exhibit unprecedented hysteretic I–V characteristics, high current on/off ratios up to ≈5 orders of magnitude, ultra low currents in high resistive state and low resistive state (100 pA and 125 nA at –0.1 V, respectively), sharp switching transitions, good cycle‐to‐cycle endurance (>1000 cycles), and low device‐to‐device variability. We are not aware of any other resistive switching memory exhibiting such characteristics, which may open the door for the development of advanced NVMs combining the advantages of filamentary and distributed resistive switching mechanisms. 相似文献
735.
Stefan Bouckaert Eli De Poorter Benôit Latré Jeroen Hoebeke Ingrid Moerman Piet Demeester 《Wireless Personal Communications》2010,53(3):443-463
Wireless sensor networks and wireless mesh networks are popular research subjects. The interconnection of both network types
enables next-generation applications and creates new optimization opportunities. However, current single-gateway solutions
are suboptimal, as they do not allow advanced interactions between sensor networks (WSNs) and mesh networks (WMNs). Therefore,
in this article, challenges and opportunities for optimizing the WSN-WMN interconnection are determined. In addition, several
alternative existing and new interconnection approaches are presented and compared. Furthermore, the interconnection of WSNs
and WMNs is used to study challenges and solutions for future heterogeneous network environments. Finally, it is argued that
the use of convergence layers and the development of adaptive network protocols is a promising approach to enable low end
devices to participate in heterogeneous network architectures. 相似文献
736.
737.
Inverse problem in the hyperthermia therapy of cancer with laser heating and plasmonic nanoparticles
Bernard Lamien Guillermo Enrique Eliçabe 《Inverse Problems in Science & Engineering》2017,25(4):608-631
In this paper, laser-induced hyperthermia therapy of cancer is treated as a state estimation problem and solved with a particle filter method, namely the Auxiliary Sampling Importance Resampling algorithm. In state estimation problems, the available measured data are used together with prior knowledge about the physical phenomena, in order to sequentially produce estimates of the desired dynamic variables. Although the hyperthermia treatment of cancer has been addressed in the literature by different computational methods, these usually involved deterministic analyses. On the other hand, state space representation of the problem in a Bayesian framework allows for the analyses of uncertainties present in the mathematical formulation of the problem, as well as in the measured data of observable variables that might be eventually available. Two physical problems are considered in this paper, involving the irradiation with a laser in the near infrared range of a non-homogeneous cylindrical medium representing either a soft-tissue phantom or a skin model, both containing a tumour. The region representing the tumour is assumed to be loaded with nanoparticles in order to enhance the hyperthermia effects and to limit such effects to the tumour. The light propagation problem is coupled with the bioheat transfer equation in the present study. Simulated transient temperature measurements are used in the inverse analysis. 相似文献
738.
Craig Lopatin Daniel Rabinovich Dan Givoli Eli Turkel 《Journal of Nondestructive Evaluation》2017,36(3):48
A model-based non destructive testing (NDT) method is proposed for damage identification in elastic structures, incorporating computational time reversal (TR) analysis. Identification is performed by advancing elastic wave signals, measured at discrete sensor locations, backward in time. In contrast to a previous study, which was purely numerical and employed only synthesized data, here an experimental system with displacement sensors is used to provide physical measurements at the sensor locations. The performance of the system is demonstrated by considering two problems of a thin metal plate in a plane stress state. The first problem, which represents passive damage identification, consists in finding the location of a small impact region from remote measurements. The second problem is the identification of the location of a square hole in the plate. The difficulties one encounters in applying this identification method and ways to overcome them are described. It is concluded that while this is a viable model-based identification method, which may lead, after further development, to a practical NDT procedure, one must be careful when drawing conclusions about its performance based solely on numerical experiments with synthesized data. 相似文献
739.
A UHF double dielectric resonator filter operating in the TE01δ mode has been constructed with a high Q, wide (14%) and reasonably linear tuning range. This has been achieved by varying the gap between the resonators, and using the influence of the end wall on the movable resonator. The experimental device is readily scaleable to the cellular radio wave bands 相似文献
740.
In this paper we present a very practical ciphertext-only cryptanalysis of GSM (Global System for Mobile communications) encrypted
communication, and various active attacks on the GSM protocols. These attacks can even break into GSM networks that use “unbreakable”
ciphers. We first describe a ciphertext-only attack on A5/2 that requires a few dozen milliseconds of encrypted off-the-air
cellular conversation and finds the correct key in less than a second on a personal computer. We extend this attack to a (more
complex) ciphertext-only attack on A5/1. We then describe new (active) attacks on the protocols of networks that use A5/1,
A5/3, or even GPRS (General Packet Radio Service). These attacks exploit flaws in the GSM protocols, and they work whenever
the mobile phone supports a weak cipher such as A5/2. We emphasize that these attacks are on the protocols, and are thus applicable
whenever the cellular phone supports a weak cipher, for example, they are also applicable for attacking A5/3 networks using
the cryptanalysis of A5/1. Unlike previous attacks on GSM that require unrealistic information, like long known-plaintext
periods, our attacks are very practical and do not require any knowledge of the content of the conversation. Furthermore,
we describe how to fortify the attacks to withstand reception errors. As a result, our attacks allow attackers to tap conversations
and decrypt them either in real-time, or at any later time. We present several attack scenarios such as call hijacking, altering
of data messages and call theft.
An earlier version of this paper appears in Barkan et al. (Advances in Cryptology, Proceedings of Crypto 2003, Lecture Notes
in Computer Science, vol. 2729, pp. 600–616, 2003). 相似文献