首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   794篇
  免费   36篇
电工技术   10篇
综合类   1篇
化学工业   232篇
金属工艺   16篇
机械仪表   18篇
建筑科学   12篇
能源动力   15篇
轻工业   55篇
水利工程   4篇
石油天然气   14篇
无线电   89篇
一般工业技术   141篇
冶金工业   97篇
自动化技术   126篇
  2024年   3篇
  2023年   9篇
  2022年   12篇
  2021年   19篇
  2020年   20篇
  2019年   32篇
  2018年   18篇
  2017年   22篇
  2016年   19篇
  2015年   20篇
  2014年   30篇
  2013年   28篇
  2012年   32篇
  2011年   48篇
  2010年   33篇
  2009年   22篇
  2008年   47篇
  2007年   47篇
  2006年   39篇
  2005年   24篇
  2004年   20篇
  2003年   23篇
  2002年   18篇
  2001年   10篇
  2000年   4篇
  1999年   16篇
  1998年   20篇
  1997年   24篇
  1996年   14篇
  1995年   8篇
  1994年   10篇
  1993年   14篇
  1992年   9篇
  1991年   8篇
  1990年   4篇
  1989年   7篇
  1988年   6篇
  1987年   6篇
  1986年   4篇
  1985年   6篇
  1984年   6篇
  1983年   8篇
  1982年   6篇
  1980年   3篇
  1979年   7篇
  1978年   3篇
  1977年   5篇
  1975年   4篇
  1974年   3篇
  1971年   3篇
排序方式: 共有830条查询结果,搜索用时 12 毫秒
731.
The measurement of the frequency and intensity noise in a novel single-mode 2-/spl mu/m Tm-Ho:KYF laser is presented. The laser frequency noise is measured by exploiting the fringe side of the transmission of a Fabry-Pe/spl acute/rot interferometer. The measured power spectral density of the frequency noise is principally characterized by a random-walk noise contribution, which sets an emission linewidth of /spl sim/ 600 kHz for the 2-/spl mu/m radiation. The relative intensity noise (RIN) reaches the quantum limit of -155 dB/Hz for Fourier frequencies above 1 MHz and shows a maximum level of -90 dB/Hz at the relaxation-oscillation frequency of 20 kHz.  相似文献   
732.
The exceptional fluorescence properties of single CdSe quantum rods (QRs) arising from internal and external electric fields are studied. Reversible external field induced switching of the emission in single QRs is reported for the first time. This effect was correlated with local field induced emission intensity reduction and newly observed darkening mechanism. Bimodal spectral jumps under a zero field were also observed and assigned to charged exciton emission, a phenomenon that was likewise directly controlled through an external field. These phenomena point to the use of single QRs as spectrally tunable charge sensitive fluorophores with polarized emission in fluorescence tagging and optical switching applications.  相似文献   
733.
The several reports and papers of the past decade suggesting paradigm shifts in engineering education are shown to reveal a common theme, to wit: engineering is an integrative process and thus engineering education, particularly at the baccalaureate level, should be designed toward that end. Suggesting a change in intellectual culture, the roots of contemporary collegiate education in the United States are traced to their origin and attention is given to discussing the current emphasis on reductionism vis-à-vis integration or, said another way, a course-focused education compared to a more holistic approach in which process and knowledge are woven throughout the curriculum. A new construct for systemic change in baccalaureate engineering education is suggested in terms of a taxonomy of intellectual components connected holistically with a core focus on developing human potential, as opposed to the present system in which students are passed serially through course filters.  相似文献   
734.
In order to fulfill the information storage needs of modern societies, the performance of electronic nonvolatile memories (NVMs) should be continuously improved. In the past few years, resistive random access memories (RRAM) have raised as one of the most promising technologies for future information storage due to their excellent performance and easy fabrication. In this work, a novel strategy is presented to further extend the performance of RRAMs. By using only cheap and industry friendly materials (Ti, TiO2, SiOX, and n++Si), memory cells are developed that show both filamentary and distributed resistive switching simultaneously (i.e., in the same IV curve). The devices exhibit unprecedented hysteretic IV characteristics, high current on/off ratios up to ≈5 orders of magnitude, ultra low currents in high resistive state and low resistive state (100 pA and 125 nA at –0.1 V, respectively), sharp switching transitions, good cycle‐to‐cycle endurance (>1000 cycles), and low device‐to‐device variability. We are not aware of any other resistive switching memory exhibiting such characteristics, which may open the door for the development of advanced NVMs combining the advantages of filamentary and distributed resistive switching mechanisms.  相似文献   
735.
Wireless sensor networks and wireless mesh networks are popular research subjects. The interconnection of both network types enables next-generation applications and creates new optimization opportunities. However, current single-gateway solutions are suboptimal, as they do not allow advanced interactions between sensor networks (WSNs) and mesh networks (WMNs). Therefore, in this article, challenges and opportunities for optimizing the WSN-WMN interconnection are determined. In addition, several alternative existing and new interconnection approaches are presented and compared. Furthermore, the interconnection of WSNs and WMNs is used to study challenges and solutions for future heterogeneous network environments. Finally, it is argued that the use of convergence layers and the development of adaptive network protocols is a promising approach to enable low end devices to participate in heterogeneous network architectures.  相似文献   
736.
737.
In this paper, laser-induced hyperthermia therapy of cancer is treated as a state estimation problem and solved with a particle filter method, namely the Auxiliary Sampling Importance Resampling algorithm. In state estimation problems, the available measured data are used together with prior knowledge about the physical phenomena, in order to sequentially produce estimates of the desired dynamic variables. Although the hyperthermia treatment of cancer has been addressed in the literature by different computational methods, these usually involved deterministic analyses. On the other hand, state space representation of the problem in a Bayesian framework allows for the analyses of uncertainties present in the mathematical formulation of the problem, as well as in the measured data of observable variables that might be eventually available. Two physical problems are considered in this paper, involving the irradiation with a laser in the near infrared range of a non-homogeneous cylindrical medium representing either a soft-tissue phantom or a skin model, both containing a tumour. The region representing the tumour is assumed to be loaded with nanoparticles in order to enhance the hyperthermia effects and to limit such effects to the tumour. The light propagation problem is coupled with the bioheat transfer equation in the present study. Simulated transient temperature measurements are used in the inverse analysis.  相似文献   
738.
A model-based non destructive testing (NDT) method is proposed for damage identification in elastic structures, incorporating computational time reversal (TR) analysis. Identification is performed by advancing elastic wave signals, measured at discrete sensor locations, backward in time. In contrast to a previous study, which was purely numerical and employed only synthesized data, here an experimental system with displacement sensors is used to provide physical measurements at the sensor locations. The performance of the system is demonstrated by considering two problems of a thin metal plate in a plane stress state. The first problem, which represents passive damage identification, consists in finding the location of a small impact region from remote measurements. The second problem is the identification of the location of a square hole in the plate. The difficulties one encounters in applying this identification method and ways to overcome them are described. It is concluded that while this is a viable model-based identification method, which may lead, after further development, to a practical NDT procedure, one must be careful when drawing conclusions about its performance based solely on numerical experiments with synthesized data.  相似文献   
739.
Howson  D.P. Sani  B.M. 《Electronics letters》1995,31(19):1652-1653
A UHF double dielectric resonator filter operating in the TE01δ mode has been constructed with a high Q, wide (14%) and reasonably linear tuning range. This has been achieved by varying the gap between the resonators, and using the influence of the end wall on the movable resonator. The experimental device is readily scaleable to the cellular radio wave bands  相似文献   
740.
Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication   总被引:1,自引:0,他引:1  
In this paper we present a very practical ciphertext-only cryptanalysis of GSM (Global System for Mobile communications) encrypted communication, and various active attacks on the GSM protocols. These attacks can even break into GSM networks that use “unbreakable” ciphers. We first describe a ciphertext-only attack on A5/2 that requires a few dozen milliseconds of encrypted off-the-air cellular conversation and finds the correct key in less than a second on a personal computer. We extend this attack to a (more complex) ciphertext-only attack on A5/1. We then describe new (active) attacks on the protocols of networks that use A5/1, A5/3, or even GPRS (General Packet Radio Service). These attacks exploit flaws in the GSM protocols, and they work whenever the mobile phone supports a weak cipher such as A5/2. We emphasize that these attacks are on the protocols, and are thus applicable whenever the cellular phone supports a weak cipher, for example, they are also applicable for attacking A5/3 networks using the cryptanalysis of A5/1. Unlike previous attacks on GSM that require unrealistic information, like long known-plaintext periods, our attacks are very practical and do not require any knowledge of the content of the conversation. Furthermore, we describe how to fortify the attacks to withstand reception errors. As a result, our attacks allow attackers to tap conversations and decrypt them either in real-time, or at any later time. We present several attack scenarios such as call hijacking, altering of data messages and call theft. An earlier version of this paper appears in Barkan et al. (Advances in Cryptology, Proceedings of Crypto 2003, Lecture Notes in Computer Science, vol. 2729, pp. 600–616, 2003).  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号