全文获取类型
收费全文 | 867287篇 |
免费 | 10472篇 |
国内免费 | 2235篇 |
专业分类
电工技术 | 15994篇 |
综合类 | 769篇 |
化学工业 | 134580篇 |
金属工艺 | 33947篇 |
机械仪表 | 26875篇 |
建筑科学 | 21330篇 |
矿业工程 | 4983篇 |
能源动力 | 22337篇 |
轻工业 | 75038篇 |
水利工程 | 9256篇 |
石油天然气 | 16387篇 |
武器工业 | 52篇 |
无线电 | 99081篇 |
一般工业技术 | 170363篇 |
冶金工业 | 155018篇 |
原子能技术 | 18473篇 |
自动化技术 | 75511篇 |
出版年
2021年 | 7314篇 |
2019年 | 6989篇 |
2018年 | 11870篇 |
2017年 | 12122篇 |
2016年 | 12811篇 |
2015年 | 8532篇 |
2014年 | 14193篇 |
2013年 | 40344篇 |
2012年 | 22691篇 |
2011年 | 31244篇 |
2010年 | 24889篇 |
2009年 | 27808篇 |
2008年 | 28783篇 |
2007年 | 28680篇 |
2006年 | 25196篇 |
2005年 | 22937篇 |
2004年 | 22175篇 |
2003年 | 21627篇 |
2002年 | 20911篇 |
2001年 | 20568篇 |
2000年 | 19422篇 |
1999年 | 19712篇 |
1998年 | 45603篇 |
1997年 | 33221篇 |
1996年 | 25995篇 |
1995年 | 20162篇 |
1994年 | 18124篇 |
1993年 | 17631篇 |
1992年 | 13521篇 |
1991年 | 12959篇 |
1990年 | 12732篇 |
1989年 | 12303篇 |
1988年 | 11811篇 |
1987年 | 10411篇 |
1986年 | 10177篇 |
1985年 | 11946篇 |
1984年 | 11029篇 |
1983年 | 10089篇 |
1982年 | 9259篇 |
1981年 | 9301篇 |
1980年 | 8883篇 |
1979年 | 8937篇 |
1978年 | 8629篇 |
1977年 | 9830篇 |
1976年 | 12701篇 |
1975年 | 7579篇 |
1974年 | 7248篇 |
1973年 | 7208篇 |
1972年 | 6116篇 |
1971年 | 5600篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
51.
WiFi access point pricing as a dynamic game 总被引:1,自引:0,他引:1
We study the economic interests of a wireless access point owner and his paying client, and model their interaction as a dynamic game. The key feature of this game is that the players have asymmetric information - the client knows more than the access provider. We find that if a client has a "web browser" utility function (a temporal utility function that grows linearly), it is a Nash equilibrium for the provider to charge the client a constant price per unit time. On the other hand, if the client has a "file transferor" utility function (a utility function that is a step function), the client would be unwilling to pay until the final time slot of the file transfer. We also study an expanded game where an access point sells to a reseller,which in turn sells to a mobile client and show that if the client has a web browser utility function, that constant price is a Nash equilibrium of the three player game. Finally, we study a two player game in which the access point does not know whether he faces a web browser or file transferor type client, and show conditions for which it is not a Nash equilibrium for the access point to maintain a constant price. 相似文献
52.
Wu-An Kuo TingTing Hwang Wu A.C.-H. 《Very Large Scale Integration (VLSI) Systems, IEEE Transactions on》2006,14(1):81-85
This paper presents a novel power-driven multiplication instruction-set design method for application-specific instruction-set processors (ASIPs). Based on a dual-and-configurable-multiplier structure, our proposed method devises a multiplication instruction set for low-power ASIPs. Our method exploits the execution sequences of multiplication instructions and effective bit widths of variables to reduce power consumed by redundant multiplication bits while minimizing the multiplication execution time. Experimental results on a set of DSP programs demonstrate that our proposed method achieves significant power reduction (up to 18.53%) and execution time improvement (up to 10.43%) with 18% area overhead. 相似文献
53.
The phenomenon of persistent tunneling photoconductivity was studied using the tunneling spectroscopy technique at liquid-helium temperature: the separation between the unoccupied levels in a δ-doped layer at the GaAs surface decreased after illumination. This decrease was due to an increase in the width of the quantum well of the δ-doped layer. For photon energies hv exceeding the GaAs band gap E g , this increase in the width of the quantum well was related to the accumulation of positive charge in the depth of GaAs induced by the generation of the electron-hole pairs and photoionization of deep centers. For hv < E g (including the case of CO2 laser), only photoionization is important. The experimental data agree with the self-consistent calculations. The critical temperature for the effect has been determined (T c = 45 K); at higher temperatures, the effect disappears. 相似文献
54.
Finite sample size effect on minimum variance beamformers: optimum diagonal loading factor for large arrays 总被引:6,自引:0,他引:6
Minimum variance beamformers are usually complemented with diagonal loading techniques in order to provide robustness against several impairments such as imprecise knowledge of the steering vector or finite sample size effects. This paper concentrates on this last application of diagonal loading techniques, i.e., it is assumed that the steering vector is perfectly known and that diagonal loading is used to alleviate the finite sample size impairments. The analysis herein is asymptotic in the sense that it is assumed that both the number of antennas and the number of samples are high but have the same order of magnitude. Borrowing some results of random matrix theory, the authors first derive a deterministic expression that describes the asymptotic signal-to-noise-plus-interference ratio (SINR) at the output of the diagonally loaded beamformer. Then, making use of the statistical theory of large observations (also known as general statistical analysis or G-analysis), the authors derive an estimator of the optimum loading factor that is consistent when both the number of antennas and the sample size increase without bound at the same rate. Because of that, the estimator has an excellent performance even in situations where the quotient between the number of observations is low relative to the number of elements of the array. 相似文献
55.
We report for the first time optical signal-to-noise penalties which lead to performance degradations in single-fiber long-reach optical access networks when compared to identical dual-fiber systems. A simplified architecture, with reduced optical amplifier count compared to previous work, for single-fiber operation of a symmetrical 10-Gb/s, 1024-way split, 110-km long-reach optical access network is presented and demonstrated. In addition, a possible solution to remove the optical signal-to-noise penalty is suggested 相似文献
56.
The objective of this study was to compare methane production and characteristics of digested material in anaerobic digestion concepts according to the Animal By-Products Regulation (ABP-Regulation) of the EC (hygienisation of biowaste for 1 hour at 70 degrees C, particle size < 12 mm) and Finnish national regulations (treatment temperature 55 degrees C, feeding interval 24 h, hydraulic retention time (HRT) 20 d, particle size < 40 mm) and with small variations in treatment methods for treating manure and biowaste. Moreover, the survival of three different salmonella bacteria in these processes was studied. Hygienisation of biowaste prior to digestion at 35 degrees C enhanced methane production by 14-18% compared to similar treatment without hygienisation. The differences in treatment temperature, HRT and hygienisation of biowaste prior to digestion did not significantly affect the characteristics of digested material. The concepts according to the ABP-Regulation and Finnish national regulations were effective in destroying salmonella bacteria to an undetectable level. 相似文献
57.
An increase in hydrogen evolution from the hydrogen-evolving enzyme in the actinomycete Frankia was recorded in the presence of nickel. Immunogold localisation analysis of the intracellular distribution of hydrogenase proteins indicated that they were evenly distributed in the membranes and cytosol of both hyphae and vesicles. In addition, molecular characterisation of the hydrogen-evolving enzyme at the proteomic level, using two-dimensional gel electrophoresis combined with mass spectrometry, confirmed that the Frankia hydrogen-evolving enzyme is similar to the cyanobacterial bidirectional hydrogenase of Anabena siamensis. 相似文献
58.
This work considers the problem of increasing the performance of the ciphers based on Data-Dependent (DD) operations (DDO)
for VLSI implementations. New minimum size primitives are proposed to design DDOs. Using advanced DDOs instead of DD permutations
(DDP) in the DDP-based iterative ciphers Cobra-H64 and Cobra-H128 the number of rounds has been significantly reduced yielding
enhancement of the “performance per cost” value and retaining security at the level of indistinguishability from a random
transformation. To obtain further enhancement of this parameter a new crypto-scheme based on the advanced DDOs is proposed.
The FPGA implementation of the proposed crypto-scheme achieves higher throughput value and minimizes the allocated resources
than the conventional designs. Design of the DDO boxes of different orders is considered and their ASIC implementation is
estimated. 相似文献
59.
Gundolf Kiefer Helko Lehmann Jürgen Weese 《IEEE transactions on information technology in biomedicine》2006,10(2):385-394
Maximum intensity projections (MIPs) are an important visualization technique for angiographic data sets. Efficient data inspection requires frame rates of at least five frames per second at preserved image quality. Despite the advances in computer technology, this task remains a challenge. On the one hand, the sizes of computed tomography and magnetic resonance images are increasing rapidly. On the other hand, rendering algorithms do not automatically benefit from the advances in processor technology, especially for large data sets. This is due to the faster evolving processing power and the slower evolving memory access speed, which is bridged by hierarchical cache memory architectures. In this paper, we investigate memory access optimization methods and use them for generating MIPs on general-purpose central processing units (CPUs) and graphics processing units (GPUs), respectively. These methods can work on any level of the memory hierarchy, and we show that properly combined methods can optimize memory access on multiple levels of the hierarchy at the same time. We present performance measurements to compare different algorithm variants and illustrate the influence of the respective techniques. On current hardware, the efficient handling of the memory hierarchy for CPUs improves the rendering performance by a factor of 3 to 4. On GPUs, we observed that the effect is even larger, especially for large data sets. The methods can easily be adjusted to different hardware specifics, although their impact can vary considerably. They can also be used for other rendering techniques than MIPs, and their use for more general image processing task could be investigated in the future. 相似文献
60.
Kruk Menno R.; Halász József; Meelis Wout; Haller József 《Canadian Metallurgical Quarterly》2004,118(5):1062
Aggressive behavior induces an adrenocortical stress response, and sudden stressors often precipitate violent behavior. Experiments in rats revealed a fast, mutual, positive feedback between the adrenocortical stress response and a brain mechanism controlling aggression. Stimulation of the aggressive area in the hypothalamus rapidly activated the adrenocortical response, even in the absence of an opponent and fighting. Hypothalamic aggression, in turn, was rapidly facilitated by a corticosterone injection in rats in which the natural adrenocortical stress response was prevented by adrenalectomy. The rapidity of both effects points to a fast, mutual, positive feedback of the controlling mechanisms within the time frame of a single conflict. Such a mutual facilitation may contribute to the precipitation and escalation of violent behavior under stressful conditions. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献