首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7015篇
  免费   409篇
  国内免费   17篇
电工技术   77篇
综合类   5篇
化学工业   1751篇
金属工艺   410篇
机械仪表   197篇
建筑科学   161篇
矿业工程   19篇
能源动力   184篇
轻工业   1300篇
水利工程   77篇
石油天然气   27篇
无线电   389篇
一般工业技术   1104篇
冶金工业   765篇
原子能技术   34篇
自动化技术   941篇
  2024年   50篇
  2023年   87篇
  2022年   206篇
  2021年   317篇
  2020年   211篇
  2019年   250篇
  2018年   339篇
  2017年   342篇
  2016年   321篇
  2015年   266篇
  2014年   270篇
  2013年   402篇
  2012年   392篇
  2011年   982篇
  2010年   295篇
  2009年   340篇
  2008年   263篇
  2007年   224篇
  2006年   179篇
  2005年   152篇
  2004年   111篇
  2003年   117篇
  2002年   94篇
  2001年   85篇
  2000年   82篇
  1999年   73篇
  1998年   233篇
  1997年   142篇
  1996年   122篇
  1995年   81篇
  1994年   73篇
  1993年   51篇
  1992年   30篇
  1991年   24篇
  1990年   18篇
  1989年   34篇
  1988年   20篇
  1987年   18篇
  1986年   17篇
  1985年   12篇
  1984年   13篇
  1983年   5篇
  1982年   6篇
  1981年   9篇
  1980年   6篇
  1979年   9篇
  1977年   7篇
  1976年   25篇
  1974年   6篇
  1972年   4篇
排序方式: 共有7441条查询结果,搜索用时 15 毫秒
71.
用于平板显示器的RGB LED   总被引:1,自引:0,他引:1  
LED背光变得比CCFL还常用。带有RGB LED背光的LCD显示器而板可以实现出色的色彩还原,加强了观看体验。跟一般的CCFL不同,RGB LED扩展了可视色彩的范围。CCFL背光显示器的色域(频谱)有限,并且色彩鲜艳度不足,见图1。CCFL覆盖NTSC色域约为80%,而RGB可  相似文献   
72.
An accurate mapping of Internet traffic to applications can be important for a broad range of network management and measurement tasks, including traffic engineering, service differentiation, performance/failure monitoring and security. Traditional mapping approaches have become increasingly inaccurate because many applications use non-default or ephemeral port numbers, use well-known port numbers associated with other applications, change application signatures or use traffic encryption. In this paper we will demonstrate that multiscale traffic analysis based on multi-order wavelet spectrum can be used as a discriminator of Internet applications traffic profiles. By performing clustering analysis over the multiscale wavelet spectrum coefficients that are inferred from the measured traffic, the proposed methodology is able to efficiently differentiate different IP applications without using any payload information. This characteristic will allow the differentiation of traffic flows in unencrypted and encrypted scenarios. In order to compare the differentiating potential of different traffic application data, upload, download and joint upload and download flow statistics are considered to evaluate the identification approach for each selected protocol. Moreover, we also evaluate which timescales and spectrum orders are more relevant for the traffic differentiation. From the analysis of the obtained results we can conclude that the proposed methodology is able to achieve good identification results using a small set of timescales of a single order wavelet spectrum of a general raw traffic statistic.  相似文献   
73.
Silicon nanowires have been implemented in microfabricated structures to develop planar thermoelectric microgenerators (??TEGs) monolithically integrated in silicon to convert heat flow from thermal gradients naturally present in the environment into electrical energy. The compatibility of typical microfabrication technologies and the vapor?Cliquid?Csolid (VLS) mechanism employed for silicon nanowire growth has been evaluated. Low-thermal-mass suspended structures have been designed, simulated, and microfabricated on silicon-on-insulator substrates to passively generate thermal gradients and operate as microgenerators using silicon nanowires as thermoelectric material. Both electrical measurements to evaluate the connectivity of the nanowires and thermoreflectance imaging to determine the heat transfer along the device have been employed.  相似文献   
74.
This paper discusses bandwidth problems associated with second-generation current conveyors (CCII). In particular, our work is centered in high-capacitance applications, and has been oriented for wireless optical links and applied physics. We discuss techniques for improving bandwidth in these CCIIs, and develop a new CCII structure with larger bandwidth than traditional circuits. These circuits are then compared in terms of their noise and dynamic range characteristics. A test circuit was developed to verify these different bandwidth behaviors.  相似文献   
75.
The versatile electrospinning technique is recognized as an efficient strategy to deliver active pharmaceutical ingredients and has gained tremendous progress in drug delivery, tissue engineering, cancer therapy, and disease diagnosis. Numerous drug delivery systems fabricated through electrospinning regarding the carrier compositions, drug incorporation techniques, release kinetics, and the subsequent therapeutic efficacy are presented herein. Targeting for distinct applications, the composition of drug carriers vary from natural/synthetic polymers/blends, inorganic materials, and even hybrids. Various drug incorporation approaches through electrospinning are thoroughly discussed with respect to the principles, benefits, and limitations. To meet the various requirements in actual sophisticated in vivo environments and to overcome the limitations of a single carrier system, feasible combinations of multiple drug‐inclusion processes via electrospinning could be employed to achieve programmed, multi‐staged, or stimuli‐triggered release of multiple drugs. The therapeutic efficacy of the designed electrospun drug‐eluting systems is further verified in multiple biomedical applications and is comprehensively overviewed, demonstrating promising potential to address a variety of clinical challenges.  相似文献   
76.
77.
In Tunable-Transmitter Fixed-Receiver (TT-FR)-based Wavelength Division Multiplexed (WDM) ring topologies, each node is provided with a dedicated wavelength (home channel) for reception, which must be shared by the upstream nodes willing to communicate with it. Thus, to avoid channel collisions, it is necessary to define a Medium Access Control (MAC) mechanism that arbitrates access to a given destination wavelength. This work proposes and analyses a simple MAC mechanism that avoids channel collisions by recirculating traffic on the upstream ring segment where congestion was detected. Essentially, whenever a given node has got any traffic to transmit, it must first block access to in-transit traffic, which is reflected back to the upstream node over a second optical fibre. Such blocked traffic is given a second chance to pass through the congested node after a round segment delay, thus making use of the ring topology as buffering units. This work analyses the performance operation of such a MAC protocol under two policies applied to recirculated traffic: (1) recirculation bypass and (2) recirculation store-and-forward.  相似文献   
78.
This article discusses the applicability of quadrature ΣΔ modulator (QΣΔM) based analog-to-digital (A/D) conversion in cognitive radio (CR) receivers. First, unavoidable in-phase/quadrature (I/Q) mismatch effects, limiting the dynamic range, are analyzed in closed-form in the case of a first-order modulator. In addition, using the derived analytical converter model, it is shown that notching the signal transfer function (STF) of the modulator at the mirror frequencies of the desired signals will effectively cancel the I/Q imbalance induced mirror-frequency interference in case of the modulator feedback mismatch. In practice, such STF design is easy to implement within the existing converter circuitry, as will be demonstrated in this article. The latter part of the article proposes a novel complex multiband QΣΔM scheme, particularly aimed for the CR receivers. This multiband scheme allows parallel reception of scattered frequency chunks in the CR context and is stemming from the additional degrees of freedom in noise transfer function (NTF) design, provided by the QΣΔM principle. Here multiple noise shaping notches on distinct frequencies are effectively realized through proper design of complex NTF. The modulator structure also allows flexible reconfigurability of the notches with straightforward parameterization of the modulator transfer functions. When combined with the above mirror-frequency rejecting STF design, the concept is demonstrated and proved effective and robust against I/Q imbalances using practical radio signal simulations in realistic received signal conditions.  相似文献   
79.
Class I hydrophobin Vmh2, a peculiar surface active and versatile fungal protein, is known to self‐assemble into chemically stable amphiphilic films, to be able to change wettability of surfaces, and to strongly adsorb other proteins. Herein, a fast, highly homogeneous and efficient glass functionalization by spontaneous self‐assembling of Vmh2 at liquid–solid interfaces is achieved (in 2 min). The Vmh2‐coated glass slides are proven to immobilize not only proteins but also nanomaterials such as graphene oxide (GO) and quantum dots (QDs). As models, bovine serum albumin labeled with Alexa 555 fluorophore, anti‐immunoglobulin G antibodies, and cadmium telluride QDs are patterned in a microarray fashion in order to demonstrate functionality, reproducibility, and versatility of the proposed substrate. Additionally, a GO layer is effectively and homogeneously self‐assembled onto the studied functionalized surface. This approach offers a quick and simple alternative to immobilize nanomaterials and proteins, which is appealing for new bioanalytical and nanobioenabled applications.  相似文献   
80.
Security is one of the major issues in MANETs. Their natural characteristics make them vulnerable to numerous severe attacks. It is widely acknowledged that cryptography provides a set of strong techniques against most vulnerabilities. Several cryptographic mechanisms for MANETs can be found in the literature. Among them, identity-based cryptographic mechanisms and key management schemes are proposed to simplify key management and to reduce the memory storage cost. This article presents the most important ID-based key management schemes, discussing their approaches, strengths, and weaknesses, and comparing their main features. It also presents the main IDbased key management application fields on MANETs. In this way it can be useful for users and researchers as a starting point on ID-based key management and its possible uses in MANETs.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号